5,980 research outputs found

    Institutional Repositories: Features, Architecture, Design and Implementation Technologies

    Get PDF
    Europe is the leading continent in terms of active adoption and use of Digital Libraries – particularly Institutional Repositories (IRs). Africa has not done poorly in this area with a steady increase from 19 repositories in 2008 to 46 in January, 2011 but there is need to raise awareness and channel efforts towards making IRs easily accessible to Africans through ubiquitous channels such as hand-helds and mobile devices. This paper reviews the features, architecture, design and implementation technologies of IRs. In addition, it highlights viable research areas that can be pursued by African researchers in the field of Digital Libraries. It also encourages research efforts to focus on areas that will be beneficial to Africa

    Cooperative Data Backup for Mobile Devices

    Get PDF
    Les dispositifs informatiques mobiles tels que les ordinateurs portables, assistants personnels et téléphones portables sont de plus en plus utilisés. Cependant, bien qu'ils soient utilisés dans des contextes où ils sont sujets à des endommagements, à la perte, voire au vol, peu de mécanismes permettent d'éviter la perte des données qui y sont stockées. Dans cette thèse, nous proposons un service de sauvegarde de données coopératif pour répondre à ce problème. Cette approche tire parti de communications spontanées entre de tels dispositifs, chaque dispositif stockant une partie des données des dispositifs rencontrés. Une étude analytique des gains de cette approche en termes de sûreté de fonctionnement est proposée. Nous étudions également des mécanismes de stockage réparti adaptés. Les problèmes de coopération entre individus mutuellement suspicieux sont également abordés. Enfin, nous décrivons notre mise en oeuvre du service de sauvegarde coopérative. ABSTRACT : Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. However, few mechanisms are available to reduce the risk of losing the data stored on these devices. In this dissertation, we try to address this concern by designing a cooperative backup service for mobile devices. The service leverages encounters and spontaneous interactions among participating devices, such that each device stores data on behalf of other devices. We first provide an analytical evaluation of the dependability gains of the proposed service. Distributed storage mechanisms are explored and evaluated. Security concerns arising from thecooperation among mutually suspicious principals are identified, and core mechanisms are proposed to allow them to be addressed. Finally, we present our prototype implementation of the cooperative backup servic

    Framework for Content Distribution over Wireless LANs

    Get PDF
    Wireless LAN (also called as Wi-Fi) is dominantly considered as the most pervasive technology for Intent access. Due to the low-cost of chipsets and support for high data rates, Wi-Fi has become a universal solution for ever-increasing application space which includes, video streaming, content delivery, emergency communication, vehicular communication and Internet-of-Things (IoT). Wireless LAN technology is defined by the IEEE 802.11 standard. The 802.11 standard has been amended several times over the last two decades, to incorporate the requirement of future applications. The 802.11 based Wi-Fi networks are infrastructure networks in which devices communicate through an access point. However, in 2010, Wi-Fi Alliance has released a specification to standardize direct communication in Wi-Fi networks. The technology is called Wi-Fi Direct. Wi-Fi Direct after 9 years of its release is still used for very basic services (connectivity, file transfer etc.), despite the potential to support a wide range of applications. The reason behind the limited inception of Wi-Fi Direct is some inherent shortcomings that limit its performance in dense networks. These include the issues related to topology design, such as non-optimal group formation, Group Owner selection problem, clustering in dense networks and coping with device mobility in dynamic networks. Furthermore, Wi-Fi networks also face challenges to meet the growing number of Wi Fi users. The next generation of Wi-Fi networks is characterized as ultra-dense networks where the topology changes frequently which directly affects the network performance. The dynamic nature of such networks challenges the operators to design and make optimum planifications. In this dissertation, we propose solutions to the aforementioned problems. We contributed to the existing Wi-Fi Direct technology by enhancing the group formation process. The proposed group formation scheme is backwards-compatible and incorporates role selection based on the device's capabilities to improve network performance. Optimum clustering scheme using mixed integer programming is proposed to design efficient topologies in fixed dense networks, which improves network throughput and reduces packet loss ratio. A novel architecture using Unmanned Aeriel Vehicles (UAVs) in Wi-Fi Direct networks is proposed for dynamic networks. In ultra-dense, highly dynamic topologies, we propose cognitive networks using machine-learning algorithms to predict the network changes ahead of time and self-configuring the network

