Abstract: Mobile banking services present a unique growth
opportunity for mobile operators in emerging markets, and have
already made good progress in bringing financial services to the
previously unbanked populations of many developing countries. The
potential is amazing, but what about the risks? In the complex
process of establishing a mobile banking business model, many kinds
of risks and factors need to be monitored and well-managed. Risk
identification is the first stage of risk management. Correct risk
identification ensures risk management effectiveness. Keeping the
risks low makes it possible to use the full potential of mobile banking
and carry out the planned business strategy. The focus should be on
adoption of consumers which is the main risk factor of mobile
banking services.
Abstract: The interaction among information and communication technology (ICT) industries is a recently ubiquitous phenomenon through fixed-mobile integration. To monitor the impact of interaction, previous research has mainly focused on measuring spillover effect among ICT industries using various methods. Among others, inter-industry analysis is one of the useful methods for examining spillover effect between industries. However, more complex ICT industries become, more important the impact within an industry is. Inter-industry analysis is limited in mirroring intra-relationships within an industry. Thus, this study applies the analytic network process (ANP) to measure the spillover effect, capturing all of the intra and inter-relationships. Using ANP-based intra and inter-industry analysis, the spillover effect is effectively measured, mirroring the complex structure of ICT industries. A main ICT industry and its linkages are also explored to show the current structure of ICT industries. The proposed approach is expected to allow policy makers to understand interactions of ICT industries and their impact.
Abstract: This paper reports a distributed mutual exclusion
algorithm for mobile Ad-hoc networks. The network is clustered
hierarchically. The proposed algorithm considers the clustered
network as a logical tree and develops a token passing scheme
to get the mutual exclusion. The performance analysis and
simulation results show that its message requirement is optimal,
and thus the algorithm is energy efficient.
Abstract: We proposed a technique to identify road traffic
congestion levels from velocity of mobile sensors with high accuracy
and consistent with motorists- judgments. The data collection utilized
a GPS device, a webcam, and an opinion survey. Human perceptions
were used to rate the traffic congestion levels into three levels: light,
heavy, and jam. Then the ratings and velocity were fed into a
decision tree learning model (J48). We successfully extracted vehicle
movement patterns to feed into the learning model using a sliding
windows technique. The parameters capturing the vehicle moving
patterns and the windows size were heuristically optimized. The
model achieved accuracy as high as 99.68%. By implementing the
model on the existing traffic report systems, the reports will cover
comprehensive areas. The proposed method can be applied to any
parts of the world.
Abstract: The third generation (3G) of cellular system adopted
the spread spectrum as solution for the transmission of the data in the
physical layer. Contrary to systems IS-95 or CDMAOne (systems
with spread spectrum of the preceding generation), the new standard,
called Universal Mobil Telecommunications System (UMTS), uses
long codes in the down link. The system is conceived for the vocal
communication and the transmission of the data. In particular, the
down link is very important, because of the asymmetrical request of
the data, i.e., more remote loading towards the mobiles than towards
the basic station. Moreover, the UMTS uses for the down link an
orthogonal spreading out with a variable factor of spreading out
(OVSF for Orthogonal Variable Spreading Factor). This
characteristic makes it possible to increase the flow of data of one or
more users by reducing their factor of spreading out without
changing the factor of spreading out of other users. In the current
standard of the UMTS, two techniques to increase the performances
of the down link were proposed, the diversity of sending antenna and
the codes space-time. These two techniques fight only fainding. The
receiver proposed for the mobil station is the RAKE, but one can
imagine a receiver more sophisticated, able to reduce the interference
between users and the impact of the coloured noise and interferences
to narrow band. In this context, where the users have long codes
synchronized with variable factor of spreading out and ignorance by
the mobile of the other active codes/users, the use of the sequences of
code pseudo-noises different lengths is presented in the form of one
of the most appropriate solutions.
Abstract: The paradigm of mobile agent provides a promising technology for the development of distributed and open applications. However, one of the main obstacles to widespread adoption of the mobile agent paradigm seems to be security. This paper treats the security of the mobile agent against malicious host attacks. It describes generic mobile agent protection architecture. The proposed approach is based on the dynamic adaptability and adopts the reflexivity as a model of conception and implantation. In order to protect it against behaviour analysis attempts, the suggested approach supplies the mobile agent with a flexibility faculty allowing it to present an unexpected behaviour. Furthermore, some classical protective mechanisms are used to reinforce the level of security.
Abstract: IP multicasting is a key technology for many existing and emerging applications on the Internet. Furthermore, with increasing popularity of wireless devices and mobile equipment, it is necessary to determine the best way to provide this service in a wireless environment. IETF Mobile IP, that provides mobility for hosts in IP networks, proposes two approaches for mobile multicasting, namely, remote subscription (MIP-RS) and bi-directional tunneling (MIP-BT). In MIP-RS, a mobile host re-subscribes to the multicast groups each time it moves to a new foreign network. MIP-RS suffers from serious packet losses while mobile host handoff occurs. In MIP-BT, mobile hosts send and receive multicast packets by way of their home agents (HAs), using Mobile IP tunnels. Therefore, it suffers from inefficient routing and wastage of system resources. In this paper, we propose a protocol called Mobile Multicast support using Old Foreign Agent (MMOFA) for Mobile Hosts. MMOFA is derived from MIP-RS and with the assistance of Mobile host's Old foreign agent, routes the missing datagrams due to handoff in adjacent network via tunneling. Also, we studied the performance of the proposed protocol by simulation under ns-2.27. The results demonstrate that MMOFA has optimal routing efficiency and low delivery cost, as compared to other approaches.
Abstract: The first generation of Mobile Agents based Intrusion
Detection System just had two components namely data collection
and single centralized analyzer. The disadvantage of this type of
intrusion detection is if connection to the analyzer fails, the entire
system will become useless. In this work, we propose novel hybrid
model for Mobile Agent based Distributed Intrusion Detection
System to overcome the current problem. The proposed model has
new features such as robustness, capability of detecting intrusion
against the IDS itself and capability of updating itself to detect new
pattern of intrusions. In addition, our proposed model is also capable
of tackling some of the weaknesses of centralized Intrusion Detection
System models.
Abstract: In this paper, we present a novel approach to location
system under indoor environment. The key idea of our work is
accurate distance estimation with cricket-based location system using
A* algorithm. We also use magnetic sensor for detecting obstacles in
indoor environment. Finally, we suggest how this system can be used
in various applications such as asset tracking and monitoring.
Abstract: MBMS is a unidirectional point-to-multipoint bearer
service in which data are transmitted from a single source entity to
multiple recipients. For a mobile to support the MBMS, MBMS client
functions as well as MBMS radio protocols should be designed and
implemented. In this paper, we analyze the MBMS client functions
and describe the implementation of them in our mobile test-bed. User
operations and signaling flows between protocol entities to control the
MBMS functions are designed in detail. Service announcement
utilizing the file download MBMS service and four MBMS user
services are demonstrated in the test-bed to verify the MBMS client
functions.
Abstract: Unified Theory of Acceptance and Use of Technology
(UTAUT) model has demonstrated the influencing factors for generic
information systems use such as tablet personal computer (TPC) and
mobile communication. However, in the context of digital library
system, there has been very little effort to determine factors affecting
the intention to use digital library based on the UTAUT model. This
paper investigates factors that are expected to influence the intention
of postgraduate students to use digital library based on modified
UTAUT model. The modified model comprises of constructs
represented by several latent variables, namely performance
expectancy (PE), effort expectancy (EE), information quality (IQ)
and service quality (SQ) and moderated by age, gender and
experience in using digital library. Results show that performance
expectancy, effort expectancy and information quality are positively
related to the intention to use digital library, while service quality is
negatively related to the intention to use digital library. Age and
gender have shown no evidence of any significant interactions, while
experience in using digital library significantly interacts with effort
expectancy and intention to use digital library. This has provided the
evidence of a moderating effect of experience in the intention to use
digital library. It is expected that this research will shed new lights
into research of acceptance and intention to use the library in a digital
environment.
Abstract: There has been a growing interest in the field of
bio-mimetic robots that resemble the shape of an insect or an aquatic
animal, among many others. One bio-mimetic robot serves the
purpose of exploring pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. In order
to move effectively inside a pipeline, the robot-s movement will
resemble that of a lizard. When situated in massive pipelines with
complex routes, the robot places fixed sensors in several important
spots in order to complete its monitoring. This monitoring task is to
prevent a major system failure by preemptively recognizing any minor
or partial malfunctions. Areas uncovered by fixed sensors are usually
impossible to provide real-time observation and examination, and thus
are dependant on periodical offline monitoring. This paper provides
the Monitoring System that is able to monitor the entire area of
pipelines–with and without fixed sensors–by using the bio-mimetic
robot.
