18 research outputs found

    From fixed to mobile femtocells in LTE systems: issues and challenges

    Get PDF
    This paper investigates the concept of Mobile Femtocell which is the extension of implementing Mobile Relays and Fixed Femtocells. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. This study intends to help cell-edge users to have better signal strength. An investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. This paper is considering several scenarios namely; Fixed Femtocells with Fixed users, Mobile Femtocells with fixed users, Fixed Femtocells with mobile users and Finally Mobile Femtocells with mobile users. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users

    Factors influencing cloud computing adoption in Yemen higher education institutions

    Get PDF
    Cloud-based technology, which is now well established, helps reducing costs and providing accessibility, reliability and flexibility. However, the Yemen Higher educational system has not yet embraced cloud computing due to security and privacy concerns, lack of trust, negative cultural attitudes (i.e. tribalism), and most importantly, little digital devices experience in educational settings as well as lack of knowledge and technical know-how. Thus, this study proposes a conceptual model of cloud computing (CC) adoption in Yemen HEIs by investigating the influence of Technology, Organization and Environment (TOE) factors. In addition, this study investigates the moderating effect of tribalism culture in the relationships between the identified factors and CC adoption. The study employed both qualitative and quantitative approaches. A preliminary study through semi-structured interviews with ten (10) participants from top management of HEIs to refine and confirm the proposed model. The quantitative approach was used to determine the factors that influence CC adoption in Yemen HEIs through a questionnaire survey. Data were collected from 328 respondents in 38 HEIs and analyzed using Partial Least Square (PLS) Structural Equation Modelling (SEM). The results showed that relative advantage, reliability, compatibility, security, technology readiness, top management support, regulatory policy and competitive pressure have a positive significant impact on CC adoption. However, tribalism culture has a negative significant impact towards CC adoption. The study also found that tribalism culture moderates the relationship between compatibility, reliability, security, relative advantage, regulatory policy and CC adoption. This study contributes to TOE model adoption by including the cultural factor as a moderator towards CC adoption in Yemen HEIs. The study also provides a model and insights for HEIs, technology consultants, vendors and policy makers in better understanding of the factors that influence CC adoption in least developed countries (LDCs), specifically, Yemen

    Intelligent evacuation management systems: A review

    Get PDF
    Crowd and evacuation management have been active areas of research and study in the recent past. Various developments continue to take place in the process of efficient evacuation of crowds in mass gatherings. This article is intended to provide a review of intelligent evacuation management systems covering the aspects of crowd monitoring, crowd disaster prediction, evacuation modelling, and evacuation path guidelines. Soft computing approaches play a vital role in the design and deployment of intelligent evacuation applications pertaining to crowd control management. While the review deals with video and nonvideo based aspects of crowd monitoring and crowd disaster prediction, evacuation techniques are reviewed via the theme of soft computing, along with a brief review on the evacuation navigation path. We believe that this review will assist researchers in developing reliable automated evacuation systems that will help in ensuring the safety of the evacuees especially during emergency evacuation scenarios

    Estimating Footfall From Passive Wi-Fi Signals: Case Study with Smart Street Sensor Project

    Get PDF
    Measuring the distribution and dynamics of the population at granular level both spatially and temporally is crucial for understanding the structure and function of the built environment. In this era of big data, there have been numerous attempts to undertake this using the preponderance of unstructured, passive and incidental digital data which are generated from day-to-day human activities. In attempts to collect, analyse and link these widely available datasets at a massive scale, it is easy to put the privacy of the study subjects at risk. This research looks at one such data source - Wi-Fi probe requests generated by mobile devices - in detail, and processes it into granular, long-term information on number of people on the retail high streets of the United Kingdom (UK). Though this is not the first study to use this data source, the thesis specifically targets and tackles the uncertainties introduced in recent years by the implementation of features designed to protect the privacy of the users of Wi-Fi enabled mobile devices. This research starts with the design and implementation of multiple experiments to examine Wi-Fi probe requests in detail, then later describes the development of a data collection methodology to collect multiple sets of probe requests at locations across London. The thesis also details the uses of these datasets, along with the massive dataset generated by the ‘Smart Street Sensor’ project, to devise novel data cleaning and processing methodologies which result in the generation of a high quality dataset which describes the volume of people on UK retail high streets with a granularity of 5 minute intervals since August 2015 across 1000 locations (approx.) in 115 towns. This thesis also describes the compilation of a bespoke ‘Medium data toolkit’ for processing Wi-Fi probe requests (or indeed any other data with a similar size and complexity). Finally, the thesis demonstrates the value and possible applications of such footfall information through a series of case studies. By successfully avoiding the use of any personally identifiable information, the research undertaken for this thesis also demonstrates that it is feasible to prioritise the privacy of users while still deriving detailed and meaningful insights from the data generated by the users

    Framework for Automated Functional Tests within Value-Added Service Environments

    Get PDF
    Full version unavailable due to 3rd party copyright restrictions.Recent years have witnessed that standard telecommunication services evolved more and more to next generation value-added services. This fact is accompanied by a change of service characteristics as new services are designed to fulfil the customer’s demands instead of just focussing on technologies and protocols. These demands can be very specific and, therefore, diverse potential service functionalities have to be considered by the service providers. To make matters worse for service providers, a fast transition from concept to market product and low price of a new service is required due to the increasing competition in the telecommunication industry. Therefore, effective test solutions need to be developed that can be integrated in current value-added service development life-cycles. Besides, these solutions should support the involvement of all participating stakeholders such as the service provider, the test developers as well as the service developers, and, in order to consider an agile approach, also the service customer. This thesis proposes a novel framework for functional testing that is based on a new sort of description language for value-added services (Service Test Description). Based on instances of the Service Test Description, sets of reusable test components described by means of an applied Statecharts notation are automatically selected and composed to so-called behaviour models. From the behaviour models, abstract test cases can be automatically generated which are then transformed to TTCN-3 test cases and then assembled to an Executable Test Suite. Within a TTCN-3 test system, the Executable Test Suite can be executed against the corresponding value-added service referred to as System Under Test. One benefit of the proposed framework is its application within standard development life-cycles. Therefore, the thesis presents a methodology that considers both service development and test development as parallel tasks and foresees procedures to synchronise the tasks and to allow an agile approach with customer involvement. The novel framework is validated through a proof-of-concept working prototype. Example value-added services have been chosen to illustrate the whole process from compiling instances of the Service Test Description until the execution of automated tests. Overall, this thesis presents a novel solution for service providers to improve the quality of their provided value-added services through automated functional testing procedures. It enables the early involvement of the customers into the service development life-cycle and also helps test developers and service developers to collaborate

    An integrated security Protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol Network

