WorldWideScience

Sample records for networks mobilizing health

  1. Optimizing network connectivity for mobile health technologies in sub-Saharan Africa.

    Science.gov (United States)

    Siedner, Mark J; Lankowski, Alexander; Musinga, Derrick; Jackson, Jonathon; Muzoora, Conrad; Hunt, Peter W; Martin, Jeffrey N; Bangsberg, David R; Haberer, Jessica E

    2012-01-01

    Mobile health (mHealth) technologies hold incredible promise to improve healthcare delivery in resource-limited settings. Network reliability across large catchment areas can be a major challenge. We performed an analysis of network failure frequency as part of a study of real-time adherence monitoring in rural Uganda. We hypothesized that the addition of short messaging service (SMS+GPRS) to the standard cellular network modality (GPRS) would reduce network disruptions and improve transmission of data. Participants were enrolled in a study of real-time adherence monitoring in southwest Uganda. In June 2011, we began using Wisepill devices that transmit data each time the pill bottle is opened. We defined network failures as medication interruptions of >48 hours duration that were transmitted when network connectivity was re-established. During the course of the study, we upgraded devices from GPRS to GPRS+SMS compatibility. We compared network failure rates between GPRS and GPRS+SMS periods and created geospatial maps to graphically demonstrate patterns of connectivity. One hundred fifty-seven participants met inclusion criteria of seven days of SMS and seven days of SMS+GPRS observation time. Seventy-three percent were female, median age was 40 years (IQR 33-46), 39% reported >1-hour travel time to clinic and 17% had home electricity. One hundred one had GPS coordinates recorded and were included in the geospatial maps. The median number of network failures per person-month for the GPRS and GPRS+SMS modalities were 1.5 (IQR 1.0-2.2) and 0.3 (IQR 0-0.9) respectively, (mean difference 1.2, 95%CI 1.0-1.3, p-valueImprovements in network connectivity were notable throughout the region. Study costs increased by approximately $1USD per person-month. Addition of SMS to standard GPRS cellular network connectivity can significantly reduce network connection failures for mobile health applications in remote areas. Projects depending on mobile health data in resource

  2. Mobile Network Data for Public-Health: Opportunities and Challenges

    Directory of Open Access Journals (Sweden)

    Nuria eOliver

    2015-08-01

    Full Text Available The ubiquity of mobile phones worldwide is generating an unprecedented amount of human behavioral data both at an individual and aggregated levels. The study of this data as a rich source of information about human behavior emerged almost a decade ago. Since then it has grown into a fertile area of research named computational social sciences with a wide variety of applications in different fields such as social networks, urban and transport planning, economic development, emergency relief and, recently, public health. In this paper we briefly describe the state of the art on using mobile phone data for public health, and present the opportunities and challenges that this kind of data presents for public health.

  3. Mobile Network Data for Public Health: Opportunities and Challenges

    Science.gov (United States)

    Oliver, Nuria; Matic, Aleksandar; Frias-Martinez, Enrique

    2015-01-01

    The ubiquity of mobile phones worldwide is generating an unprecedented amount of human behavioral data both at an individual and aggregated levels. The study of this data as a rich source of information about human behavior emerged almost a decade ago. Since then, it has grown into a fertile area of research named computational social sciences with a wide variety of applications in different fields such as social networks, urban and transport planning, economic development, emergency relief, and, recently, public health. In this paper, we briefly describe the state of the art on using mobile phone data for public health, and present the opportunities and challenges that this kind of data presents for public health. PMID:26301211

  4. Using social networking to understand social networks: analysis of a mobile phone closed user group used by a Ghanaian health team.

    Science.gov (United States)

    Kaonga, Nadi Nina; Labrique, Alain; Mechael, Patricia; Akosah, Eric; Ohemeng-Dapaah, Seth; Sakyi Baah, Joseph; Kodie, Richmond; Kanter, Andrew S; Levine, Orin

    2013-04-03

    The network structure of an organization influences how well or poorly an organization communicates and manages its resources. In the Millennium Villages Project site in Bonsaaso, Ghana, a mobile phone closed user group has been introduced for use by the Bonsaaso Millennium Villages Project Health Team and other key individuals. No assessment on the benefits or barriers of the use of the closed user group had been carried out. The purpose of this research was to make the case for the use of social network analysis methods to be applied in health systems research--specifically related to mobile health. This study used mobile phone voice records of, conducted interviews with, and reviewed call journals kept by a mobile phone closed user group consisting of the Bonsaaso Millennium Villages Project Health Team. Social network analysis methodology complemented by a qualitative component was used. Monthly voice data of the closed user group from Airtel Bharti Ghana were analyzed using UCINET and visual depictions of the network were created using NetDraw. Interviews and call journals kept by informants were analyzed using NVivo. The methodology was successful in helping identify effective organizational structure. Members of the Health Management Team were the more central players in the network, rather than the Community Health Nurses (who might have been expected to be central). Social network analysis methodology can be used to determine the most productive structure for an organization or team, identify gaps in communication, identify key actors with greatest influence, and more. In conclusion, this methodology can be a useful analytical tool, especially in the context of mobile health, health services, and operational and managerial research.

  5. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  6. Exploring mobile health in a private online social network.

    Science.gov (United States)

    Memon, Qurban A; Mustafa, Asma Fayes

    2015-01-01

    Health information is very vulnerable. Certain individuals or corporate organisations will continue to steal it similar to bank account data once data is on wireless channels. Once health information is part of a social network, corresponding privacy issues also surface. Insufficiently trained employees at hospitals that pay less attention to creating a privacy-aware culture will suffer loss when mobile devices containing health information are lost, stolen or sniffed. In this work, a social network system is explored as a m-health system from a privacy perspective. A model is developed within a framework of data-driven privacy and implemented on Android operating system. In order to check feasibility of the proposed model, a prototype application is developed on Facebook for different services, including: i) sharing user location; ii) showing nearby friends; iii) calculating and sharing distance moved, and calories burned; iv) calculating, tracking and sharing user heart rate; etc.

  7. Integrating a mobile health setup in a chronic disease management network.

    Science.gov (United States)

    Ding, Hang; Ireland, Derek; Jayasena, Rajiv; Curmi, Jamie; Karunanithi, Mohan

    2013-01-01

    Supporting self management of chronic disease in collaboration with primary healthcare has been a national priority in order to mitigate the emerging disease burden on the already strained healthcare system. However, in practice, the uptake of self-management programs and compliance with clinical guidelines remain poor. Time constraints due to work commitments and lack of efficient monitoring tools have been the major barrier to the uptake and compliance. In this paper, we present a newly integrated mobile health system with a clinical chronic disease management network called cdmNet, which has already been validated to facilitate General Practitioners (GPs) to provide collaborative disease management services. The newly integrated solution takes advantage of the latest mobile web and wireless Bluetooth communication techniques to enable patients to record health data entries through ubiquitous mobile phones, and allows the data to be simultaneously shared by multidisciplinary care teams. This integration would enable patients to self-manage their chronic disease conditions in collaboration with GPs and hence, improve the uptake and compliance. Additionally, the proposed integration will provide a useful framework encouraging the translation of innovative mobile health technologies into highly regulated healthcare systems.

  8. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  9. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  10. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  11. Mobile patient monitoring: The MobiHealth system

    NARCIS (Netherlands)

    Wac, K.E.; Bults, Richard G.A.; van Beijnum, Bernhard J.F.; Widya, I.A.; Jones, Valerie M.; Konstantas, D.; Vollenbroek-Hutten, Miriam Marie Rosé; Hermens, Hermanus J.

    2009-01-01

    The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices give rise to new mobile healthcare services. To this end, the MobiHealth system provides highly customizable vital signs tele-monitoring and tele-treatment system based on a body area network (BAN) and

  12. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  13. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  14. Connecting Mobile Users Through Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Faisal Alkhateeb

    2012-10-01

    Full Text Available Nowadays, social networks become popular with the emerging of web-based social networking services. Recently, several mobile services are developed to connect users to their favourite social networks such as Facebook, Twitter, Flickr, etc. However, these services depends upon the existing web-based social networks. In this paper, we present a mobile service for joining groups across communities. The originality of the work is that the framework of the service allows creating and joining social networks that are self-contained for mobile company servers. The service consists of several sub-services such as users invitation, group finding and others. Users, regardless of their disability, can use the service and its sub-services without the need to create their own accounts on social web sites and thus their own groups. We also propose a privacy control policy for mobile social networks.

  15. Mobile technology in health information systems - a review.

    Science.gov (United States)

    Zhang, X-Y; Zhang, P-Y

    2016-05-01

    Mobile technology is getting involved in every sphere of life including medical health care. There has been an immense upsurge in mobile phone-based health innovations these days. The expansion of mobile phone networks and the proliferation of inexpensive mobile handsets have made the digital information and communication technology capabilities very handy for the people to exploit if for any utility including health care. The mobile phone based innovations are able to transform weak and under performing health information system into more modern and efficient information system. The present review article will enlighten all these aspects of mobile technology in health care.

  16. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  17. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  18. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    Science.gov (United States)

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  19. Mobile Patient Monitoring: the MobiHealth System

    NARCIS (Netherlands)

    Konstantas, D.; van Halteren, Aart; Bults, Richard G.A.; Wac, K.E.; Widya, I.A.; Dokovski, N.T.; Jones, Valerie M.; Dokovsky, Nicolai; Koprinkov, G.T.; Herzog, Rainer; Bos, L.; Laxminarayan, S.

    2004-01-01

    The forthcoming wide availability of high bandwidth public wireless networks will give rise to new mobile health care services. Towards this direction the MobiHealth1 project has developed and trialed a highly customisable vital signals’ monitoring system based on a Body Area Network (BAN) and an

  20. Biomedical sensing analyzer (BSA) for mobile-health (mHealth)-LTE.

    Science.gov (United States)

    Adibi, Sasan

    2014-01-01

    The rapid expansion of mobile-based systems, the capabilities of smartphone devices, as well as the radio access and cellular network technologies are the wind beneath the wing of mobile health (mHealth). In this paper, the concept of biomedical sensing analyzer (BSA) is presented, which is a novel framework, devised for sensor-based mHealth applications. The BSA is capable of formulating the Quality of Service (QoS) measurements in an end-to-end sense, covering the entire communication path (wearable sensors, link-technology, smartphone, cell-towers, mobile-cloud, and the end-users). The characterization and formulation of BSA depend on a number of factors, including the deployment of application-specific biomedical sensors, generic link-technologies, collection, aggregation, and prioritization of mHealth data, cellular network based on the Long-Term Evolution (LTE) access technology, and extensive multidimensional delay analyses. The results are studied and analyzed in a LabView 8.5 programming environment.

  1. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  2. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  3. A mobile sensing system for structural health monitoring: design and validation

    International Nuclear Information System (INIS)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-01-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring

  4. A mobile sensing system for structural health monitoring: design and validation

    Science.gov (United States)

    Zhu, Dapeng; Yi, Xiaohua; Wang, Yang; Lee, Kok-Meng; Guo, Jiajie

    2010-05-01

    This paper describes a new approach using mobile sensor networks for structural health monitoring. Compared with static sensors, mobile sensor networks offer flexible system architectures with adaptive spatial resolutions. The paper first describes the design of a mobile sensing node that is capable of maneuvering on structures built with ferromagnetic materials. The mobile sensing node can also attach/detach an accelerometer onto/from the structural surface. The performance of the prototype mobile sensor network has been validated through laboratory experiments. Two mobile sensing nodes are adopted for navigating on a steel portal frame and providing dense acceleration measurements. Transmissibility function analysis is conducted to identify structural damage using data collected by the mobile sensing nodes. This preliminary work is expected to spawn transformative changes in the use of mobile sensors for future structural health monitoring.

  5. Mobile health interventions in Indigenous populations

    Directory of Open Access Journals (Sweden)

    Valerie Onyinyechi Umaefulam

    2017-06-01

    Full Text Available Humans are social beings and communication is vital and necessary for every cultural group which may be the primary motivator, why many populations worldwide have taken up mobile phones (1. Communication via mobile has significant cultural and identity implications for Indigenous people worldwide particularly those living in rural and hard to reach communities because due to globalization, a number of people now live away from their local communities for trade, employment, education, etc. Thus, mobile phones are devices for social networking and communication; and enables cultural connection and identification with family and friends. Its affordability, versatility of features, and portability create an opportunity for utilizing mobile technology to positively impact the health via health education, promotion, and provision of remote health services among others.

  6. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  7. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  8. Mobile social networking an innovative approach

    CERN Document Server

    Zhang, Daqing

    2014-01-01

    The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

  9. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers.

    OpenAIRE

    Comulada, WS

    2014-01-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and inter...

  10. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    , and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society.......the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...

  11. Mobile Phone Network Operators' Actions on RF Safety (invited paper)

    International Nuclear Information System (INIS)

    Causebrook, J.H.

    1999-01-01

    The current and possible future global penetration of mobile phone usage is given. Health and safety aspects relate to both the statutory requirements for the operation of their networks and the public perception of risks in using services provided by the operators. The coordination of this work nationally through trade associations is mentioned. GSM is the predominant standard used for the provision of global mobile phone services. The GSM MoU Association is introduced as the operators' coordination body worldwide for dealing with radio frequency (RF) health and safety issues through its sub-group, EBRC. The scope of the EBRC group is presented with the considerations used to determine if external research should be supported by the GSM MoU Association. A personal view is provided on the present quality of worldwide research on RF health and safety and some consideration is given as to what constitutes 'good' research. The mobile phone network operators' involvement in the science and application of epidemiological research is considered. Consideration is given to introducing risk/benefit analysis into the debate on the health and safety of mobile phone usage. The media presentation of the results of scientific work on this topic often leads to a falsely negative public perception of the perceived risks. This is made worse when such perceptions are used for the purposes of objecting to the deployment of network infrastructure. The operators' approach to RF health and safety procedures is outlined, with a clarification of the distinctions between near-field and far-field methodologies for the calculation of physical exclusion zones. It is concluded that the mobile phone operators are part of an industry which is safe and who work to ensure that their operations are seen to be safe in the context of the best available worldwide scientific knowledge and safety guidelines. (author)

  12. Health and Safety in Mobile Telephony

    International Nuclear Information System (INIS)

    Lipnjak, G.

    2001-01-01

    Full text: The paper deals with a description of mobile telephone network and the emitted radiation. The main focus is related to the potential health risks of mobile telephone radio waves. The international press has published articles warning of the risk of brain damage, hypersensitivity, eye damage, etc., if people use mobile telephones. The most important guidelines in the field of bioelectromagnetic and related to mobile telephony (ICNIRP, CENELEC and IEEE) are commented. Also, the problem of EMI of mobile telephone with other used electronic equipment by an impaired part of the human population has been elaborated. A lot of telecommunication companies provide expertise in a number of national and international standardisation groups, whose task is to monitor what is going on in the area of Health and Safety and to develop standardised measurement methods and equipment for radio-frequency electromagnetic exposure and interference. (author)

  13. Tamper-Resistant Mobile Health Using Blockchain Technology

    Science.gov (United States)

    2017-01-01

    Background Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and connecting people to their health care providers. Mobile apps help empower patients and health care providers to proactively address medical conditions through near real-time monitoring and treatment, regardless of the location of the patient or the health care provider. Additionally, mHealth data are stored in servers, and consequently, data management that prevents all forms of manipulation is crucial for both medical practice and clinical trials. Objective The aim of this study was to develop and evaluate a tamper-resistant mHealth system using blockchain technology, which enables trusted and auditable computing using a decentralized network. Methods We developed an mHealth system for cognitive behavioral therapy for insomnia using a smartphone app. The volunteer data collected with the app were stored in JavaScript Object Notation format and sent to the blockchain network. Thereafter, we evaluated the tamper resistance of the data against the inconsistencies caused by artificial faults. Results Electronic medical records collected using smartphones were successfully sent to a private Hyperledger Fabric blockchain network. We verified the data update process under conditions where all the validating peers were running normally. The mHealth data were successfully updated under network faults. We further ensured that any electronic health record registered to the blockchain network was resistant to tampering and revision. The mHealth data update was compatible with tamper resistance in the blockchain network. Conclusions Blockchain serves as a tamperproof system for mHealth

  14. Tamper-Resistant Mobile Health Using Blockchain Technology.

    Science.gov (United States)

    Ichikawa, Daisuke; Kashiyama, Makiko; Ueno, Taro

    2017-07-26

    Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and connecting people to their health care providers. Mobile apps help empower patients and health care providers to proactively address medical conditions through near real-time monitoring and treatment, regardless of the location of the patient or the health care provider. Additionally, mHealth data are stored in servers, and consequently, data management that prevents all forms of manipulation is crucial for both medical practice and clinical trials. The aim of this study was to develop and evaluate a tamper-resistant mHealth system using blockchain technology, which enables trusted and auditable computing using a decentralized network. We developed an mHealth system for cognitive behavioral therapy for insomnia using a smartphone app. The volunteer data collected with the app were stored in JavaScript Object Notation format and sent to the blockchain network. Thereafter, we evaluated the tamper resistance of the data against the inconsistencies caused by artificial faults. Electronic medical records collected using smartphones were successfully sent to a private Hyperledger Fabric blockchain network. We verified the data update process under conditions where all the validating peers were running normally. The mHealth data were successfully updated under network faults. We further ensured that any electronic health record registered to the blockchain network was resistant to tampering and revision. The mHealth data update was compatible with tamper resistance in the blockchain network. Blockchain serves as a tamperproof system for mHealth. Combining mHealth with blockchain technology may

  15. HealthNavigator: a mobile application for chronic disease screening and linkage to services at an urban Primary Health Network.

    Science.gov (United States)

    Seneviratne, Martin G; Hersch, Fred; Peiris, David P

    2018-03-26

    Mobile applications (apps) are promising tools to support chronic disease screening and linkage to health services. They have the potential to increase healthcare access for vulnerable populations. The HealthNavigator app was developed to provide chronic disease risk assessments, linkage to local general practitioners (GPs) and lifestyle programs, and a personalised health report for discussion with a GP. Assessments were either self-administered or facilitated by community health workers through a Primary Health Network (PHN) initiative targeting ethnically diverse communities. In total, 1492 assessments (80.4% self-administered, 19.6% facilitated) were conducted over a 12-month period in Queensland, Australia. Of these, 26% of people screened came from postcodes representing the lowest quartile of socioeconomic disadvantage. When compared against self-administered assessments, subjects screened by the facilitated program were more likely to be born outside Australia (80.5 v. 33.2%, P<0.001), and to fall within a high risk category based on cardiovascular risk scores (19.8 v. 13.7%, P<0.01) and type 2 diabetes mellitus risk scores (58.0 v. 40.1%, P<0.001). Mobile apps embedded into PHN programs may be a useful adjunct for the implementation of community screening programs. Further research is needed to determine their effect on health service access and health outcomes.

  16. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  17. Securing Mobile Networks in an Operational Setting

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  18. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  19. mobile Digital Access to a Web-enhanced Network (mDAWN): Assessing the Feasibility of Mobile Health Tools for Self-Management of Type-2 Diabetes.

    Science.gov (United States)

    Ho, Kendall; Newton, Lana; Boothe, Allison; Novak-Lauscher, Helen

    2015-01-01

    The mobile Digital Access to a Web-enhanced Network (mDAWN) program was implemented as an online, mobile self-management system to support patients with type-2 diabetes and their informal caregivers. Patients used wireless physiological sensors, received text messages, and had access to a secure web platform with health resources and semi-facilitated discussion forum. Outcomes were evaluated using (1) pre and post self-reported health behavior measures, (2) physiological outcomes, (3) program cost, and (4) in-depth participant interviews. The group had significantly decreased health distress, HbA1c levels, and systolic blood pressure. Participants largely saw the mDAWN as providing good value for the costs involved and found the program to be empowering in gaining control over their diabetes. mHealth programs have the potential to improve clinical outcomes through cost effective patient-led care for chronic illness. Further evaluation needs to examine integration of similar mHealth programs into the patient-physician relationship.

  20. Using satellite communications for a mobile computer network

    Science.gov (United States)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  1. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....

  2. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers.

    Science.gov (United States)

    Comulada, W Scott

    2014-12-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and intervention delivery, e.g. mobile users can video chat with counselors. This is due in part to privacy issues and other barriers that are more difficult to address outside of academic settings where most mobile research to date has taken place. In this article, we aim to inform a broader discussion on mobile research. In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total participants). HIV-transmission and general health behaviors were reported through a mobile phone-based daily assessment that was administered through study participants' own mobile phones. Phone log information was collected from gay men with Android phones. Benefits and challenges to mobile implementation are discussed, along with the application of multi-level models to the type of longitudinal egocentric data that we collected.

  3. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers

    Science.gov (United States)

    Comulada, W. Scott

    2015-01-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and intervention delivery, e.g. mobile users can video chat with counselors. This is due in part to privacy issues and other barriers that are more difficult to address outside of academic settings where most mobile research to date has taken place. In this article, we aim to inform a broader discussion on mobile research. In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total participants). HIV-transmission and general health behaviors were reported through a mobile phone-based daily assessment that was administered through study participants’ own mobile phones. Phone log information was collected from gay men with Android phones. Benefits and challenges to mobile implementation are discussed, along with the application of multi-level models to the type of longitudinal egocentric data that we collected. PMID:25844003

  4. Interworking evolution of mobile satellite and terrestrial networks

    Science.gov (United States)

    Matyas, R.; Kelleher, P.; Moller, P.; Jones, T.

    1993-01-01

    There is considerable interest among mobile satellite service providers in interworking with terrestrial networks to provide a universal global network. With such interworking, subscribers may be provided a common set of services such as those planned for the Public Switched Telephone Network (PSTN), the Integrated Services Digital Network (ISDN), and future Intelligent Networks (IN's). This paper first reviews issues in satellite interworking. Next the status and interworking plans of terrestrial mobile communications service providers are examined with early examples of mobile satellite interworking including a discussion of the anticipated evolution towards full interworking between mobile satellite and both fixed and mobile terrestrial networks.

  5. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  6. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    Science.gov (United States)

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  7. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  8. Mobile health in China: a review of research and programs in medical care, health education, and public health.

    Science.gov (United States)

    Corpman, David W

    2013-01-01

    There are nearly 1 billion mobile phone subscribers in China. Health care providers, telecommunications companies, technology firms, and Chinese governmental organizations use existing mobile technology and social networks to improve patient-provider communication, promote health education and awareness, add efficiency to administrative practices, and enhance public health campaigns. This review of mobile health in China summarizes existing clinical research and public health text messaging campaigns while highlighting potential future areas of research and program implementation. Databases and search engines served as the primary means of gathering relevant resources. Included material largely consists of scientific articles and official reports that met predefined inclusion criteria. This review includes 10 reports of controlled studies that assessed the use of mobile technology in health care settings and 17 official reports of public health awareness campaigns that used text messaging. All source material was published between 2006 and 2011. The controlled studies suggested that mobile technology interventions significantly improved an array of health care outcomes. However, additional efforts are needed to refine mobile health research and better understand the applicability of mobile technology in China's health care settings. A vast potential exists for the expansion of mobile health in China, especially as costs decrease and increasingly sophisticated technology becomes more widespread.

  9. Mobility management in the future mobile network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza

    2018-01-01

    The current mobile network architectures are heavily hierarchical, which implies that all traffic must be traversed through a centralized core entity. This makes the network prone to several limitations, e.g., suboptimal communication paths, low scalability, signaling overhead, and single point of

  10. The prevalence and usage of mobile health applications among mental health patients in Saudi Arabia.

    Science.gov (United States)

    Atallah, Nora; Khalifa, Mohamed; El Metwally, Ashraf; Househ, Mowafa

    2018-03-01

    Mobile health (mHealth) applications provide new methods of engagement with patients and can help patients manage their mental health condition. The main objective of this study is to explore the prevalence of the use of mobile health applications for mental health patients in Saudi Arabia. A total of 376 participants with depression and/or anxiety completed an online survey distributed by social networks which asked questions relating to mobile phone ownership, uses of health applications, and utilization patterns to track mental health related issues. Approximately, 46% of the participants reported running one or two healthcare related applications on their mobile phones. In all age groups, 64% of the participants used their mobile phones to access information related to their own health. Also, 64% of the participants expressed interest in using their own mobile phones to track and follow the progression of their depression and/or anxiety. Developing mobile health applications for Saudi mental health patients is needed since it can offer opportunities for patients, researchers, caregivers, and legislators to work together to improve the state of mental health care in Saudi Arabia. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  12. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  13. Using OpenSSH to secure mobile LAN network traffic

    Science.gov (United States)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  14. Estimating network effects in China's mobile telecommunications

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A model is proposed along with empirical investigation to prove the existence of network effects in China's mobile telecommunications market. Futhernore, network effects on China's mobile telecommunications are estimated with a dynamic model. The structural parameters are identified from regression coefficients and the results are analyzed and compared with another literature. Data and estimation issues are also discussed. Conclusions are drawn that network effects are significant in China's mobile telecommunications market, and that ignoring network effects leads to bad policy making.

  15. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  16. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  17. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  18. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  19. Mobile technologies as a health care tool

    CERN Document Server

    Arslan, Pelin

    2016-01-01

    This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety of case studies on the ways in which mobile technologies can be used to increase connectivity with health care providers and relevant others in order to promote healthy lifestyles and improve service provision. Detailed information is also provided on a sample project in which a set of tools has been used by teens at risk of obesity to record their sociopsychological environment and everyday health routines. Specifically, it is evaluated whether video diaries, created using a mobile platform and shared in real time via a social network, assist subjects in confronting obesity as a chronic disease. The book will be of inte...

  20. An approach to efficient mobility management in intelligent networks

    Science.gov (United States)

    Murthy, K. M. S.

    1995-01-01

    Providing personal communication systems supporting full mobility require intelligent networks for tracking mobile users and facilitating outgoing and incoming calls over different physical and network environments. In realizing the intelligent network functionalities, databases play a major role. Currently proposed network architectures envision using the SS7-based signaling network for linking these DB's and also for interconnecting DB's with switches. If the network has to support ubiquitous, seamless mobile services, then it has to support additionally mobile application parts, viz., mobile origination calls, mobile destination calls, mobile location updates and inter-switch handovers. These functions will generate significant amount of data and require them to be transferred between databases (HLR, VLR) and switches (MSC's) very efficiently. In the future, the users (fixed or mobile) may use and communicate with sophisticated CPE's (e.g. multimedia, multipoint and multisession calls) which may require complex signaling functions. This will generate volumness service handling data and require efficient transfer of these message between databases and switches. Consequently, the network providers would be able to add new services and capabilities to their networks incrementally, quickly and cost-effectively.

  1. Exposure to mobile telecommunication networks assessed using personal dosimetry and well-being in children and adolescents: the German MobilEe-study.

    Science.gov (United States)

    Thomas, Silke; Kühnlein, Anja; Heinrich, Sabine; Praml, Georg; von Kries, Rüdiger; Radon, Katja

    2008-11-04

    Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%). Participants were randomly selected from the population registries of four Bavarian (South of Germany) cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening).Using a dosimeter (ESM-140 Maschek Electronics), we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m) for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection) reference level. In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively. In comparison to previous studies this is one of

  2. Exposure to mobile telecommunication networks assessed using personal dosimetry and well-being in children and adolescents: the German MobilEe-study

    Directory of Open Access Journals (Sweden)

    von Kries Rüdiger

    2008-11-01

    Full Text Available Abstract Background Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. Methods We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%. Participants were randomly selected from the population registries of four Bavarian (South of Germany cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening. Using a dosimeter (ESM-140 Maschek Electronics, we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection reference level. Results In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively

  3. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University.......This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...

  4. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  5. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  6. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  7. Mobile health information system: a mobile app. to aid health ...

    African Journals Online (AJOL)

    Mobile health information system: a mobile app. to aid health workers relate health information. ... Global Journal of Mathematical Sciences ... phones in delivering vital health information and effective fieldwork reporting is of significance.

  8. Dynamic Video Streaming in Caching-enabled Wireless Mobile Networks

    OpenAIRE

    Liang, C.; Hu, S.

    2017-01-01

    Recent advances in software-defined mobile networks (SDMNs), in-network caching, and mobile edge computing (MEC) can have great effects on video services in next generation mobile networks. In this paper, we jointly consider SDMNs, in-network caching, and MEC to enhance the video service in next generation mobile networks. With the objective of maximizing the mean measurement of video quality, an optimization problem is formulated. Due to the coupling of video data rate, computing resource, a...

  9. Reversing the Energy Trend in Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2011-01-01

    In order to meet the expected boost in mobile data traffic, mobile network operators are planning and upgrading the capacity of their networks. Through a previous study it has been shown that over a period of eight years, different network upgrade strategies have a different impact on the energy ...

  10. Composing Networks: Writing Practices on Mobile Devices

    Science.gov (United States)

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  11. Patient monitoring in mobile health: opportunities and challenges.

    Science.gov (United States)

    Mohammadzadeh, Niloofar; Safdari, Reza

    2014-01-01

    In most countries chronic diseases lead to high health care costs and reduced productivity of people in society. The best way to reduce costs of health sector and increase the empowerment of people is prevention of chronic diseases and appropriate health activities management through monitoring of patients. To enjoy the full benefits of E-health, making use of methods and modern technologies is very important. This literature review articles were searched with keywords like Patient monitoring, Mobile Health, and Chronic Disease in Science Direct, Google Scholar and Pub Med databases without regard to the year of publications. Applying remote medical diagnosis and monitoring system based on mobile health systems can help significantly to reduce health care costs, correct performance management particularly in chronic disease management. Also some challenges are in patient monitoring in general and specific aspects like threats to confidentiality and privacy, technology acceptance in general and lack of system interoperability with electronic health records and other IT tools, decrease in face to face communication between doctor and patient, sudden interruptions of telecommunication networks, and device and sensor type in specific aspect. It is obvious identifying the opportunities and challenges of mobile technology and reducing barriers, strengthening the positive points will have a significant role in the appropriate planning and promoting the achievements of the health care systems based on mobile and helps to design a roadmap for improvement of mobile health.

  12. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and

  14. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  15. Content Delivery in Future Mobile Communication Networks

    Science.gov (United States)

    Jonas, Karl; Raber, Sergey

    2003-07-01

    With the fast progress in the deployment of wireless networks during the last few years, the global communication market requires the development of new methods for content delivery towards mobile users. It is currently characterised by the introduction of the 3rd generation of terrestrial mobile networks based on 3GPP's UMTS standard. It is expected that this will eventually lead to integrated all-IP-based infrastructures supporting a variety of radio access technologies (so-called beyond-3G-networks or 4th Generation networks). The integration of mobility support, security and accounting and provisioning of differentiated qualities of service are among the issues which are currently researched in the 4G framework.Since it is not possible to change network protocols and infrastructure at once in order to optimize them for mobile services, it is very important to find an appropriate way for the migration from the current infrastructure towards an integrated architecture, where fixed and mobile networks coexist and interoperate in the most effective and flexible way.The integration of satellite communication networks into the terrestrial mobile communication environment is the focus of R&D activities at the Competence Centre for Advanced Satellite Communication of the FhG FOKUS institute. These activities are presented in this article, with a focus on the CoDeSat Content Delivery over Satellite project.In the remainder of this article we first summarize services and service requirements as they are considered in our work. We then discuss the challenges derived from these requirements with respect to current network and protocol architectures. Finally, we describe our approach, and the current status of our prototype implementation.

  16. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  17. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  18. Nation-Wide Mobile Network Energy Evolution Analysis

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2013-01-01

    Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still be suppor......Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still...... be supported. In most cases, these upgrades increase the energy consumption of the network even further. This paper presents a nation-wide case study, based on a commercial network of a leading European operator, intended to provide a clear understanding of how the energy consumption of mobile networks...... is expected to evolve from 2012 until 2020. The study also considers an efficient network capacity evolution path, including base station equipment improvement forecasts....

  19. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  20. Mobile network maintenance (GSM)

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN mobile network infrastructure (GSM) on the 23 and 24 July from 6 p.m. to 6 a.m. in order to replace discontinued equipment and to increase the bandwidth capacity of the GSM mobile network. All CERN GSM emitters (40 units) will be moved one by one to the new infrastructure during the maintenance. The call of a user connected to an emitter at the time of its maintenance will be cut off. However, the general overlapping of the GSM radio coverage should mean that users are able immediately to call again should their call be interrupted. IT/CS/CS

  1. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  2. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  3. Evaluation of QoS supported in Network Mobility NEMO environments

    International Nuclear Information System (INIS)

    Hussien, L F; Abdalla, A H; Habaebi, M H; Khalifa, O O; Hassan, W H

    2013-01-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN)

  4. Looking for Sustainable Urban Mobility through Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Giovanni Fusco

    2004-11-01

    Full Text Available There is no formalised theory of sustainable urban mobility systems. Observed patterns of urban mobility are often considered unsustainable. But we don’t know what a city with sustainable mobility should look like. It is nevertheless increasingly apparent that the urban mobility system plays an important role in the achievement of the city’s wider sustainability objectives.In this paper we explore the characteristics of sustainable urban mobility systems through the technique of Bayesian networks. At the frontier between multivariate statistics and artificial intelligence, Bayesian networks provide powerful models of causal knowledge in an uncertain context. Using data on urban structure, transportation offer, mobility demand, resource consumption and environmental externalities from seventy-five world cities, we developed a systemic model of the city-transportation-environment interaction in the form of a Bayesian network. The network could then be used to infer the features of the city with sustainable mobility.The Bayesian model indicates that the city with sustainable mobility is most probably a dense city with highly efficient transit and multimodal mobility. It produces high levels of accessibility without relying on a fast road network. The achievement of sustainability objectives for urban mobility is probably compatible with all socioeconomic contexts.By measuring the distance of world cities from the inferred sustainability profile, we finally derive a geography of sustainability for mobility systems. The cities closest to the sustainability profile are in Central Europe as well as in affluent countries of the Far East. Car-dependent American cities are the farthest from the desired sustainability profile.

  5. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  6. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  7. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  8. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  9. Integrating cell phones and mobile technologies into public health practice: a social marketing perspective.

    Science.gov (United States)

    Lefebvre, Craig

    2009-10-01

    Mobile communications are being used for many purposes, from instant messaging (IM), mobile or microblogging (Twitter), social networking sites (Facebook, MySpace), e-mail to basic voicemail. A brief background on cell phone and mobile technology use in public health is reviewed. The focus of the article is framing the use of mobile technologies in public health from a social marketer's perspective--using the 4 Ps marketing mix as a guide.

  10. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  11. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  12. Robust and Cost-Efficient Communication Based on SNMP in Mobile Networks

    Science.gov (United States)

    Ryu, Sang-Hoon; Baik, Doo-Kwon

    A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Multimedia streaming services are receiving considerable interest in the mobile network business. An entire mobile network may change its point of attachment to the Internet. The mobile network is operated by a basic specification to support network mobility called Network Mobility (NEMO) Basic Support. However, NEMO basic Support mechanism has some problem in continuous communication. In this paper, we propose robust and cost-efficient algorithm. And we simulate proposed method and conclude some remarks.

  13. Virtual Stationary Automata for Mobile Networks

    National Research Council Canada - National Science Library

    Dolev, Shlomi; Gilbert, Seth; Lahiani, Limor; Lynch, Nancy; Nolte, Tina

    2005-01-01

    We define a programming abstraction for mobile networks called the Virtual Stationary Automata programming layer, consisting of real mobile clients, virtual timed I/O automata called virtual stationary automata (VSAs...

  14. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  15. Modeling and analysis of mobility management in mobile communication networks.

    Science.gov (United States)

    Baek, Woon Min; Yoon, Ji Hyun; Kim, Chesoong

    2014-01-01

    Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z) and two-zone registration with implicit registration by outgoing calls (2Zi). We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z), and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  16. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  17. Mobile Health Care over 3G Networks: the MobiHealth Pilot System and Service

    NARCIS (Netherlands)

    Wac, K.E.; Bults, Richard G.A.; Konstantas, D.; van Halteren, Aart; Jones, Valerie M.; Widya, I.A.; Herzog, Rainer

    2004-01-01

    Health care is one of the most prominent areas for the application of wireless technologies. New services and applications are today under research and development targeting different areas of health care, from high risk and chronic patients’ remote monitoring to mobility tools for the medical

  18. Mobilization and Adaptation of a Rural Cradle-to-Career Network

    Directory of Open Access Journals (Sweden)

    Sarah J. Zuckerman

    2016-10-01

    Full Text Available This case study explored the development of a rural cradle-to-career network with a dual focus on the initial mobilization of network members and subsequent adaptations made to maintain mobilization, while meeting local needs. Data sources included interviews with network members, observations of meetings, and documentary evidence. Network-based social capital facilitated mobilization. Where networks were absent and where distrust and different values were evident, mobilization faltered. Three network adaptations were discovered: Special rural community organizing strategies, district-level action planning, and a theory of action focused on out-of-school factors. All three were attributable to the composition of mobilized stakeholders and this network’s rural social geography. These findings illuminate the importance of social geography in the development and advancement of rural cradle-to-career networks.

  19. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  20. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  1. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dyna...

  2. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  3. Mapping real-time air pollution health risk for environmental management: Combining mobile and stationary air pollution monitoring with neural network models.

    Science.gov (United States)

    Adams, Matthew D; Kanaroglou, Pavlos S

    2016-03-01

    Air pollution poses health concerns at the global scale. The challenge of managing air pollution is significant because of the many air pollutants, insufficient funds for monitoring and abatement programs, and political and social challenges in defining policy to limit emissions. Some governments provide citizens with air pollution health risk information to allow them to limit their exposure. However, many regions still have insufficient air pollution monitoring networks to provide real-time mapping. Where available, these risk mapping systems either provide absolute concentration data or the concentrations are used to derive an Air Quality Index, which provides the air pollution risk for a mix of air pollutants with a single value. When risk information is presented as a single value for an entire region it does not inform on the spatial variation within the region. Without an understanding of the local variation residents can only make a partially informed decision when choosing daily activities. The single value is typically provided because of a limited number of active monitoring units in the area. In our work, we overcome this issue by leveraging mobile air pollution monitoring techniques, meteorological information and land use information to map real-time air pollution health risks. We propose an approach that can provide improved health risk information to the public by applying neural network models within a framework that is inspired by land use regression. Mobile air pollution monitoring campaigns were conducted across Hamilton from 2005 to 2013. These mobile air pollution data were modelled with a number of predictor variables that included information on the surrounding land use characteristics, the meteorological conditions, air pollution concentrations from fixed location monitors, and traffic information during the time of collection. Fine particulate matter and nitrogen dioxide were both modelled. During the model fitting process we reserved

  4. Topology of the Erasmus student mobility network

    Science.gov (United States)

    Derzsi, A.; Derzsy, N.; Káptalan, E.; Néda, Z.

    2011-07-01

    The collaboration network generated by the Erasmus student mobilities in the year 2003 is analyzed and modeled. Nodes of this bipartite network are European universities and links are the Erasmus mobilities between these universities. This network is a complex directed and weighted graph. The non-directed and non-weighted projection of this network does not exhibit a scale-free nature, but proves to be a small-word type random network with a giant component. The connectivity data indicates an exponential degree distribution, a relatively high clustering coefficient and a small radius. It can be easily modeled by using a simple configuration model and arguing the exponential degree distribution. The weighted and directed version of the network can also be described by means of simple random network models.

  5. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  6. Productivity and quality improvements in health care through airboss mobile messaging services.

    Science.gov (United States)

    Shah, P J; Martinez, R; Cooney, E

    1997-01-01

    The US health care industry is in the midst of revolutionary changes. Under tremendous pressures from third-party payers and managed care programs to control costs while providing high quality medical services, health care entities are now looking at information technologies to help them achieve their goals. These goals typically include improved productivity, efficiency and decision-making capabilities among staff members. Moreover, hospitals and other health care facilities that provide a broad and integrated range of inpatient and outpatient care, wellness and home care services are in the best position to offer comprehensive packages to managed care and private insurers. Many health care providers and administrators are considered mobile employees. This mobility can range from intra-building and intra-campus to multi-site and metropolitan areas. This group often relies on a variety of information technologies such as personal computers, communicating laptops, pagers, cellular phones, wireline phones, cordless phones and fax machines to stay in touch and handle information needs. These health care professionals require mobile information access and messaging tools to improve communications, control accessibility and enhance decision-making capabilities. AirBoss mobile messaging services could address the health care industry's need for improved messaging capabilities for its mobile employees. The AirBoss family of services supports integrated voice services, data messaging, mobile facsimile and customized information delivery. This paper describes overview of the current mobile data networking capability, the AirBoss architecture, the health care-related applications it addresses and long-term benefits. In addition, a prototype application for mobile home health care workers is illustrated. This prototype application provides integrated e-mail, information services, web access, real-time access and update of patient records from wireline or wireless networks

  7. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  8. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  9. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  10. Bridging the communication gap: successes and challenges of mobile phone technology in a health and demographic surveillance system in northern Nigeria.

    Science.gov (United States)

    Doctor, Henry V; Olatunji, Alabi; Jumare, Abdul'azeez

    2012-01-01

    Maternal and child health indicators are generally poor in Nigeria with the northern part of the country having the worst indicators than the southern part. Efforts to address maternal and health challenges in Nigeria include, among others, improvement in health and management information systems. We report on the experience of mobile phone technology in supporting the activities of a health and demographic surveillance system in northern Nigeria. Our experience calls for the need for the Nigerian Government, the mobile network companies, and the international community at large to consolidate their efforts in addressing the mobile network coverage and power supply challenges in order to create an enabling environment for socio-economic development particularly in rural and disadvantaged areas. Unless power and mobile network challenges are addressed, health interventions that rely on mobile phone technology will not have a significant impact in improving maternal and child health.

  11. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  12. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  13. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  14. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  15. Design of Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard L.; Ossenfort, John; Lee, Charles; Walker, Edward; Stone, Thom

    2004-01-01

    The Mobile Exploration System Project (MEX) at NASA Ames Research Center has been conducting studies into hybrid communication networks for future planetary missions. These networks consist of space-based communication assets connected to ground-based Internets and planetary surface-based mobile wireless networks. These hybrid mobile networks have been deployed in rugged field locations in the American desert and the Canadian arctic for support of science and simulation activities on at least six occasions. This work has been conducted over the past five years resulting in evolving architectural complexity, improved component characteristics and better analysis and test methods. A rich set of data and techniques have resulted from the development and field testing of the communication network during field expeditions such as the Haughton Mars Project and NASA Mobile Agents Project.

  16. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  17. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  18. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  19. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi-Fi...... to the network backbone. What is more, we give an overview of existing standardization activities on offloading the mobile traffic through Wi-Fi....

  20. Service Level Agreement for the QoS Guaranteed Mobile IPTV Services over Mobile WiMAX Networks

    OpenAIRE

    Chowdhury, Mostafa Zaman; Trung, Bui Minh; Jang, Yeong Min; Kim, Young-Il; Ryu, Won

    2011-01-01

    While mobile IPTV services are supported through the mobile WiMAX networks, there must need some guaranteed bandwidth for the IPTV services especially if IPTV and non-IPTV services are simultaneously supported by the mobile WiMAX networks. The quality of an IPTV service definitely depends on the allocated bandwidth for that channel. However, due to the high quality IPTV services and to support of huge non-IPTV traffic over mobile WiMAX networks, it is not possible to guarantee the sufficient ...

  1. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  2. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  3. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  4. Assessing mobile health applications with twitter analytics.

