Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 50)

Joint User Association and Energy Offloading in Downlink Heterogeneous Cellular Networks

As a key technology in Long-Term Evolution-Advanced (LTE-A) mobile communication systems, heterogeneous cellular networks (HCNs) add low-power nodes to offload the traffic from macro cell and therefore improve system throughput performance. In this paper, we investigate a joint user association and resource allocation scheme for orthogonal frequency division multiple access...

What Makes People Actually Embrace or Shun Mobile Payment: A Cross-Culture Study

Mobile payment is becoming increasingly popular, but it encounters the resistance from certain user groups. This study examines the factors that influence both the technology acceptance and actual usage aspects of mobile payment adoption from the perspective of the general systems theory. Based on a literature review, it conceptualizes the embedding relationships among relevant...

PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services

Service Level Agreements (SLAs) are defining the quality of the services delivered from the Cloud Services Providers (CSPs) to the cloud customers. The services are delivered on a pay-per-use model. The quality of the provided services is not guaranteed by the SLA because it is just a contract. The developments around mobile cloud computing and the advent of edge computing...

Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we...

A Simulation Based Analysis of The Impact of IEEE 802.15.4 MAC Parameters on the Performance Under Different Traffic Loads

IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured in terms of the packet loss probability and the packet latency...

An Enhanced MPR-Based Solution for Flooding of Broadcast Messages in OLSR Wireless ad hoc Networks

In an Optimized Link State Routing (OLSR)-based mobile wireless network, optimizing the flooding of broadcast messages is a challenging task due to node's mobility and bandwidth resource consumption. To complement existing solutions to this problem, the Multi-Point Relays (MPR) selection has recently been advocated as a promising technique that has an additional feature of...

A GPS Sensing Strategy for Accurate and Energy-Efficient Outdoor-to-Indoor Handover in Seamless Localization Systems

Indoor localization systems typically locate users on their own local coordinates, while outdoor localization systems use global coordinates. To achieve seamless localization from outdoors to indoors, a handover technique that accurately provides a starting position to the indoor localization system is needed. However, existing schemes assume that a starting position is known a...

Sharing with Caution: Managing Parking Spaces in Vehicular Networks

By exchanging events in a vehicular ad hoc network (VANET), drivers can receive interesting information while driving. For example, they can be informed of available parking spaces in their vicinity. A suitable protocol is needed to disseminate the events efficiently within the area where they are relevant. Moreover, in such a competitive context where each vehicle may be...

Personalized Behavior Pattern Recognition and Unusual Event Detection for Mobile Users

Mobile phones have become widely used for obtaining help in emergencies, such as accidents, crimes, or health emergencies. The smartphone is an essential device that can record emergency situations, which can be used for clues or evidence, or as an alert system in such situations. In this paper, we focus on mobile-based identification of potentially unusual, or abnormal events...

The Intention to Use Mobile Student Portal: A Mobile Human Computer Interaction Study in a University Context in Egypt

Mobile devices are increasingly being used as platforms for interactive services. However, factors affecting adoption of mobile services in some specific contexts, such as student portals, are still underresearched. This paper reports thematic analyses of semistructured interviews conducted with 52 undergraduate users of mobile student portal in a developing country. The results...

Analyzing Typical Mobile Gestures in mHealth Applications for Users with Down Syndrome

Mobile technology has provided many advantages for all members of the Information Society. Communication, Organization, Transportation, Health, and Entertainment are just a few areas of mobile technology application. Nevertheless, there are still some people who find difficulties using it. Although there are a lot of applications of mHealth available for almost any kind of mobile...

Energy-Neutral Communication Protocol for Living-Tree Bioenergy-Powered Wireless Sensor Network

The purpose of this paper is to represent a living-tree biological energy powered wireless sensor system and introduce a novel energy aware MAC protocol based on remaining energy level, energy harvesting status, and application requirements. Conventional wireless sensor network (WSN) cannot have an infinite lifetime without battery recharge or replacement. Energy harvesting (EH...

