Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 3,357)

Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning) and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.). This paper proposes an agent based information dissemination model for VANETs...

Global Consistency Management Methods Based on Escrow Approaches in Mobile ad Hoc Networks

In a mobile ad hoc network, consistency management of data operations on replicas is a crucial issue for system performance. In our previous work, we classified several primitive consistency levels according to the requirements from applications and provided protocols to realize them. In this paper, we assume special types of applications in which the instances of each data item...

Using Mobile Devices to Support Online Collaborative Learning

Mobile collaborative learning is considered the next step of on-line collaborative learning by incorporating mobility as a key and breakthrough requirement. Indeed, the current wide spread of mobile devices and wireless technologies brings an enormous potential to e-learning, in terms of ubiquity, pervasiveness, personalization, flexibility, and so on. For this reason, Mobile...

Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result...

Sensor Relocation for Emergent Data Acquisition in Sparse Mobile Sensor Networks

In this paper, we study the problem of sensor relocation for emergent data acquisition (initiated by a base station) in sparse mobile sensor networks. We propose a distributed scheme called BRIDGE that relocates mobile sensors to fulfill an emergent data acquisition task with the objective to minimize the task completion time. BRIDGE gradually finds a sensor that is close to the...

Recovery of Flash Memories for Reliable Mobile Storages

As the mobile appliance is applied to many ubiquitous services and the importance of the information stored in it is increased, the security issue to protect the information becomes one of the major concerns. However, most previous researches focused only on the communication security, not the storage security. Especially, a flash memory whose operational characteristics are...

Implementation of CAVENET and Its Usage for Performance Evaluation of AODV, OLSR and DYMO Protocols in Vehicular Networks

Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility...

Fault Reconnaissance Agent for Sensor Networks

One of the key prerequisite for a scalable, effective and efficient sensor network is the utilization of low-cost, low-overhead and high-resilient fault-inference techniques. To this end, we propose an intelligent agent system with a problem solving capability to address the issue of fault inference in sensor network environments. The intelligent agent system is designed and...

Estimation of Spectrum Requirements for Mobile Networks With Self-Similar Traffic, Handover, and Frequency Reuse

This paper considers self-similarity in data traffic, handover, and frequency reuse to estimate the spectrum requirements of mobile networks. An approximate average cell capacity subject to a delay requirement and self-similar traffic is presented. It is shown that handover traffic can be an additional load. Spectrum requirements are calculated based on carrier demand instead of...

MANET Performance for Source and Destination Moving Scenarios Considering OLSR and AODV protocols

Recently, a great interest is shown in MANETs potential usage and applications in several fields such as military activities, rescue operations and time-critical applications. In this work, we implement and analyse a MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing in MANET and...

RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care

This research aimed at building an intelligent system that can detect abnormal behavior for the elderly at home. Active RFID tags can be deployed at home to help collect daily movement data of the elderly who carries an RFID reader. When the reader detects the signals from the tags, RSSI values that represent signal strength are obtained. The RSSI values are reversely related to...

A Mobile Relational Algebra

Most of the dynamic query optimization methods proposed in the literature are centralized. This centralization, in a large-scale environment, generates a bottleneck due to relatively important message exchange on a network with a weak bandwidth and strong latency. It becomes thus convenient to render autonomous and self-adaptable the query execution on a large-scale network. In...

Event Sharing in Vehicular Networks using Geographic Vectors and Maps

By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/undesirable situations (e.g., an accident or a traffic jam). However, developing this kind of information services for drivers calls for new data management approaches, such as an appropriate dissemination...

IEEE 802.15.4 Modifications and Their Impact

IEEE 802.15.4 is a popular choice for MAC/PHY protocols in low power and low data rate wireless sensor networks. In this paper, we suggest several modifications to beaconless IEEE 802.15.4 MAC operation and evaluate their impact on the performance via stochastic modeling and simulations. We found that the utility of these modifications is strongly dependent on the traffic load on...

Semantic File Annotation and Retrieval on Mobile Devices

The rapid development of mobile technologies has facilitated users to generate and store files on mobile devices such as mobile phones and PDAs. However, it has become a challenging issue for users to efficiently and effectively search for files of interest in a mobile environment involving a large number of mobile nodes. This paper presents SemFARM framework which facilitates...

Optimizing the Performance and Robustness of Type-2 Fuzzy Group Nearest-Neighbor Queries

In Group Nearest-Neighbor (GNN) queries, the goal is to find one or more points of interest with minimum sum of distance to the current location of mobile users. The classic forms of GNN use Euclidean distance measure which is not sufficient to capture other essential distance perceptions of human and the inherent uncertainty of it. To overcome this problem, an improved distance...

A Web-Based Application of TELOSB Sensor Network

Sensor network can be used in a numerous number of applications. However, implementing wireless sensor networks present new challenges compared with theoretical networks. In addition, implementing a sensor network might provide results different from that derived theoretically. Some routing protocols when implemented might fail to perform. In this paper, we implement three...

QoS Routing in Ad-Hoc Networks Using GA and Multi-Objective Optimization

Much work has been done on routing in Ad-hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS) requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with...

Design of a Secure RFID Authentication Scheme Preceding Market Transactions

In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming...

Automatic Security Assessment for Next Generation Wireless Mobile Networks

Wireless networks are more and more popular in our life, but their increasing pervasiveness and widespread coverage raises serious security concerns. Mobile client devices potentially migrate, usually passing through very light access control policies, between numerous and heterogeneous wireless environments, bringing with them software vulnerabilities as well as possibly...

A Handover Security Mechanism Employing the Diffie-Hellman Key Exchange Approach for the IEEE802.16e Wireless Networks

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme...

Performance Evaluation of Acoustic Underwater Data Broadcasting Exploiting the Bandwidth-Distance Relationship

Despite being a fundamental networking primitive, data broadcasting has so far received little attention in the context of underwater networks. This paper proposes an adaptive push system for data broadcasting in underwater acoustic wireless networks with locality of client demands. The proposed system exploits the characteristic relationship between the bandwidth of an...

Smart Object Reminders with RFID and Mobile Technologies

In this paper, we present a reminder system that sends a reminder list to the user's mobile device based on the history data collected from the same user and the events in the user's calendar on that day. The system provides an individualized service. The list is to remind the user with objects he/she might have forgotten at home. The objects that the user brings along with are...

Reconfigurable and Parallelized Network Coding Decoder for VANETs

Network coding is a promising technique for data communications in wired and wireless networks. However, it places an additional computing overhead on the receiving node in exchange for the improved bandwidth. This paper proposes an FPGA-based reconfigurable and parallelized network coding decoder for embedded systems especially for vehicular ad hoc networks. In our design, rapid...

Using Bluetooth to Implement a Pervasive Indoor Positioning System with Minimal Requirements at the Application Level

Different systems have been proposed to estimate the position of a mobile device using Bluetooth based on metrics such as the Radio Signal Strength Indicator (RSSI), the received Bit Error Rate (BER) or the Cellular Signal Quality (CSQ). These systems try to improve the estimation accuracy of the basic and straightforward triangulation method among discovered BT reference base...