35 resultados para Voip,PJSIP,Android,ABPS.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Networking of computing devices has been going through rapid evolution and thus continuing to be an ever expanding area of importance in recent years. New technologies, protocols, services and usage patterns have contributed to the major research interests in this area of computer science. The current special issue is an effort to bring forward some of these interesting developments that are being pursued by researchers at present in different parts of the globe. Our objective is to provide the readership with some insight into the latest innovations in computer networking through this. This Special Issue presents selected papers from the thirteenth conference of the series (ICCIT 2010) held during December 23-25, 2010 at the Ahsanullah University of Science and Technology. The first ICCIT was held in Dhaka, Bangladesh, in 1998. Since then the conference has grown to be one of the largest computer and IT related research conferences in the South Asian region, with participation of academics and researchers from many countries around the world. Starting in 2008 the proceedings of ICCIT are included in IEEExplore. In 2010, a total of 410 full papers were submitted to the conference of which 136 were accepted after reviews conducted by an international program committee comprising 81 members from 16 countries. This was tantamount to an acceptance rate of 33%. From these 136 papers, 14 highly ranked manuscripts were invited for this Special Issue. The authors were advised to enhance their papers significantly and submit them to undergo review for suitability of inclusion into this publication. Of those, eight papers survived the review process and have been selected for inclusion in this Special Issue. The authors of these papers represent academic and/or research institutions from Australia, Bangladesh, Japan, Korea and USA. These papers address issues concerning different domains of networks namely, optical fiber communication, wireless and interconnection networks, issues related to networking hardware and software and network mobility. The paper titled “Virtualization in Wireless Sensor Network: Challenges and Opportunities” argues in favor of bringing in different heterogeneous sensors under a common virtual framework so that the issues like flexibility, diversity, management and security can be handled practically. The authors Md. Motaharul Islam and Eui-Num Huh propose an architecture for sensor virtualization. They also present the current status and the challenges and opportunities for further research on the topic. The manuscript “Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA” deals with impact of polarization mode dispersion on the bit error rate performance of direct sequence optical code division multiple access. The authors, Md. Jahedul Islam and Md. Rafiqul Islam present an analytical approach toward determining the impact of different performance parameters. The authors show that the bit error rate performance improves significantly by the third order polarization mode dispersion than its first or second order counterparts. The authors Md. Shohrab Hossain, Mohammed Atiquzzaman and William Ivancic of the paper “Cost and Efficiency Analysis of NEMO Protocol Entities” present an analytical model for estimating the cost incurred by major mobility entities of a NEMO. The authors define a new metric for cost calculation in the process. Both the newly developed metric and the analytical model are likely to be useful to network engineers in estimating the resource requirement at the key entities while designing such a network. The article titled “A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation” deals with Low Density Parity Check decoders. The authors, Vikram Arkalgud Chandrasetty and Syed Mahfuzul Aziz propose a novel multi-level structured hierarchical matrix approach for generating codes of different lengths flexibly depending upon the requirement of the application. The manuscript “Analysis of Performance Limitations in Fiber Bragg Grating Based Optical Add-Drop Multiplexer due to Crosstalk” has been contributed by M. Mahiuddin and M. S. Islam. The paper proposes a new method of handling crosstalk with a fiber Bragg grating based optical add drop multiplexer (OADM). The authors show with an analytical model that different parameters improve using their proposed OADM. The paper “High Performance Hierarchical Torus Network Under Adverse Traffic Patterns” addresses issues related to hierarchical torus network (HTN) under adverse traffic patterns. The authors, M.M. Hafizur Rahman, Yukinori Sato, and Yasushi Inoguchi observe that dynamic communication performance of an HTN under adverse traffic conditions has not yet been addressed. The authors evaluate the performance of HTN for comparison with some other relevant networks. It is interesting to see that HTN outperforms these counterparts in terms of throughput and data transfer under adverse traffic. The manuscript titled “Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm” has been contributed by M.M. Hafizur Rahman, Yukinori Sato, and Yasushi Inoguchi. The authors introduce three simple adapting routing algorithms for efficient use of physical links and virtual channels in hierarchical torus network. The authors show that their approaches yield better performance for such networks. The final title “An Optimization Technique for Improved VoIP Performance over Wireless LAN” has been contributed by five authors, namely, Tamal Chakraborty, Atri Mukhopadhyay, Suman Bhunia, Iti Saha Misra and Salil K. Sanyal. The authors propose an optimization technique for configuring the parameters of the access points. In addition, they come up with an optimization mechanism in order to tune the threshold of active queue management system appropriately. Put together, the mechanisms improve the VoIP performance significantly under congestion. Finally, the Guest Editors would like to express their sincere gratitude to the 15 reviewers besides the guest editors themselves (Khalid M. Awan, Mukaddim Pathan, Ben Townsend, Morshed Chowdhury, Iftekhar Ahmad, Gour Karmakar, Shivali Goel, Hairulnizam Mahdin, Abdullah A Yusuf, Kashif Sattar, A.K.M. Azad, F. Rahman, Bahman Javadi, Abdelrahman Desoky, Lenin Mehedy) from several countries (Australia, Bangladesh, Japan, Pakistan, UK and USA) who have given immensely to this process. They have responded to the Guest Editors in the shortest possible time and dedicated their valuable time to ensure that the Special Issue contains high-quality papers with significant novelty and contributions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the past decade there has been massive growth of data on the internet. Many people rely on XML based RSS feeds to receive updates from websites. In this paper, we propose a method for managing the RSS feeds from various news websites. A web service is developed to deliver filtered news items from RSS feeds to a mobile client. Each news item is indexed, subsequently, the indexes are used for filtering news items. Indexing is done in two steps. First, classical text categorization algorithms are used to assign a category to each