The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In vehicular ad hoc networks (VANETs), broadcast is a common operation to provide a vehicle to disseminate traffic information or warning messages to all the other vehicles. This paper proposes a distributed adaptive media access control (MAC) protocol, called DA-MAC, to dynamically select proper vehicles to form a connected virtual backbone for provision of efficient broadcasting in VANETs. The proposed...
In wireless sensor networks (WSNs) deployed in an outdoor environment, obstacles may occur as a result of a non-uniform distribution of the sensor nodes or the presence of barriers. These obstacles result in a degradation of the network performance, so obstacle identification is a major concern in most WSN applications. This paper develops a Decentralized Boundary Detection (DBD) algorithm for identifying...
One of the challenging roadblocks stunting the development and commercialization of mobile ad hoc networks (MANETs), is the lack of a thorough understanding of the fundamental performance limits in MANETs. Distinguished from available works which mainly focused on deriving order sense scaling laws of the delay performance in MANETs and usually assumed a localized transmission range, this paper examines...
In this paper, we consider 2D wireless multi-hop networks with mobile nodes randomly distributed on a torus, and a small number of base stations (infrastructure nodes) deterministically placed in the same area. Mobile nodes move following a random walk mobility model. A piece of information is broadcast from the base stations at the same time in a multi-hop manner using a Susceptible-Infectious-Recovered...
In this paper, we consider a nano-biosensor network composed of nano-to-micro scale biological machines distributed over a two-dimensional bounded area. The goal of the nano-biosensor network is to detect a target signal that propagates via Brownian motion in the monitoring area. Three simple nanomachine placement strategies are investigated: random, proportional, and regular placement. In the random...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
With widespread deployment of often overlapping mobile and wireless coverage today, modern-day smartphones may have the capability to transmit data using multiple parallel paths to improve overall communication throughput. However, multipath data transfers have serious compatibility issues with reliable transport layer protocols which dictate the data to be received at the receiver in strict sequenced...
Mobile models aim to mimic human motion. Real traces aim at the same target. However, the latters are specific. They relate to a country or a region or smaller geographical places. Also, they cover at most few months of duration. In cons, Mobility models approach is more general in space and time for taking advantage of Social Theory. Mobile models are used in mobile networks routing protocols for...
An important characteristic in trust management frameworks is how nodes obtain information about the trustworthiness of other nodes. Some trust management models are based on local information, while others use both information of neighbors and remote nodes. Despite the wide of information used, the existing trust monitoring approaches are mainly based either on passive monitoring mechanisms or on...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
The current growth of mobile devices enabled with GPS receptors, cameras, accelerometers, and Internet access offers new opportunities for new mobile ubiquitous multimedia applications. Such applications help local communities to share resources using geo-location, interactive mapping, augmented reality, and several data representations. This paper presents CityEvents, a mobile solution that provides...
Groups of people with mobile phones using short range connections like WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, Delay Tolerant Networks (DTNs). The study of message transmission speed in such kind of networks has attracted increasing attention in recent years. In this paper, we present a realistic framework to model the message...
In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called ”SIPTO”(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic which should be offloaded in real time. Although traffic...
Wireless sensor networks have been used for a variety of purposes such as habitat monitoring, malicious target detection, and climate observation. Conventionally, stationary sensors are used to carry out sensing tasks in a region of interest. However, if the region is much larger than the sensing range of a single sensor, stationary sensor networks could incur many problems such as the complicated...
The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns....
This paper address the challenge of design a feasible social-based mechanism to manage wireless mobile connectivity. In a previous work, we proposed a methodology to share connectivity experiences among mobile users inside on-line social networks [11]. The aim was explore peoples social circles to enhance their wireless connectivity experiences e.g., QoS metrics such as: throughput, latency and signal...
We design new cellular automaton based algorithms to improve coverage in a network with mobile sensors. The algorithms can be useful in applications where sensors are initially deployed in one place and need to disperse to the environment autonomously, or in situations where in certain areas sensors may be destroyed (e.g. due to a natural disaster), and the sensors need to use their mobility in order...
Cooperative communication when other mobile nodes could act as potential relays, poses significant challenge in designing relay selection algorithms due to the information asymmetry between the source and the potential relays. The potential relays in this case are better informed about their channel conditions than the source. Therefore, the source must provide them with incentive to reveal their...
Measuring and predicting users quality of experience (QoE) in dynamic network conditions is a challenging task. This paper presents results related to a decision-theoretic methodology incorporating Bayesian networks (BNs) and utility theory for quality of experience (QoE) measurement and prediction in mobile computing scenarios. In particular, we show how both generative and discriminative BNs can...
The present work investigates the behavior of the signal to noise and interference ratio (SNIR) and communication channel capacity of mobile ad hoc networks (MANETs) as a function of the number of nodes. From the propagation model that considers attenuation with the distance, a change was proposed such that, as the transmitter arbitrarily approximates to the receiver, the channel gain depends only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.