Mobile Information Systems

https://www.hindawi.com/journals/misy/

List of Papers (Total 1,249)

Mobile Service Recommendation via Combining Enhanced Hierarchical Dirichlet Process and Factorization Machines

Recently, Mashup is becoming a promising software development method in the mobile service computing environment, which enables software developers to compose existing mobile services to create new or value-added composite RESTful web application. Due to the rapid increment of mobile services on the Internet, it is difficult to find the most suitable services for building user...

Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects) in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom...

Enhancing MISP with Fast Mobile IPv6 Security

The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction...

Strategic Availability and Cost-Effective UAV-Based Flying Access Networks: S-Modular Game Analysis

Nowadays, ubiquitous network access has become a reality, thanks to Unmanned Aerial Vehicles (UAVs) that have gained extreme popularity due to their flexible deployment and higher chance of line-of-sight links to ground users. Telecommunication service providers deploy UAVs to provide areal network access in remote rural areas, disaster-affected areas, or massive-attended events...

A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms

Heart disease is one of the most critical human diseases in the world and affects human life very badly. In heart disease, the heart is unable to push the required amount of blood to other parts of the body. Accurate and on time diagnosis of heart disease is important for heart failure prevention and treatment. The diagnosis of heart disease through traditional medical history...

UAV-Assisted Data Dissemination in Delay-Constrained VANETs

Due to the high mobility of vehicles, the frequent path failures caused by dynamic network topology, and a variety of obstructions, efficient data dissemination with delay constraint in vehicular ad hoc networks (VANETs) is a challenging issue. To address these problems, a novel mobile relaying technique by employing unmanned aerial vehicles (UAVs) is considered to facilitate...

User-Adaptive Key Click Vibration on Virtual Keyboard

This study focuses on design of user-adaptive tactile keyboard on mobile device. We are particularly interested in its feasibility of user-adaptive keyboard in mobile environment. Study 1 investigates how tactile feedback intensity of the virtual keyboard in mobile devices affects typing speed and user preference. We report how different levels of feedback intensity affect user...

Security and Privacy Issues in Vehicular Named Data Networks: An Overview

A tremendous amount of content and information are exchanging in a vehicular environment between vehicles, roadside units, and the Internet. This information aims to improve the driving experience and human safety. Due to the VANET’s properties and application characteristics, the security becomes an essential aspect and a more challenging task. On the contrary, named data...

Editorial

Dynamic Location and Forwarding Pointers for Mobility Management

GSM and IS-41 are two mobility management standards widely used in second generation networks. These two standards lean on a centralized architecture made up of home location registers (HLRs) and visitor location registers (VLRs). From these standards, the location update and search procedures always imply interrogation of the HLR, even if the two mobile terminals that want to...

Similarity-Based Clustering Strategy for Mobile Ad Hoc Multimedia Databases

Multimedia data are becoming popular in wireless ad hoc environments. However, the traditional content-based retrieval techniques are inefficient in ad hoc networks due to the multiple limitations such as node mobility, computation capability, memory space, network bandwidth, and data heterogeneity. To provide an efficient platform for multimedia retrieval, we propose to cluster...

Location Based Mobile Computing–A Tuplespace Perspective

Location based or ”context aware” computing is becoming increasingly recognized as a vital part of a mobile computing environment. As a consequence, the need for location-management middleware is widely recognized and actively researched. Location-management is frequently offered to the application through a “location API” (e.g. JSR 179) where the mobile unit can find out its own...

Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this...

Cooperative Proxy Caching for Wireless Base Stations

This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a...

A Context-Aware Tour Guide: User Implications

Although examples of tourist guides abound, the role of context aware feedback in such systems is an issue that has been insufficiently explored. Given the potential importance of such feedback, this paper investigates, from a usability perspective, two tour guide systems developed for Brunel University: one with context-aware user feedback and the other without. An empirical...

A Speed-Aware Handover System for Wireless Cellular Networks Based on Fuzzy Logic

Presently, the wireless mobile networks and devices are becoming increasingly popular to provide users the access anytime and anywhere. The mobile systems are based on cellular approach and the area is covered by cells that overlap each other. In mobile cellular systems the handover is a very important process, which refers to a mechanism that transfers an ongoing call from one...

Employ a Mobile Agent for Making a Payment

The mobile agent paradigm offers flexibility and autonomy to e-commerce applications. But it is challenging to employ a mobile agent to make a payment due to the security consideration. In this paper, we propose a new agent-assisted secure payment protocol, which is based on SET payment protocol and aims at enabling the dispatched consumer-agent to autonomously sign contracts and...

Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects) in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom...

Adaptive and Fuzzy Approaches for Nodes Affinity Management in Wireless Ad-Hoc Networks

In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is inadequate for ad-hoc networks due to nodes mobility and frequent breaks of links. To overcome this problem, routing protocols with estimated LL using nodes affinity were introduced. However, these...

Recovery of Flash Memories for Reliable Mobile Storages

As the mobile appliance is applied to many ubiquitous services and the importance of the information stored in it is increased, the security issue to protect the information becomes one of the major concerns. However, most previous researches focused only on the communication security, not the storage security. Especially, a flash memory whose operational characteristics are...

An Enhanced MPR-Based Solution for Flooding of Broadcast Messages in OLSR Wireless ad hoc Networks

In an Optimized Link State Routing (OLSR)-based mobile wireless network, optimizing the flooding of broadcast messages is a challenging task due to node's mobility and bandwidth resource consumption. To complement existing solutions to this problem, the Multi-Point Relays (MPR) selection has recently been advocated as a promising technique that has an additional feature of...

Enhancing MISP with Fast Mobile IPv6 Security

The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction...

Sharing with Caution: Managing Parking Spaces in Vehicular Networks

By exchanging events in a vehicular ad hoc network (VANET), drivers can receive interesting information while driving. For example, they can be informed of available parking spaces in their vicinity. A suitable protocol is needed to disseminate the events efficiently within the area where they are relevant. Moreover, in such a competitive context where each vehicle may be...

Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this...