Zeitschriften und Ausgaben

Volumen 22 (2022): Heft 3 (September 2022)

Volumen 22 (2022): Heft 2 (June 2022)

Volumen 22 (2022): Heft 1 (March 2022)

Volumen 21 (2021): Heft 4 (December 2021)

Volumen 21 (2021): Heft 3 (September 2021)

Volumen 21 (2021): Heft 2 (June 2021)

Volumen 21 (2021): Heft 1 (March 2021)

Volumen 20 (2020): Heft 6 (December 2020)
Special Heft on New Developments in Scalable Computing

Volumen 20 (2020): Heft 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Heft 4 (November 2020)

Volumen 20 (2020): Heft 3 (September 2020)

Volumen 20 (2020): Heft 2 (June 2020)

Volumen 20 (2020): Heft 1 (March 2020)

Volumen 19 (2019): Heft 4 (November 2019)

Volumen 19 (2019): Heft 3 (September 2019)

Volumen 19 (2019): Heft 2 (June 2019)

Volumen 19 (2019): Heft 1 (March 2019)

Volumen 18 (2018): Heft 5 (May 2018)
Special Thematic Heft on Optimal Codes and Related Topics

Volumen 18 (2018): Heft 4 (November 2018)

Volumen 18 (2018): Heft 3 (September 2018)

Volumen 18 (2018): Heft 2 (June 2018)

Volumen 18 (2018): Heft 1 (March 2018)

Volumen 17 (2017): Heft 5 (December 2017)
Special Heft With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Heft 4 (November 2017)

Volumen 17 (2017): Heft 3 (September 2017)

Volumen 17 (2017): Heft 2 (June 2017)

Volumen 17 (2017): Heft 1 (March 2017)

Volumen 16 (2016): Heft 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Heft 5 (October 2016)
Heft Title: Special Heft on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Heft 4 (December 2016)

Volumen 16 (2016): Heft 3 (September 2016)

Volumen 16 (2016): Heft 2 (June 2016)

Volumen 16 (2016): Heft 1 (March 2016)

Volumen 15 (2015): Heft 7 (December 2015)
Special Heft on Information Fusion

Volumen 15 (2015): Heft 6 (December 2015)
Special Heft on Logistics, Informatics and Service Science

Volumen 15 (2015): Heft 5 (April 2015)
Special Heft on Control in Transportation Systems

Volumen 15 (2015): Heft 4 (November 2015)

Volumen 15 (2015): Heft 3 (September 2015)

Volumen 15 (2015): Heft 2 (June 2015)

Volumen 15 (2015): Heft 1 (March 2015)

Volumen 14 (2014): Heft 5 (December 2014)
Special Heft

Volumen 14 (2014): Heft 4 (December 2014)

Volumen 14 (2014): Heft 3 (September 2014)

Volumen 14 (2014): Heft 2 (June 2014)

Volumen 14 (2014): Heft 1 (March 2014)

Volumen 13 (2013): Heft Special-Heft (December 2013)

Volumen 13 (2013): Heft 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Heft 3 (September 2013)

Volumen 13 (2013): Heft 2 (June 2013)

Volumen 13 (2013): Heft 1 (March 2013)

Volumen 12 (2012): Heft 4 (December 2012)

Volumen 12 (2012): Heft 3 (September 2012)

Volumen 12 (2012): Heft 2 (June 2012)

Volumen 12 (2012): Heft 1 (March 2012)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

Volumen 18 (2018): Heft 2 (June 2018)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

11 Artikel
Uneingeschränkter Zugang

Mining Fuzzy Sequential Patterns with Fuzzy Time-Intervals in Quantitative Sequence Databases

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 3 - 19

Zusammenfassung

Abstract

The main objective of this paper is to introduce fuzzy sequential patterns with fuzzy time-intervals in quantitative sequence databases. In the fuzzy sequential pattern with fuzzy time-intervals, both quantitative attributes and time distances are represented by linguistic terms. A new algorithm based on the Apriori algorithm is proposed to find the patterns. The mined patterns can be applied to market basket analysis, stock market analysis, and so on.

Schlüsselwörter

  • Data mining
  • fuzzy sequential pattern
  • fuzzy time-interval
  • sequence database
Uneingeschränkter Zugang

Genetic Fuzzy System for Financial Management

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 20 - 35

Zusammenfassung

Abstract

This paper discusses genetic fuzzy systems – hybrid systems of artificial intelligence combining the potential of fuzzy sets for modeling approximate reasoning with the abilities of genetic algorithms for finding optimal solutions. The use of genetic algorithms for optimizing the parameters of a fuzzy system is demonstrated on GFSSAM.

Schlüsselwörter

  • Genetic fuzzy system
  • intelligent hybrid systems
  • financial management
  • artificial intelligence
Uneingeschränkter Zugang

A New Opinion Mining Method based on Fuzzy Classifier and Particle Swarm Optimization (PSO) Algorithm

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 36 - 50

Zusammenfassung

Abstract

Opinion Mining or Sentiment Analysis is the task of extracting people final opinion about something through their unstructured sentiments. The Opinion Mining process is as follows: first, product features which are most important to a user are extracted from his/her comments. Then, sentiments will be emotionally classified using their emotional implications. In this paper we propose an opinion classification method based on Fuzzy Logic. Up to now, a few methods have taken advantage of fuzzy logic in opinion classification and all of them have imported fuzzy rules into system as background knowledge. But the main challenge here is finding the fuzzy rules. Our contribution is to automatically extract fuzzy rules and their parameters from training data. Here we have used the Particle Swarm Optimization (PSO) algorithm to extract fuzzy rules from training data. Also, for better results we have devised a mutation-based PSO. All proposed methods have been implemented and tested on relevant data. Results confirm that our method can reach better accuracy than current state of the art methods in this domain.

Schlüsselwörter

  • Opinion mining
  • sentiment analysis
  • Particle Swarm Optimization Algorithm
  • fuzzy classification algorithm
Uneingeschränkter Zugang

Group Decision Analysis Algorithms with EDAS for Interval Fuzzy Sets

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 51 - 64

Zusammenfassung

Abstract

The purpose of this paper is proposing, analyzing and assessing two new algorithms of the EDAS method for group multi-criteria decision making with fuzzy sets. In the first proposed EDAS extension for distance measure between two interval Type-2 fuzzy numbers is applied Graded Mean Integration Representation (GMIR). The second algorithm takes into account the proximity between the fuzzy alternatives and its similarity measure is Map Distance Operator (MDO). The two new algorithms are verified by a numerical example. Comparative analysis of obtained rankings demonstrates that GMIR extension is more reliable as an interval Type-2 fuzzy alternative to Evaluation based on Distance from Average Solution (EDAS). In case that time is of the essence, the MDO EDAS could be preferred.

Schlüsselwörter

  • Multi-criteria group decision making
  • fuzzy decision making
  • Interval Type-2 fuzzy sets
  • EDAS
Uneingeschränkter Zugang

Combinatorial Optimization Model for Group Decision-Making

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 65 - 73

Zusammenfassung

Abstract

In the article a combinatorial optimization model for group decision-making problem is proposed. The described model relies on extended simple additive weighting model. A distinctive feature of the proposed model is consideration of the importance of experts’ opinions by introducing weighted coefficient for each of experts. This allows flexible adjustment of differences in knowledge and experience of the group members responsible to determine most preferable alternative to be achieved. The numerical application is illustrated by an example for software engineering adopted from D. Krapohl. The obtained results show the practical applicability of the proposed combinatorial optimization model for group decision-making.

Schlüsselwörter

  • Combinatorial optimization
  • group decision-making
  • multi-attribute decision making
  • simple additive weighting
  • experts’ weights
Uneingeschränkter Zugang

An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 74 - 88

Zusammenfassung

Abstract

The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to accommodate the embedded data. This paper proposes a method for increasing the payload of secret messages in an image. The edge area is used to accommodate more message bits because the image edge area can better tolerate pixel value changes. In this research paper, Canny and Sobel detectors are combined to get a wider edge area. This two-detector combined method provides a larger edge area for greater payload of messages while maintaining imperceptibility of stego-images.

Schlüsselwörter

  • Image steganography
  • LSB
  • Hybrid edge detection
  • Canny
  • Sobel
Uneingeschränkter Zugang

New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 89 - 97

Zusammenfassung

Abstract

Feature extraction is an interactive and iterative analysis process of a large dataset of raw data in order to extract meaningful knowledge. In this article, we present a strong descriptor based on the Discrete Cosine Transform (DCT), we show that the new DCT-based Neighboring Support Vector Classifier (DCT-NSVC) provides a better results compared to other algorithms for supervised classification. Experiments on our real dataset named BOSS, show that the accuracy of classification has reached 99%. The application of DCT-NSVC on MIT-CBCL dataset confirms the performance of the proposed approach.

