Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 434)

K Nearest Neighbor Search in Navigation Systems

A frequent type of query in a car navigation system is to find the k nearest neighbors (kNN) of a given query object (e.g., car) using the actual road network maps. With road networks (spatial networks), the distances between objects depend on their network connectivity and it is computationally expensive to compute the distances (e.g., shortest paths) between objects. In this...

Modelling and Quantitative Analysis of LTRACK–A Novel Mobility Management Algorithm

This paper discusses the improvements and parameter optimization issues of LTRACK, a recently proposed mobility management algorithm. Mathematical modelling of the algorithm and the behavior of the Mobile Node (MN) are used to optimize the parameters of LTRACK. A numerical method is given to determine the optimal values of the parameters. Markov chains are used to model both the...

Networked Biomedical System for Ubiquitous Health Monitoring

We propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data...

Probability Model for Data Redundancy Detection in Sensor Networks

Sensor networks are made of autonomous devices that are able to collect, store, process and share data with other devices. Large sensor networks are often redundant in the sense that the measurements of some nodes can be substituted by other nodes with a certain degree of confidence. This spatial correlation results in wastage of link bandwidth and energy. In this paper, a model...

MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and...

Glowbal IP: An Adaptive and Transparent IPv6 Integration in the Internet of Things

The Internet of Things (IoT) requires scalability, extensibility and a transparent integration of multi-technology in order to reach an efficient support for global communications, discovery and look-up, as well as access to services and information. To achieve these goals, it is necessary to enable a homogenous and seamless machine-to-machine (M2M) communication mechanism...

Joint User Association and Energy Offloading in Downlink Heterogeneous Cellular Networks

As a key technology in Long-Term Evolution-Advanced (LTE-A) mobile communication systems, heterogeneous cellular networks (HCNs) add low-power nodes to offload the traffic from macro cell and therefore improve system throughput performance. In this paper, we investigate a joint user association and resource allocation scheme for orthogonal frequency division multiple access...

What Makes People Actually Embrace or Shun Mobile Payment: A Cross-Culture Study

Mobile payment is becoming increasingly popular, but it encounters the resistance from certain user groups. This study examines the factors that influence both the technology acceptance and actual usage aspects of mobile payment adoption from the perspective of the general systems theory. Based on a literature review, it conceptualizes the embedding relationships among relevant...

PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services

Service Level Agreements (SLAs) are defining the quality of the services delivered from the Cloud Services Providers (CSPs) to the cloud customers. The services are delivered on a pay-per-use model. The quality of the provided services is not guaranteed by the SLA because it is just a contract. The developments around mobile cloud computing and the advent of edge computing...

Reliable Flying IoT Networks for UAV Disaster Rescue Operations

Recently, UAVs (unmanned air vehicles) have been developed with high performance, and hence, the range of system utilizing UAVs has also been widening. UAVs are even considered as connected mobile sensors and are claimed to be the future of IoT (Internet of Things). UAVs’ mission fulfillment is relying on the efficiency and performance of communication in a FANET (Flying Ad hoc...

Dynamic Location and Forwarding Pointers for Mobility Management

GSM and IS-41 are two mobility management standards widely used in second generation networks. These two standards lean on a centralized architecture made up of home location registers (HLRs) and visitor location registers (VLRs). From these standards, the location update and search procedures always imply interrogation of the HLR, even if the two mobile terminals that want to...

A Survey of Software Infrastructures and Frameworks for Ubiquitous Computing

In this survey, we discuss 29 software infrastructures and frameworks which support the construction of distributed interactive systems. They range from small projects with one implemented prototype to large scale research efforts, and they come from the fields of Augmented Reality (AR), Intelligent Environments, and Distributed Mobile Systems. In their own way, they can all be...

Similarity-Based Clustering Strategy for Mobile Ad Hoc Multimedia Databases

Multimedia data are becoming popular in wireless ad hoc environments. However, the traditional content-based retrieval techniques are inefficient in ad hoc networks due to the multiple limitations such as node mobility, computation capability, memory space, network bandwidth, and data heterogeneity. To provide an efficient platform for multimedia retrieval, we propose to cluster...

Location Based Mobile Computing–A Tuplespace Perspective

Location based or ”context aware” computing is becoming increasingly recognized as a vital part of a mobile computing environment. As a consequence, the need for location-management middleware is widely recognized and actively researched. Location-management is frequently offered to the application through a “location API” (e.g. JSR 179) where the mobile unit can find out its own...

Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we...

A Context-Aware Tour Guide: User Implications

Although examples of tourist guides abound, the role of context aware feedback in such systems is an issue that has been insufficiently explored. Given the potential importance of such feedback, this paper investigates, from a usability perspective, two tour guide systems developed for Brunel University: one with context-aware user feedback and the other without. An empirical...

Novel Directory Service and Message Delivery Mechanism Enabling Scalable Mobile Agent Communication

Mobile agent technology has emerged as a promising programming paradigm for developing highly dynamic and large-scale service-oriented computing middlewares due to its desirable features. For this purpose, first of all, scalable location-transparent agent communication issue should be addressed in mobile agent systems despite agent mobility. Although there were proposed several...

A Simulation Based Analysis of The Impact of IEEE 802.15.4 MAC Parameters on the Performance Under Different Traffic Loads

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured in terms of the packet loss probability and the packet latency...

XPL the Extensible Presentation Language

The last decade has witnessed a growing interest in the development of web interfaces enabling both multiple ways to access contents and, at the same time, fruition by multiple modalities of interaction (point-and-click, contents reading, voice commands, gestures, etc.). In this paper we describe a framework aimed at streamlining the design process of multi-channel, multimodal...

Location-Dependent Query Processing Under Soft Real-Time Constraints

In recent years, mobile devices and applications achieved an increasing development. In database field, this development required methods to consider new query types like location-dependent queries (i.e. the query results depend on the query issuer location). Although several researches addressed problems related to location-dependent query processing, a few works considered...

An Enhanced MPR-Based Solution for Flooding of Broadcast Messages in OLSR Wireless ad hoc Networks

In an Optimized Link State Routing (OLSR)-based mobile wireless network, optimizing the flooding of broadcast messages is a challenging task due to node's mobility and bandwidth resource consumption. To complement existing solutions to this problem, the Multi-Point Relays (MPR) selection has recently been advocated as a promising technique that has an additional feature of...

QoS Routing in Ad-Hoc Networks Using GA and Multi-Objective Optimization

Much work has been done on routing in Ad-hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS) requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with...

A Handover Security Mechanism Employing the Diffie-Hellman Key Exchange Approach for the IEEE802.16e Wireless Networks

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme...