331 |
Quality of service routing in mobile ad hoc networks /Chau, Ming Kit. January 2003 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 156-159). Also available in electronic version. Access restricted to campus users.
|
332 |
"It's the future!" : A qualitative study exploring Generation Y’s attitude towards m-commerceSteinbernreiter, Kajsa, Roback, Lisa, Bergström, Helena January 2015 (has links)
Background: Mobile commerce (m-commerce) is a result of the phenomenal growth in Internet usage combined with the increasing number of mobile phone users. Entering mobile websites or apps in purchase-, sale- or trade purposes by using a tablet or smart phone, is the definition of m-commerce. To comprehend an individual’s attitude (affect, beliefs and cognition) is of importance in order to find out how the attitude towards an object will affect the consumer. Up until today, no consensus is drawn regarding the consumers attitude towards mobile shopping. Generation Y is seen as the most frequent users of mobile devices, even though previous research has not focused on exploring their attitude towards m-commerce. Research questions: 1. How are the components of attitude associated with the m-commerce factors? 2. What kind of function does each m-commerce factor fulfil? Purpose: The purpose is to explore Generation Y’s attitude towards m-commerce. Methodology: A qualitative exploratory study with elements of a case study conducted through seven semi-structured interviews. Conclusion: The study concludes that the Generation Y holds a positive attitude towards ubiquity, convenience and security, a negative attitude towards technology and localisation and a mixed attitude towards personalisation within m-commerce.
|
333 |
High-capacity communication systems using advanced optical and wireless technologiesZhu, Ming 08 June 2015 (has links)
The increasing traffic demand from the use of 3G/4G, streaming, and other broadband wireless services exposes existing bottlenecks in the communications infrastructure and the coordination between the wireless network and its wired counterpart. While wireless systems are constantly evolving to newer generations and higher capacities, their supporting wired networks urgently require advancements in both architecture design and enabling technologies. New optical access systems specifically tailored for the unique natures of various wireless standards are investigated. This dissertation presents the design and experimental verification of high-capacity optical-wireless communication systems using advanced electrical and optical technologies.
Technologies such as high level modulation and multiple-input and multiple-output (MIMO) to increase the spectral efficiency is approaching the Shannon limit. New frequency bands with larger bandwidth are to be explored; for example, millimetre wave (mm-wave) spectrum range (30-300 GHz), especially the license-free spectrum located in 60 GHz. Although fiber-optic systems excel in the high-bandwidth core network, as bandwidth demand increases, more and more progress has been made towards the usage of fiber in the last mile. Radio-over-Fiber (RoF) technology has been proposed as a cost-effective optical access solution to support high-speed wireless communications, especially at the mm-wave band. Signal processing and coordination are centralized at the central office (CO), making the system economical and simple to build, operate, and maintain. Moreover, RoF systems are capable of delivering radio signals with different frequencies and protocols simultaneously. Therefore, the advantage of integrated fiber wireless systems leads to the first research topic of this dissertation: multi-band multi-service RoF systems. With an emphasis on the uniformity of the RoF platform that accommodates both legacy wireless services and advanced mm-wave services, the first part of the dissertation presents two schemes - analog all-band RoF and band-mapped 60-GHz RoF - to cover distinct application scenarios. In the all-band RoF access architecture, lower RF signals, such as Wi-Fi and cellular signals, and 60-GHz signal are transmitted at their original carrier frequencies for both indoor and outdoor coverages. On the other hand, the band-mapped mm-wave RoF scheme, fully utilizing the wide 7-GHz bandwidth at 60 GHz, delivers multiple converged high-speed services only through 60-GHz wireless link, which is especially suited for in-building broadband wireless access. The experimental verification of an all-band RoF system featuring relaxed component requirement is introduced, followed by a real-time multi-service demonstration in the proposed band-mapped 60-GHz RoF system.
This dissertation also presents the design, analysis, and experimental demonstration of next-generation high-capacity cellular networks to keep up with the ever-growing bandwidth demand and performance requirements. New mobile backhaul (MBH) architectures based on orthogonal frequency division multiple access (OFDMA) are proposed along with a simple and low-latency clock distribution and recovery scheme. The transmission of OFDMA signals in the dense wavelength division multiplexing (DWDM) network with flexible clock rates and DSP-free clock recovery is implemented. Also, a spectrally-efficient, low-complexity clock distribution and recovery scheme for OFDMA-based MBH in coherent ultra-dense WDM (UDWDM) system is demonstrated. Finally, mobile fronthaul (MFH) architectures based on subcarrier multiplexing (SCM) technology, which significantly reduces the requirements on both the number of wavelengths per cell site and the optical bandwidth of the optical transceivers, are systematically investigated. Additionally, two upstream schemes, tailored for the uplink (UL), are introduced to maintain low complexity, and more importantly, to achieve high spectral efficiency by wavelength sharing.
Therefore, Internet-access-oriented optical-wireless systems using Wi-Fi and other emerging mm-wave technologies are developed along with the optical fronthaul and backhaul for cellular networks in this dissertation. Moreover, with the proposed techniques, heterogeneous networks can be seamlessly provided even with different services, radio nodes, and performance requirements.
|
334 |
Addressing connectivity challenges for mobile computing and communicationShi, Cong 27 August 2014 (has links)
Mobile devices are increasingly being relied on for computation intensive and/or communication intensive applications that go beyond simple connectivity and demand more complex processing. This has been made possible by two trends. First, mobile devices, such as smartphones and tablets, are increasingly capable devices with processing and storage capabilities that make significant step improvements with every generation. Second, many improved connectivity options (e.g., 3G, WiFi, Bluetooth) are also available to mobile devices.