    Science.gov (United States)

    Pai, Rajesh R; Alathur, Sreejith

    2018-05-01

    Advancement in the field of information technology and rise in the use of Internet has changed the lives of people by enabling various services online. In recent times, healthcare sector which faces its service delivery challenges started promoting and using mobile health applications with the intention of cutting down the cost making it accessible and affordable to the people. The objective of the study is to perform sentiment analysis using the Twitter data which measures the perception and use of various mobile health applications among the citizens. The methodology followed in this research is qualitative with the data extracted from a social networking site "Twitter" through a tool RStudio. This tool with the help of Twitter Application Programming Interface requested one thousand tweets each for four different phrases of mobile health applications (apps) such as "fitness app", "diabetes app", "meditation app", and "cancer app". Depending on the tweets, sentiment analysis was carried out, and its polarity and emotions were measured. Except for cancer app there exists a positive polarity towards the fitness, diabetes, and meditation apps among the users. Following a system thinking approach for our results, this paper also explains the causal relationships between the accessibility and acceptability of mobile health applications which helps the healthcare facility and the application developers in understanding and analyzing the dynamics involved the adopting a new system or modifying an existing one. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. User cooperation, virality and gaming in a social mobile network

    DEFF Research Database (Denmark)

    Varga, C; Blazovics, L; Charaf, H

    2012-01-01

    Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we...

  6. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  7. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  8. Mobile satellite business networks: A part of the European mobile system

    Science.gov (United States)

    deMateo, M. L.; Jongejans, A.; Loisy, C.; VanHimbeeck, C.; Marchal, J. P.; Borella, A.; Sartori, M.

    1995-01-01

    The European Space Agency (ESA) is presently procuring an L-band payload EMS, to be embarked on the ITALSAT-2 satellite due for launch in early 1996, in order to promote a regional European mobile system. One of the Land Mobile Communication systems supported by EMS is the MSBN (Mobile Satellite Business Network) voice and data system which will offer the services of a business network on a seamless European coverage. This paper will first recall the characteristics of the MSBN system, which is based on quasi-synchronized CDMA (Code Division Multiple Access) techniques in both directions, and then describe the CDMA receivers implementation. Main validation test results will also be reported confirming predicted performances.

  9. Community Core Evolution in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2013-01-01

    Full Text Available Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  10. Community core evolution in mobile social networks.

    Science.gov (United States)

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  11. Mens mobile health

    DEFF Research Database (Denmark)

    Levisen, Vinie Diana Hvidbak; Castaño, Francisco Mansilla; Jensen, Camilla Skovbjerg

    2016-01-01

    Preferences Keywords: Men with little or no education, physical health, mobile health application. Types of presentations: First presentation preference: E-Poster presentations Second presentation preference: Pitch presentation Abstract Background: Men mobile health contributes knowledge of how mobile health...... applications affect the physical activity levels by men with little or no education and the frequency of how often they think and do something to promote their health. Men with little or no education have both the lowest life expectancy and longest patient delay, and there are not conducted researches...... of steps, minutes of physical activity. Every two weeks they receive a male health promotion sms. Checking steps, minutes of physical activity and the measurement of VAS every fourth week. Hypotheses – The intervention group will: • More often think of their own physical health • More often do something...

  12. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  13. Data-Driven Handover Optimization in Next Generation Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Po-Chiang Lin

    2016-01-01

    Full Text Available Network densification is regarded as one of the important ingredients to increase capacity for next generation mobile communication networks. However, it also leads to mobility problems since users are more likely to hand over to another cell in dense or even ultradense mobile communication networks. Therefore, supporting seamless and robust connectivity through such networks becomes a very important issue. In this paper, we investigate handover (HO optimization in next generation mobile communication networks. We propose a data-driven handover optimization (DHO approach, which aims to mitigate mobility problems including too-late HO, too-early HO, HO to wrong cell, ping-pong HO, and unnecessary HO. The key performance indicator (KPI is defined as the weighted average of the ratios of these mobility problems. The DHO approach collects data from the mobile communication measurement results and provides a model to estimate the relationship between the KPI and features from the collected dataset. Based on the model, the handover parameters, including the handover margin and time-to-trigger, are optimized to minimize the KPI. Simulation results show that the proposed DHO approach could effectively mitigate mobility problems.

  14. Knowledge Creation Through Mobile Social Networks and Its Impact on Intentions to Use Innovative Mobile Services

    NARCIS (Netherlands)

    Kleijnen, M.H.P.; Lievens, A.; de Ruyter, K.; Wetzels, M.G.M.

    2009-01-01

    Taking a social network perspective, the authors investigate consumers' intentions to use innovative mobile services. With a sociometric survey, they empirically assess how consumers integrate and connect through mobile social networks, as well as how their network position influences knowledge

  15. Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    Recently, context awareness in Intermittently Connected Mobile Networks (ICMNs) has gained popularity in order to discover social similarities among mobile entities. Nevertheless, most of the contextual methods depend on network knowledge obtained with unrealistic scenarios. Mobile entities should

  16. Residential mobility : Towards progress in mobility health research

    NARCIS (Netherlands)

    Morris, T.; Manley, D.J.; Sabel, C.E.

    2016-01-01

    Research into health disparities has long recognized the importance of residential mobility as a crucial factor in determining health outcomes. However, a lack of connectivity between the health and mobility literatures has led to a stagnation of theory and application on the health side, which

  17. Rural medicine via mobile network

    International Nuclear Information System (INIS)

    Srivastava, Shikha; Bharade, Sandeep; Sinha, Vineet; Ananthakrishnan, T.S.; Jindal, G.D.; Prakash, C.

    2009-01-01

    Bhabha Atomic Research Centre (BARC) has developed a handheld Tele-ECG system for providing optimum cardiac care and a Mobile Network Based Telemedicine (MNBT) utility for providing telemedicine services to isolated rural population. The handheld Tele-ECG acquires, saves and transfers the electrocardiographic signal to the expert's mobile for his advice in dealing with cardiac emergencies. Similarly, MNBT utility transfers the medical images and relevant patient data from a PC based instrument to a mobile phone for further transmission to an expert for his advice. This paper summarizes these developments. (author)

  18. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  19. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  20. The Network of International Student Mobility (Working Title)

    Energy Technology Data Exchange (ETDEWEB)

    Voegtle, E.; Windzio, M.

    2016-07-01

    In a previous paper (see Vögtle and Windzio 2016) we investigated the impact of membership in the Bologna Process on patterns and driving forces of cross-national student mobility. Student exchange flows were analysed for almost all Bologna Process member states and nonBologna OECD members over a ten-year period (from 2000 to 2009). We applied a Social Network Approach focusing on outbound diploma-mobility to identify positions of countries in the network of cross-national student exchange. Based on social network analyses, we first visualized the exchange patterns between sampled countries. In doing so, we analysed the student exchange linkages to gain descriptive insights into the development of the network (see Figure 1). Second, we used Exponential Random Graph Models (ERGM) to test which factors determine patterns of transnational student mobility. The results of this network analyses reveal that cross-national student exchange networks are stable over time. At the core of these networks are the United States, Great Britain, France, and Germany; they attract the highest shares of students from the remaining countries in our sample. Moreover, the results of the ERGM demonstrate that homophily between countries determines student exchange patterns. The most relevant ties exist between bordering countries. Moreover, membership in the Bologna Process impacts on mobility patterns, and the effect size increases over the periods investigated. (Author)

  1. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  2. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements.

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-09-15

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period.

  3. PKI-based secure mobile access to electronic health services and data.

    Science.gov (United States)

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  4. Use of mobile health (mHealth) tools by primary care patients in the WWAMI region Practice and Research Network (WPRN).

    Science.gov (United States)

    Bauer, Amy M; Rue, Tessa; Keppel, Gina A; Cole, Allison M; Baldwin, Laura-Mae; Katon, Wayne

    2014-01-01

    The purpose of this study was to determine the prevalence of mobile health (mHealth) use among primary care patients and examine demographic and clinical correlates. Adult patients who presented to 1 of 6 primary care clinics in a practice-based research network in the northwest United States during a 2-week period received a survey that assessed smartphone ownership; mHealth use; sociodemographic characteristics (age, sex, race/ethnicity, health literacy); chronic conditions; and depressive symptoms (2-item Patient Health Questionnaire). Data analysis used descriptive statistics and mixed logistic regression. Of 918 respondents (estimated response rate, 67.4%), 55% owned a smartphone, among whom 70% were mHealth users. In multivariate analyses, smartphone ownership and mHealth use were not associated with health literacy, chronic conditions, or depression but were less common among adults >45 years old (adjusted odds ratio, 0.07-0.39; P mHealth tools from their physician, and few (31%) prioritized their provider's involvement. Use of mHealth technologies is lower among older adults but otherwise is common among primary care patients, including those with limited health literacy and those with chronic conditions. Findings support the potential role of mHealth in improving disease management among certain groups in need; however, greater involvement of health care providers may be important for realizing this potential. © Copyright 2014 by the American Board of Family Medicine.

  5. REDISTRIBUTION OF BASE STATIONS LOAD IN MOBILE COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Igor Ruban

    2017-09-01

    Full Text Available The subject matter of the article is the processes of load distribution in mobile communication networks. The object of research is the handover. The goal is to develop a method for redistributing the load between neighboring areas for mobile nodes. The considered base stations are supposed to have the signal-to-noise ratios that are equal or close. The methods that are used: methods of system analysis, methods of digital signal processing. The following results are obtained. The method that allows mobile nodes, whose signal-to-noise ratios are equal or close, to switch to a less loaded base station. This method allows the base station to launch the handover process enabling more even distribution of the load from mobile nodes among neighboring base stations in wireless and mobile networks. In the suggested modification of the method, the function assessing the bandwidth of the uplink channel is added to the base stations, as well a threshold value for using its bandwidth. Thus, when the current value of bandwidth reaches the threshold, the base station starts sending out a message to all mobile nodes and verifies free neighboring areas for switching over mobile nodes. If there are adjacent areas with a lower load, the base station notifies all potential candidates about the necessity of their switching over. The handover process is launched when the available bandwidth of the base station decreases below a certain threshold. Therefore, it is possible to optimize the operation of the WiMAX network with respect to the criterion of the total bandwidth capacity of the base stations. Besides, the results of the comparative analysis of the handover process in networks based on the WiMAX technology that are obtained using the OpNet simulation environment are presented. Conclusions.The suggested approach can be used to improve the basic software of mobile communication networks. When moving a node from one area to another one in access servers, the

  6. Modeling the propagation of mobile malware on complex networks

    Science.gov (United States)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  7. Goodput Analysis of 3G wireless networks supporting m-health services

    NARCIS (Netherlands)

    Bults, Richard G.A.; Wac, K.E.; van Halteren, Aart; Nicola, V.F.; Konstantas, D.; Matijasevic, M.

    2005-01-01

    The introduction of third generation (3G) public wireless network infrastructures, such as the Universal Mobile Telecommunications System (UMTS), enable the development of innovative mobile services. For example, deploying m-health services which embed tele-monitoring and tele-treatment services

  8. Advanced wireless mobile collaborative sensing network for tactical and strategic missions

    Science.gov (United States)

    Xu, Hao

    2017-05-01

    In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.

  9. Assessment of the energy efficiency enhancement of future mobile networks

    NARCIS (Netherlands)

    Litjens, R.; Toh, Y.; Zhang, H.; Blume, O.

    2014-01-01

    We assess the energy efficiency of mobile networks in 2020, and compare it with a 2010 baseline. A comprehensive assessment approach is taken, considering all relevant scenario aspects such as data traffic growth, hardware evolutions, mobile network deployments and operations including network

  10. Complex human mobility dynamics on a network

    International Nuclear Information System (INIS)

    Szell, M.

    2010-01-01

    Massive multiplayer online games provide a fascinating new way of observing hundreds of thousands of simultaneously interacting individuals engaged in virtual socio-economic activities. We have compiled a data set consisting of practically all actions of all players over a period of four years from an online game played by over 350,000 people. The universe of this online world is a lattice-like network on which players move in order to interact with other players. We focus on the mobility of human players on this network over a time-period of 500 days. We take a number of mobility measurements and compare them with measures of simulated random walkers on the same topology. Mobility of players is sub-diffusive - the mean squared displacement follows a power law with exponent 0.4 - and significantly deviates from mobility patterns of random walkers. Mean first passage times and transition counts relate via a power-law with slope -1/3. We compare our results with studies where human mobility was measured via mobile phone data and find striking similarities. (author)

  11. Fundamentals of 5G mobile networks

    CERN Document Server

    Rodriguez, Jonathan

    2015-01-01

    Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks,  discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development.  The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organ

  12. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  13. Legacy of Polio—Use of India’s Social Mobilization Network for Strengthening of the Universal Immunization Program in India

    Science.gov (United States)

    Deutsch, Nicole; Singh, Vivek; Curtis, Rod; Siddique, Anisur Rahman

    2017-01-01

    Abstract The Social Mobilization Network (SMNet) has been lauded as one of the most successsful community engagement strategies in public health for its role in polio elimination in India. The UNICEF-managed SMNet was created as a strategy to eradicate polio by engaging >7000 frontline social mobilizers to advocate for vaccination in some of the most underserved, marginalized, and at-risk communities in India. This network focused initially on generating demand for polio vaccination but later expanded its messaging to promote routine immunization and other health and sanitation interventions related to maternal and children’s health. As an impact of the network’s interventions, in collaboration with other eradication efforts, these high-risk pockets witnessed an increase in full routine immunization coverage. The experience of the SMNet offers lessons for health-system strengthening for social mobilization and promoting positive health behaviors for other priority health programs like the Universal Immunization Program. PMID:28838190

  14. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  15. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2013-01-01

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  16. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  17. MOBILE-izing Adolescent Sexual and Reproductive Health Care: A Pilot Study Using a Mobile Health Unit in Chicago.

    Science.gov (United States)

    Stefansson, Lilja S; Webb, M Elizabeth; Hebert, Luciana E; Masinter, Lisa; Gilliam, Melissa L

    2018-03-01

    Adolescents experience numerous barriers to obtaining sexual and reproductive health care (SRHC). Mobile Health Units (MHUs) can remove some barriers by traveling to the community. This pilot study developed Mobile SRHC through an iterative process on an existing MHU and evaluated it among adolescents and providers. Mobile SRHC was developed through a mixed-method, multiphase study. Three key informant interviews with MHU providers, an adolescent needs assessment survey, and a Youth Model Development Session informed model development. Emergency contraception (EC), oral contraceptive pills (OCPs), and depot-medroxyprogesterone acetate (DMPA) were sequentially incorporated into MHU services. Administrative data assessed method distribution and surveys assessed patient satisfaction. Key informants held positive attitudes toward implementing Mobile SRHC into their practice. Needs assessment surveys (N = 103) indicated a majority was interested in learning about sexual health (66.0%) and obtaining birth control (54.4%) on an MHU. Over 3 months, 123 adolescents participated in Mobile SRHC. Seven packs and 9 prescriptions of EC, 8 3-month packs and 10 prescriptions of OCPs, and 5 injections and 5 prescriptions of DMPA were distributed. Ninety-two percent of adolescent participants reported they would recommend Mobile SRHC to friends. Mobile SRHC is a feasible approach for reproductive health care among adolescents. © 2018, American School Health Association.

  18. Increasing cellular coverage within integrated terrestrial/satellite mobile networks

    Science.gov (United States)

    Castro, Jonathan P.

    1995-01-01

    When applying the hierarchical cellular concept, the satellite acts as giant umbrella cell covering a region with some terrestrial cells. If a mobile terminal traversing the region arrives to the border-line or limits of a regular cellular ground service, network transition occurs and the satellite system continues the mobile coverage. To adequately assess the boundaries of service of a mobile satellite system an a cellular network within an integrated environment, this paper provides an optimized scheme to predict when a network transition may be necessary. Under the assumption of a classified propagation phenomenon and Lognormal shadowing, the study applies an analytical approach to estimate the location of a mobile terminal based on a reception of the signal strength emitted by a base station.

  19. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  20. Body sensor networks for Mobile Health Monitoring: Experience in Europe and Australia

    NARCIS (Netherlands)

    Jones, Valerie M.; Gay, Valerie; Leijdekkers, Peter

    2009-01-01

    Remote ambulatory monitoring is widely seen as playing a key part in addressing the impending crisis in health care provision. We describe two mobile health solutions, one developed in the Netherlands and one in Australia. In both cases a patient’s biosignals are measured by means of a body sensor

  1. An Efficient Patch Dissemination Strategy for Mobile Networks

    OpenAIRE

    Zhao, Dawei; Peng, Haipeng; Li, Lixiang; Yang, Yixian; Li, Shudong

    2013-01-01

    Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they enable us to access a large variety of ubiquitous services. Mobile networks, formed by the connection of mobile devices following some relationships among mobile users, provide good platforms for mobile virus spread. Quick and efficient security patch dissemination strategy is necessary for the update of antivirus software so that it can detect mobile virus, especially the new vir...

  2. Role of Social Mobilization (Network) in Polio Eradication in India.

    Science.gov (United States)

    Siddique, Anisur Rahman; Singh, Prem; Trivedi, Geetali

    2016-08-07

    In 2009, India contributed to over half the global cases of poliomyelitis. Many believed that India would be the last country to be polio free. India proved them wrong and was certified polio free in 2014. In January 2016, India celebrated 5 years of being polio free. One of the major reasons behind the interruption of polio transmission in the Polio endemic states of Uttar Pradesh and Bihar was the deployment of Social Mobilization Network (SMNet). A three tiered structure, the 7300 strong SMNet is now the gold standard in public health communication. It mobilizes communities by spearheading civil society participation; and works at district, block and community levels. The SMNet's social mobilization has evolved into an accelerated approach for achieving results with principles of mobilization at its core. The SMNet targets resistance to polio immunization through a multipronged approach by using local religious leaders, community influencers, interpersonal communication, counseling, mothers meetings, announcements from religious institutions and rallies. The success of the SMNet has been its ability to identify and convert resistant families into advocates for polio immunization. Deeply respected in the community, the SMNet mobilizers (98 percent of whom are women) are themselves models for gender empowerment. The SMNet model shows how mobilization techniques can be harnessed for short term and long term goals and can be replicated in other health programs to achieve the same results as were achieved for Polio.

  3. Pinning synchronization of a mobile agent network

    International Nuclear Information System (INIS)

    Wang, Lei; Sun, You-xian

    2009-01-01

    We investigate the problem of controlling a group of mobile agents in a plane in order to move them towards a desired orbit via pinning control, in which each agent is associated with a chaotic oscillator coupled with those of neighboring agents, and the pinning strategy is to have the common linear feedback acting on a small fraction of agents by random selection. We explore the effects of the pinning probability, feedback gains and agent density in the pinning synchronization of a mobile agent network under a fast-switching constraint, and perform numerical simulations for validation. In particular, we show that there exists a critical pinning density for network synchronization with an unbounded region: above the threshold, the dynamical network can be controlled by pinning; below it, anarchy prevails. And for the network with a single bounded synchronization region, pinning control has little effect as regards enhancing network synchronizability

  4. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  5. Mobile health a technology road map

    CERN Document Server

    2015-01-01

    This book offers a comprehensive report on the technological aspects of Mobile Health (mHealth) and discusses the main challenges and future directions in the field. It is divided into eight parts:  (1) preventive and curative medicine;  (2) remote health monitoring; (3) interoperability; (4) framework, architecture, and software/hardware systems;  (5) cloud applications; (6) radio technologies and applications; (7) communication networks and systems; and (8) security and privacy mechanisms. The first two parts cover sensor-based and bedside systems for remotely monitoring patients’ health condition, which aim at preventing the development of health problems and managing the prognosis of acute and chronic diseases. The related chapters discuss how new sensing and wireless technologies can offer accurate and cost-effective means for monitoring and evaluating behavior of individuals with dementia and psychiatric disorders, such as wandering behavior and sleep impairments. The following two parts focus on a...

  6. Software agent constrained mobility for network performance monitoring

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.

    2000-01-01

    During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management applications. Also, a lot of research work is currently being carried out trying to provide an assessment of mobile agent

  7. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  8. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  9. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  10. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    Science.gov (United States)

    Bush, Stephen F.

    1999-05-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters.

  11. Mobile health data collection at primary health care in Ethiopia: a feasible challenge.

    Science.gov (United States)

    Medhanyie, Araya Abrha; Moser, Albine; Spigt, Mark; Yebyo, Henock; Little, Alex; Dinant, GeertJan; Blanco, Roman

    2015-01-01

    Feasibility assessment of mobile health (mHealth) data collection at primary health care in Ethiopia. A total of 14 health workers were recruited from 12 primary health care facilities to use smartphones, installed with customized data collection application and electronic maternal health care forms for assessing pregnant women's health for 6 months. Qualitative approaches comprising in-depth interviews and field notes were used to document the users' perception and experience in using the application and forms. All health workers had never had previous exposure to smartphones and electronic forms, but they got used to them easily. Over 6 months, all health workers completed a total of 952 patient records using the forms on smartphones. Health workers' acceptability and demand for the application and forms were high. In introducing the application, nontechnical challenges were more difficult to solve than technical challenges. Introducing an mHealth application at primary health care for routine collection of health data relevant to maternal health at a small scale was feasible. Nonetheless, implementing a system of assigning unique and consistent patient identifier, standardization of health services, and improving mobile network coverage would be prerequisites for scaled-up usage of such an application. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  13. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    testing the methods with data from real mobile communications networks. Keywords: Call .... System. Monitoring. Database. Database. Fig. 3: Mobile communication detection tools ..... receiver operating characteristic curve (ROC). ROC is a ...

  14. [Mobile Health Units: An Analysis of Concepts and Implementation Requirements in Rural Regions.

    Science.gov (United States)

    Hämel, K; Kutzner, J; Vorderwülbecke, J

    2017-12-01

    Access to health services in rural regions represents a challenge. The development of care models that respond to health service shortages and pay particular attention to the increasing health care needs of the elderly is an important concern. A model that has been implemented in other countries is that of mobile health units. But until now, there is no overview of their possible objectives, functions and implementation requirements. This paper is based on a literature analysis and an internet research on mobile health units in rural regions. Mobile health units aim to avoid regional undersupply and address particularly vulnerable population groups. In the literature, mobile health units are described with a focus on specific illnesses, as well as those that provide comprehensive, partly multi-professional primary care that is close to patients' homes. The implementation of mobile health units is demanding; the key challenges are (a) alignment to the needs of the regional population, (b) user-oriented access and promotion of awareness and acceptance of mobile health units by the local population, and (c) network building within existing care structures to ensure continuity of care for patients. To fulfill these requirements, a community-oriented program development and implementation is important. Mobile health units could represent an interesting model for the provision of health care in rural regions in Germany. International experiences are an important starting point and should be taken into account for the further development of models in Germany. © Georg Thieme Verlag KG Stuttgart · New York.

