International Journal of Mobile Computing and Multimedia
Communications (IJMCMC)
Official Publication of the Information Resources Management Association
Volume 1, Issue 3, July-September 2009
Published: Quarterly in Print and Electronically
ISSN: 1937-9412 EISSN: 1937-9404
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/ijmcmc
Editors-in-Chief:
Ismail Khalil, Johannes Kepler University Linz, Austria
Edgar Weippl, Secure Business Austria - Security Research, Austria
PAPER ONE
Frequency Domain Equalization And Adaptive Ofdm Vs Single Carrier
Modulation
Inderjeet Kaur, Ajay Kumar Garg Engineering College, India
In this article, the author compares multi-carrier and single-carrier
modulation schemes for wireless communication systems with the
utilization of fast fourier transform (FFT) and its inverse in both
cases. With the assumption that in OFDM (orthogonal frequency division
multiplexing) the inverse FFT transforms the complex amplitudes of the
individual sub-carriers at the transmitter into time domain, the
inverse operation is carried out at the receiver. In the case of
single-carrier modulation, the FFT and its inverse are used at the
input and output of the frequency domain equalizer in the receiver.
The author simulates different single-carrier and multi-carrier
transmission systems with time-variant transfer functions measured
with a wideband channel sounder.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34130
PAPER TWO
A Secure and Trustworthy Framework for Mobile Agent-Based E-
Marketplace with Digital Forensics and Security Protocols
Qi Wei, University Kebangsaan Malaysia, Malaysia
Ahmed Patel, University Kebangsaan Malaysia, Malaysia
Mobile agents raise security issues such as the protection of platform/
host that runs the mobile agent against attacks, which can harm or use
its resources without permission. In this article, the authors propose
a framework which includes safe, secure and trusted and auditable
services, as well as forensic mechanisms to provide audit trails for
digital evidence of transactions and protection against illegal
activities. The proposed framework and protocols provide a secure
communication for mobile agents when they move to different security
environments to deal with e-marketplace activities, such as search
information, negotiation, and payments. This article concludes by
highlighting and discussing further research work to build viable
systems.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34131
PAPER THREE
Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks
Kais Mnif, University of Sfax, Tunisia
Michel Kadoch, University of Quebec, Canada
This article proposes using virtual backbone structures to handle
control messages in ad hoc networks. In the first part, the authors
present an approach to build the virtual backbone on the setup phase.
The construction of backbone is based on the minimum connected
dominating set (MCDS), and a linear programming approach is used to
build a Minimum Dominating Set (MDS). The authors develop a
theoretical analysis based on probabilistic approach to evaluate the
size of MCDS and present and compare different techniques of diffusion
in ad hoc networks. The second part of this article presents a
distributed procedure to maintain the backbone when introducing the
mobility of terminals.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34132
PAPER FOUR
Definition and Analysis of a Fixed Mobile Convergent Architecture for
Enterprise VoIP Services
Joel Penhoat, France Telecom Orange Labs, France
Olivier Le Grand, France Telecom Orange Labs, France
Mikael Salaun, France Telecom Orange Labs, France
Tayeb Lemlouma, Université de Rennes 1 IRISA, France
Fixed mobile convergence is an important challenge for
telecommunication operators given the heterogeneity of access network
technologies and the variety of terminals. Fixed mobile convergence,
which introduces the concept 'being always best connected', is
considered to be the next step in the evolution of telecommunication
networks and should increase the operators' revenues. In order to
enforce the concept 'being always best connected', this article
presents and analyzes an architecture for enterprises, named 'business
zone'. After defining the business zone, the authors present an
architecture and analyze main components while limiting their study to
the transport of VoIP flows. This article also presents two patented
methods: the first method authorizes a VoIP flow to be transmitted
according to the available resources in the business zone, and the
second method enhances the decision process during a handover.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34133
PAPER FIVE
Realization of Route Reconstructing Scheme for Mobile Ad hoc Network
Qin Danyang, Harbin Institute of Technology, China
Ma Lin, Harbin Institute of Technology, China
Sha Xuejun, Harbin Institute of Technology, China
Xu Yubin, Harbin Institute of Technology, China
Mobile ad hoc network (MANET) is a centerless packet radio network
without fixed infrastructure. In recent years tremendous attention
have been received because of capabilities of self-configuration and
self-maintenance; however, attenuation and interference caused by node
mobility and wireless channels sharing weaken the stability of
communication links, especially in ubiquitous MANET. A mathematical
exploring model for next-hop node has been established. The authors
provide a to increase survivability and reduce average end-to-end
delay during route maintenance as well as allowing continuous packet
forwarding for fault resilience so as to support mobile multimedia
communication.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34134
PAPER SIX
Buffer Management in Cellular IP Network using PSO
Mohammad Anbar, Jawaharlal Nehru University, New Delhi
Deo Prakash Vidyarthi, Jawaharlal Nehru University, New Delhi
Cellular IP networks deal with the concepts of micro-mobility. Buffer
management in cellular IP networks is very crucial, as its proper
usage not only increases the throughput of the network but also
results in the reduction of the call drops. This article proposes a
model for buffer management in cellular IP network using particle
swarm optimization (PSO). The model considers two kinds of buffers:
gateway buffer and base station buffer. In the proposed two-tier
model, the first tier applies a prioritization algorithm for
prioritizing real-time packets in the buffer. In the second tier, PSO
algorithm is used on a swarm of cells in the network. PSO is applied
for a given time slot, called window. In each window period, the swarm
stores a number of packets depending on the window size and the total
number of packets. This article studies the effect of various
parameters (e.g. number of packets, size of packets, window size, and
a threshold value on buffer utilization) by conducting the simulation
experiments.