    Competitive Evolutionary Dynamics of Cloud Service Offerings in Korea: A Path-Dependency Perspective

    Get PDF
    Cloud service for personal users has become more popular world-wide since Apple Inc. launched iCloud storage service in October, 2011. However, such cloud storage service was not new because many global telecom companies, usually called telcos, as well as many portals had already offered similar Internet-based online storage services at that time. As of now, there can be seen hundreds of diverse cloud storage and computing services for both personal and enterprise users in the global market. During last several years, Korean cloud service market has been led by three major telcos, who have launched more advanced and more diversified services competing with each other. Some questions may arise: What makes that happen and what kind of market dynamics affects on the evolution of cloud service offerings? This paper tries to answer these questions by categorizing and analysing 84 cloud services offered by three major telcos in Korea during last three years. As a research framework, Pessemier’s new product classification scheme was employed and precedence relationships among differently positioned service categories were analyzed to figure out the competitive evolutionary dynamics of the market. From the empirical study, path dependency was observed and resource-based view of the market competition was validated. Also, it was found that a player’s next move in service offering to a better position in Pessemier’s product space is quite closely related with the competitive position as well as the company-owned competitive resources like technology competency and company-wide service scope

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient

    Resilient architecture (preliminary version)

    Get PDF
    The main objectives of WP2 are to define a resilient architecture and to develop a range of middleware solutions (i.e. algorithms, protocols, services) for resilience to be applied in the design of highly available, reliable and trustworthy networking solutions. This is the first deliverable within this work package, a preliminary version of the resilient architecture. The deliverable builds on previous results from WP1, the definition of a set of applications and use cases, and provides a perspective of the middleware services that are considered fundamental to address the dependability requirements of those applications. Then it also describes the architectural organisation of these services, according to a number of factors like their purpose, their function within the communication stack or their criticality/specificity for resilience. WP2 proposes an architecture that differentiates between two classes of services, a class including timeliness and trustworthiness oracles, and a class of so called complex services. The resulting architecture is referred to as a "hybrid architecture". The hybrid architecture is motivated and discussed in this document. The services considered within each of the service classes of the hybrid architecture are described. This sets the background for the work to be carried on in the scope of tasks 2.2 and 2.3 of the work package. Finally, the deliverable also considers high-level interfacing aspects, by providing a discussion about the possibility of using existing Service Availability Forum standard interfaces within HIDENETS, in particular discussing possibly necessary extensions to those interfaces in order to accommodate specific HIDENETS services suited for ad-hoc domain

    A Design Rationale for Pervasive Computing - User Experience, Contextual Change, and Technical Requirements

    Get PDF
    The vision of pervasive computing promises a shift from information technology per se to what can be accomplished by using it, thereby fundamentally changing the relationship between people and information technology. In order to realize this vision, a large number of issues concerning user experience, contextual change, and technical requirements should be addressed. We provide a design rationale for pervasive computing that encompasses these issues, in which we argue that a prominent aspect of user experience is to provide user control, primarily founded in human values. As one of the more significant aspects of the user experience, we provide an extended discussion about privacy. With contextual change, we address the fundamental change in previously established relationships between the practices of individuals, social institutions, and physical environments that pervasive computing entails. Finally, issues of technical requirements refer to technology neutrality and openness--factors that we argue are fundamental for realizing pervasive computing. We describe a number of empirical and technical studies, the results of which have helped to verify aspects of the design rationale as well as shaping new aspects of it. The empirical studies include an ethnographic-inspired study focusing on information technology support for everyday activities, a study based on structured interviews concerning relationships between contexts of use and everyday planning activities, and a focus group study of laypeople’s interpretations of the concept of privacy in relation to information technology. The first technical study concerns the model of personal service environments as a means for addressing a number of challenges concerning user experience, contextual change, and technical requirements. Two other technical studies relate to a model for device-independent service development and the wearable server as a means to address issues of continuous usage experience and technology neutrality respectively
    • …
    corecore