    Get PDF
    Internet of Things communication is mainly based on a machine-to-machine pattern, where devices are globally addressed and identified. However, as the number of connected devices increase, the burdens on the network infrastructure increase as well. The major challenges are the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone. To address these problems, an Internet Engineering Task Force (IETF) working group, along with the research group at Cisco, are still working on the Locator/ID Separation Protocol as a routing architecture that can provide new semantics for the IP addressing, to simplify routing operations and improve scalability in the future of the Internet such as the Internet of Things. Nonetheless, The Locator/ID Separation Protocol is still at an early stage of implementation and the security Protocol e.g. Internet Protocol Security (IPSec), in particular, is still in its infancy. Based on this, three scenarios were considered: Firstly, in the initial stage, each Locator/ID Separation Protocol-capable router needs to register with a Map-Server. This is known as the Registration Stage. Nevertheless, this stage is vulnerable to masquerading and content poisoning attacks. Secondly, the addresses resolving stage, in the Locator/ID Separation Protocol the Map Server (MS) accepts Map-Request from Ingress Tunnel Routers and Egress Tunnel Routers. These routers in trun look up the database and return the requested mapping to the endpoint user. However, this stage lacks data confidentiality and mutual authentication. Furthermore, the Locator/ID Separation Protocol limits the efficiency of the security protocol which works against redirecting the data or acting as fake routers. Thirdly, As a result of the vast increase in the different Internet of Things devices, the interconnected links between these devices increase vastly as well. Thus, the communication between the devices can be easily exposed to disclosures by attackers such as Man in the Middle Attacks (MitM) and Denial of Service Attack (DoS). This research provided a comprehensive study for Communication and Mobility in the Internet of Things as well as the taxonomy of different security protocols. It went on to investigate the security threats and vulnerabilities of Locator/ID Separation Protocol using X.805 framework standard. Then three Security protocols were provided to secure the exchanged transitions of communication in Locator/ID Separation Protocol. The first security protocol had been implemented to secure the Registration stage of Locator/ID separation using ID/Based cryptography method. The second security protocol was implemented to address the Resolving stage in the Locator/ID Separation Protocol between the Ingress Tunnel Router and Egress Tunnel Router using Challenge-Response authentication and Key Agreement technique. Where, the third security protocol had been proposed, analysed and evaluated for the Internet of Things communication devices. This protocol was based on the authentication and the group key agreement via using the El-Gamal concept. The developed protocols set an interface between each level of the phase to achieve security refinement architecture to Internet of Things based on Locator/ID Separation Protocol. These protocols were verified using Automated Validation Internet Security Protocol and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and achieved results demonstrating that they do not have any security flaws. Finally, a performance analysis of security refinement protocol analysis and an evaluation were conducted using Contiki and Cooja simulation tool. The results of the performance analysis showed that the security refinement was highly scalable and the memory was quite efficient as it needed only 72 bytes of memory to store the keys in the Wireless Sensor Network (WSN) device

    Adoption of cloud computing technology for exploration, drilling and production activities: Nigerian upstream oil and gas industry

    Get PDF
    A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy.The upstream oil and gas industry, which identifies and produces oil and gas, is essential for the generation of energy. This sector has a fragmented pattern of activities and uses real-time information and accurate results for faster and more accurate decision making. Cloud computing offers information technology (IT) services via the internet and the technology offers several benefits such as flexibility, scalability, cost reduction, real-time information, monitoring, collaboration and timely interpretation of exploration and production data. However, the cloud has not yet penetrated the upstream oil and gas sector. Generally, the adoption of cloud computing in the oil and gas industry is less discussed in academia, let alone the upstream oil and gas sector. This research aims to study the adoption of cloud computing in the upstream oil and gas industry, particularly in Nigeria, which is an emerging economy. The decision to adopt cloud computing for exploration, drilling and production is a complex process. A major outcome of the research is the development of a model consisting of factors influencing decision to adopt cloud technology in the upstream oil and gas sector. In addition, the study develops a prototype decision support system (DSS) based on analytical hierarchy process (AHP) which enables decision makers to select an appropriate cloud service model. The developed prototype DSS is described in appendix A. This research adopted a mixed method approach comprising of semi-structured interview which was used to collect qualitative data using NVivo 11 software, and a questionnaire survey which was used to collect quantitative data which was analysed using the Analysis of a Moment Structures (AMOS) based structural equation modelling technique. The findings of this research confirmed the significant factors for cloud computing adoption for exploration, drilling and production activities. This research has both theoretical and practical implications which reinforce the need for cloud technology adoption in the upstream oil and gas sector. In addition, using the research findings to develop a prototype Decision Support System (DSS) is innovative and would be useful to the Nigerian government, cloud service providers and the upstream oil and gas sector. Finally, the study makes recommendations for upstream O&G based on the findings of the study.Nigerian Petroleum Technology Development Fund (PTDF)
    corecore