Volume 6, Issue 7, July 2015

A Convergent and Configurable Policy and Charging Architecture for Integrated Mobile Services
Pages: 1-7 (7) | [Full Text] PDF (398K)
Asaf Sarajlic and Mirko Skrbic
BH Telecom Saarajevo, Bosnia and Herzegovina
Faculty of Electrical Engineering, Sarajevo, Bosnia and Herzegovina

Abstract -
This paper describes a convergent and configurable On-line charging architecture for integrated services in the IMS environment, as a layered platform with separate levels for individual charging processes. Certain components on different charging levels are dynamically configurable and customizable according to service and tariff policies of operators, to allow flexible charging of different services, in real time. We describe how such elements ought to be initially set by the central provisioning system and configured by created charging rules, in order to follow dynamic changes in the service session.
 Index Terms - On-Line Charging System, Provisioning System, Order Management, Charging Rules, Service Policies, PCRF (Policy and Charging Rules Function), PCEF (Policy and Charging Enforcement Function) and CPS (Central Provisioning System)
Comparison on Some Machine Learning Methods for Lao Text Categorization
Pages: 8-13 (6) | [Full Text] PDF (525K)
Souksan Vilavong and Khanh Phan Huy
Champasak University, Ban Chat Sanh, Pakse, Laos
Danang University of Technology, The University of Danang, Danang, Vietnam

Abstract -
Text categorization is one of the most important role in many applications in natural language processing (NLP). The task of text classification is assignment of free text document to one or more predefined categories based on their content. Whereas a wide range of methods have been applied to English text classification, relatively very few studies have been done on Lao text. In this paper, we present methodology for Lao document presentation and two of the best machine learning techniques, which have namely Radial Basis Function (RBF) network and support vector machines (SVM), to classify the documents. Experimental results revealed that these approaches could achieve an average about 82% accuracy. Additionally, we also analyze the advantages and disadvantages of each approach to find out the best method in specific circumstances.
 Index Terms - Machine Learning, Comparison, Natural Language Processing (NLP) and Lao Text Categorization
Developing Configurable Security Algorithms for Embedded System Storage
Pages: 14-27 (14) | [Full Text] PDF (656K)
Sunil Devidas Bobade and Vijay R. Mankar
S.G.B. Amravati University, India
MSBTE, Pune, India

Abstract -
The constrained operating environments of many FPGA based embedded systems require flexible security that can be configured to minimize the impact on FPGA area and power consumption. To ensure the overall security of embedded systems with off-chip memories, it is essential to safeguard the confidentiality and integrity of the data that travels between the system-on-chip part of the embedded system and the off-chip memory. This paper proposes a complete hardware solution for embedded systems that fully protects off-chip memory. The confidentiality and integrity is achieved by using a modified Elliptic Curve Cryptographic (ECC) approach. Initially, with respect to the instruction from the processor, the security level for the address is identified and based on the security level the encryption process follows, thereby storing the data in the form of cipher text in the external memory location. During read operation, based on the address, the segment id is verified and then the decrypted data is allowed to the processor after appropriate verification. These modules safeguard external memories for embedded processors against a series of well-known attacks, including replay attacks, spoofing attacks and relocation attacks. The complete module is realized using Xilinx ISE 14.1 software using verilog coding with a target device as virtex-4 xc4vlx200-11-ff1513. The functional verification of the design is done by simulating the design.
 Index Terms - Elliptic Curve Cryptographic, Embedded System, VLSI, Xilinx, Confidentiality and Integrity
Soft Frequency Reuse for Inter-Cell Interference Co-ordination in LTE Based Cellular Network
Pages: 28-33 (6) | [Full Text] PDF (573K)
Rajesh Kumar Paudyal
Department of Electronics and Computer Engineering, Himalaya College of Engineering, Tribhuvan University, Kathmandu, Nepal

Abstract -
In third generation partnership project (3GPP) Long Term Evolution (LTE), the frequency planning with reuse of one is aim to provide high bandwidth service to the user but such a frequency planning strategy can lead to unacceptable inter-cell interference levels experienced especially by users located at the cell edge area. In this paper two methods, Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are proposed as interference management scheme in order to enhance overall per user Quality of Service (QoS) and throughput as per basis on Signal to Interference Plus Noise Ratio (SINR) metrics. Both of them are analyzed on the basis of probability of coverage and acceptance rate by considering the average SINR experienced by the user. Along with individual analysis, comparative analysis, it was found that FFR and SFR have relative better performance in terms of per user acceptance rate and coverage probability. Among them Soft frequency reuse improves the cell capacity with seven percent in coverage and thirty five percentage in rate than FFR but it still suffers from more interference than FFR.
 Index Terms - Soft Frequency Reuse (SFR), Fractional Frequency Reuse (FFR), Traditional Frequency Reuse, Inter-cell Interference Coordination (ICIC) Technique and SINR
An Architecture for Location Based Mobile Advertising
Pages: 34-39 (6) | [Full Text] PDF (411K)
P. Sathya and E. Kirubakaran
School of Computer Science and Engineering, Bharathidasan University, Tiruchirappalli–620 023, India
Additional General Manager, SSTP Systems, Bharat Heavy Electricals Limited, Tiruchirappalli–620 014, India

Abstract -
Mobile phone becomes an indispensable medium not only for communication but also for delivering services based on their location and demand. Mobile location data provides wide range of opportunities to the marketers for delivering services to their consumer based on their real world behavior, geographic location, from point of interest to path-to-purchase. Location Based Mobile advertising is a new form mobile advertising combined with location based services. This paper provides a detailed ecosystem of Mobile Advertising along with localization and personalization. The proposed section of this paper LBMA architecture addresses few challenges in the mobile environment by dividing three layer interfaces and it list outs success factors of location services. By implementing this framework leads to significant opportunity for delivering advertising channels through mobile devices.
 Index Terms - Mobile, Location, Advertising, Services, Framework and Information