  15. A Mobile Satellite Experiment (MSAT-X) network definition

    Science.gov (United States)

    Wang, Charles C.; Yan, Tsun-Yee

    1990-01-01

    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.

  16. Benefits of Self-Organizing Networks (SON for Mobile Operators

    Directory of Open Access Journals (Sweden)

    Olav Østerbø

    2012-01-01

    Full Text Available Self-Organizing Networks (SON is a collection of functions for automatic configuration, optimization, diagnostisation and healing of cellular networks. It is considered to be a necessity in future mobile networks and operations due to the increased cost pressure. The main drivers are essentially to reduce CAPEX and OPEX, which would otherwise increase dramatically due to increased number of network parameters that has to be monitored and set, the rapidly increasing numbers of base stations in the network and parallel operation of 2G, 3G and Evolved Packet Core (EPC infrastructures. This paper presents evaluations on the use of some of the most important SON components. Mobile networks are getting more complex to configure, optimize and maintain. Many SON functions will give cost savings and performance benefits from the very beginning of a network deployment and these should be prioritized now. But even if many functions are already available and can give large benefits, the field is still in its infancy and more advanced functions are either not yet implemented or have immature implementations. It is therefore necessary to have a strategy for how and when different SON functions should be introduced in mobile networks.

  17. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  18. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    Results are reported for basic research in mobile wireless communication networks for tactical applications including investigations of new methods for error-control coding and decoding, modulation...

  19. Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard; Lee, Charles; Walker, Edward; Osenfort, John; Stone, Thom

    2007-01-01

    A paper discusses the continuing work of the Mobile Exploration System Project, which has been performing studies toward the design of hybrid communication networks for future exploratory missions to remote planets. A typical network could include stationary radio transceivers on a remote planet, mobile radio transceivers carried by humans and robots on the planet, terrestrial units connected via the Internet to an interplanetary communication system, and radio relay transceivers aboard spacecraft in orbit about the planet. Prior studies have included tests on prototypes of these networks deployed in Arctic and desert regions chosen to approximate environmental conditions on Mars. Starting from the findings of the prior studies, the paper discusses methods of analysis, design, and testing of the hybrid communication networks. It identifies key radio-frequency (RF) and network engineering issues. Notable among these issues is the study of wireless LAN throughput loss due to repeater use, RF signal strength, and network latency variations. Another major issue is that of using RF-link analysis to ensure adequate link margin in the face of statistical variations in signal strengths.

  20. Some Mobile Phone Associated Health Problems Among Mobile ...

    African Journals Online (AJOL)

    Background: Although mobile telecommunications deliver enormous benefit to society, there are concerns whether its electric and magnetic field emissions are linked with cancer or other health hazards. Objectives: 1) determining some of the mobile phone(Mph) associated health problems. 2) identifying some of the risk ...

  1. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  2. Housing mobility and adolescent mental health: The role of substance use, social networks, and family mental health in the Moving to Opportunity Study.

    Science.gov (United States)

    Schmidt, Nicole M; Glymour, M Maria; Osypuk, Theresa L

    2017-12-01

    The Moving to Opportunity (MTO) experiment was a housing mobility program begun in the mid-nineties that relocated volunteer low income families from public housing to rental units in higher opportunity neighborhoods in 5 US cities, using the Section 8 affordable housing voucher program. Compared to the control group who stayed behind in public housing, the MTO voucher group exhibited a harmful main effect for boys' mental health, and a beneficial main effect for girls' mental health. But no studies have examined how this social experiment caused these puzzling, opposite gender effects. The present study tests potential mediating mechanisms of the MTO voucher experiment on adolescent mental health (n=2829, aged 12-19 in 2001-2002). Using Inverse Odds Ratio Weighting causal mediation, we tested whether adolescent substance use comorbidity, social networks, or family mental health acted as potential mediators. Our results document that comorbid substance use (e.g. past 30 day alcohol use, cigarette use, and number of substances used) significantly partially mediated the effect of MTO on boys' behavior problems, resulting in -13% to -18% percent change in the total effect. The social connectedness domain was a marginally significant mediator for boys' psychological distress. Yet no tested variables mediated MTO's beneficial effects on girls' psychological distress. Confounding sensitivity analyses suggest that the indirect effect of substance use for mediating boys' behavior problems was robust, but social connectedness for mediating boys' psychological distress was not robust. Understanding how housing mobility policies achieve their effects may inform etiology of neighborhoods as upstream causes of health, and inform enhancement of future affordable housing programs.

  3. Envisioning Networked Urban Mobilities : Art, Performances, Impacts

    NARCIS (Netherlands)

    Kjaerulf, Aslak Aamot; Kesselring, Sven; Peters, Peter; Hannam, Kevin

    2017-01-01

    Envisioning Networked Urban Mobilities brings together scientific reflections on the relations of art and urban mobilities and artistic research on the topic. The editors open the book by setting out the concept grounded in the exhibition curated by Aslak Aamot Kjærulff and refers to earlier work on

  4. Context-Aware Community Construction in Proximity-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Na Yu

    2015-01-01

    Full Text Available Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.

  5. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  6. Modeling the Propagation of Mobile Phone Virus under Complex Network

    Science.gov (United States)

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209

  7. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    , an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. Thus by focusing on the complex relationship between material and virtual technologies within the sphere of mobility it is shown that we need to move beyond dichotomies of; global or local, nomad...... or sedentary, digital or material. The paper investigates the meaning of mobility and the potential in mediation and technologies to enhance the experiences and interaction in relation to urban transit spaces. In understanding the importance of mediation, global-local interactions, networks....... By studying embedded technologies and ‘ambient environments' we increase our knowledge about the over layering of the material environment with digital technologies. The presences of GPS, mediated surfaces, mobile agents (robots), RFID and other technologies that all relate to contemporary mobility practices...

  8. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  9. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  10. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  11. Mobile network architecture of the long-range WindScanner system

    OpenAIRE

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per; Jensen, Henrik M.

    2016-01-01

    In this report we have presented the network architecture of the long-range WindScanner system that allows utilization of mobile network connections without the use of static public IP addresses. The architecture mitigates the issues of additional fees and contractual obligations that are linked to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki...

  12. Smartloss: A Personalized Mobile Health Intervention for Weight Management and Health Promotion.

    Science.gov (United States)

    Martin, Corby K; Gilmore, L Anne; Apolzan, John W; Myers, Candice A; Thomas, Diana M; Redman, Leanne M

    2016-03-16

    Synonymous with increased use of mobile phones has been the development of mobile health (mHealth) technology for improving health, including weight management. Behavior change theory (eg, the theory of planned behavior) can be effectively encapsulated into mobile phone-based health improvement programs, which is fostered by the ability of mobile phones and related devices to collect and transmit objective data in near real time and for health care or research professionals and clients to communicate easily. To describe SmartLoss, a semiautomated mHealth platform for weight loss. We developed and validated a dynamic energy balance model that determines the amount of weight an individual will lose over time if they are adherent to an energy intake prescription. This model was incorporated into computer code that enables adherence to a prescribed caloric prescription determined from the change in body weight of the individual. Data from the individual are then used to guide personalized recommendations regarding weight loss and behavior change via a semiautomated mHealth platform called SmartLoss, which consists of 2 elements: (1) a clinician dashboard and (2) a mobile phone app. SmartLoss includes and interfaces with a network-connected bathroom scale and a Bluetooth-connected accelerometer, which enables automated collection of client information (eg, body weight change and physical activity patterns), as well as the systematic delivery of preplanned health materials and automated feedback that is based on client data and is designed to foster prolonged adherence with body weight, diet, and exercise goals. The clinician dashboard allows for efficient remote monitoring of all clients simultaneously, which may further increase adherence, personalization of treatment, treatment fidelity, and efficacy. Evidence of the efficacy of the SmartLoss approach has been reported previously. The present report provides a thorough description of the SmartLoss Virtual Weight

  13. [Progress in research of mobile health intervention].

    Science.gov (United States)

    Huang, Z; Ning, P S; Cheng, P X; Hu, G Q

    2016-10-10

    With the rapid development of mobile communication technology and the growing popularity of smartphones worldwide, mobile health has become an extension of e-Health and Tele-Health, and is of value in the research and practice of public health. In this paper, we systematically assessed research literature of mobile health' s application on disease prevention and control as well as health promotion. Based on the characteristics of current literature, this paper focused on the application of mobile health in maternal health promotion, chronic disease management, and communicable disease prevention and control to provide reference for the mobile health intervention research in China.

  14. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  15. Decentralized coverage control problems for mobile robotic sensor and actuator networks

    CERN Document Server

    Savkin, A; Xi, Z; Javed, F; Matveev, A; Nguyen, H

    2015-01-01

    This book introduces various coverage control problems for mobile sensor networks including barrier, sweep and blanket. Unlike many existing algorithms, all of the robotic sensor and actuator motion algorithms developed in the book are fully decentralized or distributed, computationally efficient, easily implementable in engineering practice and based only on information on the closest neighbours of each mobile sensor and actuator and local information about the environment. Moreover, the mobile robotic sensors have no prior information about the environment in which they operation. These various types of coverage problems have never been covered before by a single book in a systematic way. Another topic of this book is the study of mobile robotic sensor and actuator networks. Many modern engineering applications include the use of sensor and actuator networks to provide efficient and effective monitoring and control of industrial and environmental processes. Such mobile sensor and actuator networks are abl...

  16. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  17. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  18. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  19. Meeting fronthaul challenges of future mobile network deployments — The HARP approach

    DEFF Research Database (Denmark)

    Dittmann, Lars; Christiansen, Henrik Lehrmann; Checko, Aleksandra

    2014-01-01

    In future mobile networks aggregation at different levels is necessary but at the same time imposes challenges that mandate looking into new architectures. This paper presents the design consideration approach for a C-RAN based mobile aggregation network used in the EU HARP project....... With this architecture fronthaul aggregation is performed which might be an option for future generation of mobile networks....

  20. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  1. Game-theoretic pricing for video streaming in mobile networks.

    Science.gov (United States)

    Lin, W Sabrina; Liu, K J Ray

    2012-05-01

    Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content to nonsubscribers. Such a redistribution mechanism is a potential competitor for the mobile service provider and is very difficult to trace given users' high mobility. The service provider has to set a reasonable price for the data plan to prevent such unauthorized redistribution behavior to protect or maximize his/her own profit. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the content-redistribution network. We model the behavior between the subscribers and the secondary buyers as a noncooperative game and find the optimal price and quantity for both groups of users. Based on the behavior of users in the redistribution network, we investigate the evolutionarily stable ratio of mobile users who decide to subscribe to the data plan. Such an analysis can help the service provider preserve his/her profit under the threat of the redistribution networks and can improve the quality of service for end users.

  2. Dynamic optical resource allocation for mobile core networks with software defined elastic optical networking.

    Science.gov (United States)

    Zhao, Yongli; Chen, Zhendong; Zhang, Jie; Wang, Xinbo

    2016-07-25

    Driven by the forthcoming of 5G mobile communications, the all-IP architecture of mobile core networks, i.e. evolved packet core (EPC) proposed by 3GPP, has been greatly challenged by the users' demands for higher data rate and more reliable end-to-end connection, as well as operators' demands for low operational cost. These challenges can be potentially met by software defined optical networking (SDON), which enables dynamic resource allocation according to the users' requirement. In this article, a novel network architecture for mobile core network is proposed based on SDON. A software defined network (SDN) controller is designed to realize the coordinated control over different entities in EPC networks. We analyze the requirement of EPC-lightpath (EPCL) in data plane and propose an optical switch load balancing (OSLB) algorithm for resource allocation in optical layer. The procedure of establishment and adjustment of EPCLs is demonstrated on a SDON-based EPC testbed with extended OpenFlow protocol. We also evaluate the OSLB algorithm through simulation in terms of bandwidth blocking ratio, traffic load distribution, and resource utilization ratio compared with link-based load balancing (LLB) and MinHops algorithms.

  3. Radio-location of mobile stations in third generation networks

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-06-01

    Full Text Available Mobile station localization in mobile networks started with simple methods (e.g. Cell-ID method which required only slight modifications of network infrastructures. Principally, it was about network localization by which a localization service became available to all types of mobile phones. Due to low precision, the initiated development of more sophisticated methods has not been finished yet. Among the advanced location-based methods are those based on the measurement of location parameters in the time domain. In this paper the general consideration of radio location methods in 3G (UMTS radio networks is presented. The use of time based measurement methods was analysed in detail. Due to the limited article length, the use of other locating methods in 3G networks (based on power measurements, on radio direction measurement, and on cells identification – Cell ID and global positioning system - GPS are not described. Introduction Mobile station localization within modern cellular networks increases the level of user security and opens wide opportunities for commercial operators who provide this service. The major obstacle for the implementation of this service, which also prevents its practical usage, is the modification of the existing network infrastructure. In general, depending on the infrastructure used, positioning methods can be divided into two groups: integrated and independent. Integrated methods are primarily created for communication networks. A possibility to locate users represents just an additional service within a radio network. Independent methods are totally detached from the communication network in which the user whose location is being determined is. Radio location methods Determining the location of a mobile radio station is performed by determining the intersection of two or more lines of position. These lines represent the position of the set of points at which the mobile station may be located. These lines can be: (a

  4. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  5. MOBILE-izing Adolescent Sexual and Reproductive Health Care: A Pilot Study Using A Mobile Health Unit in Chicago

    Science.gov (United States)

    Stefansson, Lilja S.; Webb, M. Elizabeth; Hebert, Luciana E.; Masinter, Lisa; Gilliam, Melissa L.

    2018-01-01

    Background: Adolescents experience numerous barriers to obtaining sexual and reproductive health care (SRHC). Mobile Health Units (MHUs) can remove some barriers by traveling to the community. This pilot study developed Mobile SRHC through an iterative process on an existing MHU and evaluated it among adolescents and providers. Methods: Mobile…

  6. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  7. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  8. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  9. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  10. A network analytical approach to the study of labour market mobility

    DEFF Research Database (Denmark)

    Toubøl, Jonas; Larsen, Anton Grau; Jensen, Carsten Strøby

    (RR), which enable us to identify clusters of inter-mobile categories. We apply the method to data of the labour market mobility in Denmark 2000-2007 and demonstrate how this new method can overcome some long standing obstacles to the advance of labour market segmentation theory: Instead...... of the typical theory driven definition of the labour market segments, the use of social network analysis enable a data driven definition of the segments based on the direct observation of mobility between job-positions, which reveals a number of new findings.......The aim of this paper is to present a new network analytical method for analysis of social mobility between categories like occupations or industries. The method consists of two core components; the algorithm MONECA (Mobility Network Clustering Algorithm), and the intensity measure of Relative Risk...

  11. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. ... testing the methods with data from real mobile communications networks. Keywords: Call data, fraud ...... Ph. D. thesis. Pur-.

  12. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  13. Cartographic Analysis of Antennas and Towers: A Novel Approach to Improving the Implementation and Data Transmission of mHealth Tools on Mobile Networks.

    Science.gov (United States)

    Brown Iii, William; Ibitoye, Mobolaji; Bakken, Suzanne; Schnall, Rebecca; Balán, Iván; Frasca, Timothy; Carballo-Diéguez, Alex

    2015-06-04

    Most mHealth tools such as short message service (SMS), mobile apps, wireless pill counters, and ingestible wireless monitors use mobile antennas to communicate. Limited signal availability, often due to poor antenna infrastructure, negatively impacts the implementation of mHealth tools and remote data collection. Assessing the antenna infrastructure prior to starting a study can help mitigate this problem. Currently, there are no studies that detail whether and how the antenna infrastructure of a study site or area is assessed. To address this literature gap, we analyze and discuss the use of a cartographic analysis of antennas and towers (CAAT) for mobile communications for geographically assessing mobile antenna and tower infrastructure and identifying signal availability for mobile devices prior to the implementation of an SMS-based mHealth pilot study. An alpha test of the SMS system was performed using 11 site staff. A CAAT for the study area's mobile network was performed after the alpha test and pre-implementation of the pilot study. The pilot study used a convenience sample of 11 high-risk men who have sex with men who were given human immunodeficiency virus test kits for testing nonmonogamous sexual partners before intercourse. Product use and sexual behavior were tracked through SMS. Message frequency analyses were performed on the SMS text messages, and SMS sent/received frequencies of 11 staff and 11 pilot study participants were compared. The CAAT helped us to successfully identify strengths and weaknesses in mobile service capacity within a 3-mile radius from the epicenters of four New York City boroughs. During the alpha test, before CAAT, 1176/1202 (97.84%) text messages were sent to staff, of which 26/1176 (2.21%) failed. After the CAAT, 2934 messages were sent to pilot study participants and none failed. The CAAT effectively illustrated the research area's mobile infrastructure and signal availability, which allowed us to improve study setup and

  14. From mobile mental health to mobile wellbeing: opportunities and challenges.

    Science.gov (United States)

    Gaggioli, Andrea; Riva, Giuseppe

    2013-01-01

    The combination of smart phones, wearable sensor devices and social media offer new ways of monitoring and promoting mental and physical wellbeing. In this contribution, we describe recent developments in the field of mobile healthcare (or mHealth), by focusing in particular on mobile mental health applications. First, we examine the potential benefits associated with this approach, providing examples from existing projects. Next, we identify and explain possible differences in focus between mobile mental health and mobile wellbeing applications. Finally, we discuss some open challenges associated with the implementation of this vision, ranging from the lack of evidence-based validation to privacy, security and ethical concerns.

  15. Composite Social Network for Predicting Mobile Apps Installation

    Science.gov (United States)

    2011-06-02

    Social network tools (such as the Facebook app and the Twitter app) can observe users’ online friendship network . In this work, our key idea is...the friendship network from phones by collecting data from social networking apps such as the Facebook and Twitter apps. We summarize all the networks ...ar X iv :1 10 6. 03 59 v1 [ cs .S I] 2 J un 2 01 1 Composite Social Network for Predicting Mobile Apps Installation Wei Pan

  16. An Intelligent Cooperative Visual Sensor Network for Urban Mobility.

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Moroni, Davide; Pieri, Gabriele; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea; Marino, Francesco

    2017-11-10

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  17. ASH : Tackling node mobility in large-scale networks

    NARCIS (Netherlands)

    Pruteanu, A.; Dulman, S.

    2012-01-01

    With the increased adoption of technologies likewireless sensor networks by real-world applications, dynamic network topologies are becoming the rule rather than the exception. Node mobility, however, introduces a range of problems (communication interference, path uncertainty, low quality of

  18. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  19. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  20. Assessing the implications of cellular network performance on mobile content access

    DEFF Research Database (Denmark)

    Kaup, Fabian; Michelinakis, Foivos; Bui, Nicola

    2016-01-01

    Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service...... of cellular network measurements, focused on analyzing root causes of mobile network performance variability. Measurements conducted on a 4G cellular network in Germany show that management and configuration decisions have a substantial impact on the performance. Specifically, it is observed...

  1. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  2. Epidemic transmission on random mobile network with diverse infection periods

    Science.gov (United States)

    Li, Kezan; Yu, Hong; Zeng, Zhaorong; Ding, Yong; Ma, Zhongjun

    2015-05-01

    The heterogeneity of individual susceptibility and infectivity and time-varying topological structure are two realistic factors when we study epidemics on complex networks. Current research results have shown that the heterogeneity of individual susceptibility and infectivity can increase the epidemic threshold in a random mobile dynamical network with the same infection period. In this paper, we will focus on random mobile dynamical networks with diverse infection periods due to people's different constitutions and external circumstances. Theoretical results indicate that the epidemic threshold of the random mobile network with diverse infection periods is larger than the counterpart with the same infection period. Moreover, the heterogeneity of individual susceptibility and infectivity can play a significant impact on disease transmission. In particular, the homogeneity of individuals will avail to the spreading of epidemics. Numerical examples verify further our theoretical results very well.

  3. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  4. Mobile human network management and recommendation by probabilistic social mining.

    Science.gov (United States)

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  5. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  6. Spatial spreading of infectious disease via local and national mobility networks in South Korea

    Science.gov (United States)

    Kwon, Okyu; Son, Woo-Sik

    2017-12-01

    We study the spread of infectious disease based on local- and national-scale mobility networks. We construct a local mobility network using data on urban bus services to estimate local-scale movement of people. We also construct a national mobility network from orientation-destination data of vehicular traffic between highway tollgates to evaluate national-scale movement of people. A metapopulation model is used to simulate the spread of epidemics. Thus, the number of infected people is simulated using a susceptible-infectious-recovered (SIR) model within the administrative division, and inter-division spread of infected people is determined through local and national mobility networks. In this paper, we consider two scenarios for epidemic spread. In the first, the infectious disease only spreads through local-scale movement of people, that is, the local mobility network. In the second, it spreads via both local and national mobility networks. For the former, the simulation results show infected people sequentially spread to neighboring divisions. Yet for the latter, we observe a faster spreading pattern to distant divisions. Thus, we confirm the national mobility network enhances synchronization among the incidence profiles of all administrative divisions.

  7. Mobility Aids: MedlinePlus Health Topic

    Science.gov (United States)

    ... Mobility Problems (AGS Foundation for Health in Aging) Topic Image MedlinePlus Email Updates Get Mobility Aids updates ... standing and walking Using a cane Related Health Topics Assistive Devices Other Languages Find health information in ...

  8. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  9. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  10. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  11. Networked Mobilities and new sites of mediated interaction

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2008-01-01

    everyday life experiences the movement is much more than a travel from point A to point B. The mobile experiences of the contemporary society are practices that are meaningful and normatively embedded. That is to say, mobility is seen as a cultural phenomenon shaping notions of self and other as well......This paper takes point of departure in an understanding of mobility as an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our...

  12. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  13. Fractal Analysis of Mobile Social Networks

    International Nuclear Information System (INIS)

    Zheng Wei; Pan Qian; Sun Chen; Deng Yu-Fan; Zhao Xiao-Kang; Kang Zhao

    2016-01-01

    Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs. (paper)

  14. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  15. Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Juul, Anders Christian; Christiansen, Henrik Lehrmann

    2015-01-01

    In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now...... transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based...... fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we...

  16. Network design consideration of a satellite-based mobile communications system

    Science.gov (United States)

    Yan, T.-Y.

    1986-01-01

    Technical considerations for the Mobile Satellite Experiment (MSAT-X), the ground segment testbed for the low-cost spectral efficient satellite-based mobile communications technologies being developed for the 1990's, are discussed. The Network Management Center contains a flexible resource sharing algorithm, the Demand Assigned Multiple Access scheme, which partitions the satellite transponder bandwidth among voice, data, and request channels. Satellite use of multiple UHF beams permits frequency reuse. The backhaul communications and the Telemetry, Tracking and Control traffic are provided through a single full-coverage SHF beam. Mobile Terminals communicate with the satellite using UHF. All communications including SHF-SHF between Base Stations and/or Gateways, are routed through the satellite. Because MSAT-X is an experimental network, higher level network protocols (which are service-specific) will be developed only to test the operation of the lowest three levels, the physical, data link, and network layers.

  17. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Science.gov (United States)

    Briscoe, Patricia; Pollock, Katina; Campbell, Carol; Carr-Harris, Shasta

    2015-01-01

    The use of networks in public education is one of many knowledge mobilization (KMb) strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to mobilize knowledge through networks. The purpose of this paper is to explore how networks work. Data were collected from virtual discussions for an…

  18. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  19. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  20. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  1. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea

    2017-01-01

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities. PMID:29125535

  2. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Directory of Open Access Journals (Sweden)

    Giuseppe Riccardo Leone

    2017-11-01

    Full Text Available Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  3. A comparative analysis of the statistical properties of large mobile phone calling networks.

    Science.gov (United States)

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  4. Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    Mobile nodes have been found useful for improving performance of network parameters such as coverage, data latency and load balancing in wireless sensor networks (WSNs). In spite of the benets which mobile nodes could oer when used in WSNs, they have been often stated as infeasible for use...

  5. Mobilizing Drug Consumption Rooms: inter-place networks and harm reduction drug policy.

    Science.gov (United States)

    McCann, Eugene; Temenos, Cristina

    2015-01-01

    This article discusses the learning and politics involved in spreading Drug Consumption Rooms (DCRs) globally. DCRs are health facilities, operating under a harm reduction philosophy, where people consume illicit drugs in a supervised setting. Approximately 90 are located in almost 60 cities in 11 countries. They are intensely local attempts to improve the lives of specific populations and urban neighborhoods. DCRs are also global models that travel. This article examines the relationship between DCRs as facilities that are fixed in place and DCRs as globally-mobilized models of drug policy and public health practice. Drawing on research from seven countries, we apply concepts from the policy mobilities literature to analyze the travels of the DCR model and the political strategies involved in the siting of these public health service facilities. We detail the networked mobilization of the DCR model from Europe to Canada and Australia, the learning among facilities, the strategies used to mold the DCR model to local contexts, and the role of DCR staff in promoting continued proliferation of DCRs. We conclude by identifying some immobilities of DCRs to identify questions about practices, principles and future directions of harm reduction. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Mobile health (mHealth) for mental health in Asia: objectives, strategies, and limitations.

    Science.gov (United States)

    Brian, Rachel M; Ben-Zeev, Dror

    2014-08-01

    Mobile technologies are transforming the way in which we interact with one another, access resources, find information, and conduct business around the world. Harnessing the capabilities of mobile technologies to support health care initiatives worldwide has developed into a new interdisciplinary field called mobile health (mHealth). In the current paper, we review the penetration of mobile technology in Asia, and consider the integration of mobile technologies into the study, diagnoses, and treatment of mental disorders in the region. We outline how mHealth programs could improve mental health literacy, provide greater access to mental health services, extend community-based outreach and engagement, support self-management of illness, and regulate medication distribution. We end with a consideration of the potential barriers and limitations of mHealth for mental health, including funding, language and literacy barriers, power supply considerations, data security, and privacy issues. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  8. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    Science.gov (United States)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  9. Role of Distance-Based Routing in Traffic Dynamics on Mobile Networks

    Science.gov (United States)

    Yang, Han-Xin; Wang, Wen-Xu

    2013-06-01

    Despite of intensive investigations on transportation dynamics taking place on complex networks with fixed structures, a deep understanding of networks consisting of mobile nodes is challenging yet, especially the lacking of insight into the effects of routing strategies on transmission efficiency. We introduce a distance-based routing strategy for networks of mobile agents toward enhancing the network throughput and the transmission efficiency. We study the transportation capacity and delivering time of data packets associated with mobility and communication ability. Interestingly, we find that the transportation capacity is optimized at moderate moving speed, which is quite different from random routing strategy. In addition, both continuous and discontinuous transitions from free flow to congestions are observed. Degree distributions are explored in order to explain the enhancement of network throughput and other observations. Our work is valuable toward understanding complex transportation dynamics and designing effective routing protocols.

  10. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Directory of Open Access Journals (Sweden)

    Patricia Briscoe

    2016-06-01

    Full Text Available The use of networks in public education is one of a number of knowledge mobilization (KMb strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to effectively mobilizing knowledge through external partnership networks. The purpose of this paper is to further explore how networks work. Data was collected from virtual discussions for an interim report for a province-wide government initiative. A secondary analysis of the data was performed. The findings present network structures and processes that partners were engaged in when building a network within education. The implications of this study show that building a network for successful outcomes is complex and metaphorically similar to finding the “sweet spot.” It is challenging but networks that used strategies to align structures and processes proved to achieve more success in mobilizing research to practice.

  11. Mobility support and networking for women in STEM

    Science.gov (United States)

    Avellis, Giovanna; Didenkulova, Ira

    2017-04-01

    Mobility support for women in STEM (Science, Technology, Engineering and Mathematics) career is an increasingly important issue in today's world. Cutting edge research tends to be undertaken via international collaboration, often within networks built up by moving to a new country. In addition, many of today's funding opportunities are geared towards international cooperation. There have been quite a few debates and several projects based on extended surveys to understand the role and impact of mobility on a scientific career. Although in general it is true that these issues are sensitive to the country and the scientific field for example, it is believed by the scientific community at least, that there is a connection between mobility and scientific excellence. Rewarding mobility is becoming a concern at the European level because mechanisms to measure in the best and objective way possible scientific excellence are not homogeneous. But still mobility is a key issue to strengthen a researcher's scientific curriculum and be recognised at the international level. Women have been widely recognised as a source of untapped potential. Different steps have been taken so far for a deeper understanding of barriers and different obstacles faced by women in the Science field. Present calls in the Science in Society panel in HORIZON 2020 deal with the horizontal and vertical segregation experienced by women in their careers and best practices to manage these issues. The general aim is to foster women participation in all scientific fields with particular regard to male dominated disciplines as STEM and increase the number and the effective representation of women in decision-making positions, to help also speed up the whole process. Mobility has demonstrated to be partly gender sensitive and this needs to be addressed in some way in order to ensure at least equal opportunities to male and female scientists regarding possibilities and benefits offered by mobility programmes

  12. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  13. Acceptance of Health Information Technologies, Acceptance of Mobile Health: A Review Article.

    Science.gov (United States)

    Garavand, A; Samadbeik, M; Kafashi, M; Abhari, Sh

    2017-12-01

    Mobile health is one of the new technologies for the utilization of health information. For its successful implementation as well as any other system, we must primarily measure the adoption and use of its factors. The purpose of this study was to systematically investigate published articles about the factors affecting the adoption of mobile health and categorizing the factors affecting the adoption of this system. This study is a comprehensive review done by searching major databases such as Google Scholar, Emerald, Science Direct, Iran Medex, SID, Magiran, Pub med, etc. In addition, we use Mobile, mobile Health + adoption, mobile Health + TAM, Health + TAM keywords in the range of 2004 to 2015. Among the studies that use information technology theories to survey the factors affecting the adoption of mobile health, TAM model was used more than other models. Factors such as perceived ease of use, perceived usefulness and facilitating condition form TUATU are the most effective in the adoption of mobile health. Results showed that by considering factors such as perceived ease of use, perceived usefulness and facilitating condition can increase the adoption of mobile health system. Consequently, these factors are recommended to be considered in planning to run systems.

  14. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  15. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

    OpenAIRE

    Wang, Shuo; Zhang, Xing; Zhang, Yan; Wang, Lin; Yang, Juwo; Wang, Wenbo

    2017-01-01

    As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures which bring network functions and contents to the network edge are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at th...

  16. One Health in social networks and social media.

    Science.gov (United States)

    Mekaru, S R; Brownstein, J S

    2014-08-01

    In the rapidly evolving world of social media, social networks, mobile applications and citizen science, online communities can develop organically and separately from larger or more established organisations. The One Health online community is experiencing expansion from both the bottom up and the top down. In this paper, the authors review social media's strengths and weaknesses, earlier work examining Internet resources for One Health, the current state of One Health in social media (e.g. Facebook, Twitter, YouTube) and online social networking sites (e.g. LinkedIn and ResearchGate), as well as social media in One Health-related citizen science projects. While One Health has a fairly strong presence on websites, its social media presence is more limited and has an uneven geographic distribution. In work following the Stone Mountain Meeting,the One Health Global Network Task Force Report recommended the creation of an online community of practice. Professional social networks as well as the strategic use of social media should be employed in this effort. Finally, One Health-related research projects using volunteers (citizen science) often use social media to enhance their recruitment. Including these researchers in a community of practitioners would take full advantage of their existing social media presence. In conclusion, the interactive nature of social media, combined with increasing global Internet access, provides the One Health community with opportunities to meaningfully expand their community and promote their message.

  17. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  18. Cloud computing for enhanced mobile health applications

    CSIR Research Space (South Africa)

    Nkosi, MT

    2010-11-01

    Full Text Available Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations...

  19. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  20. Who's calling? Social networks and mobile phone use among motorcyclists.

    Science.gov (United States)

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  2. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  3. Improving the security of the Hwang-Su protocol for mobile networks ...

    African Journals Online (AJOL)

    The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by weak security, especially at the level of authentication. Hwang and Su have ...

  4. Cloud RAN for Mobile Networks - a Technology Overview

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU...

  5. Efficient priority queueing routing strategy on networks of mobile agents

    Science.gov (United States)

    Wu, Gan-Hua; Yang, Hui-Jie; Pan, Jia-Hui

    2018-03-01

    As a consequence of their practical implications for communications networks, traffic dynamics on complex networks have recently captivated researchers. Previous routing strategies for improving transport efficiency have paid little attention to the orders in which the packets should be forwarded, just simply used first-in-first-out queue discipline. Here, we apply a priority queuing discipline and propose a shortest-distance-first routing strategy on networks of mobile agents. Numerical experiments reveal that the proposed scheme remarkably improves both the network throughput and the packet arrival rate and reduces both the average traveling time and the rate of waiting time to traveling time. Moreover, we find that the network capacity increases with an increase in both the communication radius and the number of agents. Our work may be helpful for the design of routing strategies on networks of mobile agents.

  6. Performance Evaluation Of Mobile Cellular Networks In Nigeria

    OpenAIRE

    Shoewu, O.O

    2018-01-01

    The aim of this paper is to evaluate the performance of mobile networks such as MTN, GLO, and ETISALAT in Nigeria and suggest ways the performance of digital cellular networks can improve to minimize some of its present short comings or limitations. This paper discusses the performance improvement of digital cellular networks. A non- CDMA cellular network is use in an overall wireless environment for the purpose of this paper. This paper also discusses the performance assessment of three mobi...

  7. The regulation of mobile health applications

    Directory of Open Access Journals (Sweden)

    Barton Amy J

    2012-05-01

    Full Text Available Abstract In July 2011, the United States Food and Drug Administration issued draft guidance concerning the regulation of mobile medical applications (applications on a wireless device that are used as accessories to medical devices or to convert a mobile platform to a medical device. While the suggestion of regulation is rooted in patient safety, concerns about limits on innovation and discovery as well as the evolving nature of both mobile health and current healthcare delivery have emerged. This article discusses the prevalence of mobile health, the context of regulation concerning mobile medical applications, and implications for the future.

  8. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  9. Resource Optimization of Mobile Intelligent System with heart MPLS network

    Directory of Open Access Journals (Sweden)

    Mohammed Elkoutbi

    2009-10-01

    Full Text Available In this paper, we introduce the original Mobile Intelligent System (MIS in embeded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.

  10. Mobile health clinics in the era of reform.

    Science.gov (United States)

    Hill, Caterina F; Powers, Brian W; Jain, Sachin H; Bennet, Jennifer; Vavasis, Anthony; Oriol, Nancy E

    2014-03-01

    Despite the role of mobile clinics in delivering care to the full spectrum of at-risk populations, the collective impact of mobile clinics has never been assessed. This study characterizes the scope of the mobile clinic sector and its impact on access, costs, and quality. It explores the role of mobile clinics in the era of delivery reform and expanded insurance coverage. A synthesis of observational data collected through Mobile Health Map and published literature related to mobile clinics. Analysis of data from the Mobile Health Map Project, an online platform that aggregates data on mobile health clinics in the United States, supplemented by a comprehensive literature review. Mobile clinics represent an integral component of the healthcare system that serves vulnerable populations and promotes high-quality care at low cost. There are an estimated 1500 mobile clinics receiving 5 million visits nationwide per year. Mobile clinics improve access for vulnerable populations, bolster prevention and chronic disease management, and reduce costs. Expanded coverage and delivery reform increase opportunities for mobile clinics to partner with hospitals, health systems, and insurers to improve care and lower costs. Mobile clinics have a critical role to play in providing high-quality, low-cost care to vulnerable populations. The postreform environment, with increasing accountability for population health management and expanded access among historically underserved populations, should strengthen the ability for mobile clinics to partner with hospitals, health systems, and payers to improve care and lower costs.

  11. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  12. Performance Analysis of SINEMO: Seamless IP-diversity Based Network Mobility

    National Research Council Canada - National Science Library

    Chowdhury, Pulak K; Reaz, Abu S; Atiquzzaman, Mohammed; Ivancic, William

    2007-01-01

    ...) to support network mobility. NEMO BSP inherits all the drawbacks of Mobile IPv6, such as inefficient routing path, single point of failure, high handover latency and packet loss, and high packet overhead...

  13. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  14. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  15. Mobility and power in networked European space

    DEFF Research Database (Denmark)

    Richardson, Tim; Jensen, Ole B.

    This paper seeks to contribute to debates about how urban, social and critical theory can conceptualise the socio-technologies of connection, resilience, mobility, and collapse in contemporary urban space. The paper offers a theoretical frame for conceptualising this New Urban Condition, focusing...... on themes of mobility, power, flow, network and scale. The analysis suggests the importance of close atention to the knowledge claims which are deployed in multi-level struggles to assert smooth futures in face of dysfunction....

  16. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  17. Validation of Bosch' Mobile Communication NetworkArchitecture with SPIN

    NARCIS (Netherlands)

    Ruys, T.C.; Langerak, Romanus

    This paper discusses validation projects carried out for the Mobile Communication Division of Robert Bosch GmbH. We verified parts of their Mobile Communication Network (MCNet), a communication system which is to be used in infotainment systems of future cars. The protocols of the MCNet have been

  18. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  19. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  20. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  1. Mental Health Mobile Apps: From Infusion to Diffusion in the Mental Health Social System

    OpenAIRE

    East, Marlene Lynette; Havard, Byron C

    2015-01-01

    The roles of mental health educators and professionals in the diffusion of mental health mobile apps are addressed in this viewpoint article. Mental health mobile apps are emerging technologies that fit under the broad heading of mobile health (mHealth). mHealth, encompassed within electronic health (eHealth), reflects the use of mobile devices for the practice of public health. Well-designed mental health mobile apps that present content in interactive, engaging, and stimulating ways can pro...

  2. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  3. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  4. Strategies for a better performance of RPL under mobility in wireless sensor networks

    Science.gov (United States)

    Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.

    2017-09-01

    A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.

  5. Health Participatory Sensing Networks

    Directory of Open Access Journals (Sweden)

    Andrew Clarke

    2014-01-01

    Full Text Available The use of participatory sensing in relation to the capture of health-related data is rapidly becoming a possibility due to the widespread consumer adoption of emerging mobile computing technologies and sensing platforms. This has the potential to revolutionize data collection for population health, aspects of epidemiology, and health-related e-Science applications and as we will describe, provide new public health intervention capabilities, with the classifications and capabilities of such participatory sensing platforms only just beginning to be explored. Such a development will have important benefits for access to near real-time, large-scale, up to population-scale data collection. However, there are also numerous issues to be addressed first: provision of stringent anonymity and privacy within these methodologies, user interface issues, and the related issue of how to incentivize participants and address barriers/concerns over participation. To provide a step towards describing these aspects, in this paper we present a first classification of health participatory sensing models, a novel contribution to the literature, and provide a conceptual reference architecture for health participatory sensing networks (HPSNs and user interaction example case study.

  6. Energy Efficient Evolution of Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben

    2011-01-01

    options for how to evolve their networks, allowing them to carry the expected increase in traffic. The best solution is generally selected based on two main criteria, performance and cost. However, pushed by a variety of environmental and energy challenges, MNOs are now also showing interest...... in understanding the impact that different options can have on the energy consumption of their networks. This paper investigates the possible energy gains of evolving a mobile network through a joint pico deployment and macro upgrade solution over a period of 8 years. Besides the network energy consumption, energy...... efficiency in Mbps/kWh is also analyzed. Furthermore, a cost analysis is carried out, to give a more complete picture of the different options being considered. Focusing on the last year of the evolution analysis, results show that deploying more pico sites reduces the energy consumption of the network...

  7. Mental Health Mobile Apps: From Infusion to Diffusion in the Mental Health Social System.

    Science.gov (United States)

    East, Marlene Lynette; Havard, Byron C

    2015-01-01

    The roles of mental health educators and professionals in the diffusion of mental health mobile apps are addressed in this viewpoint article. Mental health mobile apps are emerging technologies that fit under the broad heading of mobile health (mHealth). mHealth, encompassed within electronic health (eHealth), reflects the use of mobile devices for the practice of public health. Well-designed mental health mobile apps that present content in interactive, engaging, and stimulating ways can promote cognitive learning, personal growth, and mental health enhancement. As key influencers in the mental health social system, counselor educators and professional associations may either help or hinder diffusion of beneficial mHealth technologies. As mental health mobile apps move towards ubiquity, research will continue to be conducted. The studies published thus far, combined with the potential of mental health mobile apps for learning and personal growth, offer enough evidence to compel mental health professionals to infuse these technologies into education and practice. Counselor educators and professional associations must use their influential leadership roles to train students and practitioners in how to research, evaluate, and integrate mental health mobile apps into practice. The objectives of this article are to (1) increase awareness of mHealth and mental health mobile apps, (2) demonstrate the potential for continued growth in mental health mobile apps based on technology use and acceptance theory, mHealth organizational initiatives, and evidence about how humans learn, (3) discuss evidence-based benefits of mental health mobile apps, (4) examine the current state of mHealth diffusion in the mental health profession, and (5) offer solutions for impelling innovation diffusion by infusing mental health mobile apps into education, training, and clinical settings. This discussion has implications for counselor educators, mental health practitioners, associations

  8. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  9. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  10. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  11. An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks

    Science.gov (United States)

    Zhong, Peijun; Ruan, Feng

    2018-03-01

    With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.

  12. Large Scale Experiments of Multihop Networks in Mobile Scenarios

    Directory of Open Access Journals (Sweden)

    Yacine Benchaïb

    2016-03-01

    Full Text Available This paper presents the latest advances in our research work focused on VIRMANEL and SILUMOD, a couple of tools developed for research in wireless mobile multihop networks. SILUMOD is a domain specific language dedicated to the definition of mobility models. This language contains key- words and special operators that make it easy to define a mobility model and calculate the positions of a trajectory. These positions are sent to VIRMANEL, a tool that man- ages virtual machines corresponding to mobile nodes, emu- lates their movements and the resulting connections and dis- connections, and displays the network evolution to the user, thanks to its graphical user interface. The virtualization ap- proach we take here allows to run real code and to test real protocol implementations without deploying an important experimental platform. For the experimentation of a large number of virtual mobile nodes, we defined and implemented a new algorithm for the nearest neighbor search to find the nodes that are within communication range. We then car- ried out a considerable measurement campaign in order to evaluate the performance of this algorithm. The results show that even with an experiment using a large number of mobile nodes, our algorithm make it possible to evaluate the state of connectivity between mobile nodes within a reasonable time and number of operations.

  13. IMPROVING THE TRANSMISSION PERFORMANCE BASED ON MINIMIZING ENERGY IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2015-06-01

    Full Text Available Networking is collectively no of mobile nodes allocate users to correctly detect a distant environment. These wireless mobile networks want strong but simple, scalable, energy efficient and also self organize routing algorithms. In Mobile technology small quantity of power electronics and less power radio frequency have permit the expansion of small, comparatively economical and less power nodes, are associated in a wireless mobile networkIn this study we proposed method are: energy effectiveness, energetic occurrence zone and multiple hop TRANSMIT, taking into concern between the energy of transmit nodes and distance from the transmit node to the trusted neighbor node, link weight energy utilization and distance are measured as most important constraint for decide on greatest possible path from Zone Head (ZH to the neighbor node. In this we use the different constraints and lessen the quantity of distribution messages during the Transmit node choice point to decrease the energy utilization of the complete network.

