Skip to main content
Top
Published in: Journal of Computer Virology and Hacking Techniques 2/2014

01-05-2014 | Editorial

Recent trends in Mobile Communication Systems

Authors: Sang-Yeob Oh, Supratip Ghose, Hye-Jung Jang, Kyungyong Chung

Published in: Journal of Computer Virology and Hacking Techniques | Issue 2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

With recent expansions of IT convergence equipment, more and more mobile communications—related devices are used in many fields, and mobile communications—based projects are underway in various venues, such as u-cities, u-ports, u-health, and u-traffic. In particular, owing to increasing demand for personal services due to the rapid increase in the elderly population and rapid development of convergence technology, the increased competition among mobile communications institutions, etc., is shifting towards consumer-oriented services, giving priority to the expectations and desires of consumers when delivering ubiquitous services. As a result, the use of mobile communications technology is increasing in convergence-related fields. Mobile communications systems for convergence environments pose many research challenges. Among these is processing overhead in service environments [1318]. Therefore, novel techniques, architectures, algorithms, and experiences regarding multimedia applications and industry services must be considered. Some of these research areas are listed below.
\(\bullet \)
Ubiquitous Computing for Convergence
\(\bullet \)
Software Infrastructure, Middleware and Frameworks for Convergence Information
\(\bullet \)
Mobile and Wearable Computing for Convergence Information
\(\bullet \)
Agent Technology in Convergence Information Systems
\(\bullet \)
Convergence Information Applications in u-Commerce, u-Learning, u-Health
\(\bullet \)
Two-way Authentication Protocols in Wireless Communications
\(\bullet \)
Innovative Authentication and Authorization of Mobile Users
\(\bullet \)
Device Identities and Authentication
\(\bullet \)
Mobility for Convergence
\(\bullet \)
Mobile Identity Management
\(\bullet \)
Enhanced Authentication Control Systems for Mobile and Wireless Systems
\(\bullet \)
Authentication in Mobile Networks
\(\bullet \)
Convergence Information Indexing, Searching, and Visualization
\(\bullet \)
Intelligent Information Extraction Algorithms
This special issue is devoted to one of the hottest topics in mobile communication systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kwon, I., Lee, S.: Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies. J. Comput. Virol. Hacking Tech. (2013). doi:10.1007/s11416-013-0199-y Kwon, I., Lee, S.: Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies. J. Comput. Virol. Hacking Tech. (2013). doi:10.​1007/​s11416-013-0199-y
3.
go back to reference Kim, S., Park, H., Bang, H., Kim, D.: An indoor location tracking based on mobile RFID for smart exhibition service. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0200-4 Kim, S., Park, H., Bang, H., Kim, D.: An indoor location tracking based on mobile RFID for smart exhibition service. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0200-4
6.
go back to reference Lim, D., Kim, T.: Modeling discovery and removal of security vulnerabilities in software system using priority queueing models. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0205-z Lim, D., Kim, T.: Modeling discovery and removal of security vulnerabilities in software system using priority queueing models. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0205-z
8.
9.
go back to reference Ahn, H., Lee, Y., Lee, J., Cho, H.: A low complexity image stitching using advanced feature matching in mobile environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0207-x Ahn, H., Lee, Y., Lee, J., Cho, H.: A low complexity image stitching using advanced feature matching in mobile environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0207-x
11.
go back to reference Choi, M., Han, K.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0209-8 Choi, M., Han, K.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0209-8
13.
go back to reference Ha, O.K., Song, Y.S., Chung, K.Y., Lee, K.D., Park, D.: Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers. Ubiquitous Comput. 18(3), 553–561 (2014)CrossRef Ha, O.K., Song, Y.S., Chung, K.Y., Lee, K.D., Park, D.: Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers. Ubiquitous Comput. 18(3), 553–561 (2014)CrossRef
14.
go back to reference Kim, S.H., Chung, K.Y.: 3D simulator for stability analysis of finite slope causing plane activity. Multimed. Tools Appl. 68(2), 455–463 (2014)CrossRefMathSciNet Kim, S.H., Chung, K.Y.: 3D simulator for stability analysis of finite slope causing plane activity. Multimed. Tools Appl. 68(2), 455–463 (2014)CrossRefMathSciNet
16.
go back to reference Jung, E.Y., Kim, J.H., Chung, K.Y., Park, D.K.: Home health gateway based healthcare services through U-health platform. Wirel. Pers. Commun. 73(2), 207–218 (2013)CrossRef Jung, E.Y., Kim, J.H., Chung, K.Y., Park, D.K.: Home health gateway based healthcare services through U-health platform. Wirel. Pers. Commun. 73(2), 207–218 (2013)CrossRef
18.
go back to reference Kim, J.H., Ryu, J.K.: Recent trends on high-performance computing and security. Clust. Comput. 16(2), 207–208 (2013)CrossRefMathSciNet Kim, J.H., Ryu, J.K.: Recent trends on high-performance computing and security. Clust. Comput. 16(2), 207–208 (2013)CrossRefMathSciNet
Metadata
Title
Recent trends in Mobile Communication Systems
Authors
Sang-Yeob Oh
Supratip Ghose
Hye-Jung Jang
Kyungyong Chung
Publication date
01-05-2014
Publisher
Springer Paris
DOI
https://doi.org/10.1007/s11416-014-0213-z

Other articles of this Issue 2/2014

Journal of Computer Virology and Hacking Techniques 2/2014 Go to the issue

Premium Partner