52 research outputs found

    A Moving Direction and Historical Information Assisted Fast Handover in LTE-A

    Get PDF
    Handover is one of the critical features in mobility management of Long Term Evolution Advanced (LTE-A) wireless systems. It allows the User Equipment (UE) to roam between LTE-A wireless networks. LTE-A is purely on hard handover, which may cause loss data if the handover is not fast. In this paper, an advanced technique proposed which combined between the current UE moving direction and its history information. Our proposed tracks the UE positions to discover its direction. When the UE is being near to handover area the UE starts searching in its history to return back the target cell. If the UE trajectory does not exist in its history then the UE and its serving cell start searching for target cell through using cosine function in order to select target cell.  Our proposed technique is expected to increase the throughput, reduce the packet delay and loss, and reduce the frequent handovers

    The Design and Implementation of Middleware for Application Development within Honeybee Computing Environment

    Get PDF
    Computing technology is now moving from ubiquitous computing into advanced ubiquitous computing environment. An advanced ubiquitous environment is an extension of ubiquitous environment that improve connectivity between devices. This computing environment has five major characteristics, namely: large number of heterogeneous devices; new communication technology; mobile ad hoc network (MANET); peer-to-peer communication; and Internet of Things. Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives, which is a project initiated within Digital Malaysia. This paper describes the design and implementation of a middleware to support application development within Honeybee computing environment

    Penyimpanan data sulit dalam persekitaran berbilang awan

    Get PDF
    Pengkomputeran awan telah berkembang selama bertahun-tahun untuk mengatasi kekangan pengiraan dan penyimpanan peranti mudah alih. Kekangan storan boleh diatasi melalui storan awan dengan ketersediaan sambungan internet. Walaupun pengkomputeran awan mempunyai faedahnya, kebimbangan keselamatan mengenai data pengguna masih wujud. Data yang disimpan di dalam awan dihantar melalui Internet dimana pengguna tidak mempunyai kawalan dan terdedah kepada penyalahgunaan data yang disebabkan oleh perisian hasad atau serangan orang dalam. Kajian ini bertujuan untuk memastikan keselamatan data dalam berbilang awan awam dengan pelbagai jenis penyulitan, teknik penghirisan dan juga panduan penggnaan aplikasi tersedia untuk pengguna. Aplikasi yang dicadangkan akan menyulitkan data di mana berbilang algoritma penyulitan disediakan dan ia juga memberi pilihan kepada pengguna untuk memilih jenis teknik penghirisan yang hendak digunakan. Selepas fail disulitkan, fail akan dihiris kepada segmen- segmen kecil di mana ia akan menjalani proses perawakkan dan dimuat naik secara rawak pada berbilang storan awan yang berbeza. Pengguna yang masih baru dalam dunia digital akan dibekalkan dengan beberapa maklumat dan penjelasan ringkas tentang apa itu penyulitan dan cara teknik penghirisan berfungsi pada data mereka. Langkah keselamatan yang dilaksanakan akan menghalang penyalahgunaan data pada awan walaupun salah satu akaun awan digodam. Ia juga memberi pengguna kebebasan untuk memilih jenis penyulitan dan teknik penghirisan untuk digunakan pada fail peribadi mereka, memberikan lapisan keselamatan tambahan untuk mengelakkan data mereka daripada dicuri ataupun hilang

    Prediction Model for Offloading in Vehicular Wi-Fi Network

    Get PDF
    It cannot be denied that, the inescapable diffusion of smartphones, tablets and other vehicular network applications with diverse networking and multimedia capabilities, and the associated blooming of all kinds of data-hungry multimedia services that passengers normally used while traveling exert a big challenge to cellular infrastructure operators. Wireless fidelity (Wi-Fi) as well as fourth generation long term evolution advanced (4G LTE-A) network are widely available today, Wi-Fi could be used by the vehicle users to relieve 4G LTE-A networks. Though, using IEE802.11 Wi-Fi AP to offload 4G LTE-A network for moving vehicle is a challenging task since it only covers short distance and not well deployed to cover all the roads. Several studies have proposed the offloading techniques based on predicted available APs for making offload decision. However, most of the proposed prediction mechanisms are only based on historical connection pattern. This work proposed a prediction model which utilized historical connection pattern, vehicular movement and driver profile to predict the next available AP.  The proposed model is compared with the existing models to evaluate its practicability

