624 research outputs found
Relevant Affect Factors of Smartphone Mobile Data Traffic
Smartphones are used to access a wide range of different information and communication services and perform functions based on data transfer. A number of subscription contracts for smartphones is rapidly increasing, and the development of mobile communications network provides higher speed of data transfer. The continuous increase in the average amount of data traffic per one subscriber contract leads to an increase in the total Mobile Data Traffic (MDT), globally. This research represents a summary of factors that affect the amount of smartphone MDT. Previous literature shows only a few of the factors individually that affect the realization of smartphone MDT. The results of the research clarify the ways which influence the amount of MDT generated by a smartphone. This paper increases the awareness of the users of the methods of generating smartphone MDT. The research also allows users to specify parameters that affect the prediction of generated MDT of a smartphone
Relevant Affect Factors of Smartphone Mobile Data Traffic
Smartphones are used to access a wide range of different information and communication services and perform functions based on data transfer. A number of subscription contracts for smartphones is rapidly increasing, and the development of mobile communications network provides higher speed of data transfer. The continuous increase in the average amount of data traffic per one subscriber contract leads to an increase in the total Mobile Data Traffic (MDT), globally. This research represents a summary of factors that affect the amount of smartphone MDT. Previous literature shows only a few of the factors individually that affect the realization of smartphone MDT. The results of the research clarify the ways which influence the amount of MDT generated by a smartphone. This paper increases the awareness of the users of the methods of generating smartphone MDT. The research also allows users to specify parameters that affect the prediction of generated MDT of a smartphone
Optimizing Mobile Application Performance through Network Infrastructure Aware Adaptation.
Encouraged by the fast adoption of mobile devices and the widespread deployment of mobile networks, mobile applications are becoming the preferred “gateways” connecting users to networking services. Although the CPU capability of mobile devices is approaching that of off-the-shelf PCs, the performance of mobile networking applications is still far behind. One of the fundamental reasons is that most mobile applications are unaware of the mobile network specific characteristics, leading to inefficient network and device resource utilization. Thus, in order to improve the user experience for most mobile applications, it is essential to dive into the critical network components along network connections including mobile networks, smartphone platforms, mobile applications, and content partners. We aim to optimize the performance of mobile network applications through network-aware resource adaptation approaches. Our techniques consist of the following four aspects: (i) revealing the fundamental infrastructure characteristics of cellular networks that are distinctive from wireline networks; (ii) isolating the impact of important factors on user perceived performance in mobile network applications; (iii) determining the particular usage patterns of mobile applications; and (iv) improving the performance of mobile applications through network aware adaptations.PhDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/99829/1/qiangxu_1.pd
Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges
Today's mobile phones are far from mere communication devices they were ten
years ago. Equipped with sophisticated sensors and advanced computing hardware,
phones can be used to infer users' location, activity, social setting and more.
As devices become increasingly intelligent, their capabilities evolve beyond
inferring context to predicting it, and then reasoning and acting upon the
predicted context. This article provides an overview of the current state of
the art in mobile sensing and context prediction paving the way for
full-fledged anticipatory mobile computing. We present a survey of phenomena
that mobile phones can infer and predict, and offer a description of machine
learning techniques used for such predictions. We then discuss proactive
decision making and decision delivery via the user-device feedback loop.
Finally, we discuss the challenges and opportunities of anticipatory mobile
computing.Comment: 29 pages, 5 figure
A Survey on Cellular-connected UAVs: Design Challenges, Enabling 5G/B5G Innovations, and Experimental Advancements
As an emerging field of aerial robotics, Unmanned Aerial Vehicles (UAVs) have
gained significant research interest within the wireless networking research
community. As soon as national legislations allow UAVs to fly autonomously, we
will see swarms of UAV populating the sky of our smart cities to accomplish
different missions: parcel delivery, infrastructure monitoring, event filming,
surveillance, tracking, etc. The UAV ecosystem can benefit from existing 5G/B5G
cellular networks, which can be exploited in different ways to enhance UAV
communications. Because of the inherent characteristics of UAV pertaining to
flexible mobility in 3D space, autonomous operation and intelligent placement,
these smart devices cater to wide range of wireless applications and use cases.
This work aims at presenting an in-depth exploration of integration synergies
between 5G/B5G cellular systems and UAV technology, where the UAV is integrated
as a new aerial User Equipment (UE) to existing cellular networks. In this
integration, the UAVs perform the role of flying users within cellular
coverage, thus they are termed as cellular-connected UAVs (a.k.a. UAV-UE,
drone-UE, 5G-connected drone, or aerial user). The main focus of this work is
to present an extensive study of integration challenges along with key 5G/B5G
technological innovations and ongoing efforts in design prototyping and field
trials corroborating cellular-connected UAVs. This study highlights recent
progress updates with respect to 3GPP standardization and emphasizes
socio-economic concerns that must be accounted before successful adoption of
this promising technology. Various open problems paving the path to future
research opportunities are also discussed.Comment: 30 pages, 18 figures, 9 tables, 102 references, journal submissio
Social Computing for Mobile Big Data
Mobile big data contains vast statistical features in various dimensions, including spatial, temporal, and the underlying social domain. Understanding and exploiting the features of mobile data from a social network perspective will be extremely beneficial to wireless networks, from planning, operation, and maintenance to optimization and marketing
Mobile network anomaly detection and mitigation: The NEMESYS approach
Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and eliminate or mitigate their effects, as part of the EU FP7 NEMESYS project. These ideas are supplemented with a careful review of the state-of-the-art regarding anomaly detection techniques that mobile network operators may use to protect their infrastructure and secure users against malware
IoT vs. Human: A Comparison of Mobility
Internet of Thing (IoT) devices are rapidly becoming an indispensable part of our life with their increasing deployment in many promising areas, including tele-health, smart city, intelligent agriculture. Understanding the mobility of IoT devices is essential to improve quality of service in IoT applications, such as route planning in logistic management, infrastructure deployment, cellular network update and congestion detection in intelligent traffic. Despite its importance, there are not many results pertaining to the mobility of IoT devices. In this article, we aim to answer three research questions: (i) what are the mobility patterns of IoT device? (ii) what are the differences between IoT device and smartphone mobility patterns? (iii) how the IoT device mobility patterns differ among device types and usage scenarios? We present a comprehensive characterization of IoT device mobility patterns from the perspective of cellular data networks, using a 36-days long signal trace, including 1.5 million IoT devices and 0.425 million smartphones, collected from a nation-wide cellular network in China. We first investigate the basic patterns of IoT devices from two perspectives: temporal and spatial characteristics. Our study finds that IoT device mobility exhibits significantly different patterns compared with smartphones in multiple aspects. For instance, IoT devices move more frequently and have larger radius of gyration. Then we explore the essential mobility of IoT devices by utilizing two models that reveal the nature of human mobility, i.e., exploration and preferential return (EPR) model and entropy based predictability model. We find that IoT devices, with few exceptions, behave totally different from human, and we further derive a new formulation to describe their movement. We also find the gap mobility predictability and predictability limit between IoT and human is not as big as people expected.Peer reviewe
- …