  14. Peer-to-Peer JXTA Architecture for Continuing Mobile Medical Education Incorporated in Rural Public Health Centers.

    Science.gov (United States)

    Rajasekaran, Rajkumar; Iyengar, Nallani Chackravatula Sriman Narayana

    2013-04-01

    Mobile technology helps to improve continuing medical education; this includes all aspects of public health care as well as keeping one's knowledge up-to-date. The program of continuing medical and health education is intertwined with mobile health technology, which forms an imperative component of national strategies in health. Continuing mobile medical education (CMME) programs are designed to ensure that all medical and health-care professionals stay up-to-date with the knowledge required through mobile JXTA to appraise modernized strategies so as to achieve national goals of health-care information distribution. In this study, a 20-item questionnaire was distributed to 280 health professionals practicing traditional training learning methodologies (180 nurses, 60 doctors, and 40 health inspectors) in 25 rural hospitals. Among the 83% respondents, 56% are eager to take new learning methodologies as part of their evaluation, which is considered for promotion to higher grades, increments, or as part of their work-related activities. The proposed model was executed in five public health centers in which nurses and health inspectors registered in the JXTA network were referred to the record peer group by administrators. A mobile training program on immunization was conducted through the ADVT, with the lectures delivered on their mobiles. Credits are given after taking the course and completing an evaluation test. The system is faster compared with traditional learning. Medical knowledge management and mobile-streaming application support the CMME system through JXTA. The mobile system includes online lectures and practice quizzes, as well as assignments and interactions with health professionals. Evaluation and assessments are done online and credits certificates are provided based on the score the student obtains. The acceptance of mobile JXTA peer-to-peer learning has created a drastic change in learning methods among rural health professionals. The professionals

  15. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  16. Transparent settlement model between mobile network operator and mobile voice over Internet protocol operator

    Directory of Open Access Journals (Sweden)

    Luzango Pangani Mfupe

    2014-12-01

    Full Text Available Advances in technology have enabled network-less mobile voice over internet protocol operator (MVoIPO to offer data services (i.e. voice, text and video to mobile network operator's (MNO's subscribers through an application enabled on subscriber's user equipment using MNO's packet-based cellular network infrastructure. However, this raises the problem of how to handle interconnection settlements between the two types of operators, particularly how to deal with users who now have the ability to make ‘free’ on-net MVoIP calls among themselves within the MNO's network. This study proposes a service level agreement-based transparent settlement model (TSM to solve this problem. The model is based on concepts of achievement and reward, not violation and punishment. The TSM calculates the MVoIPO's throughput distribution by monitoring the variations of peaks and troughs at the edge of a network. This facilitates the determination of conformance and non-conformance levels to the pre-set throughput thresholds and, subsequently, the issuing of compensation to the MVoIPO by the MNO as a result of generating an economically acceptable volume of data traffic.

  17. A novel approach to Service Discovery in Mobile Adhoc Network

    OpenAIRE

    Islam, Noman; Shaikh, Zubair A.

    2015-01-01

    Mobile Adhoc Network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. Service Discovery is one of the most important issues in MANET. It is defined as the process of ...

  18. Consumer Mobile Health Apps: Current State, Barriers, and Future Directions.

    Science.gov (United States)

    Kao, Cheng-Kai; Liebovitz, David M

    2017-05-01

    This paper discusses the current state, barriers, and future directions of consumer-facing applications (apps). There are currently more than 165,000 mobile health apps publicly available in major app stores, the vast majority of which are designed for patients. The top 2 categories are wellness management and disease management apps, whereas other categories include self-diagnosis, medication reminder, and electronic patient portal apps. Apps specific to physical medicine and rehabilitation also are reviewed. These apps have the potential to provide low-cost, around-the-clock access to high-quality, evidence-based health information to end users on a global scale. However, they have not yet lived up to their potential due to multiple barriers, including lack of regulatory oversight, limited evidence-based literature, and concerns of privacy and security. The future directions may consist of improving data integration into the health care system, an interoperable app platform allowing access to electronic health record data, cloud-based personal health record across health care networks, and increasing app prescription by health care providers. For consumer mobile health apps to fully contribute value to health care delivery and chronic disease management, all stakeholders within the ecosystem must collaborate to overcome the significant barriers. Copyright © 2017 American Academy of Physical Medicine and Rehabilitation. Published by Elsevier Inc. All rights reserved.

  19. Scripted Mobile Network Routing in a Contested Environment

    National Research Council Canada - National Science Library

    Otto, Anthony R

    2008-01-01

    Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds...

  20. A proposed architecture for a satellite-based mobile communications network - The lowest three layers

    Science.gov (United States)

    Yan, T. Y.; Naderi, F. M.

    1986-01-01

    Architecture for a commercial mobile satellite network is proposed. The mobile satellite system (MSS) is composed of a network management center, mobile terminals, base stations, and gateways; the functions of each component are described. The satellite is a 'bent pipe' that performs frequency translations, and it has multiple UHF beams. The development of the MSS design based on the seven-layer open system interconnection model is examined. Consideration is given to the functions of the physical, data link, and network layers and the integrated adaptive mobile access protocol.

  1. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  2. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  3. Neural Networks in Mobile Robot Motion

    Directory of Open Access Journals (Sweden)

    Danica Janglová

    2004-03-01

    Full Text Available This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the “free” space using ultrasound range finder data. The second neural network “finds” a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.

  4. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  5. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  6. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  7. Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Feilong Tang

    2010-01-01

    Full Text Available Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requirements due to their limited processing ability, and poor programmability and scalability. Intel's network processor IXP is specially designed for fast packet processing to achieve a broad bandwidth. IXP provides a large number of registers to reduce the number of memory accesses. Registers in an IXP are physically partitioned as two banks so that two source operands in an instruction have to come from the two banks respectively, which makes the IXP register allocation tricky and different from conventional ones. In this paper, we investigate an approach for efficiently generating balanced bipartite graph and register allocation algorithms for the dual-bank register allocation in IXPs. The paper presents a graph uniform 2-way partition algorithm (FPT, which provides an optimal solution to the graph partition, and a heuristic algorithm for generating balanced bipartite graph. Finally, we design a framework for IXP register allocation. Experimental results demonstrate the framework and the algorithms are efficient in register allocation for IXP network processors.

  8. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  9. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  10. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  11. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  12. Spectrum Reorganization and Bundling for Power Efficient Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2012-01-01

    are still required for supporting legacy devices and providing wider network coverage. In order to facilitate and reduce the cost of rolling out a new network, mobile operators often reuse existing sites. Radio frequency modules in base station sites house power amplifiers, which are designed to operate...

  13. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  14. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  15. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  16. Network-aware support for mobile distributed teams

    NARCIS (Netherlands)

    Kleij, R. van der; Jong, A. de; Brake, G.M. te; Greefe, T.E.

    2009-01-01

    An experiment evaluated network-aware support to increase understanding of the factors that are important for successful teamwork in mobile geographically dispersed teams of first responders. Participants performed a simulated search and rescue team task and were equipped with a digitized map and

  17. CDMA coverage under mobile heterogeneous network load

    NARCIS (Netherlands)

    Saban, D.; van den Berg, Hans Leo; Boucherie, Richardus J.; Endrayanto, A.I.

    2002-01-01

    We analytically investigate coverage (determined by the uplink) under non-homogeneous and moving traffic load of third generation UMTS mobile networks. In particular, for different call assignment policies, we investigate cell breathing and the movement of the coverage gap occurring between cells

  18. Predictors of Mobile Phone and Social Networking Site Dependency in Adulthood.

    Science.gov (United States)

    Burnell, Kaitlyn; Kuther, Tara L

    2016-10-01

    The present study explored social and psychological predictors of social networking site (SNS) and mobile phone dependency in a sample of emerging adults (ages 18-25, n = 159, M = 21.87, SD = 2.08) and young adults (ages 26-40, n = 97, M = 31.21, SD = 4.11). Path analysis revealed that SNS dependency mediated the relationship of social comparison, SNS support, and impulsivity on mobile phone dependency. Impulsivity also showed direct links to mobile phone dependency. The present findings suggest that individuals with a strong orientation toward social comparison, who perceive a strong sense of support through SNS networks, or who show difficulty with self-regulation may be at risk for SNS and mobile phone dependency.

  19. Cloud RAN for Mobile Networks - a Technology Overview

    OpenAIRE

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying; Scolari, Lara; Kardaras, Georgios; Berger, Michael Stübert; Dittmann, Lars

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and pos...

  20. Mathematical model on malicious attacks in a mobile wireless network with clustering

    International Nuclear Information System (INIS)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2015-01-01

    A mathematical model has been formulated for the analysis of a wireless epidemic on a clustered heterogeneous network. The model introduces mobility into the epidemic framework assuming that the component nodes have a tendency to be attached with a frequently visited home cluster. This underlines the inherent regularity in the mobility pattern of mobile nodes in a wireless network. The analysis focuses primarily on features that arise because of the mobility considerations compared in the larger scenario formed by the epidemic aspects. A result on the invariance of the home cluster populations with respect to time provides an important view-point of the long-term behavior of the system. The analysis also focuses on obtaining a basic threshold condition that guides the epidemic behavior of the system. Analytical as well as numerical results have also been obtained to establish the asymptotic behavior of the connected components of the network, and that of the whole network when the underlying graph turns out to be irreducible. Applications to proximity based attacks and to scenarios with high cluster density have also been outlined

  1. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  2. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. Mobile Health Applications in Digital Life

    Directory of Open Access Journals (Sweden)

    Deniz Sezgin

    2014-12-01

    Full Text Available With the effect of recent rapid developments in communication technologies, every day, various new experiences are introduced into daily life practices. The spread of smart devices and the increase in their accessibility causes a reorganization of the information concerning the daily life via smart phones, tablets, all peripheral devices which can communicate with them, and applications which are installed in these devices. There is also a rapid development in the field of health which has an important position among the fastest growing fields in digital life; and the information and possibilities which are provided by mobile health applications to people who are not health care professionals are also developing rapidly. In this study, health applications which are developed for IOS operating system and presented to the consumers through Apple App-Store on Apple I-Phone and I-Pad mobile devices are examined in order to reveal what mobile health applications as new practices of daily life offer in terms of health and how they direct the individuals towards healthy behaviour; and some of the most frequently used free applications are included as sample applications. Mobile health applications offer many conveniences to the patients or the caretakers of patients such as reminding about medicines or treatments, and administering and monitoring simple treatments.

  5. Mobility and the spread of HIV / AIDS: a challenge to health promotion.

    Science.gov (United States)

    Broring, G; Van Duifhuizen, R

    1993-01-01

    Mobility affects health because unfamiliar surroundings can cause people to take health risks which they may have avoided in their ordinary environments. The epidemiologic role of mobility in spreading communicable diseases is highlighted by the emergence of a new disease such as HIV infection. The path of HIV can actually be plotted on a map. The disease cannot be stopped at international borders, however, because this is an era of increasing international interdependency. Programs for HIV prevention must consider the mobility circumstance, whether the target population consists of permanent, temporary, or seasonal migrants, non-settling travellers, or involuntary refugees. The vulnerability of each group must be assessed in terms of such issues as exposure, socioeconomic status, and access to health care. Aspects of cultural background, such as language and concepts of sexuality, are important considerations for migrants, as are psychological factors for travellers (pleasure-seeking tourists and relaxation-seeking business travellers) and legal aspects and living conditions for refugees. To date, prevention programs in Brazil, India, Burkina, Faso, Kenya, and Tanzania have targeted truckers. Both national campaigns and specific projects have been addressed to travelers, with high acceptance achieved, for example, in Australia, and, for tourists, in Torbay, England. Migrant male and female prostitutes have been the focus of health services in western European cities in collaboration with the project "AIDS and Mobility." To succeed, collaboration in prevention programs must follow the disease across international borders and cooperation must extend throughout a network of agencies.

  6. Supersampling and Network Reconstruction of Urban Mobility.

    Directory of Open Access Journals (Sweden)

    Oleguer Sagarra

    Full Text Available Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required.

  7. Factors associated with mobile health information seeking among Singaporean women.

    Science.gov (United States)

    Chang, Leanne; Chiuan Yen, Ching; Xue, Lishan; Choo Tai, Bee; Chuan Chan, Hock; Been-Lirn Duh, Henry; Choolani, Mahesh

    2017-01-01

    This study examined effects of age and social psychological factors on women's willingness to be mobile health information seekers. A national survey of 1,878 Singaporean women was conducted to obtain information on women's mobile phone usage, experiences of health information seeking, and appraisals of using mobile phones to seek health information. Results showed that young, middle-aged, and older women exhibited distinct mobile phone usage behaviors, health information-seeking patterns, and assessments of mobile health information seeking. Factors that accounted for their mobile information-seeking intention also varied. Data reported in this study provide insights into mobile health interventions in the future.

  8. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  9. Toward a Nationwide Mobile-Based Public Healthcare Service System with Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chien-wen Shen

    2016-01-01

    Full Text Available This paper describes the development of a nationwide public healthcare service system with the integration of cloud technology, wireless sensor networks, and mobile technology to provide citizens with convenient and professional healthcare services. The basic framework of the system includes the architectures for the user end of wireless physiological examinations, for the regional healthcare cloud, and for national public healthcare service system. Citizens with chronic conditions or elderly people who are living alone can use the wireless physiological sensing devices to keep track of their health conditions and get warning if the system detects abnormal signals. Through mobile devices, citizens are able to get real-time health advice, prompt warning, health information, feedback, personalized support, and intervention ubiquitously. With the long-term tracking data for physiological sensing, reliable prediction models for epidemic diseases and chronic diseases can be developed for the government to respond to and control diseases immediately. Besides, such a nationwide approach enables government to have a holistic understanding of the public health information in real time, which is helpful to establish effective policies or strategies to prevent epidemic diseases or chronic diseases.

  10. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  11. Mobile network architecture of the long-range WindScanner system

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per

    to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki with additional 3G or 4G dongles. With the presented network architecture and appropriate configuration, we fulfill...

  12. The Bacterial Mobile Resistome Transfer Network Connecting the Animal and Human Microbiomes.

    Science.gov (United States)

    Hu, Yongfei; Yang, Xi; Li, Jing; Lv, Na; Liu, Fei; Wu, Jun; Lin, Ivan Y C; Wu, Na; Weimer, Bart C; Gao, George F; Liu, Yulan; Zhu, Baoli

    2016-11-15

    Horizontally acquired antibiotic resistance genes (ARGs) in bacteria are highly mobile and have been ranked as principal risk resistance determinants. However, the transfer network of the mobile resistome and the forces driving mobile ARG transfer are largely unknown. Here, we present the whole profile of the mobile resistome in 23,425 bacterial genomes and explore the effects of phylogeny and ecology on the recent transfer (≥99% nucleotide identity) of mobile ARGs. We found that mobile ARGs are mainly present in four bacterial phyla and are significantly enriched in Proteobacteria The recent mobile ARG transfer network, which comprises 703 bacterial species and 16,859 species pairs, is shaped by the bacterial phylogeny, while an ecological barrier also exists, especially when interrogating bacteria colonizing different human body sites. Phylogeny is still a driving force for the transfer of mobile ARGs between farm animals and the human gut, and, interestingly, the mobile ARGs that are shared between the human and animal gut microbiomes are also harbored by diverse human pathogens. Taking these results together, we suggest that phylogeny and ecology are complementary in shaping the bacterial mobile resistome and exert synergistic effects on the development of antibiotic resistance in human pathogens. The development of antibiotic resistance threatens our modern medical achievements. The dissemination of antibiotic resistance can be largely attributed to the transfer of bacterial mobile antibiotic resistance genes (ARGs). Revealing the transfer network of these genes in bacteria and the forces driving the gene flow is of great importance for controlling and predicting the emergence of antibiotic resistance in the clinic. Here, by analyzing tens of thousands of bacterial genomes and millions of human and animal gut bacterial genes, we reveal that the transfer of mobile ARGs is mainly controlled by bacterial phylogeny but under ecological constraints. We also found

  13. Self-deployable mobile sensor networks for on-demand surveillance

    Science.gov (United States)

    Miao, Lidan; Qi, Hairong; Wang, Feiyi

    2005-05-01

    This paper studies two interconnected problems in mobile sensor network deployment, the optimal placement of heterogeneous mobile sensor platforms for cost-efficient and reliable coverage purposes, and the self-organizable deployment. We first develop an optimal placement algorithm based on a "mosaicked technology" such that different types of mobile sensors form a mosaicked pattern uniquely determined by the popularity of different types of sensor nodes. The initial state is assumed to be random. In order to converge to the optimal state, we investigate the swarm intelligence (SI)-based sensor movement strategy, through which the randomly deployed sensors can self-organize themselves to reach the optimal placement state. The proposed algorithm is compared with the random movement and the centralized method using performance metrics such as network coverage, convergence time, and energy consumption. Simulation results are presented to demonstrate the effectiveness of the mosaic placement and the SI-based movement.

  14. Connection adaption for control of networked mobile chaotic agents.

    Science.gov (United States)

    Zhou, Jie; Zou, Yong; Guan, Shuguang; Liu, Zonghua; Xiao, Gaoxi; Boccaletti, S

    2017-11-22

    In this paper, we propose a strategy for the control of mobile chaotic oscillators by adaptively rewiring connections between nearby agents with local information. In contrast to the dominant adaptive control schemes where coupling strength is adjusted continuously according to the states of the oscillators, our method does not request adaption of coupling strength. As the resulting interaction structure generated by this proposed strategy is strongly related to unidirectional chains, by investigating synchronization property of unidirectional chains, we reveal that there exists a certain coupling range in which the agents could be controlled regardless of the length of the chain. This feature enables the adaptive strategy to control the mobile oscillators regardless of their moving speed. Compared with existing adaptive control strategies for networked mobile agents, our proposed strategy is simpler for implementation where the resulting interaction networks are kept unweighted at all time.

  15. Mental Health Mobile Apps for Preadolescents and Adolescents: A Systematic Review.

    Science.gov (United States)

    Grist, Rebecca; Porter, Joanna; Stallard, Paul

    2017-05-25

    There are an increasing number of mobile apps available for adolescents with mental health problems and an increasing interest in assimilating mobile health (mHealth) into mental health services. Despite the growing number of apps available, the evidence base for their efficacy is unclear. This review aimed to systematically appraise the available research evidence on the efficacy and acceptability of mobile apps for mental health in children and adolescents younger than 18 years. The following were systematically searched for relevant publications between January 2008 and July 2016: APA PsychNet, ACM Digital Library, Cochrane Library, Community Care Inform-Children, EMBASE, Google Scholar, PubMed, Scopus, Social Policy and Practice, Web of Science, Journal of Medical Internet Research, Cyberpsychology, Behavior and Social Networking, and OpenGrey. Abstracts were included if they described mental health apps (targeting depression, bipolar disorder, anxiety disorders, self-harm, suicide prevention, conduct disorder, eating disorders and body image issues, schizophrenia, psychosis, and insomnia) for mobile devices and for use by adolescents younger than 18 years. A total of 24 publications met the inclusion criteria. These described 15 apps, two of which were available to download. Two small randomized trials and one case study failed to demonstrate a significant effect of three apps on intended mental health outcomes. Articles that analyzed the content of six apps for children and adolescents that were available to download established that none had undergone any research evaluation. Feasibility outcomes suggest acceptability of apps was good and app usage was moderate. Overall, there is currently insufficient research evidence to support the effectiveness of apps for children, preadolescents, and adolescents with mental health problems. Given the number and pace at which mHealth apps are being released on app stores, methodologically robust research studies

  16. Tamper-Resistant Mobile Health Using Blockchain Technology

    OpenAIRE

    Ichikawa, Daisuke; Kashiyama, Makiko; Ueno, Taro

    2017-01-01

    Background Digital health technologies, including telemedicine, mobile health (mHealth), and remote monitoring, are playing a greater role in medical practice. Safe and accurate management of medical information leads to the advancement of digital health, which in turn results in a number of beneficial effects. Furthermore, mHealth can help lower costs by facilitating the delivery of care and connecting people to their health care providers. Mobile apps help empower patients and health care p...

  17. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  18. Energy-efficient peer-to-peer networking for constrained-capacity mobile environments

    OpenAIRE

    Harjula, E. (Erkki)

    2016-01-01

    Abstract Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile d...

  19. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  20. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  1. A Mobile-Based Community Health Management Information System for Community Health Workers and Their Supervisors in 2 Districts of Zambia.

    Science.gov (United States)

    Biemba, Godfrey; Chiluba, Boniface; Yeboah-Antwi, Kojo; Silavwe, Vichaels; Lunze, Karsten; Mwale, Rodgers K; Russpatrick, Scott; Hamer, Davidson H

    2017-09-27

    Effective community health management information systems (C-HMIS) are important in low-resource countries that rely heavily on community-based health care providers. Zambia currently lacks a functioning C-HMIS to provide real-time, community-based health information from community health workers (CHWs) to health center staff and higher levels of the health system. We developed a C-HMIS mobile platform for use by CHWs providing integrated community case management (iCCM) services and their supervisors to address challenges of frequent stock-outs and inadequate supportive supervision of iCCM-trained CHWs. The platform used simple feature mobile phones on which were loaded the District Health Information System version 2 (DHIS2) software and Java 2 platform micro edition (J2ME) aggregation and tracker applications. This project was implemented in Chipata and Chadiza districts, which supported previous mHealth programs and had cellular coverage from all 3 major network carriers in Zambia. A total of 40 CHWs and 20 CHW supervisors received mobile phones with data bundles and training in the mobile application, after which they implemented the program over a period of 5.5 months, from February to mid-July 2016. CHWs used the mobile phones to submit data on iCCM cases seen, managed, and referred, as well as iCCM medical and diagnostic supplies received and dispensed. Using their mobile phones, the supervisors tracked CHWs' reported cases with medicine consumption, sent CHWs feedback on their referrals, and received SMS reminders to set up mentorship sessions. CHWs were able to use the mobile application to send weekly reports to health center supervisors on disease caseloads and medical commodities consumed, to make drug and supply requisitions, and to send pre-referral notices to health centers. Health center staff used the mobile system to provide feedback to CHWs on the case outcomes of referred patients and to receive automated monthly SMS reminders to invite CHWs to

  2. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  3. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  4. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  5. Mobile Phone Health Applications for the Federal Sector.

    Science.gov (United States)

    Burrows, Christin S; Weigel, Fred K

    2016-01-01

    As the US healthcare system moves toward a mobile care model, mobile phones will play a significant role in the future of healthcare delivery. Today, 90% of American adults own a mobile phone and 64% own a smartphone, yet many healthcare organizations are only beginning to explore the opportunities in which mobile phones can improve and streamline care. After searching Google Scholar, the Association for Computing Machinery Database, and PubMed for articles related to mobile phone health applications and cell phone text message health, we selected articles and studies related to the application of mobile phones in healthcare. From our initial review, we identified the potential application areas and continued to refine our search, identifying a total of 55 articles for additional review and analysis. From the literature, we identified 3 main themes for mobile phone implementation in improving healthcare: primary, preventive, and population health. We recommend federal health leaders pursue the value and potential in these areas; not only because 90% of Americans already own mobile phones, but also because mobile phone integration can provide substantial access and potential cost savings. From the positive findings of multiple studies in primary, preventive, and population health, we propose a 5-year federal implementation plan to integrate mobile phone capabilities into federal healthcare delivery. Our proposal has the potential to improve access, reduce costs, and increase patient satisfaction, therefore changing the way the federal sector delivers healthcare by 2021.

  6. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  7. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  8. Mobile Health Insurance System and Associated Costs: A Cross-Sectional Survey of Primary Health Centers in Abuja, Nigeria.

    Science.gov (United States)

    Chukwu, Emeka; Garg, Lalit; Eze, Godson

    2016-05-17

    Nigeria contributes only 2% to the world's population, accounts for 10% of the global maternal death burden. Health care at primary health centers, the lowest level of public health care, is far below optimal in quality and grossly inadequate in coverage. Private primary health facilities attempt to fill this gap but at additional costs to the client. More than 65% Nigerians still pay out of pocket for health services. Meanwhile, the use of mobile phones and related services has risen geometrically in recent years in Nigeria, and their adoption into health care is an enterprise worth exploring. The purpose of this study was to document costs associated with a mobile technology-supported, community-based health insurance scheme. This analytic cross-sectional survey used a hybrid of mixed methods stakeholder interviews coupled with prototype throw-away software development to gather data from 50 public primary health facilities and 50 private primary care centers in Abuja, Nigeria. Data gathered documents costs relevant for a reliable and sustainable mobile-supported health insurance system. Clients and health workers were interviewed using structured questionnaires on services provided and cost of those services. Trained interviewers conducted the structured interviews, and 1 client and 1 health worker were interviewed per health facility. Clinic expenditure was analyzed to include personnel, fixed equipment, medical consumables, and operation costs. Key informant interviews included a midmanagement staff of a health-management organization, an officer-level staff member of a mobile network operator, and a mobile money agent. All the 200 respondents indicated willingness to use the proposed system. Differences in the cost of services between public and private facilities were analyzed at 95% confidence level (Phealth care facilities is significantly higher than at public primary health care facilities. Key informant interviews with a health management organizations

  9. Resource mobilization for health advocacy: Afro-Brazilian religious organizations and HIV prevention and control.

    Science.gov (United States)

    Garcia, Jonathan; Parker, Richard G

    2011-06-01

    Brazil's national response to AIDS has been tied to the ability to mobilize resources from the World Bank, the World Health Organization, and a variety of donor agencies. The combination of favorable political economic opportunities and the bottom-up demands from civil society make Brazil a particularly interesting case. Despite the stabilization of the AIDS epidemic within the general Brazilian population, it continues to grow in pockets of poverty, especially among women and blacks. We use resource mobilization theories to examine the role of Afro-Brazilian religious organizations in reaching these marginalized populations. From December 2006 through November 2008, we conducted ethnographic research, including participant observation and oral histories with religious leaders (N = 18), officials from the National AIDS Program (N = 12), public health workers from Rio de Janeiro (N = 5), and non-governmental organization (NGO) activists who have worked with Afro-Brazilian religions (N = 5). The mobilization of resources from international donors, political opportunities (i.e., decentralization of the National AIDS Program), and cultural framings enabled local Afro-Brazilian religious groups to forge a national network. On the micro-level, in Rio de Janeiro, we observed how macro-level structures led to the proliferation of capacity-building and peer educator projects among these religious groups. We found that beyond funding assistance, the interrelation of religious ideologies, leadership, and networks linked to HIV can affect mobilization. Copyright © 2010 Elsevier Ltd. All rights reserved.

  10. Energy saving techniques applied over a nation-wide mobile network

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2014-01-01

    Traffic carried over wireless networks has grown significantly in recent years and actual forecasts show that this trend is expected to continue. However, the rapid mobile data explosion and the need for higher data rates comes at a cost of increased complexity and energy consumption of the mobil...

  11. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Some argue that big data and big data users offer advantages to generate evidence. ... Supported by IDRC, this research focused on transportation planning in urban ... Using mobile network big data for land use classification CPRsouth 2015.

  12. Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems

    Directory of Open Access Journals (Sweden)

    Omar Waleed Abdulwahhab

    2017-01-01

    Full Text Available Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA and received signal strength (RSS are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method.

  13. Structural equation modelling of determinants of customer satisfaction of mobile network providers: Case of Kolkata, India

    Directory of Open Access Journals (Sweden)

    Shibashish Chakraborty

    2014-12-01

    Full Text Available The Indian market of mobile network providers is growing rapidly. India is the second largest market of mobile network providers in the world and there is intense competition among existing players. In such a competitive market, customer satisfaction becomes a key issue. The objective of this paper is to develop a customer satisfaction model of mobile network providers in Kolkata. The results indicate that generic requirements (an aggregation of output quality and perceived value, flexibility, and price are the determinants of customer satisfaction. This study offers insights for mobile network providers to understand the determinants of customer satisfaction.

  14. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    NARCIS (Netherlands)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network

  15. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  16. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  17. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  18. Mobile mental health: a challenging research agenda.

    Science.gov (United States)

    Olff, Miranda

    2015-01-01

    The field of mobile health ("m-Health") is evolving rapidly and there is an explosive growth of psychological tools on the market. Exciting high-tech developments may identify symptoms, help individuals manage their own mental health, encourage help seeking, and provide both preventive and therapeutic interventions. This development has the potential to be an efficient cost-effective approach reducing waiting lists and serving a considerable portion of people globally ("g-Health"). However, few of the mobile applications (apps) have been rigorously evaluated. There is little information on how valid screening and assessment tools are, which of the mobile intervention apps are effective, or how well mobile apps compare to face-to-face treatments. But how feasible is rigorous scientific evaluation with the rising demands from policy makers, business partners, and users for their quick release? In this paper, developments in m-Health tools-targeting screening, assessment, prevention, and treatment-are reviewed with examples from the field of trauma and posttraumatic stress disorder. The academic challenges in developing and evaluating m-Health tools are being addressed. Evidence-based guidance is needed on appropriate research designs that may overcome some of the public and ethical challenges (e.g., equity, availability) and the market-driven wish to have mobile apps in the "App Store" yesterday rather than tomorrow.

  19. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  20. Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Amine Dahane

    2015-01-01

    Full Text Available The main concern of clustering approaches for mobile wireless sensor networks (WSNs is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. The approach based on the computing of the weight of each node in the network is one of the proposed techniques to deal with this problem. In this paper, we propose an energy efficient and safe weighted clustering algorithm (ES-WCA for mobile WSNs using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, the highlight of our work is summarized in a comprehensive strategy for monitoring the network, in order to detect and remove the malicious nodes. We use simulation study to demonstrate the performance of the proposed algorithm.

  1. Mobile phones and health concerns

    International Nuclear Information System (INIS)

    Vaikuntam, Shreenivas; Pushparaja

    2003-01-01

    As Mobile Cellular phone ownership grows throughout the developed as well as the developing world, concerns about the health risks due to radio frequency emissions from the mobile phone base stations and due to usage of mobile handsets are slowly growing. This article has a look at the concepts used in the mobile phone technology, the power outputs from base stations and mobile handsets, the quantities Specific Energy Absorption Rate (SAR) and power density as a means to assess the effects on biological tissue. The precautionary approach to manage the health risks from mobile phones by specifying exposure guidelines is explored. Having surveyed the relevant epidemiological surveys and finding them inconclusive, NRPB, United Kingdom's national regulatory body has issued exposure guidelines based on the potential of RF radiation to cause illness or injury through heating of body tissues. USA's Federal Communications Commission (FCC) limits are also listed for comparison. ICNIRP has issued two-tier guidelines, differentiating between occupational and public exposure. The public exposure limits are kept at one-fifth of the occupational exposure limits. The evidence till date, suggests that exposure to RF radiation below NRPB and ICNIRP limits do not cause adverse effects to the general population. However, the gaps in our knowledge warrant a precautionary approach. (author)

  2. Research of using mobile agents for information discovery in P2P networks

    International Nuclear Information System (INIS)

    Lan Yan; Yao Qing

    2003-01-01

    The technology of P2P is a new network-computing model that has great value of commerce and technology. After analyzing the current information discovery technology in P2P network, a new solution that is based on mobile agent is proposed. The mobile agent solution can reduce the need of bandwidth, be adapt to the dynamic of P2P network, and be asynchronous and be very fault tolerant. (authors)

  3. 78 FR 69018 - Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity...

    Science.gov (United States)

    2013-11-18

    ... consumers value overall network reliability and quality in selecting mobile wireless service providers, they...-125] Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity... (Reliability NOI) in 2011 to ``initiate a comprehensive examination of issues regarding the reliability...

  4. A Reliable Handoff Mechanism for Mobile Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Jian; Yang, Dong; Zhang, Hongke; Gidlund, Mikael

    2017-08-04

    With the prevalence of low-power wireless devices in industrial applications, concerns about timeliness and reliability are bound to continue despite the best efforts of researchers to design Industrial Wireless Sensor Networks (IWSNs) to improve the performance of monitoring and control systems. As mobile devices have a major role to play in industrial production, IWSNs should support mobility. However, research on mobile IWSNs and practical tests have been limited due to the complicated resource scheduling and rescheduling compared with traditional wireless sensor networks. This paper proposes an effective mechanism to guarantee the performance of handoff, including a mobility-aware scheme, temporary connection and quick registration. The main contribution of this paper is that the proposed mechanism is implemented not only in our testbed but in a real industrial environment. The results indicate that our mechanism not only improves the accuracy of handoff triggering, but also solves the problem of ping-pong effect during handoff. Compared with the WirelessHART standard and the RSSI-based approach, our mechanism facilitates real-time communication while being more reliable, which can help end-to-end packet delivery remain an average of 98.5% in the scenario of mobile IWSNs.

  5. Use of Multimedia or Mobile Devices By Adolescents for Health Promotion and Disease Prevention: A Literature Review.

    Science.gov (United States)

    Geckle, Joan

    2016-01-01

    The purpose of this literature review is to summarize studies of the use of multimedia technology by adolescents to engage in their healthcare promotion and disease prevention. A systematic literature review of relevant peer-reviewed research published between 2009 and 2014 was performed. The 16 articles reviewed were a combination of quantitative and mixed-method methodology based on the efficacy of multimedia, mobile technology, Short Messaging Services (SMS) texting, and social networking (e.g., Facebook®), to engage adolescents ages 10 to 20 years in health promotion and disease prevention. Although adolescents have high attrition rates in the studies, they demonstrated advantages in using SMS texting features and social networking, especially the chat function, in relation to health promotion and disease prevention. Some small gains were noticed in health promotion and disease prevention in the majority of the studies, though some were not significant due to attrition. Additional research, especially nursing research, is necessary. Mobile and multimedia technology allows for a promising correlation between adolescents and increased healthcare knowledge, health promotion, and disease prevention.

  6. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  7. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  8. Mobile Health Application and e-Health Literacy: Opportunities and Concerns for Cancer Patients and Caregivers.

    Science.gov (United States)

    Kim, Hyunmin; Goldsmith, Joy V; Sengupta, Soham; Mahmood, Asos; Powell, M Paige; Bhatt, Jay; Chang, Cyril F; Bhuyan, Soumitra S

    2017-11-14

    Health literacy is critical for cancer patients as they must understand complex procedures or treatment options. Caregivers' health literacy also plays a crucial role in caring for cancer patients. Low health literacy is associated with low adherence to medications, poor health status, and increased health care costs. There is a growing interest in the use of mobile health applications (apps) to improve health literacy. Mobile health apps can empower underserved cancer patients and their caregivers by providing features or functionalities to enhance interactive patient-provider communication and to understand medical information more readily. Despite the potentiality of improving health literacy through mobile health apps, there exist several related concerns: no equal access to mobile technology, no familiarity or knowledge of using mobile health apps, and privacy and security concerns. These elements should be taken into account for health policy making and mobile apps design and development. Importantly, mobile apps should be developed with the goal of achieving a high range of user access by considering all health literacy level and various cultural and linguistic needs.

  9. Mobile Health Interventions for Improving Health Outcomes in Youth: A Meta-analysis.

    Science.gov (United States)

    Fedele, David A; Cushing, Christopher C; Fritz, Alyssa; Amaro, Christina M; Ortega, Adrian

    2017-05-01

    Mobile health interventions are increasingly popular in pediatrics; however, it is unclear how effective these interventions are in changing health outcomes. To determine the effectiveness of mobile health interventions for improving health outcomes in youth 18 years or younger. Studies published through November 30, 2016, were collected through PubMed, Cumulative Index to Nursing and Allied Health Literature, Educational Resources Information Center, and PsychINFO. Backward and forward literature searches were conducted on articles meeting study inclusion criteria. Search terms included telemedicine, eHealth, mobile health, mHealth, app, and mobile application. Search results were limited to infants, children, adolescents, or young adults when possible. Studies were included if quantitative methods were used to evaluate an application of mobile intervention technology in a primary or secondary capacity to promote or modify health behavior in youth 18 years or younger. Studies were excluded if the article was an unpublished dissertation or thesis, the mean age of participants was older than 18 years, the study did not assess a health behavior and disease outcome, or the article did not include sufficient statistics. Inclusion and exclusion criteria were applied by 2 independent coders with 20% overlap. Of 9773 unique articles, 36 articles (containing 37 unique studies with a total of 29 822 participants) met the inclusion criteria. Of 9773 unique articles, 36 articles (containing 37 unique studies) with a total of 29 822 participants met the inclusion criteria. Effect sizes were calculated from statistical tests that could be converted to standardized mean differences. All aggregate effect sizes and moderator variables were tested using random-effects models. Change in health behavior or disease control. A total of 29 822 participants were included in the studies. In studies that reported sex, the total number of females was 11 226 (53.2%). Of those

  10. Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.

    Science.gov (United States)

    Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto

    2017-07-07

    This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.

  11. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    Science.gov (United States)

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  12. An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-08-01

    Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  13. Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing

    Science.gov (United States)

    Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong

    2018-01-01

    The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination. PMID:29565313

  14. Explicit Content Caching at Mobile Edge Networks with Cross-Layer Sensing.

    Science.gov (United States)

    Chen, Lingyu; Su, Youxing; Luo, Wenbin; Hong, Xuemin; Shi, Jianghong

    2018-03-22

    The deployment density and computational power of small base stations (BSs) are expected to increase significantly in the next generation mobile communication networks. These BSs form the mobile edge network, which is a pervasive and distributed infrastructure that can empower a variety of edge/fog computing applications. This paper proposes a novel edge-computing application called explicit caching, which stores selective contents at BSs and exposes such contents to local users for interactive browsing and download. We formulate the explicit caching problem as a joint content recommendation, caching, and delivery problem, which aims to maximize the expected user quality-of-experience (QoE) with varying degrees of cross-layer sensing capability. Optimal and effective heuristic algorithms are presented to solve the problem. The theoretical performance bounds of the explicit caching system are derived in simplified scenarios. The impacts of cache storage space, BS backhaul capacity, cross-layer information, and user mobility on the system performance are simulated and discussed in realistic scenarios. Results suggest that, compared with conventional implicit caching schemes, explicit caching can better exploit the mobile edge network infrastructure for personalized content dissemination.

  15. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  16. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.

    Science.gov (United States)

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-13

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

  17. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Heijenk, Geert

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver

  18. Energy savings in mobile broadband network based on load predictions

    DEFF Research Database (Denmark)

    Samulevicius, Saulius; Pedersen, Torben Bach; Sørensen, Troels Bundgaard

    2012-01-01

    Abstract—The deployment of new network equipment is resulting in increasing energy consumption in mobile broadband networks (MBNs). This contributes to higher CO2 emissions. Over the last 10 years MBNs have grown considerably, and are still growing to meet the evolution in traffic volume carried...

  19. Network Resource Awareness and Prediction on Mobile Devices

    NARCIS (Netherlands)

    Peddemors, A.J.H.

    2009-01-01

    In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more

  20. Performance Evaluation of Distributed Mobility Management Protocols: Limitations and Solutions for Future Mobile Networks

    Directory of Open Access Journals (Sweden)

    J. Carmona-Murillo

    2017-01-01

    Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.

  1. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  2. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  3. Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

    Directory of Open Access Journals (Sweden)

    Dalibor Uhlir

    2015-05-01

    Full Text Available Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node, SGSN (Serving GPRS Support Node, F5 or MSP (Multi Service Proxy. Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

  4. Energy Efficient Evolution of Mobile Broadband Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert

    to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce...... for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies......, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of existing macro base station sites together with the deployment of outdoor or indoor small cells (heterogeneous network) provide the best...

  5. Optimizations in Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana

    nodes. The independent control of the user’s transmit power at each node may cause degradation of the overall performance. In this line, a dedicated study of power distribution among the carriers is performed. An optimization of the power allocation is proposed and evaluated. The results show...... significant performance improvement to the achieved user throughput in low as well as in high loads in the cell. The flow control of the data between the nodes is another challenge for effective aggregation of the resources in case of dual connectivity. As such, this thesis discusses the challenges...... with the densification of the base stations, bring into a very complex network management and operation control for the mobile operators. Furthermore, the need to provide always best connection and service with high quality demands for a joint overall network resource management. This thesis addresses this challenge...

  6. Initial Results of a New Mobile Spectrum Occupancy Monitoring Network

    NARCIS (Netherlands)

    van Bloem, J.W.H.; Schiphorst, Roelof; Slump, Cornelis H.

    2010-01-01

    In this paper we present results of the new monitoring network for spectrum governance. The network is based on the RFeye system of CRFS where the data is collected employing mobile monitoring vehicles. The measurement data, obtained from a frequency sweep between 10 MHz and 6 GHz, is further

  7. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  8. A Visual Analytics Approach for Extracting Spatio-Temporal Urban Mobility Information from Mobile Network Traffic

    Directory of Open Access Journals (Sweden)

    Euro Beinat

    2012-11-01

    Full Text Available In this paper we present a visual analytics approach for deriving spatio-temporal patterns of collective human mobility from a vast mobile network traffic data set. More than 88 million movements between pairs of radio cells—so-called handovers—served as a proxy for more than two months of mobility within four urban test areas in Northern Italy. In contrast to previous work, our approach relies entirely on visualization and mapping techniques, implemented in several software applications. We purposefully avoid statistical or probabilistic modeling and, nonetheless, reveal characteristic and exceptional mobility patterns. The results show, for example, surprising similarities and symmetries amongst the total mobility and people flows between the test areas. Moreover, the exceptional patterns detected can be associated to real-world events such as soccer matches. We conclude that the visual analytics approach presented can shed new light on large-scale collective urban mobility behavior and thus helps to better understand the “pulse” of dynamic urban systems.

  9. Delay-tolerant mobile network protocol for rice field monitoring using wireless sensor networks

    Science.gov (United States)

    Guitton, Alexandre; Andres, Frédéric; Cardoso, Jarbas Lopes; Kawtrakul, Asanee; Barbin, Silvio E.

    2015-10-01

    The monitoring of rice fields can improve productivity by helping farmers throughout the rice cultivation cycle, on various issues: when to harvest, when to treat the crops against disease, when to increase the water level, how to share observations and decisions made in a collaborative way, etc. In this paper, we propose an architecture to monitor a rice field by a wireless sensor network. Our architecture is based on static sensor nodes forming a disconnected network, and mobile nodes communicating with the sensor nodes in a delay-tolerant manner. The data collected by the static sensor nodes are transmitted to mobile nodes, which in turn transmit them to a gateway, connected to a database, for further analysis. We focus on the related architecture, as well as on the energy-efficient protocols intended to perform the data collection.

  10. Mobile clinics for women's and children's health.

    Science.gov (United States)

    Abdel-Aleem, Hany; El-Gibaly, Omaima M H; El-Gazzar, Amira F E-S; Al-Attar, Ghada S T

    2016-08-11

    The accessibility of health services is an important factor that affects the health outcomes of populations. A mobile clinic provides a wide range of services but in most countries the main focus is on health services for women and children. It is anticipated that improvement of the accessibility of health services via mobile clinics will improve women's and children's health. To evaluate the impact of mobile clinic services on women's and children's health. For related systematic reviews, we searched the Database of Abstracts of Reviews of Effectiveness (DARE), CRD; Health Technology Assessment Database (HTA), CRD; NHS Economic Evaluation Database (NHS EED), CRD (searched 20 February 2014).For primary studies, we searched ISI Web of Science, for studies that have cited the included studies in this review (searched 18 January 2016); WHO ICTRP, and ClinicalTrials.gov (searched 23 May 2016); Cochrane Central Register of Controlled Trials (CENTRAL), part of The Cochrane Library. www.cochranelibrary.com (including the Cochrane Effective Practice and Organisation of Care (EPOC) Group Specialised Register) (searched 7 April 2015); MEDLINE, OvidSP (searched 7 April 2015); Embase, OvidSP (searched 7 April 2015); CINAHL, EbscoHost (searched 7 April 2015); Global Health, OvidSP (searched 8 April 2015); POPLINE, K4Health (searched 8 April 2015); Science Citation Index and Social Sciences Citation Index, ISI Web of Science (searched 8 April 2015); Global Health Library, WHO (searched 8 April 2015); PAHO, VHL (searched 8 April 2015); WHOLIS, WHO (searched 8 April 2015); LILACS, VHL (searched 9 April 2015). We included individual- and cluster-randomised controlled trials (RCTs) and non-RCTs. We included controlled before-and-after (CBA) studies provided they had at least two intervention sites and two control sites. Also, we included interrupted time series (ITS) studies if there was a clearly defined point in time when the intervention occurred and at least three data points

  11. Adaptive Mobile Positioning in WCDMA Networks

    Directory of Open Access Journals (Sweden)

    Dong B.

