20 research outputs found

    Interactive Design and Delivery Challenges for Wireless Handheld Multimedia Systems

    Get PDF
    The mobile media market is a new communication channel with its own characteristics and opportunities. Streaming on your mobile phone is not watching TV or going to the movies. Instead, the mobile channel provides personalization, interactivity and anytime, anywhere services. Content delivery in mobile multimedia is an application area that offers big business potential, as the users of mobile devices want to access multimedia content from their devices. People want to use it anytime, anywhere and in whatever way they choose. Mobile applications should therefore present adaptable multimedia content to different end-user devices. And with content presented in a dynamic environment, this presents new challenges. Hence, multimedia content has to be adapted to fit the constraints of the device. Handheld devices with increasing multimedia enabling features and diverse capabilities are undergoing considerable progress because of portability and mobility. This paper looks at the design and security challenges facing multimedia content and context delivery

    IMPLEMENTATION OF TACTICAL OPEN SOURCE 5G MOBILE NETWORKS

    Get PDF
    The implementation of fifth-generation (5G) communications technology is a global effort, with China leading the way. The Department of Defense has initiated efforts on 5G implementation from smart warehouses to virtual combat training; however, focus on the tactical communications level remains minimal. This thesis examines the feasibility of using OpenAirInterface Software Alliance (OSA) software to build a private mobile ad hoc 5G network for various military applications. First, we created a Fourth Generation/Long Term Evolution network utilizing commercial off-the-shelf equipment and software to operate the radio access network (RAN), software-defined radio, and an evolved packet core (EPC). Then we connected the EPC to an 802.11 network for internet access. We successfully configured a subscriber identification module and smartphone and attached it to the network for data services. Although the OSA software is robust and customizable, it is difficult to make changes, is restrictive in which user equipment (UE) can connect to the network, and does not reliably allow the UE to connect. The potential of OSA software for military applications is apparent but does not appear ready for field implementation. Going forward, we recommend researchers use this work to implement new software versions and test scalability to reassess the feasibility of OSA software.NCWDGLieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks

    Get PDF
    Includes supplementary materialFifth Generation New Radio (5G NR) represents a shift in mobile telephony whereby the network architecture runs containerized software on commodity hardware. In preparation for this transition, numerous 4G Long Term Evolution software stacks have been developed to test the containerization of core network functions and the interfaces with radio access network protocols. In this thesis, one such stack, developed by the OpenAirInterface Software Alliance, was used to create a low-cost, simplified mobile network compatible with the Naval Operational Architecture. Commercial off-the-shelf user equipment was then connected to the network to demonstrate how a buffer overflow vulnerability found in Qualcomm Global Navigation Satellite System chipsets and identified as CVE-2019-2254 can be leveraged to enable a spoofed network attack. The research also yielded an extension of the attack method to 5G NR networks.http://archive.org/details/aplaceholderreco1094567451Lieutenant, United States NavyApproved for public release. Distribution is unlimited

    An infrastructure to communicate with wireless devices

    Get PDF
    Contemporary and future network protocols allow wireless devices to send and receive information with reasonable reliability and at reasonable speed. Yet, for an application to take advantage of the full networking capabilities of modern devices, much overhead is needed. Although the physical networking capabilities are embedded in the wireless device, an accepted standardized software protocol for utilizing these capabilities is not fully in place yet. There is a need for an infrastructure and a protocol for data communication with wireless devices. Such an infrastructure could serve as a middleware tool for wireless application developers that will decrease the amount of overhead for wireless application development. This work proposes the function and structure for that infrastructure, the details of the protocol that can be used and discusses issues of selfishness and cooperation when such middleware is used cooperatively by uncoordinated parties

    Advances in Grid Computing

    Get PDF
    This book approaches the grid computing with a perspective on the latest achievements in the field, providing an insight into the current research trends and advances, and presenting a large range of innovative research papers. The topics covered in this book include resource and data management, grid architectures and development, and grid-enabled applications. New ideas employing heuristic methods from swarm intelligence or genetic algorithm and quantum encryption are considered in order to explain two main aspects of grid computing: resource management and data management. The book addresses also some aspects of grid computing that regard architecture and development, and includes a diverse range of applications for grid computing, including possible human grid computing system, simulation of the fusion reaction, ubiquitous healthcare service provisioning and complex water systems

    The Murray Ledger and Times, January 20, 2000

    Get PDF

    A pre-transfer assessment framework for international technology transfer

    Get PDF
    Access to the full-text thesis is no longer available at the author's request, due to 3rd party copyright restrictions. Access removed on 29.11.2016 by CS (TIS).Metadata merged with duplicate record (http://hdl.handle.net/10026.1/405) on 20.12.2016 by CS (TIS).This is a digitised version of a thesis that was deposited in the University Library. If you are the author please contact PEARL Admin ([email protected]) to discuss options.The demands off managing in an international operating environment has changed considerably over the past 20 years due to developments in global markets. Multinational enterprises face fierce international competition and are now tasked not only with developing effective competitive capabilities but also with maximising the knowledge and expertise developed in one part of the organisation by transferring it to another. This work has investigated the position of multinational enterprises in the developing global market and through a broad and thorough review of current literature, identified a gap in the knowledge -a tool for helping the assessment of the transfer of technology prior to the transfer process taking place. Using existing models as a foundation, a new framework has been developed with observations from three case study organisations and the incorporation of other relevant literature. To -make use of the new framework to practitioners it leas been used as the basis of a workbook by which the anticipated difficulties can be judged and a priority focus developed. Validation of the `r ework has been carried out by a panel of industrialists and academics experienced in international technology transfer. The thesis concludes with a series of recommendations for further work. The originality of this work lies in the development by the author of the new pre-transfer assessment Framework. This should provide clear advantages over previous approaches and give way to improving the success of technology transfer projects
    corecore