The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the exact per node throughput capacity of a MANET, where the transmission power of each node can be controlled to adapt to a specified transmission range v and a generalized two-hop relay with limited packet redundancy f is adopted for packet routing. Based on the concept of automatic feedback control and the Markov chain model, we first develop a general theoretical framework to...
Mobile Ad hoc Networks (MANETs) are used for node to node communications for a fixed purpose under mobile conditions. Different applications have found MANETs useful for communication tasks. The challenges while such a communication is performed are plenty. Although a number of protocols have facilitated the communication between mobile nodes, there is an unavoidable interruption in the network due...
In the era of the Internet of Everything, users with handheld or wearable devices equipped with sensing capability have become producers as well as consumers of information and services. The more powerful these devices get, the more likely it is that they will generate and share content locally, through ad hoc opportunistic connectivity, leading to the presence of distributed information sources and...
In this paper, we first present a heterogeneous theoretical framework for DTNs where the contact between nodes is based on independent differently distributed assumption. Moreover, the message forwarding process follows a Gamma Distribution. Then, we propose a new spray routing scheme based on this framework. Moreover, we compare our routing protocol with traditional spray routing (TSR) protocols...
The IEEE Engineering Mobile Service Oriented Systems (EMSOS) Workshop aims to bring together researchers from academia and industry, as well as practitioners in the area of engineering services in mobile environments in order to provide a forum where recent research results can be presented and discussed. The objective is to understand open issues in the software engineering area of services applied...
Mobile devices are now the most convenient and ubiquitous interface for accessing information services. The advanced sensing capabilities of these devices enable them to effectively observe, analyze and understand the context of the current environment and thus are used as service providers. However, the resource constraints of mobile devices limit the type and scale of functionality that can be offered...
Delay tolerant networks (DTNs) are sparse wireless networks. Node mobility, power outage and propagation cause disconnections regularly. DTN characteristics such as long delay, dynamic topology, and intermittent connections make routing a challenging matter. DTNs have many real applications such as military networks, interplanetary network, wildlife tracking, and etc. Message delivery ratio, dropped...
Self-certifying names provide the property that any entity in a distributed system can verify the binding between a corresponding public key and the self-certifying name without relying on a trusted third party. However, self-certifying names lack a binding with a corresponding real-world identity. In this paper, we present a concrete mechanism for using a Web-of-Trust in conjunction with self-certifying...
Information-centric networks have recently been drawing increasing attention in academia as well as in industry. Information and content retrieval is a critical service for mobile ad-hoc networks. It relies on other resources and tools, such as internal storage, content searching and sharing, delay-tolerant delivery, etc. Previous studies have shown that social networking can assist delay-tolerant...
In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric duty cycles can still be improved. In this work, we investigate asynchronous neighbor discovery through a code-based...
A mobile cloudlet is a set of resource-rich mobile devices — referred to as cloudlet nodes — that an initiator mobile device can connect to for services. In this paper, we examine the fundamental mobile cloudlet properties that unfold whether and when a mobile cloudlet can provide mobile application service. Specifically, we investigate the cloudlet size, cloudlet node's lifetime and reachable time...
In some extraordinary situations like natural disasters or terrorist attacks, cellular mobile networks may face dramatically increased network traffics. Due to GSM network architecture, the number of available radio traffic channels within a cell is limited and this limitation may cause traffic congestions on such conditions. These congestions may drop the quality of mobile subscriber service channels...
OFDMA-based mobile relay enhanced cellular networks which have lower infrastructure cost and larger coverage areas are important technologies for the next generation communication systems since they allow to communicate at higher data rates. However, it is required to develop efficient radio resource management algorithms in order to reveal these advantages. Thus, in this study, relay selection and...
Wireless sensor networks are created using low cost, low power sensor nodes to collect useful information from a targeted environment in various applications. Location estimation is one of the areas where these networks can be exploited. Main aim of this study is to control a fleet via wireless sensor networks that only leader vehicle has human control. Instead, some of the vehicles can be equipped...
Understanding the user mobility is essential to resource optimization and algorithm evaluation in mobile networks, such as network planning, content distribution, and evaluation of hand-over mechanisms. Existing human mobility models focus on extracting mobility patterns from Call Detail Records (CDRs) or WiFi traces. While the former only captures movements during phone calls, the latter does not...
Voice traffic termination fraud, often referred to as Subscriber Identity Module box (SIMbox) fraud, is a common illegal practice on mobile networks. As a result, cellular operators around the globe lose billions annually. Moreover, SIMboxes compromise the cellular network infrastructure by overloading local base stations serving these devices. This paper analyzes the fraudulent traffic from SIMboxes...
It is our great pleasure to welcome you to the Fifth International Conference on Information and Communication System (ICICS2014), which takes place in Irbid on April 1–3, 2014. This year conference is technically co-sponsored by the Institute of Electrical and Electronics Engineers (IEEE).
The use of smart phones and similar devices are increasing day by day and mobile devices are moving towards becoming the mainstream computing hardware. In parallel, the number of mobile applications is increasing exponentially. Besides the many advantages of being mobile, in these applications limited battery power is a fundamental constraint. With "Energy Aware" programming techniques,...
The digitization of social networks has enabled the passive collection of large scale data, which in turn have fostered social studies that have been traditionally dependent on small scale, interview-based data. During the last years, a new class of digital social networks has emerged, namely, location-based social networks (LBSNs). The main interaction between users of an LBSN is location sharing,...
The content routing protocols for MANETs proposed to date require the flooding of content requests or link-state advertisements. The Adaptive Publish-subscribe Distance Vector (APDV) protocol is presented as an alternative. APDV combines routing to well-known directories using distance-vector signaling with publish-subscribe mechanisms to discover content. Named data objects (NDO) are published with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.