Schlüsselwörter

  • Supervised learning
  • DCT
  • NSVC
  • shape recognition
  • SVM
  • feature extraction
Uneingeschränkter Zugang

Energy-Aware Task Scheduling Using Hybrid Firefly-BAT (FFABAT) in Big Data

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 98 - 111

Zusammenfassung

Abstract

In modern times there is an increasing trend of applications for handling Big data. However, negotiating with the concepts of the Big data is an extremely difficult issue today. The MapReduce framework has been in focus recently for serious consideration. The aim of this study is to get the task-scheduling over Big data using Hadoop. Initially, we prioritize the tasks with the help of k-means clustering algorithm. Then, the MapReduce framework is employed. The available resource is optimally selected using optimization technique in map-phase. The proposed method uses the FireFly Algorithm and BAT algorithms (FFABAT) for choosing the optimal resource with minimum cost value. The bat-inspired algorithm is a meta-heuristic optimization method developed by Xin-She Yang (2010). This bat algorithm is established on the echo-location behaviour of micro-bats with variable pulse rates of emission and loudness. Finally, the tasks are scheduled with the optimal resource in reducer-phase and stored in the cloud. The performance of the algorithm is analysed, based on the total cost, time and memory utilization.

Schlüsselwörter

  • Map reduce framework
  • task scheduling
  • firefly algorithm
  • BAT Algorithm
  • Hadoop
  • k-Means clustering
  • Hadoop
  • HDFS
Uneingeschränkter Zugang

Evaluation of Two-Dimensional Angular Orientation of a Mobile Robot by a Modified Algorithm Based on Hough Transform

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 112 - 122

Zusammenfassung

Abstract

This paper proposes an algorithm that assesses the angular orientation of a mobile robot with respect to its referential position or a map of the surrounding space. In the framework of the suggested method, the orientation problem is converted to evaluating a dimensional rotation of the object that is abstracted as a polygon (or a closed polygonal chain). The method is based on Hough transform, which transforms the measurement space to a parametric space (in this case, a two-dimensional space [θ, r] of straight-line parameters). The Hough transform preserves the angles between the straight lines during rotation, translation, and isotropic scaling transformations. The problem of rotation assessment then becomes a one-dimensional optimization problem. The suggested algorithm inherits the Hough method’s robustness to noise.

Schlüsselwörter

  • Simultaneous Localization And Mapping (SLAM)
  • path planning
  • Hough transform
  • angular orientation
  • mobile robot
Uneingeschränkter Zugang

Using Agent-Based Methodologies in Healthcare Information Systems

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 123 - 132

Zusammenfassung

Abstract

This paper carries out a comparative analysis to determine the advantages and the stages of two agent-based methodologies: Multi-agent Systems Engineering (MaSE) methodology, which is designed specifically for an agent-based and complete lifecycle approach, while also being appropriate for understanding and developing complex open systems; Agent Systems Methodology (ASEME) suggests a modular Multi-Agent System (MAS) development approach and uses the concept of intra-agent control. We also examine the strengths and weaknesses of these methodologies and the dependencies between their models and their processes. Both methodologies are applied to develop The Guardian Angle: Patient-Centered Health Information System (GA: PCHIS), which is an example of agent-based applications used to improve health care information systems.

Schlüsselwörter

  • Agent-based Methodologies
  • MaSE
  • ASEME
Uneingeschränkter Zugang

Mobile Edge Services for Quality of Service Control and Access to Terminal Status

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 133 - 150

Zusammenfassung

Abstract

An important ingredient of fifth generation (5G) networks will be Multi-access Edge Computing (MEC). MEC brings the computational intelligence of the cloud within the Radio Access Network (RAN). The virtualized functionality is accessible through Application Programming Interfaces (APIs). In this paper, we study capabilities of reuse existing time-tested Web Services to provide mobile edge middleware services. The focus is on mobile edge services that can be used by applications for bandwidth management and access to user contextual information. An extension of Web Service functionality is proposed. Implementation issues of Web Services in RAN are considered.

Schlüsselwörter

  • Multi-access Edge Computing
  • Application Programming Interfaces
  • Radio resource control
  • Bandwidth management
  • Terminal activity
11 Artikel
Uneingeschränkter Zugang

Mining Fuzzy Sequential Patterns with Fuzzy Time-Intervals in Quantitative Sequence Databases

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 3 - 19

Zusammenfassung

Abstract

The main objective of this paper is to introduce fuzzy sequential patterns with fuzzy time-intervals in quantitative sequence databases. In the fuzzy sequential pattern with fuzzy time-intervals, both quantitative attributes and time distances are represented by linguistic terms. A new algorithm based on the Apriori algorithm is proposed to find the patterns. The mined patterns can be applied to market basket analysis, stock market analysis, and so on.

