Skip to main content
Erschienen in: Journal of Computer Virology and Hacking Techniques 2/2014

01.05.2014 | Editorial

Recent trends in Mobile Communication Systems

verfasst von: Sang-Yeob Oh, Supratip Ghose, Hye-Jung Jang, Kyungyong Chung

Erschienen in: Journal of Computer Virology and Hacking Techniques | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

With recent expansions of IT convergence equipment, more and more mobile communications—related devices are used in many fields, and mobile communications—based projects are underway in various venues, such as u-cities, u-ports, u-health, and u-traffic. In particular, owing to increasing demand for personal services due to the rapid increase in the elderly population and rapid development of convergence technology, the increased competition among mobile communications institutions, etc., is shifting towards consumer-oriented services, giving priority to the expectations and desires of consumers when delivering ubiquitous services. As a result, the use of mobile communications technology is increasing in convergence-related fields. Mobile communications systems for convergence environments pose many research challenges. Among these is processing overhead in service environments [1318]. Therefore, novel techniques, architectures, algorithms, and experiences regarding multimedia applications and industry services must be considered. Some of these research areas are listed below.
\(\bullet \)
Ubiquitous Computing for Convergence
\(\bullet \)
Software Infrastructure, Middleware and Frameworks for Convergence Information
\(\bullet \)
Mobile and Wearable Computing for Convergence Information
\(\bullet \)
Agent Technology in Convergence Information Systems
\(\bullet \)
Convergence Information Applications in u-Commerce, u-Learning, u-Health
\(\bullet \)
Two-way Authentication Protocols in Wireless Communications
\(\bullet \)
Innovative Authentication and Authorization of Mobile Users
\(\bullet \)
Device Identities and Authentication
\(\bullet \)
Mobility for Convergence
\(\bullet \)
Mobile Identity Management
\(\bullet \)
Enhanced Authentication Control Systems for Mobile and Wireless Systems
\(\bullet \)
Authentication in Mobile Networks
\(\bullet \)
Convergence Information Indexing, Searching, and Visualization
\(\bullet \)
Intelligent Information Extraction Algorithms
This special issue is devoted to one of the hottest topics in mobile communication systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kwon, I., Lee, S.: Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies. J. Comput. Virol. Hacking Tech. (2013). doi:10.1007/s11416-013-0199-y Kwon, I., Lee, S.: Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies. J. Comput. Virol. Hacking Tech. (2013). doi:10.​1007/​s11416-013-0199-y
2.
3.
Zurück zum Zitat Kim, S., Park, H., Bang, H., Kim, D.: An indoor location tracking based on mobile RFID for smart exhibition service. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0200-4 Kim, S., Park, H., Bang, H., Kim, D.: An indoor location tracking based on mobile RFID for smart exhibition service. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0200-4
6.
Zurück zum Zitat Lim, D., Kim, T.: Modeling discovery and removal of security vulnerabilities in software system using priority queueing models. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0205-z Lim, D., Kim, T.: Modeling discovery and removal of security vulnerabilities in software system using priority queueing models. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0205-z
8.
Zurück zum Zitat Kim, D., Park, K., Choi, G., Min, K.: A study on the factors that affect the adoption of smart water grid. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0206-y Kim, D., Park, K., Choi, G., Min, K.: A study on the factors that affect the adoption of smart water grid. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0206-y
9.
Zurück zum Zitat Ahn, H., Lee, Y., Lee, J., Cho, H.: A low complexity image stitching using advanced feature matching in mobile environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0207-x Ahn, H., Lee, Y., Lee, J., Cho, H.: A low complexity image stitching using advanced feature matching in mobile environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0207-x
11.
Zurück zum Zitat Choi, M., Han, K.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.1007/s11416-014-0209-8 Choi, M., Han, K.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. (2014). doi:10.​1007/​s11416-014-0209-8
13.
Zurück zum Zitat Ha, O.K., Song, Y.S., Chung, K.Y., Lee, K.D., Park, D.: Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers. Ubiquitous Comput. 18(3), 553–561 (2014)CrossRef Ha, O.K., Song, Y.S., Chung, K.Y., Lee, K.D., Park, D.: Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers. Ubiquitous Comput. 18(3), 553–561 (2014)CrossRef
14.
Zurück zum Zitat Kim, S.H., Chung, K.Y.: 3D simulator for stability analysis of finite slope causing plane activity. Multimed. Tools Appl. 68(2), 455–463 (2014)CrossRefMathSciNet Kim, S.H., Chung, K.Y.: 3D simulator for stability analysis of finite slope causing plane activity. Multimed. Tools Appl. 68(2), 455–463 (2014)CrossRefMathSciNet
16.
Zurück zum Zitat Jung, E.Y., Kim, J.H., Chung, K.Y., Park, D.K.: Home health gateway based healthcare services through U-health platform. Wirel. Pers. Commun. 73(2), 207–218 (2013)CrossRef Jung, E.Y., Kim, J.H., Chung, K.Y., Park, D.K.: Home health gateway based healthcare services through U-health platform. Wirel. Pers. Commun. 73(2), 207–218 (2013)CrossRef
18.
Zurück zum Zitat Kim, J.H., Ryu, J.K.: Recent trends on high-performance computing and security. Clust. Comput. 16(2), 207–208 (2013)CrossRefMathSciNet Kim, J.H., Ryu, J.K.: Recent trends on high-performance computing and security. Clust. Comput. 16(2), 207–208 (2013)CrossRefMathSciNet
Metadaten
Titel
Recent trends in Mobile Communication Systems
verfasst von
Sang-Yeob Oh
Supratip Ghose
Hye-Jung Jang
Kyungyong Chung
Publikationsdatum
01.05.2014
Verlag
Springer Paris
Erschienen in
Journal of Computer Virology and Hacking Techniques / Ausgabe 2/2014
Elektronische ISSN: 2263-8733
DOI
https://doi.org/10.1007/s11416-014-0213-z

Weitere Artikel der Ausgabe 2/2014

Journal of Computer Virology and Hacking Techniques 2/2014 Zur Ausgabe

Premium Partner