PoLTE has developed Positioning over LTE (PoLTE) Macro, a solution that leverages existing LTE infrastructure to accurately locate devices indoors and outdoors using a single cell tower. PoLTE Macro uses signals transmitted by user devices to determine their location within 6 meters, providing a significant improvement over previous single tower methods that could only locate devices within kilometers. This allows mobile network operators to offer new location-based services and monetize their network infrastructure without additional equipment investments.
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOSijasuc
In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy
(BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE
technology where every technology plays a part in a user discovery and broadcasting process. In such
system, a specific ibeacon device broadcasts the information when a user is in proximity. Using
experiments, we conduct a scenario where the system discovers users, disseminates information, and later
we use collected data to examine the system performance and capability. The results show that our
proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting
concept that can be easily implemented and used in business environments.
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
DOT NET IEEE 2013 - 2014 IEEE PROJECT TITLES FOR STUDENTS B.E.,B.TECH.,M.E,M.TECH.,M.PHIL.,M.S.,MCA,M.S.,MBA AND DIPLOMA PROJECTS USING C#.NET, ASP.NET, .NET, DOTNET, DOT NET
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOSijasuc
In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy
(BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE
technology where every technology plays a part in a user discovery and broadcasting process. In such
system, a specific ibeacon device broadcasts the information when a user is in proximity. Using
experiments, we conduct a scenario where the system discovers users, disseminates information, and later
we use collected data to examine the system performance and capability. The results show that our
proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting
concept that can be easily implemented and used in business environments.
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
DOT NET IEEE 2013 - 2014 IEEE PROJECT TITLES FOR STUDENTS B.E.,B.TECH.,M.E,M.TECH.,M.PHIL.,M.S.,MCA,M.S.,MBA AND DIPLOMA PROJECTS USING C#.NET, ASP.NET, .NET, DOTNET, DOT NET
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
IoT protocols overview part 2- Tethered protocolsClint Smith
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the second in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments focusing on IoT Tethered Protocols.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
IDC: Peplink Adds Resilience to IoT NetworksEric Wong
In this whitepaper, IDC argues that diversification of Internet access WAN technologies, combined with secure VPN and central management is the best way to both guarantee IoT network availability and allow for rapid deployment of IoT networks anywhere.
Bhadale group of companies telecom industry products catalogueVijayananda Mohire
This is our first version of product offering for the Telecom sector. We offer Intelligent resource management and mobile ambient intelligent agent system for easy and richer user experience while transferring from once cell to another
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
IoT protocols overview part 2- Tethered protocolsClint Smith
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the second in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments focusing on IoT Tethered Protocols.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
IDC: Peplink Adds Resilience to IoT NetworksEric Wong
In this whitepaper, IDC argues that diversification of Internet access WAN technologies, combined with secure VPN and central management is the best way to both guarantee IoT network availability and allow for rapid deployment of IoT networks anywhere.
Bhadale group of companies telecom industry products catalogueVijayananda Mohire
This is our first version of product offering for the Telecom sector. We offer Intelligent resource management and mobile ambient intelligent agent system for easy and richer user experience while transferring from once cell to another
IIoT : Real-time Decision-making is Enabled Through Real-time MonitoringInfyiot Solutions
The Industrial Internet of Things (IIoT) is a network of interconnected devices that allows industrial businesses to make more informed business choices more quickly by monitoring, collecting, exchanging, and analyzing data. Applying IIoT concepts to industrial business challenges has enormous advantages because even a slight gain in productivity, capital expenditure, or asset allocation results in large cost savings and/or revenue growth. In the sections below, we examine two typical use cases for IIoT monitoring solutions and the related real-world examples.
It’s clear that private LTE networks will play an important role in our connected future. In this paper, we will explore
what private LTE is, its benefits, and where it can best be used.
