Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 1,080)

UAV-Assisted Data Dissemination in Delay-Constrained VANETs

Due to the high mobility of vehicles, the frequent path failures caused by dynamic network topology, and a variety of obstructions, efficient data dissemination with delay constraint in vehicular ad hoc networks (VANETs) is a challenging issue. To address these problems, a novel mobile relaying technique by employing unmanned aerial vehicles (UAVs) is considered to facilitate...

Dynamic Location and Forwarding Pointers for Mobility Management

GSM and IS-41 are two mobility management standards widely used in second generation networks. These two standards lean on a centralized architecture made up of home location registers (HLRs) and visitor location registers (VLRs). From these standards, the location update and search procedures always imply interrogation of the HLR, even if the two mobile terminals that want to...

Location Based Mobile Computing–A Tuplespace Perspective

Location based or ”context aware” computing is becoming increasingly recognized as a vital part of a mobile computing environment. As a consequence, the need for location-management middleware is widely recognized and actively researched. Location-management is frequently offered to the application through a “location API” (e.g. JSR 179) where the mobile unit can find out its own...

Adaptive and Fuzzy Approaches for Nodes Affinity Management in Wireless Ad-Hoc Networks

In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is inadequate for ad-hoc networks due to nodes mobility and frequent breaks of links. To overcome this problem, routing protocols with estimated LL using nodes affinity were introduced. However, these...

Enhancing MISP with Fast Mobile IPv6 Security

The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction...

Sharing with Caution: Managing Parking Spaces in Vehicular Networks

By exchanging events in a vehicular ad hoc network (VANET), drivers can receive interesting information while driving. For example, they can be informed of available parking spaces in their vicinity. A suitable protocol is needed to disseminate the events efficiently within the area where they are relevant. Moreover, in such a competitive context where each vehicle may be...

Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this...

Tangible Interfaces for Interactive Multimedia Presentations

This article is devoted to tangible interfaces for steering and control of interactive multimedia presentations. Various methods for digital encoding of physical objects are considered and their applicability in surface encoding for tangible interface components is discussed. Experiments with presentation controls, based on direct interaction with digitally encoded printed...

Design and Evaluation of Reliable Data Transmission Protocol in Wireless Sensor Networks

A wireless sensor-actuator network (WSAN) is composed of sensor modes and actuator modes which are interconnected in wireless networks. A sensor node collects information on the physical world and sends a sensed value in a wireless network. Another sensor node forwards the sensed value to deliver to an actuator node. A sensor node can deliver messages with sensed values to only...

Adaptive and Fuzzy Approaches for Nodes Affinity Management in Wireless Ad-Hoc Networks

In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is inadequate for ad-hoc networks due to nodes mobility and frequent breaks of links. To overcome this problem, routing protocols with estimated LL using nodes affinity were introduced. However, these...

A new MAC Protocol for Reducing Effect of Needless Transmission Deferment Induced by Missed RTS/CTS Handshake

IEEE802.11DCF employs RTS/CTS (Request To Send/Clear To Send) mechanism for mitigating effect of hidden terminals. The RTS/CTS mechanism sets transmission deferral timer to neighbor terminals by exchanging RTS and CTS between transmitter and receiver. Then, in the case that RTS/CTS exchange succeeds, effect of hidden terminals could be suppressed, otherwise, any neighbor which...

Performance Evaluation with Different Mobility Models for Dynamic Probabilistic Flooding in MANETs

Broadcasting is an essential and effective data propagation mechanism, with several of important applications such as route discovery, address resolution, as well as many other network services. As data broadcasting has many advantages, also causing a lot of contention, collision, and congestion, which induces what is known as "broadcast storm problems". Broadcasting has...

A Scheduling Method to Reduce Waiting Time for Close-Range Broadcasting

Due to the recent popularization of digital broadcasting systems, close-range broadcasting using continuous media data, i.e. audio and video, has attracted great attention. For example, in a drama, after a user watches interesting content such as a highlight scene, he/she will watch the main program continuously. In close-range broadcasting, the necessary bandwidth for...

Seamless MANET Autoconfiguration through Enhanced 802.11 Beaconing

The deployment of mobile ad-hoc networks involves several configuration steps, which complicate research efforts and hinder user interest. This problem prompts for new approaches offering full autoconfiguration of terminals at the different network layers involved. In this paper we propose a novel solution for the autoconfiguration of IEEE 802.11 based MANETs that relies on SSID...

Integrated Context-Aware Driver Assistance System Architecture

Recently, significant improvements have been made in the area of vehicular communication systems. Furthermore, vehicle-to-vehicle communication is considered a key concept for keeping roads safe. An efficient implementation of these systems is necessary to ensure the safety of driving situations and to reduce the collision rates. This paper proposes a Context-Aware Driver...

Health Participatory Sensing Networks

The use of participatory sensing in relation to the capture of health-related data is rapidly becoming a possibility due to the widespread consumer adoption of emerging mobile computing technologies and sensing platforms. This has the potential to revolutionize data collection for population health, aspects of epidemiology, and health-related e-Science applications and as we will...

Dynamic Location and Forwarding Pointers for Mobility Management

GSM and IS-41 are two mobility management standards widely used in second generation networks. These two standards lean on a centralized architecture made up of home location registers (HLRs) and visitor location registers (VLRs). From these standards, the location update and search procedures always imply interrogation of the HLR, even if the two mobile terminals that want to...

Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present...

K Nearest Neighbor Search in Navigation Systems

A frequent type of query in a car navigation system is to find the k nearest neighbors (kNN) of a given query object (e.g., car) using the actual road network maps. With road networks (spatial networks), the distances between objects depend on their network connectivity and it is computationally expensive to compute the distances (e.g., shortest paths) between objects. In this...

Similarity-Based Clustering Strategy for Mobile Ad Hoc Multimedia Databases

Multimedia data are becoming popular in wireless ad hoc environments. However, the traditional content-based retrieval techniques are inefficient in ad hoc networks due to the multiple limitations such as node mobility, computation capability, memory space, network bandwidth, and data heterogeneity. To provide an efficient platform for multimedia retrieval, we propose to cluster...

Modelling and Quantitative Analysis of LTRACK–A Novel Mobility Management Algorithm

This paper discusses the improvements and parameter optimization issues of LTRACK, a recently proposed mobility management algorithm. Mathematical modelling of the algorithm and the behavior of the Mobile Node (MN) are used to optimize the parameters of LTRACK. A numerical method is given to determine the optimal values of the parameters. Markov chains are used to model both the...

Applying Algebraic Approaches for Modeling Workflows and their Transformations in Mobile Networks

In emergency scenarios we can obtain a more effective coordination among team members, each of them equipped with hand-held devices, through the use of workflow management software. Team members constitute a Mobile Ad-hoc NETwork (MANET), whose topology both influences and is influenced by the workflow. In this paper we propose an algebraic approach for modeling workflow progress...

SPLAI: Computational Finite Element Model for Sensor Networks

Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called...

Personalized Avatars for Mobile Entertainment

With evolution in computer and mobile networking technologies comes the challenge of offering novel and complex multimedia applications and end-user services in heterogeneous environments for both developers and service providers. This paper describes one novel service, called LiveMail that explores the potential of existing face animation technologies for innovative and...