Stochastic Geometry Analysis of Downlink Spectral and Energy Efficiency in Ultradense Heterogeneous Cellular Networks

The energy efficiency (EE) is a key metric of ultradense heterogeneous cellular networks (HCNs). Earlier works on the EE analysis of ultradense HCNs by using the stochastic geometry tool only focused on the impact of the base station density ratio and ignored the function of different tiers. In this paper, a two-tier ultradense HCN with small-cell base stations (SBSs) and user...

A Fuzzy Logic-Based Personalized Method to Classify Perceived Exertion in Workplaces Using a Wearable Heart Rate Sensor

Knowing the perceived exertion of workers during their physical activities facilitates the decision-making of supervisors regarding the worker allocation in the appropriate job, actions to prevent accidents, and reassignment of tasks, among others. However, although wearable heart rate sensors represent an effective way to capture perceived exertion, ergonomic methods are generic...

The Effects of Consumer Innovativeness on Mobile App Download: Focusing on Comparison of Innovators and Noninnovators

In the new market for mobile apps, innovators, that is, early adopters of new products, have drawn attention from various researchers for their role in contributing to the success of a product. Due to the discrepancies between findings in these studies, a research framework and empirical model must be established to demonstrate how innovators affect the market for mobile apps in...

Exploiting Awareness for the Development of Collaborative Rehabilitation Systems

Physical and cognitive rehabilitation is usually a challenging activity as people with any kind of deficit have to carry out tasks that are difficult due to their damaged abilities. Moreover, such difficulties become even harder while they have to work at home in an isolated manner. Therefore, the development of collaborative rehabilitation systems emerges as one of the best...

Fuzzy Intelligent System for Patients with Preeclampsia in Wearable Devices

Preeclampsia affects from 5% to 14% of all pregnant women and is responsible for about 14% of maternal deaths per year in the world. This paper is focused on the use of a decision analysis tool for the early detection of preeclampsia in women at risk. This tool applies a fuzzy linguistic approach implemented in a wearable device. In order to develop this tool, a real dataset...

Determination of Collection Points for Disjoint Wireless Sensor Networks

When the connection in Wireless Sensor Networks (WSNs) is broken, a subset of nodes which serve as the data collection points (CPs) can buffer the data from sensors and transfer these data to mobile data collectors (MDCs) to restore the connectivity of WSNs. One of the existing problems is how to decide the numbers and positions of CPs for obtaining an optimal path of MDC. In...

Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes...

Three-Dimensional Vehicle-to-Vehicle Channel Modeling with Multiple Moving Scatterers

Connected vehicles have received much attention in recent years due to their significant societal benefit and commercial value. However, a suitable channel model for vehicle-to-vehicle (V2V) communications is difficult to build due to the dynamic communication environment. In this paper, a three-dimensional (3D) geometrical propagation model that includes line-of-sight (LoS...

Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s...

A Hybrid Location Privacy Solution for Mobile LBS

The prevalent usage of location based services, where getting any service is solely based on the user’s current location, has raised an extreme concern over location privacy of the user. Generalized approaches dealing with location privacy, referred to as cloaking and obfuscation, are mainly based on a trusted third party, in which all the data remain available at a central...

A Practical Framework for Energy-Efficient Node Activation in Heterogeneous LTE Networks

This paper presents a framework to activate and deactivate micronodes in a heterogeneous multicell LTE network, based on load and energy efficiency consideration. The framework exploits historical data (i.e., per-macro-cell load curves) to select a set of candidate switch-on/switch-off instants of microcells, assuming a limited number of state changes is allowed in a day. The...

A New Hybrid Protocol for Random Access and Data Transmission Based on Two-Phase ACB Mechanisms for M2M Communications

Machine-to-machine (M2M) communication is considered as one of the key enablers for providing of advanced services and applications. Since M2M features a massive number of user equipment (UE) pieces, one of the key issues is the radio access network (RAN) overload problem for massive connections in M2M communications. In order to improve the number of successful accesses (i.e...

Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems

Static state security analysis (SSSA) is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU) is proposed for power systems, which...