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A novel password based authentication technique for 4 g mobile communicationseSAT Journals
Abstract Subscriber and network mutual authentication in mobile systems is a process by which mobile network gains confidence about the identity of the communicating subscriber and subscriber verified that he is communicating with correct network. Authentication in mobile systems is a challenge issue due to swift growth of wireless traffic with increasing security threats and attacks in mobile systems. 4G mobile communications system has brought for the high speedy data communications network by packet switching technology for networking transmission through SGSN servers. In this paper, we propose a mutual authentication technique that verifies the authenticity of the subscriber as well as the network by subscriber password in 4G mobile system. We focus on the advantages of our proposed technique, termed as password based mutual authentication technique. Keywords: Identifier, Mutual Authentication, Packet Switching, Password, SIM.
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
#IOT BASICS & EVOLUTION OF 3GPP TECHNOLOGIES FOR IOT CONNECTIVITY
#IOT-Internet of Things Handbook
#Cellular NW for Massive IOT
#LTE_Evolution_for_IoT_Connectivity
Although all of this may come soon, we still need to understand the myriad behind-the-scenes technology that makes dreams a reality. Without them, dreams will never be realized.
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
Abstract Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging
technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a
new mobile payment system using long term evolution direct and its features. A sensitive mobile payment system would require
high security requirements in order to be trusted by the users and the businesses. These requirements are taken into account in
our proposed system design and solutions to security considerations are provided. The system’s security and usability features are
designed for implementation from physical to application layer to address the identified issues. Within the scope of this work, we
provided the conceptual design solutions to allow the system to be as solid and secure as possible while they are convenient
enough not to degrade user’s experience when using the system.
Keywords: LTE Direct, Mobile Payment, Internet of Things, Device-To-Device Networking
21 Innovative IoT Products To Watch at Hannover Messe 2017Kudzai Manditereza
In just a few days, thousands of exhibitors and journalists will pour into Germany for the Hannover Messe. Founded in the middle of the twentieth century the fair has grown over the years to become the world's biggest industrial fair, offering a glimpse into what's to come for different industries. And while IoT may not be front and centre , there seems to be no slowing down in the push for innovation in that space. What follows in the slideshow below are 21 IoT products that I consider to be at the forefront of innovation amidst a sea of devices and software in 2017.
To meet the new connectivity requirements of the emerging IoT segment, 3GPP has taken evolutionary steps on both the network side and the device side. A single technology or solution cannot be ideal to all the different potential IoT applications, market situations and spectrum availability. As a result, the 3GPP standardizing several technologies, including Extended Coverage GSM (EC-GSM), LTE-M and NB-IoT.
LTE-M, NB-IoT and EC-GSM are all superior solutions to meet IoT requirements as a family of solutions, and can complement each other based on technology availability, use case requirements and deployment scenarios. The evolution for these technologies is shown in figure #5. Technical studies and normative work for the support of Machine Type Communication (MTC) as part of 3GPP LTE specifications for RAN began in 3GPP Release 12 and are continuing with the goals of developing features optimized for devices with MTC traffic.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
D'ici 2020, il y aura plus de 28 milliards d'objets connectés installés, et le marché présentera un potentiel de 7 trillions de dollars, selon les résultats de l'étude. Pour atteindre ces niveaux de performances, les infrastructures de réseau actuelles doivent cependant évoluer, pour gérer les grandes quantités de données qui seront produites, le nombre croissant de connexions qui auront lieu sur ces réseaux, ou encore assurer la sécurité de ces infrastructures.
This article (in French) explains how Geoflex has developed original PPP-RTK solutions (Precise Point Positioning with Real Time Kinematic capabilities) to reduce the convergence time of PPP (from 30 minutes to a few minutes) by adding a priori atmospheric data in the PPP calculation.
With 50 expert speakers and 170 senior attendees, The Fourth annual ConnecteDriver conference (Feb1-2, 2017) is a must attend event that offers the right mix between the automotive, mobile and consumer electronics industry, with a strong focus on the driver.
Study HERE SBD - How autonomous vehicles could relieve or worsen traffic cong...Ludovic Privat
The utopian vision of autonomous cars and a world where traffic issues are null is a generation away, according to this whitepaper from HERE and SBD research, which also asserts that advancement in autonomous vehicles will be gridlocked without the cooperation of all stakeholders.
Inrix competitive parking lot benchmark against ParkopediaLudovic Privat
Inrix competitive parking lot benchmark against Parkopedia. While SBD is a well respected research firm we see several limitations in this study and the way their results are promoted by INRIX.
2015 UBI Research Results for the Consumer Market - LexisNexisLudovic Privat
The 2015 Annual LexisNexis Consumer UBI Study was conducted with over 4,000 total consumers to test existing and new concepts in the market. Some of the findings included:
Overall consumer awareness has leveled off since 2013, suggesting that carriers should consider alternative ways of presenting UBI to consumers
Discounting deductibles, rather than premiums, could be a more sustainable and profitable way to drive adoption
Messaging around safety may be even more effective than a discount-centric approach
Also included is a case study illustrating how AAMI, a leading Australian insurer, launched a highly successful UBI campaign without a discount.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
1. WHITE paper
performance, public safety, retail, data
analytics, enterprise, and the Internet
of Things (IoT). Currently, obtaining
location data is highly fragmented for
the end user, the venue owner, and
the MNO. Typically, network-based
solutions do not meet the accuracy
requirements, and local solutions are
stand-alone products that require
significant investment in infrastructure
equipment and operate independently
from or in competition with the MNO.
The most challenging aspects of
providing location services is the ability
to provide a seamless experience for
the customer and a complete location
dataset as the user moves between
indoor and outdoor environments.
MNOs are uniquely positioned to
solve these issues by exploiting the
dense macro cell deployments used
to maintain subscriber voice and data
services.
PoLTE is transforming the market
for location-based data services by
leveraging the carrier’s vast terrestrial
LTE networks to accurately locate user
devices in the network both indoors
and outdoors. PoLTE has developed
technology called Positioning over
LTE (PoLTE) that provides a universally
available, integrated global platform
that helps ensure user privacy. This
solution, PoLTE Macro, achieves a
high level of precision by leveraging
the Sounding Reference Signals (SRS)
that are embedded in an LTE user’s
transmissions. PoLTE Macro uses
the SRS in the LTE uplink signal, and
converts it into a probe signal by
adapting radar location techniques.
This approach enables the location
of the user devices to be determined
to a level of accuracy not previously
achieved with LTE, TDMA or CDMA-
based technologies.
Leveraging PoLTE Macro, MNOs can
become leaders in providing the
end-to-end location information. This
unique approach and solution enables
the MNO to monetize their existing LTE
infrastructure deployment and provide
next generation location services.
Location accuracy within 6 meters
A critical consideration when selecting
a location solution is the location
Quality of Service (QoS), such as
positioning accuracy and location
response time. Today, access to location
information that the user device
generates is subject to interruption.
PoLTE Macro allows MNOs to provide
consistent and reliable positioning
across their LTE macro, micro and
small cell deployments, independent
of whether the user device is using
the Apple iOS* or Google Android*
operating system or if it is an LTE-
enabled IoT device. Other location
solutions, such as Wi-Fi and Bluetooth
beacons, can be implemented to
complement the core PoLTE Macro
deployment, but they are not required.
Traditional macro cell location methods
require at least three towers to see the
user device in order to locate the device
with precision. Historically, single tower
Accurate Mobile Positioning Using a
Single LTE Macro Cell
PoLTE Corporation1
is a company
that is revolutionizing the market for
location-based data services. PoLTE
have teamed with Applied Computer
Solutions (ACS) and Intel to develop
Positioning over LTE (PoLTE) Macro,
a solution specifically for Mobile
Network Operators (MNOs). In a highly
fragmented location data market,
PoLTE Macro enables MNOs to deliver
immediate value in the form of highly
accurate location data to customers
whether they are indoors or outdoors.