To obtain a copy of the entire article, click on the link below.
http://www.infosci-on-demand.com/content/details.asp?ID=34135
****************************************************
For full copies of the above articles, check for this issue of the
International Journal of Mobile Computing and Multimedia
Communications (IJMCMC) in your institution's library. This journal
is also included in the IGI Global aggregated "InfoSci-Journals"
database: www.infosci-journals.com.
*****************************************************
CALL FOR PAPERS
Mission of IJMCMC:
The primary goal of the International Journal of Mobile Computing and
Multimedia Communications (IJMCMC) is to provide researchers and
academic communities around the world with the highest quality
articles while reporting the state-of-the-art research results and
scientific findings allowing students, developers, engineers,
innovators, research strategists, and IT-managers in this field to
gain greater insight into mobile multimedia as they relate to
applications, management, and opportunities within any given
construct. This journal publishes original research papers, state of
the art reviews, technical notes, case studies, innovative projects,
and books reviews on topics leveraging all aspects of mobile computing
and multimedia communications: from underlying technologies to
applications, from theory to practices, and from servers to networks
to devices.
Coverage of IJMCMC:
The coverage of this journal ranges from innovative topics to research
findings to trends analysis on mobile multimedia and related theories,
technologies, methods, applications, and services from all
engineering, business and organizational perspectives.
Contributing papers may deal with, but are not limited to the
following topics:
- Active multimedia network
- Advances in MAN
- Augmented reality
- Billing and security for mobile multimedia services
- Coding, equalization, and modulation
- Consumer applications
- Content distribution architectures
- Content distribution internetworking
- Cooperation in mobile multimedia
- Database for mobile systems
- Digital rights managements
- Economics of mobile multimedia
- Effect of mobility on computing
- Emerging access networks
- Enabling infrastructures for mobile computing and multimedia
- Ergonomics and health issues
- Home networking
- Industrial applications
- IP video, streaming, and interactive video services
- Location- & context-aware dependent computing
- Low power networking
- Marketing strategies
- Measurement and modeling of network operation
- Medical applications
- Middleware support for mobile multimedia
- Military applications
- Mobile and multimedia markets and business models
- Mobile aware applications
- Mobile CSCW (computer-supported cooperative work)
- Mobile multimedia interfaces
- Mobile multimedia network traffic engineering
- Mobile multimedia platforms
- Mobile multimedia software architectures
- Mobile operating systems
- Multimedia and integrated services
- Multimedia traffic management
- Multi-point, multicast services
- Network models and architectures
- Network programming for mobile multimedia services
- New mobile and multimedia applications and services
- People with disabilities
- Personal area networks
- Personalization, privacy, and security issues
- Portable computers with wireless access
- Portable devices and smart sensors
- Provisioning of multimedia networks and services
- QoS management
- Regulatory and legal frameworks
- Regulatory and societal issues of mobile computing and multimedia
- Security and authentication
- Social implications
- Source coding/compression
- Spread spectrum communications
- Standardization
- Streaming media protocols
- Training
- Ubiquitous and pervasive computing
- Value added chains for mobile multimedia
- VoIP services
- Wearable computers and PDAs
- Wireless and mobile multimedia network management
- Wireless data services
Interested authors should consult the journal's manuscript submission
guidelines at www.igi-global.com/ijmcmc.
All inquiries and submissions should be sent to:
Editor-in-Chief: Ismail Khalil at ismail.khalil@jku.at
============================================================
Ismail Khalil Tel: +43 732 2468 9888
Institute of Telecooperation Mobile: +43 680 125 9331
Johannes Kepler University Linz Fax: +43 732 2468 9829
Altenberger Strasse 69 email: ismail@iiwas.org
A-4040 Linz, Austria http://www.iiwas.org/ismail/
=============================================================
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment