43 research outputs found

    Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks

    Get PDF
    Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based VEhicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.Peer ReviewedPostprint (published version

    The architecture of a web service-based remote control service system

    Get PDF
    There is increasing attention recently in the development of remote control and monitoring. Many applications and experiments have been done to apply internet technology in this field with the aim of developing a general and expendable architecture. In this paper, a novel Web Service-based Remote Control Service System (WSRCSS) is proposed. Compared with other designs, this system focuses on offering a service development and delivery environment. The system architecture and data structure for the system are given. Related works are also discussed in this paper

    Designing a Mobile Linguist Guide Application to Facilitate the Communication Between Malaysian and Arabs

    Get PDF
    Mobile device can be used anywhere and anytime. Relying on this characteristic, the research aims to introduce electronic linguist guide can be applied on the mobile devices in order to obtain the communication between the countries which are talking different languages. Facilitating or enhancing the communication leads to convergence of cultures. As long as the research deals with Malaysians and those people who talk Arabic language, that will be useful for both sides where the Malaysians will be more familiar with the Arabic language which is the Holy Quran language and Arabs can spread the Islamic language actively. Learning common phrases will urge users to have more about a specific language. Hope of the benefits of this study serves more than two kinds of people if we have knew it can expand for including many languages

    The architecture of a web service-based remote control service system

    Get PDF
    There is increasing attention recently in the development of remote control and monitoring. Many applications and experiments have been done to apply internet technology in this field with the aim of developing a general and expendable architecture. In this paper, a novel Web Service-based Remote Control Service System (WSRCSS) is proposed. Compared with other designs, this system focuses on offering a service development and delivery environment. The system architecture and data structure for the system are given. Related works are also discussed in this paper

    XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement

    Full text link
    The increasing use of graph-structured data for business- and privacy-critical applications requires sophisticated, flexible and fine-grained authorization and access control. Currently, role-based access control is supported in graph databases, where access to objects is restricted via roles. This does not take special properties of graphs into account such as vertices and edges along the path between a given subject and resource. In previous iterations of our research, we started to design an authorization policy language and access control model, which considers the specification of graph paths and enforces them in the multi-model database ArangoDB. Since this approach is promising to consider graph characteristics in data protection, we improve the language in this work to provide flexible path definitions and specifying edges as protected resources. Furthermore, we introduce a method for a datastore-independent policy enforcement. Besides discussing the latest work in our XACML4G model, which is an extension to the Extensible Access Control Markup Language (XACML), we demonstrate our prototypical implementation with a real case and give an outlook on performance.Comment: Extended version of an accepted paper at the 20th International Conference on Security and Cryptography (SECRYPT), 202

    MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

    Get PDF

    Supporting personalised content management in smart health information portals

    Get PDF
    Information portals are seen as an appropriate platform for personalised healthcare and wellbeing information provision. Efficient content management is a core capability of a successful smart health information portal (SHIP) and domain expertise is a vital input to content management when it comes to matching user profiles with the appropriate resources. The rate of generation of new health-related content far exceeds the numbers that can be manually examined by domain experts for relevance to a specific topic and audience. In this paper we investigate automated content discovery as a plausible solution to this shortcoming that capitalises on the existing database of expert-endorsed content as an implicit store of knowledge to guide such a solution. We propose a novel content discovery technique based on a text analytics approach that utilises an existing content repository to acquire new and relevant content. We also highlight the contribution of this technique towards realisation of smart content management for SHIPs.<br /

    User Privacy in Mobile Advertising

    Get PDF
    With the pervasiveness of mobile devices in our daily life continuously increasing, mobile advertising is emerging as an important marketing strategy. However, due to its intrusive nature in practice, there has been a growing concern over users’ privacy in mobile advertising, especially push-based mode, which can affect consumers’ acceptance and effectiveness of mobile advertising. Aiming to gain a deeper understanding of not only users’ concerns of privacy intrusion in mobile advertising, but also the potential solutions to addressing those concerns, we conducted a survey in this study. The findings of this study provide a few useful insights for researchers, advertisers, and businesses on both the importance and methods of privacy protection in mobile advertising from a user perspective
    corecore