This paper describes the PoLTE Macro
solution and the test results from field
trials using Long Term Evolution (LTE)
macro cells.
Access and control of location
information
Accurate network-based location
information is becoming a core need
for MNO. The location information
crosses a multitude of highly valuable
and critical markets, including network
2. White Paper
Accurate Mobile Positioning Using a
Single LTE Macro Cell
2
deployments as shown in Figure 1
were limited in accuracy to the width of
the sector created by the 120-degree
antenna that was serving the user
device. For example, at a distance of
1.5 kilometers from a base station, the
cross range precision would be 4000
meters.
PoLTE Macro can improve the
precision to less than 2 meters. Table
1 provides a snapshot of the location
measurements attained during
intensive field-testing of the PoLTE
Macro solution2
.
Consistency across indoor and
outdoor environments
Subscribers have shown interest in
additional location services such
as improved interactive gaming
experience, new social networking
opportunities, and localized relevant
information. However, variations among
user device capabilities, and the need
to connect to different networks can
cause subscriber frustration. The PoLTE
Macro solution seamlessly tracks the
location of the user device as it moves
among different networks, including
Wi-Fi, and legacy cellular networks.
It provides a consistent service as
the subscriber moves between their
home, office, stores, and other public
locations.
For complicated indoor environments
such as multi-story office buildings,
where the outdoor macro signal
does not penetrate, there is a
complementary solution called PoLTE
Indoors. PoLTE Indoors can provide
greater location accuracy than Wi-Fi
and Bluetooth dependent solutions
by using existing indoor network
infrastructure.
Even though the PoLTE Macro
solution works across all LTE network
infrastructures, initial MNO interest
is focused on the macro cell. Russ
Markhovsky, CEO at PoLTE Corporation,
explained, “In our conversations with
MNOs, they see significant value
in reusing existing infrastructure
to provide a universal and highly
accurate location solution. MNOs see
the greatest near-term opportunity to
monetize location services at the macro
cell.”
Monetizing accuracy location
metadata
The utilization of PoLTE Macro can be
further enhanced by processing the
location calculations at the edge of the
network. This capability is provided
by two PoLTE partners, ACS and Intel.
ACS offers a Mobile-Edge Computing
(MEC) appliance that allows the location
metadata to be immediately utilized by
other applications and services running
at the network edge. Intel provides the
MEC compliant architecture that helps
maximize the performance of PoLTE
software.
The ACS MEC appliance runs on the
same Intel general purpose platform
that MNOs have implemented in
their data center. The Intel® NEV SDK
real-time virtualization platform and
developer’s environment enables the
MNO to leverage the same architecture
and mechanisms that they use in
their data centers. This allows the
PoLTE Macro location metadata to be
seamlessly integrated with other third-
party applications at the network edge.
Presence-based applications that utilize
contextual location information are
significantly more valuable as the level
of accuracy and ubiquity increases.
MEC enables a new suite of real-time
location services to be envisioned and
allows the existing location services
to be reinvented. Potential services
include targeted advertising, location
analytics to determine what is trending
locally, public safety services such as
crowd and situation monitoring, and
emergency and disaster response
logistical services. Example use cases
are provided in Table 2.
Figure 1: Historical single cell solutions.
Serving
Cell/Sector ID
rOUNDTrIpTIME*
Sector
Beamwidth
Propagation
environments
Antenna configuration No. of sectors used Location accuracy at up to
3 km distance
Light industrial (indoors
and out), dense tree
coverage, and non-line
of sight.
• Three 120o
sectors –
2m separation
• 2x2 MIMO
• Antenna height 9m
1 Better than 6m
2 Better than 2m
Table 1: PoLTE Macro test results.