Abstract: With the advantage of wireless network technology,
there are a variety of mobile applications which make the issue of
wireless sensor networks as a popular research area in recent years.
As the wireless sensor network nodes move arbitrarily with the
topology fast change feature, mobile nodes are often confronted with
the void issue which will initiate packet losing, retransmitting,
rerouting, additional transmission cost and power consumption.
When transmitting packets, we would not predict void problem
occurring in advance. Thus, how to improve geographic routing with
void avoidance in wireless networks becomes an important issue. In
this paper, we proposed a greedy geographical void routing algorithm
to solve the void problem for wireless sensor networks. We use the
information of source node and void area to draw two tangents to
form a fan range of the existence void which can announce voidavoiding
message. Then we use source and destination nodes to draw
a line with an angle of the fan range to select the next forwarding
neighbor node for routing. In a dynamic wireless sensor network
environment, the proposed greedy void avoiding algorithm can be
more time-saving and more efficient to forward packets, and improve
current geographical void problem of wireless sensor networks.
Abstract: With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. However, the acceptance of m-learning by individuals is critical to the successful implementation of m-learning systems. Thus, there is a need to research the factors that affect users- intention to use m-learning. Based on an updated information system (IS) success model, data collected from 350 respondents in Taiwan were tested against the research model using the structural equation modeling approach. The data collected by questionnaire were analyzed to check the validity of constructs. Then hypotheses describing the relationships between the identified constructs and users- satisfaction were formulated and tested.
Abstract: It is a challenge to provide a wide range of queries to
database query systems for small mobile devices, such as the PDAs
and cell phones. Currently, due to the physical and resource
limitations of these devices, most reported database querying systems
developed for them are only offering a small set of pre-determined
queries for users to possibly pose. The above can be resolved by
allowing free-form queries to be entered on the devices. Hence, a
query language that does not restrict the combination of query terms
entered by users is proposed. This paper presents the free-form query
language and the method used in translating free-form queries to
their equivalent SQL statements.
Abstract: A Personal Distributed Environment (PDE) is an
example of an IP-based system architecture designed for future
mobile communications. In a single PDE, there exist several Subnetworks
hosting devices located across the infrastructure, which will
inter-work with one another through the coordination of a Device
Management Entity (DME). Some of these Sub-networks are fixed
and some are mobile. In order to support Mobile Sub-networks
mobility in the PDE, the PDE-NEMO protocol was proposed. This
paper discussed the signalling cost analysis of PDE-NEMO by use of
a detailed simulation model. The paper started with the introduction
of the protocol, followed by the experiments and results and then
followed by discussions.
Abstract: The recent developments in computing and
communication technology permit to users to access multimedia
documents with variety of devices (PCs, PDAs, mobile phones...)
having heterogeneous capabilities. This diversification of supports
has trained the need to adapt multimedia documents according to
their execution contexts. A semantic framework for multimedia
document adaptation based on the conceptual neighborhood graphs
was proposed. In this framework, adapting consists on finding
another specification that satisfies the target constraints and which is
as close as possible from the initial document. In this paper, we
propose a new way of building the conceptual neighborhood graphs
to best preserve the proximity between the adapted and the original
documents and to deal with more elaborated relations models by
integrating the relations relaxation graphs that permit to handle the
delays and the distances defined within the relations.
Abstract: The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.
Abstract: The technology usages of high speed Internet leads to
establish and start new era of online education. With the
advancement of the information technology and communication
systems new opportunities have been created. This leads universities
to have various online education channels to meet the demand of
different learners- needs. One of these channels is M-learning, which
can be used to improve the online education environment. With using
such mobile technology in learning both students and instructors can
easily access educational courses anytime from anywhere. The paper
first presents literature about mobile learning and to what extent this
approach can be utilized to enhance the overall learning system. It
provides a comparison between mobile learning and traditional elearning
showing the wide array of benefits of the new generation of
technology. The possible challenges and potential advantages of Mlearning
in the online education system are also discussed.
Abstract: This paper presents the modeling results of an
innovative system for the temperature control in the interior
compartment of a stationary automobile facing the solar energy from
the sun. A very thin layer of PCM inside a pouch placed in the
ceiling of the car in which the heating energy is absorbed and release
with melting and solidification of phase change materials. As a result
the temperature of the car interior is maintained in the comfort
condition. The amount of required PCM has been calculated to be
about 755 g. The PCM-temperature controlling system is simple and
has a potential to be implemented as a practical solution to prevent
undesirable heating of the automobile-s cabin.