Schlüsselwörter

  • Data mining
  • fuzzy sequential pattern
  • fuzzy time-interval
  • sequence database
Uneingeschränkter Zugang

Genetic Fuzzy System for Financial Management

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 20 - 35

Zusammenfassung

Abstract

This paper discusses genetic fuzzy systems – hybrid systems of artificial intelligence combining the potential of fuzzy sets for modeling approximate reasoning with the abilities of genetic algorithms for finding optimal solutions. The use of genetic algorithms for optimizing the parameters of a fuzzy system is demonstrated on GFSSAM.

Schlüsselwörter

  • Genetic fuzzy system
  • intelligent hybrid systems
  • financial management
  • artificial intelligence
Uneingeschränkter Zugang

A New Opinion Mining Method based on Fuzzy Classifier and Particle Swarm Optimization (PSO) Algorithm

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 36 - 50

Zusammenfassung

Abstract

Opinion Mining or Sentiment Analysis is the task of extracting people final opinion about something through their unstructured sentiments. The Opinion Mining process is as follows: first, product features which are most important to a user are extracted from his/her comments. Then, sentiments will be emotionally classified using their emotional implications. In this paper we propose an opinion classification method based on Fuzzy Logic. Up to now, a few methods have taken advantage of fuzzy logic in opinion classification and all of them have imported fuzzy rules into system as background knowledge. But the main challenge here is finding the fuzzy rules. Our contribution is to automatically extract fuzzy rules and their parameters from training data. Here we have used the Particle Swarm Optimization (PSO) algorithm to extract fuzzy rules from training data. Also, for better results we have devised a mutation-based PSO. All proposed methods have been implemented and tested on relevant data. Results confirm that our method can reach better accuracy than current state of the art methods in this domain.

Schlüsselwörter

  • Opinion mining
  • sentiment analysis
  • Particle Swarm Optimization Algorithm
  • fuzzy classification algorithm
Uneingeschränkter Zugang

Group Decision Analysis Algorithms with EDAS for Interval Fuzzy Sets

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 51 - 64

Zusammenfassung

Abstract

The purpose of this paper is proposing, analyzing and assessing two new algorithms of the EDAS method for group multi-criteria decision making with fuzzy sets. In the first proposed EDAS extension for distance measure between two interval Type-2 fuzzy numbers is applied Graded Mean Integration Representation (GMIR). The second algorithm takes into account the proximity between the fuzzy alternatives and its similarity measure is Map Distance Operator (MDO). The two new algorithms are verified by a numerical example. Comparative analysis of obtained rankings demonstrates that GMIR extension is more reliable as an interval Type-2 fuzzy alternative to Evaluation based on Distance from Average Solution (EDAS). In case that time is of the essence, the MDO EDAS could be preferred.

Schlüsselwörter

  • Multi-criteria group decision making
  • fuzzy decision making
  • Interval Type-2 fuzzy sets
  • EDAS
Uneingeschränkter Zugang

Combinatorial Optimization Model for Group Decision-Making

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 65 - 73

Zusammenfassung

Abstract

In the article a combinatorial optimization model for group decision-making problem is proposed. The described model relies on extended simple additive weighting model. A distinctive feature of the proposed model is consideration of the importance of experts’ opinions by introducing weighted coefficient for each of experts. This allows flexible adjustment of differences in knowledge and experience of the group members responsible to determine most preferable alternative to be achieved. The numerical application is illustrated by an example for software engineering adopted from D. Krapohl. The obtained results show the practical applicability of the proposed combinatorial optimization model for group decision-making.

Schlüsselwörter

  • Combinatorial optimization
  • group decision-making
  • multi-attribute decision making
  • simple additive weighting
  • experts’ weights
Uneingeschränkter Zugang

An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 74 - 88

Zusammenfassung

Abstract

The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to accommodate the embedded data. This paper proposes a method for increasing the payload of secret messages in an image. The edge area is used to accommodate more message bits because the image edge area can better tolerate pixel value changes. In this research paper, Canny and Sobel detectors are combined to get a wider edge area. This two-detector combined method provides a larger edge area for greater payload of messages while maintaining imperceptibility of stego-images.

Schlüsselwörter

  • Image steganography
  • LSB
  • Hybrid edge detection
  • Canny
  • Sobel
Uneingeschränkter Zugang

New Proposed Fusion between DCT for Feature Extraction and NSVC for Face Classification

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 89 - 97

Zusammenfassung

Abstract

Feature extraction is an interactive and iterative analysis process of a large dataset of raw data in order to extract meaningful knowledge. In this article, we present a strong descriptor based on the Discrete Cosine Transform (DCT), we show that the new DCT-based Neighboring Support Vector Classifier (DCT-NSVC) provides a better results compared to other algorithms for supervised classification. Experiments on our real dataset named BOSS, show that the accuracy of classification has reached 99%. The application of DCT-NSVC on MIT-CBCL dataset confirms the performance of the proposed approach.