In the rich computing and communication environment, it is promising but also challenging for mobile devices to take advantage of various available resources to improve the performance of mobile applications. First, with varying connectivity, remote computing resources are not always accessible to mobile devices in a predictable way. Second, given the uncertainty of connectivity and computing resources, their contention will become severe.
This thesis seeks to address the connectivity challenges for mobile computing and communication. We propose a set of techniques and systems that help mobile applications to better handle the varying network connectivity in the utilization of various computation and communication resources. This thesis makes the following contributions:
We design and implement Serendipity to allow a mobile device to use other encountered, albeit intermittently, mobile devices to speedup the execution of parallel applications through carefully allocating computation tasks among intermittently connected mobile devices.
We design and implement IC-Cloud to enable a group of mobile devices to efficiently use the cloud computing resources for computation offloading even when the connectivity is varying or intermittent.
We design and implement COSMOS to provide scalable computation offloading service to mobile devices at low cost by efficiently managing and allocating cloud computing resources.
We design and implement CoAST to allow collaborative application-aware scheduling of mobile traffic to reduce the contention for bandwidth among communication-intensive applications without affecting their user experience.
|
335 |
Analyse Mobile Device Management CriteriaJalili, Mahmoud January 2014 (has links)
Mobility and using smartphones and tablets as replacement of laptops are getting to be increasingly vital for enterprises and accordingly bring new concerns from different perspective for both companies and individuals. To achieve enterprise mobility companies needs to ensure that the mobile equipment are always connected, complies with security policy in a safe and protected path toward being productivity and efficiency. To approach these purposes Mobile Device Management (MDM) was created few years back in order to not only secure enterprises information but additionally manage user’s activities and equipment. However there is no general methodology to define criteria weight for these systems and rather depends on different enterprise policy. One primary issue here is availability of many MDM solutions in market and several difficulties to compare them together and meanwhile most of comparison documents limited based on white papers of providers which mostly designed for commercial market purposes. This thesis will come up with a list of important properties for MDM solutions and evaluate several of solutions as well as categorizing all available criteria in this area. Second part of thesis is a case study of choosing proper MDM solution for two different scenarios and give recommendations on what products to utilize relying upon what sort of association you have. In order to achieve this, strong analytical methods are required to compare existing services and sharper eye from security perspective toward the applications.
|
336 |
Analyzing Mobile App Privacy Using Computation and CrowdsourcingAmini, Shahriyar 01 May 2014 (has links)
Mobile apps can make use of the rich data and sensors available on smartphones to offer compelling services. However, the use of sensitive resources by apps is not always justified, which has led to new kinds of privacy risks and challenges. While it is possible for app market owners and third-parties to analyze the privacy-related behaviors of apps, present approaches are difficult and tedious.
I present two iterations of the design, implementation, and evaluation of a system, Gort, which enables more efficient app analysis, by reducing the burden of instrumenting apps, making it easier to find potential privacy problems, and presenting sensitive behavior in context. Gort interacts with apps while instrumenting them to detect sensitive information transmissions. It then presents this information along with the associated app context to a crowd of users to obtain their expectations and comfort regarding the privacy implications of using the app. Gort also runs a set of heuristics on the app to flag potential privacy problems. Finally, Gort synthesizes the information obtained through its analysis and presents it in an interactive GUI, built specifically for privacy analysts.
This work offers three distinct new advances over the state of the art. First, Gort uses a set of heuristics, elicited through interviews with 12 experts, to identify potential app privacy problems. Gort heuristics present high-level privacy problems instead of the overwhelming amount of information offered through existing tools. Second, Gort automatically interacts with apps by discovering and interacting with UI elements while instrumenting app behavior. This eliminates the need for analysts to manually interact with apps or to script interactions. Third, Gort uses crowdsourcing in a novel way to determine whether app privacy leaks are legitimate and desirable and raises red flags about potentially suspicious app behavior. While existing tools can detect privacy leaks, they cannot determine whether the privacy leaks are beneficial or desirable to the user. Gort was evaluated through two separate user studies. The experiences from building Gort and the insights from the user studies guide the creation of future systems, especially systems intended for the inspection and analysis of software.
|
337 |
Implementing touch interaction in a casual mobile gameAndersson, Gustav January 2014 (has links)
This thesis is to help developers in the touch design of casual games. The thesis work was made on the development platform Gideros Mobile and much of the thesis theory and methods will be based on that work. The purpose of the report is to show what one should think about when making a casual game in a touch design perspective, like taking into account that most people are used to one type of input design (like swiping or tapping), that you should design the game with the purpose to reach out to as a large audience as possible (taking into account people with disabilities) and some small notes on what should be avoided so not to deter people from wanting to play the game. It is important to note that this thesis is built for the purpose of mobile casual games, others will probably not find this thesis relevant.
|
338 |
Network Decontamination with Temporal ImmunityYassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents.
In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur.
We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
|
339 |
Dynamically reconfigurable architecture for third generation mobile systemsAlsolaim, Ahmad M. January 2002 (has links)
Thesis (Ph. D.)--Ohio University, August, 2002. / Title from PDF t.p. Includes bibliographical references (leaves 298-307).
|
340 |
Neuro-fuzzy admission control in mobile communications systemsRaad, Raad. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes bibliographical references: leaf 234-249.
|
Page generated in 0.035 seconds