news item, second, geoparsing is used to assign geolocation data to each news item. An android application is developed to access filtered news items by consuming the proposed web service. A prototype is implemented using Rapid miner 5.0 as the data mining tool and SVM as the classification algorithm. Geoparsing and geocoding web services, and Android API are used to implement location-based access to news items. Experimental results prove that the proposed approach is effective and saves a significant amount of information overload processing time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent investigations have determined that many Android applications in both official and non-official online markets expose details of the user's mobile phone without user consent. In this paper, for the first time in the research literature, we provide a full investigation of why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we employ a combination of static and dynamic analysis based on examination of Java classes and application behaviour for a data set of 123 samples, all pre-determined as being free from malicious software. Despite the fact that anti-virus vendor software did not flag any of these samples as malware, approximately 10% of them are shown to leak data about the mobile phone to a third-party; applications from the official market appear to be just as susceptible to such leaks as applications from the non-official markets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tracking services play a fundamental role in the smartphone ecosystem. While their primary purpose is to provide a smartphone user with the ability to regulate the extent of sharing private information with external parties, these services can also be misused by advertisers in order to boost revenues. In this paper, we investigate tracking services on the Android and iOS smartphone platforms. We present a simple and effective way to monitor traffic generated by tracking services to and from the smartphone and external servers. To evaluate our work, we dynamically execute a set of Android and iOS applications, collected from their respective official markets. Our empirical results indicate that even if the user disables or limits tracking services on the smartphone, applications can by-pass those settings and, consequently, leak private information to external parties. On the other hand, when testing the location 'on' setting, we notice that generally location is not tracked.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the hardware and software design for using a TF card in debugging an embedded system are described. The used hardware platform is designed based on a PXA310 application processor. The Android open source operating system is used as the software platform. The design of the connection circuit between the application processor and the TF card is introduced first. Secondly, the design of the TF card driver program and the method for Android system to mount the TF card are described. In designing the TF driver program, an SPI operation mode and FAT32 file system are used. The transplant of the FAT32 file system is presented more detail. Finally, the paper introduced the system debugging and the test results are given for the TF card used in a video data acquisition unit of a video monitoring. It is shown that high speed data exchange and good universal property can be obtained by using a TF card to download a system image during developing and debugging. The TF card used in debugging can be used as a mass storage in the embedded product without the need of changing the design for debugging the system and it is also convenient for a user to upgrade operating system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We hypothesised that strict inactivity (bed rest) would lead to regional differences in fat deposition. Twenty-four male subjects underwent 60 d bed rest and remained inactive (n = 9), performed resistance exercise plus whole-body vibration (RVE; n = 7) or resistance exercise only (RE; n = 8). Fat mass was assessed via dual X-ray absorptiometry. In the inactive subjects, fat deposition differed between body regions (P = 0.0005) with android region visceral adipose tissue increasing the most (+29% at the end of bed rest), followed by remainder of the trunk (from chin to the iliac crest; +10%) and the arms and legs (both +7%). Insulin sensitivity reduced in the inactive subjects at the end of bed rest (P = 0.036). RE did not have a significant impact on regional fat mass changes (P ⩾ 0.055). In RVE, increases in visceral adipose tissue (-14%; P = 0.028 vs inactive subjects) and in the arms (arms -8%, P = 0.011 vs inactive) were not seen. We conclude that inactivity leads to a preferential increase in visceral adipose tissue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We hypothesised that strict inactivity (bed rest) would lead to regional differences in fat deposition. Twenty-four male subjects underwent 60d bed rest and remained inactive (n = 9), performed resistance exercise plus whole-body vibration (RVE; n = 7) or resistance exercise only (RE; n = 8). Fat mass was assessed via dual X-ray absorptiometry. In the inactive subjects, fat deposition differed between body regions (P = 0.0005) with android region visceral adipose tissue increasing the most (+29% at the end of bed rest), followed by remainder of the trunk (from chin to the iliac crest; +10%) and the arms and legs (both +7%). Insulin sensitivity reduced in the inactive subjects at the end of bed rest (P = 0.036). RE did not have a significant impact on regional fat mass changes (P ≥ 0.055). In RVE, increases in visceral adipose tissue (-14%; P = 0.028 vs inactive subjects) and in the arms (arms -8%, P = 0.011 vs inactive) were not seen. We conclude that inactivity leads to a preferential increase in visceral adipose tissue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stroke is a common neurological condition which is becoming increasingly common as the population ages. This entails healthcare monitoring systems suitable for home use, with remote access for medical professionals and emergency responders. The mobile phone is becoming the easy access tool for self-evaluation of health, but it is hindered by inherent problems including computational power and storage capacity. This research proposes a novel cloud based architecture of a biomedical system for a wearable motion kinematic analysis system which mitigates the above mentioned deficiencies of mobile devices. The system contains three subsystems: 1. Bio Kin WMS for measuring the acceleration and rotation of movement 2. Bio Kin Mobi for Mobile phone based data gathering and visualization 3. Bio Kin Cloud for data intensive computations and storage. The system is implemented as a web system and an android based mobile application. The web system communicates with the mobile application using an encrypted data structure containing sensor data and identifiable headings. The raw data, according to identifiable headings, is stored in the Amazon Relational Database Service which is automatically backed up daily. The system was deployed and tested in Amazon Web Services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

