7 research outputs found

    Available Bandwidth and RSRP Based Handover Algorithm for LTE/LTE-Advanced Networks Tested in LTE-Sim Simulator

    Get PDF
    In this paper, we propose a new algorithm that improves the performance of the operation of Handover (HO) in LTE-Advanced (LTE-A) networks. As recognized, Mobility Management (MM) is an important pillar in LTE/LTE-A systems to provide high quality of service to users on the move. The handover algorithms define the method and the steps to follow to ensure a reliable transfer of the UEs from one cell to another without interruption or degradation of the services offered by the network. In this paper, the authors proposed a new handover algorithm for LTE/LTE-A networks based on the measurement and calculation of two important parameters, namely the available bandwidth and the Received Power (RSRP) at the level of eNodeBs. The proposed scheme named LTE Available Bandwidth and RSRP Based Handover Algorithm (LABRBHA) was tested in comparison with well-known algorithms in the literature as the LHHA, LHHAARC and the INTEGRATOR scheme using the open source simulator LTE-Sim. Finally, the network performances were investigated via three indicators: the number of lost packets during the handover operation, the latency as well as the maximum system throughput. The results reported that our algorithm shows remarkable improvements over other transfer schemes

    Annual Report, 2013-2014

    Get PDF
    Beginning in 2004/2005- issued in online format onl

    A crowdsensing method for water resource monitoring in smart communities

    Get PDF
    Crowdsensing aims to empower a large group of individuals to collect large amounts of data using their mobile devices, with the goal of sharing the collected data. Existing crowdsensing studies do not consider all the activities and methods of the crowdsensing process and the key success factors related to the process. Nor do they investigate the profile and behaviour of potential participants. The aim of this study was to design a crowdsensing method for water resource monitoring in smart communities. This study opted for an exploratory study using the Engaged Scholarship approach, which allows the study of complex real-world problems based on the different perspectives of key stakeholders. The proposed Crowdsensing Method considers the social, technical and programme design components. The study proposes a programme design for the Crowdsensing Methodwhich is crowdsensing ReferenceFrameworkthat includes Crowdsensing Processwith key success factors and guidelines that should be considered in each phase of the process. The method also uses the Theory of Planned Behaviour (TPB) to investigate citizens’intention to participate in crowdsensing for water resource monitoring and explores their attitudes, norms and perceived behavioural control on these intentions. Understanding the profiles of potential participants can assist with designing crowdsensing systems with appropriate incentive mechanisms to achieve adequate user participation and good service quality. A survey was conducted to validate the theoretical TB model in a real-world context. Regression and correlation analyses demonstrated that the attitudes, norms and perceived behavioural control can be used to predict participants’ intention to participate in crowdsensing for water resource monitoring. The survey results assisted with the development of an Incentive Mechanism as part of the Crowdsensing Method. This mechanism incorporates recruitment and incentive policies, as well as guidelines derived from the literature review and extant system analysis. The policies, called the OverSensepolicies, provide guidance for recruitment and rewarding of participants using the popular Stackelberg technique. The policies were evaluated using simulation experiments with a data set provided by the case study, the Nelson Mandela Bay Municipality. The results of the simulation experiments illustrated that the OverSenserecruitmentpolicycan reduce the computing resources required for the recruitment of participants and that the recruitment policy performs better than random or naïve recruitment policies. The proposed Crowdsensing Method was evaluated using an ecosystem of success factors for mobile-based interventions identified in the literature and the Crowdsensing Method adhered to a majority (90%) of the success factors. This study also contributes information systems design theory by proposing several sets of guidelines for crowdsensing projects and the development of crowdsensing systems. This study fulfils an identified need to study the applicability of crowdsensing for water resource monitoring and explores how a crowdsensing method can create a smart community

    Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información RECSI XIII : Alicante, 2-5 de septiembre de 2014

    Get PDF
    Si tuviéramos que elegir un conjunto de palabras clave para definir la sociedad actual, sin duda el término información sería uno de los más representativos. Vivimos en un mundo caracterizado por un continuo flujo de información en el que las Tecnologías de la Información y Comunicación (TIC) y las Redes Sociales desempeñan un papel relevante. En la Sociedad de la Información se generan gran variedad de datos en formato digital, siendo la protección de los mismos frente a accesos y usos no autorizados el objetivo principal de lo que conocemos como Seguridad de la Información. Si bien la Criptología es una herramienta tecnológica básica, dedicada al desarrollo y análisis de sistemas y protocolos que garanticen la seguridad de los datos, el espectro de tecnologías que intervienen en la protección de la información es amplio y abarca diferentes disciplinas. Una de las características de esta ciencia es su rápida y constante evolución, motivada en parte por los continuos avances que se producen en el terreno de la computación, especialmente en las últimas décadas. Sistemas, protocolos y herramientas en general considerados seguros en la actualidad dejarán de serlo en un futuro más o menos cercano, lo que hace imprescindible el desarrollo de nuevas herramientas que garanticen, de forma eficiente, los necesarios niveles de seguridad. La Reunión Española sobre Criptología y Seguridad de la Información (RECSI) es el congreso científico español de referencia en el ámbito de la Criptología y la Seguridad en las TIC, en el que se dan cita periódicamente los principales investigadores españoles y de otras nacionalidades en esta disciplina, con el fin de compartir los resultados más recientes de su investigación. Del 2 al 5 de septiembre de 2014 se celebrará la decimotercera edición en la ciudad de Alicante, organizada por el grupo de Criptología y Seguridad Computacional de la Universidad de Alicante. Las anteriores ediciones tuvieron lugar en Palma de Mallorca (1991), Madrid (1992), Barcelona (1994), Valladolid (1996), Torremolinos (1998), Santa Cruz de Tenerife (2000), Oviedo (2002), Leganés (2004), Barcelona (2006), Salamanca (2008), Tarragona (2010) y San Sebastián (2012)
    corecore