Schlüsselwörter

  • Supervised learning
  • DCT
  • NSVC
  • shape recognition
  • SVM
  • feature extraction
Uneingeschränkter Zugang

Energy-Aware Task Scheduling Using Hybrid Firefly-BAT (FFABAT) in Big Data

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 98 - 111

Zusammenfassung

Abstract

In modern times there is an increasing trend of applications for handling Big data. However, negotiating with the concepts of the Big data is an extremely difficult issue today. The MapReduce framework has been in focus recently for serious consideration. The aim of this study is to get the task-scheduling over Big data using Hadoop. Initially, we prioritize the tasks with the help of k-means clustering algorithm. Then, the MapReduce framework is employed. The available resource is optimally selected using optimization technique in map-phase. The proposed method uses the FireFly Algorithm and BAT algorithms (FFABAT) for choosing the optimal resource with minimum cost value. The bat-inspired algorithm is a meta-heuristic optimization method developed by Xin-She Yang (2010). This bat algorithm is established on the echo-location behaviour of micro-bats with variable pulse rates of emission and loudness. Finally, the tasks are scheduled with the optimal resource in reducer-phase and stored in the cloud. The performance of the algorithm is analysed, based on the total cost, time and memory utilization.

Schlüsselwörter

  • Map reduce framework
  • task scheduling
  • firefly algorithm
  • BAT Algorithm
  • Hadoop
  • k-Means clustering
  • Hadoop
  • HDFS
Uneingeschränkter Zugang

Evaluation of Two-Dimensional Angular Orientation of a Mobile Robot by a Modified Algorithm Based on Hough Transform

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 112 - 122

Zusammenfassung

Abstract

This paper proposes an algorithm that assesses the angular orientation of a mobile robot with respect to its referential position or a map of the surrounding space. In the framework of the suggested method, the orientation problem is converted to evaluating a dimensional rotation of the object that is abstracted as a polygon (or a closed polygonal chain). The method is based on Hough transform, which transforms the measurement space to a parametric space (in this case, a two-dimensional space [θ, r] of straight-line parameters). The Hough transform preserves the angles between the straight lines during rotation, translation, and isotropic scaling transformations. The problem of rotation assessment then becomes a one-dimensional optimization problem. The suggested algorithm inherits the Hough method’s robustness to noise.

Schlüsselwörter

  • Simultaneous Localization And Mapping (SLAM)
  • path planning
  • Hough transform
  • angular orientation
  • mobile robot
Uneingeschränkter Zugang

Using Agent-Based Methodologies in Healthcare Information Systems

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 123 - 132

Zusammenfassung

Abstract

This paper carries out a comparative analysis to determine the advantages and the stages of two agent-based methodologies: Multi-agent Systems Engineering (MaSE) methodology, which is designed specifically for an agent-based and complete lifecycle approach, while also being appropriate for understanding and developing complex open systems; Agent Systems Methodology (ASEME) suggests a modular Multi-Agent System (MAS) development approach and uses the concept of intra-agent control. We also examine the strengths and weaknesses of these methodologies and the dependencies between their models and their processes. Both methodologies are applied to develop The Guardian Angle: Patient-Centered Health Information System (GA: PCHIS), which is an example of agent-based applications used to improve health care information systems.

Schlüsselwörter

  • Agent-based Methodologies
  • MaSE
  • ASEME
Uneingeschränkter Zugang

Mobile Edge Services for Quality of Service Control and Access to Terminal Status

Online veröffentlicht: 30 Jun 2018
Seitenbereich: 133 - 150

Zusammenfassung

Abstract

An important ingredient of fifth generation (5G) networks will be Multi-access Edge Computing (MEC). MEC brings the computational intelligence of the cloud within the Radio Access Network (RAN). The virtualized functionality is accessible through Application Programming Interfaces (APIs). In this paper, we study capabilities of reuse existing time-tested Web Services to provide mobile edge middleware services. The focus is on mobile edge services that can be used by applications for bandwidth management and access to user contextual information. An extension of Web Service functionality is proposed. Implementation issues of Web Services in RAN are considered.

Schlüsselwörter

  • Multi-access Edge Computing
  • Application Programming Interfaces
  • Radio resource control
  • Bandwidth management
  • Terminal activity

Planen Sie Ihre Fernkonferenz mit Scienceendo