 Mobile platform security solution has become especially important for mobile computing paradigms, due to the fact that increasing amounts of private and sensitive information are being stored on the smartphones' on-device memory or MicroSD/SD cards. This paper aims to consider a comparative approach to the security aspects of the current smartphone systems, including: iOS, Android, BlackBerry (QNX), and Windows Phone.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the increasing trends of mobile interactions, voice authentication applications are in a higher demand, giving rise to new rounds of research activities. Authentication is an important security mechanism that requires the intended communication parties to present valid credentials to the communication network. In a stronger sense, all the involved parties are required to be authenticated to one another (mutual authentication). In the voice authentication technique described in this paper, the voice characteristics of an intended individual wishing to take part in a communication channel will be classified and processed. This involves a low overhead voice authentication scheme, which features equalization and scaling of the voice frequency harmonics. The performance of this system is discussed in a Labview 8.5 visual development environment, following a complete security analysis. © 2013 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

 This research investigated the proliferation of malicious applications on smartphones and a framework that can efficiently detect and classify such applications based on behavioural patterns was proposed. Additionally the causes and impact of unauthorised disclosure of personal information by clean applications were examined and countermeasures to protect smartphone users’ privacy were proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Low iron intake can lead to iron deficiency, which can result in impaired health and iron-deficiency anemia. A mobile phone app, combining successful dietary strategies to increase bioavailable iron with strategies for behavior change, such as goal setting, monitoring, feedback, and resources for knowledge acquisition, was developed with the aim to increase bioavailable iron intake in premenopausal women.

OBJECTIVE: To evaluate the content, usability, and acceptability of a mobile phone app designed to improve intake of bioavailable dietary iron.

METHODS: Women aged 18-50 years with an Android mobile phone were invited to participate. Over a 2-week period women were asked to interact with the app. Following this period, semistructured focus groups with participants were conducted. Focus groups were audio recorded and analyzed via an inductive open-coding method using the qualitative analysis software NVivo 10. Themes were identified and frequency of code occurrence was calculated.

