43 research outputs found
Implementation of CAVENET and its usage for performance evaluation of AODV, OLSR and DYMO protocols in vehicular networks
Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based VEhicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.Peer ReviewedPostprint (published version
The architecture of a web service-based remote control service system
There is increasing attention recently in the development of
remote control and monitoring. Many applications and
experiments have been done to apply internet technology in this
field with the aim of developing a general and expendable
architecture. In this paper, a novel Web Service-based Remote
Control Service System (WSRCSS) is proposed. Compared with
other designs, this system focuses on offering a service
development and delivery environment. The system architecture
and data structure for the system are given. Related works are also
discussed in this paper
Designing a Mobile Linguist Guide Application to Facilitate the Communication Between Malaysian and Arabs
Mobile device can be used anywhere and anytime. Relying on this characteristic, the research aims to introduce electronic linguist guide can be applied on the mobile
devices in order to obtain the communication between the countries which are talking different languages. Facilitating or enhancing the communication leads to
convergence of cultures. As long as the research deals with Malaysians and those people who talk Arabic language, that will be useful for both sides where the Malaysians will be more familiar with the Arabic language which is the Holy Quran language and Arabs can spread the Islamic language actively. Learning common phrases will urge users to have more about a specific language. Hope of the benefits of this study serves more than two kinds of people if we have knew it can expand for including many languages
The architecture of a web service-based remote control service system
There is increasing attention recently in the development of
remote control and monitoring. Many applications and
experiments have been done to apply internet technology in this
field with the aim of developing a general and expendable
architecture. In this paper, a novel Web Service-based Remote
Control Service System (WSRCSS) is proposed. Compared with
other designs, this system focuses on offering a service
development and delivery environment. The system architecture
and data structure for the system are given. Related works are also
discussed in this paper
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement
The increasing use of graph-structured data for business- and
privacy-critical applications requires sophisticated, flexible and fine-grained
authorization and access control. Currently, role-based access control is
supported in graph databases, where access to objects is restricted via roles.
This does not take special properties of graphs into account such as vertices
and edges along the path between a given subject and resource. In previous
iterations of our research, we started to design an authorization policy
language and access control model, which considers the specification of graph
paths and enforces them in the multi-model database ArangoDB. Since this
approach is promising to consider graph characteristics in data protection, we
improve the language in this work to provide flexible path definitions and
specifying edges as protected resources. Furthermore, we introduce a method for
a datastore-independent policy enforcement. Besides discussing the latest work
in our XACML4G model, which is an extension to the Extensible Access Control
Markup Language (XACML), we demonstrate our prototypical implementation with a
real case and give an outlook on performance.Comment: Extended version of an accepted paper at the 20th International
Conference on Security and Cryptography (SECRYPT), 202
Supporting personalised content management in smart health information portals
Information portals are seen as an appropriate platform for personalised healthcare and wellbeing information provision. Efficient content management is a core capability of a successful smart health information portal (SHIP) and domain expertise is a vital input to content management when it comes to matching user profiles with the appropriate resources. The rate of generation of new health-related content far exceeds the numbers that can be manually examined by domain experts for relevance to a specific topic and audience. In this paper we investigate automated content discovery as a plausible solution to this shortcoming that capitalises on the existing database of expert-endorsed content as an implicit store of knowledge to guide such a solution. We propose a novel content discovery technique based on a text analytics approach that utilises an existing content repository to acquire new and relevant content. We also highlight the contribution of this technique towards realisation of smart content management for SHIPs.<br /
User Privacy in Mobile Advertising
With the pervasiveness of mobile devices in our daily life continuously increasing, mobile advertising is emerging as an important marketing strategy. However, due to its intrusive nature in practice, there has been a growing concern over users’ privacy in mobile advertising, especially push-based mode, which can affect consumers’ acceptance and effectiveness of mobile advertising. Aiming to gain a deeper understanding of not only users’ concerns of privacy intrusion in mobile advertising, but also the potential solutions to addressing those concerns, we conducted a survey in this study. The findings of this study provide a few useful insights for researchers, advertisers, and businesses on both the importance and methods of privacy protection in mobile advertising from a user perspective