Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 246)

Modelling and Quantitative Analysis of LTRACK–A Novel Mobility Management Algorithm

This paper discusses the improvements and parameter optimization issues of LTRACK, a recently proposed mobility management algorithm. Mathematical modelling of the algorithm and the behavior of the Mobile Node (MN) are used to optimize the parameters of LTRACK. A numerical method is given to determine the optimal values of the parameters. Markov chains are used to model both the...

Networked Biomedical System for Ubiquitous Health Monitoring

We propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data...

Probability Model for Data Redundancy Detection in Sensor Networks

Sensor networks are made of autonomous devices that are able to collect, store, process and share data with other devices. Large sensor networks are often redundant in the sense that the measurements of some nodes can be substituted by other nodes with a certain degree of confidence. This spatial correlation results in wastage of link bandwidth and energy. In this paper, a model...

Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

The Internet of Things (IoT) requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M) communication mechanism...

Joint User Association and Energy Offloading in Downlink Heterogeneous Cellular Networks

As a key technology in Long-Term Evolution-Advanced (LTE-A) mobile communication systems, heterogeneous cellular networks (HCNs) add low-power nodes to offload the traffic from macro cell and therefore improve system throughput performance. In this paper, we investigate a joint user association and resource allocation scheme for orthogonal frequency division multiple access...

What Makes People Actually Embrace or Shun Mobile Payment: A Cross-Culture Study

Mobile payment is becoming increasingly popular, but it encounters the resistance from certain user groups. This study examines the factors that influence both the technology acceptance and actual usage aspects of mobile payment adoption from the perspective of the general systems theory. Based on a literature review, it conceptualizes the embedding relationships among relevant...

PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services

Service Level Agreements (SLAs) are defining the quality of the services delivered from the Cloud Services Providers (CSPs) to the cloud customers. The services are delivered on a pay-per-use model. The quality of the provided services is not guaranteed by the SLA because it is just a contract. The developments around mobile cloud computing and the advent of edge computing...

Reliable Flying IoT Networks for UAV Disaster Rescue Operations

Recently, UAVs (unmanned air vehicles) have been developed with high performance, and hence, the range of system utilizing UAVs has also been widening. UAVs are even considered as connected mobile sensors and are claimed to be the future of IoT (Internet of Things). UAVs’ mission fulfillment is relying on the efficiency and performance of communication in a FANET (Flying Ad hoc...

Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we...

A Simulation Based Analysis of The Impact of IEEE 802.15.4 MAC Parameters on the Performance Under Different Traffic Loads

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured in terms of the packet loss probability and the packet latency...

Location-Dependent Query Processing Under Soft Real-Time Constraints

In recent years, mobile devices and applications achieved an increasing development. In database field, this development required methods to consider new query types like location-dependent queries (i.e. the query results depend on the query issuer location). Although several researches addressed problems related to location-dependent query processing, a few works considered...

An Enhanced MPR-Based Solution for Flooding of Broadcast Messages in OLSR Wireless ad hoc Networks

In an Optimized Link State Routing (OLSR)-based mobile wireless network, optimizing the flooding of broadcast messages is a challenging task due to node's mobility and bandwidth resource consumption. To complement existing solutions to this problem, the Multi-Point Relays (MPR) selection has recently been advocated as a promising technique that has an additional feature of...

A Handover Security Mechanism Employing the Diffie-Hellman Key Exchange Approach for the IEEE802.16e Wireless Networks

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme...

A GPS Sensing Strategy for Accurate and Energy-Efficient Outdoor-to-Indoor Handover in Seamless Localization Systems

Indoor localization systems typically locate users on their own local coordinates, while outdoor localization systems use global coordinates. To achieve seamless localization from outdoors to indoors, a handover technique that accurately provides a starting position to the indoor localization system is needed. However, existing schemes assume that a starting position is known a...

Sharing with Caution: Managing Parking Spaces in Vehicular Networks

By exchanging events in a vehicular ad hoc network (VANET), drivers can receive interesting information while driving. For example, they can be informed of available parking spaces in their vicinity. A suitable protocol is needed to disseminate the events efficiently within the area where they are relevant. Moreover, in such a competitive context where each vehicle may be...

Personalized Behavior Pattern Recognition and Unusual Event Detection for Mobile Users

Mobile phones have become widely used for obtaining help in emergencies, such as accidents, crimes, or health emergencies. The smartphone is an essential device that can record emergency situations, which can be used for clues or evidence, or as an alert system in such situations. In this paper, we focus on mobile-based identification of potentially unusual, or abnormal events...

The Intention to Use Mobile Student Portal: A Mobile Human Computer Interaction Study in a University Context in Egypt

Mobile devices are increasingly being used as platforms for interactive services. However, factors affecting adoption of mobile services in some specific contexts, such as student portals, are still underresearched. This paper reports thematic analyses of semistructured interviews conducted with 52 undergraduate users of mobile student portal in a developing country. The results...

Analyzing Typical Mobile Gestures in mHealth Applications for Users with Down Syndrome

Mobile technology has provided many advantages for all members of the Information Society. Communication, Organization, Transportation, Health, and Entertainment are just a few areas of mobile technology application. Nevertheless, there are still some people who find difficulties using it. Although there are a lot of applications of mHealth available for almost any kind of mobile...

Designing an Android-Based Application for Geohazard Reduction Using Citizen-Based Crowdsourcing Data

Application development based on mobile platform is regarded as one of the major trends in information communication technology. However, only a few cases of mobile application are available for geohazard reduction using citizen-based crowdsourcing data. With the development of geohazard informatization and the rapid progress of mobile technology, the design and implementation of...

A Novel Method for Predicting Vehicle State in Internet of Vehicles

In the fields of advanced driver assistance systems (ADAS) and Internet of Vehicles (IoV), predicting the vehicle state is essential, including the ego vehicle’s position, velocity, and acceleration. In ADAS, an early position prediction helps to avoid traffic accidents. In IoV, the vehicle state prediction is essential for the required calculation of the expected reliable...

Developing a Mobile APP-Supported Learning System for Evaluating Health-Related Physical Fitness Achievements of Students

This study developed a mobile APP support learning system to compare the effects of two different learning approaches based on students’ health-related physical fitness (HRPF) achievements, self-efficacy, and system usability. There were 90 participants from four physical education classes in an elementary school of Taiwan who were assigned to the experimental and control groups...

Energy-Neutral Communication Protocol for Living-Tree Bioenergy-Powered Wireless Sensor Network

The purpose of this paper is to represent a living-tree biological energy powered wireless sensor system and introduce a novel energy aware MAC protocol based on remaining energy level, energy harvesting status, and application requirements. Conventional wireless sensor network (WSN) cannot have an infinite lifetime without battery recharge or replacement. Energy harvesting (EH...

Efficient Maintenance of AODV Routes in the Vehicular Communication Environment with Sparsely Placed Road Side Units

Thanks to the vehicular communication network, vehicles on the road can communicate with other vehicles or nodes in the global Internet. In this study, we propose an enhanced routing mechanism based on AODV so that road side units (RSUs) can provide continuous services such as video streaming services to vehicles which may be intermittently located outside of the coverage areas...

Hybrid Aspect of Context-Aware Middleware for Pervasive Smart Environment: A Review

Pervasive computing has made almost every device we see today to be communicated and function in collaboration with one another. Since the portable devices have become a part of our everyday life, people are more involved in a pervasive computing environment. They engage with many computational devices simultaneously without knowing the availability of their existence. The...

An F-Score-Weighted Indoor Positioning Algorithm Integrating WiFi and Magnetic Field Fingerprints

Indoor positioning systems have attracted much attention with the recent development of location-based services. Although global positioning system (GPS) is a widely accepted and accurate outdoor localization system, there is no such a solution for indoor areas. Therefore, various systems are proposed for the indoor positioning problem. Fingerprint-based positioning is one of the...