RESULTS: Four focus groups (n=26) were conducted (age range 19-36 years, mean 24.7, SD 5.2). Two themes about the app's functionality were identified (frequency of occurrence in brackets): interface and design (134) and usability (86). Four themes about the app's components were identified: goal tracker (121), facts (78), photo diary (40), and games (46). A number of suggestions to improve the interface and design of the app were provided and will inform the ongoing development of the app.

CONCLUSIONS: This research indicates that participants are interested in iron and their health and are willing to use an app utilizing behavior change strategies to increase intake of bioavailable iron. The inclusion of information about the link between diet and health, monitoring and tracking of the achievement of dietary goals, and weekly reviews of goals were also seen as valuable components of the app and should be considered in mobile health apps aimed at adult women.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Internet websites and smartphone apps have become a popular resource to guide parents in their children’s feeding and nutrition. Given the diverse range of websites and apps on infant feeding, the quality of information in these resources should be assessed to identify whether consumers have access to credible and reliable information.

Objective: This systematic analysis provides perspectives on the information available about infant feeding on websites and smartphone apps.

Methods: A systematic analysis was conducted to assess the quality, comprehensibility, suitability, and readability of websites and apps on infant feeding using a developed tool. Google and Bing were used to search for websites from Australia, while the App Store for iOS and Google Play for Android were used to search for apps. Specified key words including baby feeding, breast feeding, formula feeding and introducing solids were used to assess websites and apps addressing feeding advice. Criteria for assessing the accuracy of the content were developed using the Australian Infant Feeding Guidelines.

Results: A total of 600 websites and 2884 apps were screened, and 44 websites and 46 apps met the selection criteria and were analyzed. Most of the websites (26/44) and apps (43/46) were noncommercial, some websites (10/44) and 1 app were commercial and there were 8 government websites; 2 apps had university endorsement. The majority of the websites and apps were rated poor quality. There were two websites that had 100% coverage of information compared to those rated as fair or poor that had low coverage. Two-thirds of the websites (65%) and almost half of the apps (47%) had a readability level above the 8th grade level.

Conclusions: The findings of this unique analysis highlight the potential for website and app developers to merge user requirements with evidence-based content to ensure that information on infant feeding is of high quality. There are currently no apps available to consumers that address a variety of infant feeding topics. To keep up with the rapid turnover of the evolving technology, health professionals need to consider developing an app that will provide consumers with a credible and reliable source of information about infant feeding, using quality assessment tools and evidence-based content.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the widespread use of smartphones, the loss of a device is a critical problem, which results both in disrupting daily communications and losing valuable property. As a result, tracking systems have been developed to track mobile devices. Previous tracking systems focus on recovering the device's locations after it goes missing, with security methods implemented on the clients. However, users' locations are stored in untrusted third-party services, which may be attacked or eavesdropped. In this paper, we propose a system, named Android Cloud Tracker, to provide a privacy-preserving tracking client and safe storing of user's locations. We use cloud storage controlled by users themselves as storage facilities, and they do not need to worry about any untrusted third party. We implement Android Cloud Tracker prototype on Android phones, and the evaluation shows that it is both practical and lightweight: it generates a small amount of data flow and its distributed architecture provides strong guarantees of location privacy while preserving the ability to efficiently track missing devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A low-cost system to generate, control and detect electrochemiluminescence using a mobile smartphone is described. A simple tone-detection integrated circuit is used to switch power sourced from the phone's Universal Serial Bus (USB) 'On-The-Go' (OTG) port, using audible tone pulses played over the device's audio jack. We have successfully applied this approach to smartphones from different manufacturers and with different operating system versions. ECL calibrations of a common luminophore, tris(2,2′-bipyridine)ruthenium(II) ([Ru(bpy)3]2+), with 2-(dibutylamino)ethanol (DBAE) as a co-reactant, showed no significant difference in light intensities when an electrochemical cell was controlled by a mobile phone in this manner, compared to the same calibration generated using a conventional potentiostat. Combining this novel approach to control the applied potential with the measurement of the emitted light through the smart phone camera (using an in-house built Android app), we explored the ECL properties of a water-soluble iridium(III) complex that emits in the blue region of the spectrum. The iridium(III) complex exhibited superior co-reactant ECL intensities and limits of detection to that of the conventional [Ru(bpy)3]2+ luminophore.