    Encryption as a Service (EaaS) as a Solution for Cryptography in Cloud

    Get PDF
    AbstractIn recent years, there has been a vast interest in optimal usage of computing resources so that massive data can be processed with minimal cost. The need to use a pool of shared resources in a wide area network that provide elasticity, high capacity of computation and ability to store information on location-independent storages have led to the advent of cloud-computing. However, the global nature of cloud brings about some challenges in security domain when physical control over our information in cloud is impossible. Thus, encrypting critical data becomes essential, and strongly advisable. The server-side encryption in an untrustworthy environment like public cloud is too risky. On the other hand, client-side encryption can undermine the benefits of cloud since it is a time-consuming task for encryption and decryption. To address this issue, we developed a private cloud as an intermediary. In this paper, based on XaaS concept, we design an Encryption as a Service in order to get rid of the security risks of cloud provider's encryption and the inefficiency of client-side encryption

    Aplikasi jual-beli dalam talian berasaskan web awan dengan analisis data (Buy-On-Behalf Service)

    Get PDF
    Pemodenan dan pasca-COVID-19 telah membawa revolusi digital yang signifikan dan memberi impak yang besar dalam kehidupan kita, terutama dalam bidang pembelian atas talian. Walaupun edagang telah menjadi perkara biasa, terdapat beberapa produk seperti kraf tradisional, kepakaran produk tempatan, dan produk borong yang hanya boleh dibeli dari kedai fizikal. Apabila produkproduk ini dijual dalam talian, perantara sering terlibat untuk mengaut komisen tambahan yang meningkatkan kos secara keseluruhan. Oleh itu, pembeli sering bergantung kepada rakan dan keluarga yang berada di kawasan tersebut untuk mendapatkan produk ini kerana perjalanan ke sana hanya untuk membeli produk adalah tidak praktikal dan mahal. Oleh itu, projek ini dibangunkan untuk memudahkan pengguna dalam mendapatkan produk yang diingini, terutamanya dari kedai fizikal yang tidak menawarkan perkhidmatan dalam talian. Projek ini adalah penambahbaikan daripada projek yang telah dilaksanakan dan akan dibangunkan sebagai aplikasi web kerana ia boleh diakses oleh sesiapa sahaja yang mempunyai sambungan Internet yang stabil dan tidak berminat untuk memuat turun aplikasi dalam telefon pintar. Platform ini akan membolehkan pengguna untuk membeli produk melalui individu yang akan membeli barang yang diminta dari kedai fizikal. Selain itu, aplikasi web ini akan diintegrasikan dengan pengkomputeran awan untuk memastikan aksesibiliti dan skalabiliti aplikasi. Dengan mengurangkan jurang antara pembelian dalam talian dan luar talian, projek ini berjanji untuk mengubah pengalaman membeli-belah sambil mencipta peluang baru untuk pembeli dan penjual

    A Comprehensive Comparison of Educational Growth within Four Different Developing Countries between 1990 and 2012

    Get PDF
    Educational growth is a fundamental infrastructure factor required to achieve sustainable development. Therefore, evaluation and measurement of educational growth is essential for establishing a development road map. Because of this, there are many organizations and databases that work to capture academic trends and provide the general view of institute achievements. Web of Science and Scopus are the two most popular and scientific. In this paper, we define the important effective factors in educational growth and discuss them; we then compare these defined factors across four different developing countries: Brazil, Iran, Malaysia, and Turkey. As well as the comparisons, this paper uses the Pearson product moment correlation coefficient method to analyze the factors and the strong or weak relationship between the factors are discussed.  Keywords: Educational growth; Developing countries; Publication; Impact factor; Web of Science; Scopus

    Dynamic Virtual Machine Allocation Policy for Load Balancing using Principal Component Analysis and Clustering Technique in Cloud Computing

    Get PDF
    The scalability and agility characteristics of cloud computing allow load balancing to reroute workload requests easily and to enhance overall accessibility. One of the most important services for cloud computing is Infrastructure as a Service (IaaS). There is a large number of physical hosts in a cloud data center for IaaS and it is quite difficult to arrange the allocation of the workload requests manually. Therefore, different load balancing methods have been proposed by researchers to avoid overloaded physical hosts in the cloud data center. However, fewer works have used multivariate analysis in cloud computing environment for considering the dynamic changes of the computing resources. Thus, this work suggests a new Virtual Machine (VM) allocation policy for load balancing by using a multivariate technique, Principal Component Analysis (PCA), and clustering technique. Moreover, PCA and clustering techniques were simulated on a cloud computing simulator, CloudSim. In the proposed allocation policy, a group of VMs were dynamically allocated to physical hosts. The allocation was based on the clusters of hosts according to their similar features in computing resources. The clusters were formed using PCA and a clustering technique based on variables related to the physical hosts such as Million Instructions Per Second (MIPS), Random Access Memory (RAM), bandwidth and storage. The results show that the completion time for all tasks has decreased, and the resource utilization has increased. This will optimize the performance of cloud data centers by effectively utilizing the available resources
    • …
    corecore