    2005-01-01

    Full Text Available We propose a new technique for mobile tracking in wideband code-division multiple-access (WCDMA systems employing multiple receive antennas. To achieve a high estimation accuracy, the algorithm utilizes the time difference of arrival (TDOA measurements in the forward link pilot channel, the angle of arrival (AOA measurements in the reverse-link pilot channel, as well as the received signal strength. The mobility dynamic is modelled by a first-order autoregressive (AR vector process with an additional discrete state variable as the motion offset, which evolves according to a discrete-time Markov chain. It is assumed that the parameters in this model are unknown and must be jointly estimated by the tracking algorithm. By viewing a nonlinear dynamic system such as a jump-Markov model, we develop an efficient auxiliary particle filtering algorithm to track both the discrete and continuous state variables of this system as well as the associated system parameters. Simulation results are provided to demonstrate the excellent performance of the proposed adaptive mobile positioning algorithm in WCDMA networks.

  12. Improving the security of the Hwang-Su protocol for mobile networks

    African Journals Online (AJOL)

    user

    Improving the security of the Hwang-Su protocol for mobile networks. Miloud Ait ... But, it is threatened by weak ... Wireless networks (IEEE standard 802.11 1996, Gast 2005) have allowed computer systems to exchange data without cable.

  13. Reducing handover latency in future IP-based wireless networks: Fast Proxy Mobile IPv6

    NARCIS (Netherlands)

    Heijenk, Geert; Bargh, Mortaza S.; Laganier, Julien; Prasad, Anand R.

    2008-01-01

    Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. At the same time they do not give sufficient control to the network to control the handover process. This paper presents an extension to Proxy Mobile IP, which is the

  14. Mobile user forecast and power-law acceleration invariance of scale-free networks

    International Nuclear Information System (INIS)

    Guo Jin-Li; Guo Zhao-Hua; Liu Xue-Jiao

    2011-01-01

    This paper studies and predicts the number growth of China's mobile users by using the power-law regression. We find that the number growth of the mobile users follows a power law. Motivated by the data on the evolution of the mobile users, we consider scenarios of self-organization of accelerating growth networks into scale-free structures and propose a directed network model, in which the nodes grow following a power-law acceleration. The expressions for the transient and the stationary average degree distributions are obtained by using the Poisson process. This result shows that the model generates appropriate power-law connectivity distributions. Therefore, we find a power-law acceleration invariance of the scale-free networks. The numerical simulations of the models agree with the analytical results well. (interdisciplinary physics and related areas of science and technology)

  15. Iterative Available Bandwidth Estimation for Mobile Transport Networks

    DEFF Research Database (Denmark)

    Ubeda Castellanos, Carlos; López Villa, Dimas; Teyeb, Oumer Mohammed

    2007-01-01

    Available bandwidth estimation has lately been proposed to be used for end-to-end resource management in existing and emerging mobile communication systems, whose transport networks could end up being the bottleneck rather than the air interface. Algorithms for admission control, handover...

  16. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  17. Navigation Architecture for a Space Mobile Network

    Science.gov (United States)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  18. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  19. Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey

    Directory of Open Access Journals (Sweden)

    Dlamini Thembelihle

    2017-01-01

    Full Text Available Future mobile networks (MNs are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN and network function virtualization (NFV technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC, a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC and MEC architectures.

  20. Profile-driven regression for modeling and runtime optimization of mobile networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2010-01-01

    Computer networks often display nonlinear behavior when examined over a wide range of operating conditions. There are few strategies available for modeling such behavior and optimizing such systems as they run. Profile-driven regression is developed and applied to modeling and runtime optimization...... of throughput in a mobile ad hoc network, a self-organizing collection of mobile wireless nodes without any fixed infrastructure. The intermediate models generated in profile-driven regression are used to fit an overall model of throughput, and are also used to optimize controllable factors at runtime. Unlike...

  1. Service Demand Discovery Mechanism for Mobile Social Networks.

    Science.gov (United States)

    Wu, Dapeng; Yan, Junjie; Wang, Honggang; Wang, Ruyan

    2016-11-23

    In the last few years, the service demand for wireless data over mobile networks has continually been soaring at a rapid pace. Thereinto, in Mobile Social Networks (MSNs), users can discover adjacent users for establishing temporary local connection and thus sharing already downloaded contents with each other to offload the service demand. Due to the partitioned topology, intermittent connection and social feature in such a network, the service demand discovery is challenging. In particular, the service demand discovery is exploited to identify the best relay user through the service registration, service selection and service activation. In order to maximize the utilization of limited network resources, a hybrid service demand discovery architecture, such as a Virtual Dictionary User (VDU) is proposed in this paper. Based on the historical data of movement, users can discover their relationships with others. Subsequently, according to the users activity, VDU is selected to facilitate the service registration procedure. Further, the service information outside of a home community can be obtained through the Global Active User (GAU) to support the service selection. To provide the Quality of Service (QoS), the Service Providing User (SPU) is chosen among multiple candidates. Numerical results show that, when compared with other classical service algorithms, the proposed scheme can improve the successful service demand discovery ratio by 25% under reduced overheads.

  2. Classification of ion mobility spectra by functional groups using neural networks

    Science.gov (United States)

    Bell, S.; Nazarov, E.; Wang, Y. F.; Eiceman, G. A.

    1999-01-01

    Neural networks were trained using whole ion mobility spectra from a standardized database of 3137 spectra for 204 chemicals at various concentrations. Performance of the network was measured by the success of classification into ten chemical classes. Eleven stages for evaluation of spectra and of spectral pre-processing were employed and minimums established for response thresholds and spectral purity. After optimization of the database, network, and pre-processing routines, the fraction of successful classifications by functional group was 0.91 throughout a range of concentrations. Network classification relied on a combination of features, including drift times, number of peaks, relative intensities, and other factors apparently including peak shape. The network was opportunistic, exploiting different features within different chemical classes. Application of neural networks in a two-tier design where chemicals were first identified by class and then individually eliminated all but one false positive out of 161 test spectra. These findings establish that ion mobility spectra, even with low resolution instrumentation, contain sufficient detail to permit the development of automated identification systems.

  3. Data Transmission Scheme Using Mobile Sink in Static Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Awais Ahmad

    2015-01-01

    Full Text Available Multihop communication in wireless sensor network (WSN brings new challenges in reliable data transmission. Recent work shows that data collection from sensor nodes using mobile sink minimizes multihop data transmission and improves energy efficiency. However, due to continuous movements, mobile sink has limited communication time to collect data from sensor nodes, which results in rapid depletion of node’s energy. Therefore, we propose a data transmission scheme that addresses the aforementioned constraints. The proposed scheme first finds out the group based region on the basis of localization information of the sensor nodes and predefined trajectory information of a mobile sink. After determining the group region in the network, selection of master nodes is made. The master nodes directly transmit their data to the mobile sink upon its arrival at their group region through restricted flooding scheme. In addition, the agent node concept is introduced for swapping of the role of the master nodes in each group region. The master node when consuming energy up to a certain threshold, neighboring node with second highest residual energy is selected as an agent node. The mathematical analysis shows that the selection of agent node maximizes the throughput while minimizing transmission delay in the network.

  4. A Framework for Joint Optical-Wireless Resource Management in Multi-RAT, Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann

    2013-01-01

    Mobile networks are constantly evolving: new Radio Access Technologies (RATs) are being introduced, and backhaul architectures like Cloud-RAN (C-RAN) and distributed base stations are being proposed. Furthermore, small cells are being deployed to enhance network capacity. The end-users wish...... to be always connected to a high-quality service (high bit rates, low latency), thus causing a very complex network control task from an operator’s point of view. We thus propose a framework allowing joint overall network resource management. This scheme covers different types of network heterogeneity (multi......-RAT, multi-layer, multi-architecture) by introducing a novel, hierarchical approach to network resource management. Self-Organizing Networks (SON) and cognitive network behaviors are covered as well as more traditional mobile network features. The framework is applicable to all phases of network operation...

  5. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  6. 'Mobile' health needs and opportunities in developing countries.

    Science.gov (United States)

    Kahn, James G; Yang, Joshua S; Kahn, James S

    2010-02-01

    Developing countries face steady growth in the prevalence of chronic diseases, along with a continued burden from communicable diseases. "Mobile" health, or m-health-the use of mobile technologies such as cellular phones to support public health and clinical care-offers promise in responding to both types of disease burdens. Mobile technologies are widely available and can play an important role in health care at the regional, community, and individual levels. We examine various m-health applications and define the risks and benefits of each. We find positive examples but little solid evaluation of clinical or economic performance, which highlights the need for such evaluation.

  7. Sensor proxy mobile IPv6 (SPMIPv6)--a novel scheme for mobility supported IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  8. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  9. Utilisation of mobile health by medical doctors in a Zimbabwean ...

    African Journals Online (AJOL)

    Background: Mobile Health is the utilisation of mobile devices like cellphones and tablets for the delivery of health care. It is an up and coming intervention promising to benefit health services. Recent mobile health studies have tended to focus on mHealth for data collection and surveillance rather than on actual patient care ...

  10. Mobile Network Leader: A New Role of the Leader in Corporate Management

    Directory of Open Access Journals (Sweden)

    Haber Lesław H.

    2015-12-01

    Full Text Available The purpose of this paper was to present the management system evolution, from functional to process to network management. The network management system requires new organizational solutions associated with the fulfilment of external functions in management, directed at the acquisition of stakeholders from the environment who are treated as relational capital. That also requires new skills and competences in searching for relational capital. Possession of that type of capital indicates the importance of a company on a competitive market. The author pointed out the significance of the mobile network leaders’ personal traits, from the viewpoint of their causative power in searching for relational capital. It was pointed out that not every mobile network leader may possess specific personal capabilities to attain relevant objectives.

  11. A Mobile Sensor Network to Map CO2 in Urban Environments

    Science.gov (United States)

    Lee, J.; Christen, A.; Nesic, Z.; Ketler, R.

    2014-12-01

    Globally, an estimated 80% of all fuel-based CO2 emissions into the atmosphere are attributable to cities, but there is still a lack of tools to map, visualize and monitor emissions to the scales at which emissions reduction strategies can be implemented - the local and urban scale. Mobile CO2 sensors, such as those attached to taxis and other existing mobile platforms, may be a promising way to observe and map CO2 mixing ratios across heterogenous urban environments with a limited number of sensors. Emerging modular open source technologies, and inexpensive compact sensor components not only enable rapid prototyping and replication, but also are allowing for the miniaturization and mobilization of traditionally fixed sensor networks. We aim to optimize the methods and technologies for monitoring CO2 in cities using a network of CO2 sensors deployable on vehicles and bikes. Our sensor technology is contained in a compact weather-proof case (35.8cm x 27.8cm x 11.8cm), powered independently by battery or by car, and includes the Li-Cor Li-820 infrared gas analyzer (Licor Inc, lincoln, NB, USA), Arduino Mega microcontroller (Arduino CC, Italy) and Adafruit GPS (Adafruit Technologies, NY, USA), and digital air temperature thermometer which measure CO2 mixing ratios (ppm), geolocation and speed, pressure and temperature, respectively at 1-second intervals. With the deployment of our sensor technology, we will determine if such a semi-autonomous mobile approach to monitoring CO2 in cities can determine excess urban CO2 mixing ratios (i.e. the 'urban CO2 dome') when compared to values measured at a fixed, remote background site. We present results from a pilot study in Vancouver, BC, where the a network of our new sensors was deployed both in fixed network and in a mobile campaign and examine the spatial biases of the two methods.

  12. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  13. A super base station based centralized network architecture for 5G mobile communication systems

    Directory of Open Access Journals (Sweden)

    Manli Qian

    2015-04-01

    Full Text Available To meet the ever increasing mobile data traffic demand, the mobile operators are deploying a heterogeneous network with multiple access technologies and more and more base stations to increase the network coverage and capacity. However, the base stations are isolated from each other, so different types of radio resources and hardware resources cannot be shared and allocated within the overall network in a cooperative way. The mobile operators are thus facing increasing network operational expenses and a high system power consumption. In this paper, a centralized radio access network architecture, referred to as the super base station (super BS, is proposed, as a possible solution for an energy-efficient fifth-generation (5G mobile system. The super base station decouples the logical functions and physical entities of traditional base stations, so different types of system resources can be horizontally shared and statistically multiplexed among all the virtual base stations throughout the entire system. The system framework and main functionalities of the super BS are described. Some key technologies for system implementation, i.e., the resource pooling, real-time virtualization, adaptive hardware resource allocation are also highlighted.

  14. Challenges for coexistence of machine to machine and human to human applications in mobile network

    DEFF Research Database (Denmark)

    Sanyal, R.; Cianca, E.; Prasad, Ramjee

    2012-01-01

    A key factor for the evolution of the mobile networks towards 4G is to bring to fruition high bandwidth per mobile node. Eventually, due to the advent of a new class of applications, namely, Machine-to-Machine, we foresee new challenges where bandwidth per user is no more the primal driver...... be evolved to address various nuances of the mobile devices used by man and machines. The bigger question is as follows. Is the state-of-the-art mobile network designed optimally to cater both the Human-to-Human and Machine-to-Machine applications? This paper presents the primary challenges....... As an immediate impact of the high penetration of M2M devices, we envisage a surge in the signaling messages for mobility and location management. The cell size will shrivel due to high tele-density resulting in even more signaling messages related to handoff and location updates. The mobile network should...

  15. Dynamic Integration of Mobile JXTA with Cloud Computing for Emergency Rural Public Health Care.

    Science.gov (United States)

    Rajkumar, Rajasekaran; Sriman Narayana Iyengar, Nallani Chackravatula

    2013-10-01

    The existing processes of health care systems where data collection requires a great deal of labor with high-end tasks to retrieve and analyze information, are usually slow, tedious, and error prone, which restrains their clinical diagnostic and monitoring capabilities. Research is now focused on integrating cloud services with P2P JXTA to identify systematic dynamic process for emergency health care systems. The proposal is based on the concepts of a community cloud for preventative medicine, to help promote a healthy rural community. We investigate the approaches of patient health monitoring, emergency care, and an ambulance alert alarm (AAA) under mobile cloud-based telecare or community cloud controller systems. Considering permanent mobile users, an efficient health promotion method is proposed. Experiments were conducted to verify the effectiveness of the method. The performance was evaluated from September 2011 to July 2012. A total of 1,856,454 cases were transported and referred to hospital, identified with health problems, and were monitored. We selected all the peer groups and the control server N0 which controls N1, N2, and N3 proxied peer groups. The hospital cloud controller maintains the database of the patients through a JXTA network. Among 1,856,454 transported cases with beneficiaries of 1,712,877 cases there were 1,662,834 lives saved and 8,500 cases transported per day with 104,530 transported cases found to be registered in a JXTA network. The registered case histories were referred from the Hospital community cloud (HCC). SMS messages were sent from node N0 to the relay peers which connected to the N1, N2, and N3 nodes, controlled by the cloud controller through a JXTA network.

  16. An analysis of mobile signalling in converged networks

    NARCIS (Netherlands)

    Oredope, A.; Exarchakos, G.; Menkovski, V.; Liotta, A.

    2009-01-01

    Converged networks are viewed as a multi-access platform on which fixed and mobile communications can be easily merged into a unified system thus enabling the deployment of rich and personalized services. In this paper, we provide the outcomes of our research into the challenges introduced by

  17. Energy and Power Measurements for Network Coding in the Context of Green Mobile Clouds

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pedersen, Morten Videbæk; Roetter, Daniel Enrique Lucani

    2013-01-01

    results for inter-session network coding in Open-Mesh routers underline that the energy invested in performing network coding pays off by dramatically reducing the total energy for the transmission of data over wireless links. We also show measurements for intra-session network coding in three different......This paper presents an in-depth power and energy measurement campaign for inter- and intra-session network coding enabled communication in mobile clouds. The measurements are carried out on different commercial platforms with focus on routers and mobile phones with different CPU capabilities. Our...

  18. Mobile Technologies and Public Health

    Centers for Disease Control (CDC) Podcasts

    2008-09-05

    In this podcast, Erin Edgerton, CDC, and Eric Holman, President of SmartReply, discuss why mobile technologies are an important communications tool for disseminating health messages.  Created: 9/5/2008 by National Center for Health Marketing (NCHM), Division of eHealth Marketing (DeHM).   Date Released: 1/12/2009.

  19. Mobility-based Time References for Wireless Sensor Networks

    CERN Document Server

    Sebastiano, Fabio; Makinwa, Kofi A A

    2013-01-01

     This book describes the use of low-power low-cost and extremely small radios to provide essential time reference for wireless sensor networks.  The authors explain how to integrate such radios in a standard CMOS process to reduce both cost and size, while focusing on the challenge of designing a fully integrated time reference for such radios. To enable the integration of the time reference, system techniques are proposed and analyzed, several kinds of integrated time references are reviewed, and mobility-based references are identified as viable candidates to provide the required accuracy at low-power consumption. Practical implementations of a mobility-based oscillator and a temperature sensor are also presented, which demonstrate the required accuracy over a wide temperature range, while drawing 51-uW from a 1.2-V supply in a 65-nm CMOS process. Provides system analysis to understand requirements for time/frequency accuracy in wireless sensor networks; Describes system optimization for time references i...

  20. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  1. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  2. A Social Network Analysis of the Financial Links Backing Health and Fitness Apps.

    Science.gov (United States)

    Grundy, Quinn; Held, Fabian; Bero, Lisa

    2017-11-01

    To identify the major stakeholders in mobile health app development and to describe their financial relationships using social network analysis. We conducted a structured content analysis of a purposive sample of prominent health and fitness apps available in November 2015 in the United States, Canada, and Australia. We conducted a social network analysis of apps' developers, investors, other funding sources, and content advisors to describe the financial relationships underpinning health app development. Prominent health and fitness apps are largely developed by private companies based in North America, with an average of 4.7 (SD = 5.5) financial relations, including founders, external investors, acquiring companies, and commercial partnerships. Network analysis revealed a core of 41 sampled apps connected to 415 other entities by 466 financial relations. This core largely comprised apps published by major technology, pharmaceutical, and fashion corporations. About one third of apps named advisors, many of whom had commercial affiliations. Public health needs to extend its scrutiny and advocacy beyond the health messages contained within apps to understanding commercial influences on health and, when necessary, challenging them.

  3. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  4. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  5. The longitudinal relationship between job mobility, perceived organizational justice, and health

    Directory of Open Access Journals (Sweden)

    Ekberg Kerstin

    2008-05-01

    Full Text Available Abstract Background The main purpose of the present study was to examine the 2-year longitudinal and reciprocal relationship between job mobility and health and burnout. A second aim was to elucidate the effects of perceived organizational justice and turnover intentions on the relationship between job mobility (non-, internally and externally mobile, and health (SF-36 and burnout (CBI. Methods The study used questionnaire data from 662 Swedish civil servants and the data were analysed with Structural Equation Modeling statistical methods. Results The results showed that job mobility was a better predictor of health and burnout, than health and burnout were as predictors of job mobility. The predictive effects were most obvious for psychosocial health and burnout, but negligible as far as physical health was concerned. Organizational justice was found to have a direct impact on health, but not on job mobility; whereas turnover intentions had a direct effect on job mobility. Conclusion The predictive relationship between job mobility and health has practical implications for health promotive actions in different organizations.

  6. Best Signal Quality in Cellular Networks: Asymptotic Properties and Applications to Mobility Management in Small Cell Networks

    Directory of Open Access Journals (Sweden)

    Baccelli François

    2010-01-01

    Full Text Available The quickly increasing data traffic and the user demand for a full coverage of mobile services anywhere and anytime are leading mobile networking into a future of small cell networks. However, due to the high-density and randomness of small cell networks, there are several technical challenges. In this paper, we investigate two critical issues: best signal quality and mobility management. Under the assumptions that base stations are uniformly distributed in a ring-shaped region and that shadowings are lognormal, independent, and identically distributed, we prove that when the number of sites in the ring tends to infinity, then (i the maximum signal strength received at the center of the ring tends in distribution to a Gumbel distribution when properly renormalized, and (ii it is asymptotically independent of the interference. Using these properties, we derive the distribution of the best signal quality. Furthermore, an optimized random cell scanning scheme is proposed, based on the evaluation of the optimal number of sites to be scanned for maximizing the user data throughput.

  7. Factors influencing the intention to accept advertising in mobile social networks

    OpenAIRE

    S.M. Jafari; Gh. Jandaghi; H. Taghavi

    2016-01-01

    The aim of the article. The role and importance of advertising in today's world is no secret. Advertising can have a significant role on consumer behavioral intention. Increasing the use of mobile and social networks in mobile phones has provided a new opportunity for marketers to continuously advertise their products or services and also communicate directly with their consumers. Nevertheless, the trust of audiences on mobile advertising has been significantly reduced and people often consid...

  8. Place-based attributes predict community membership in a mobile phone communication network.

    Directory of Open Access Journals (Sweden)

    T Trevor Caughlin

    Full Text Available Social networks can be organized into communities of closely connected nodes, a property known as modularity. Because diseases, information, and behaviors spread faster within communities than between communities, understanding modularity has broad implications for public policy, epidemiology and the social sciences. Explanations for community formation in social networks often incorporate the attributes of individual people, such as gender, ethnicity or shared activities. High modularity is also a property of large-scale social networks, where each node represents a population of individuals at a location, such as call flow between mobile phone towers. However, whether or not place-based attributes, including land cover and economic activity, can predict community membership for network nodes in large-scale networks remains unknown. We describe the pattern of modularity in a mobile phone communication network in the Dominican Republic, and use a linear discriminant analysis (LDA to determine whether geographic context can explain community membership. Our results demonstrate that place-based attributes, including sugar cane production, urbanization, distance to the nearest airport, and wealth, correctly predicted community membership for over 70% of mobile phone towers. We observed a strongly positive correlation (r = 0.97 between the modularity score and the predictive ability of the LDA, suggesting that place-based attributes can accurately represent the processes driving modularity. In the absence of social network data, the methods we present can be used to predict community membership over large scales using solely place-based attributes.

  9. Place-based attributes predict community membership in a mobile phone communication network.

    Science.gov (United States)

    Caughlin, T Trevor; Ruktanonchai, Nick; Acevedo, Miguel A; Lopiano, Kenneth K; Prosper, Olivia; Eagle, Nathan; Tatem, Andrew J

    2013-01-01

    Social networks can be organized into communities of closely connected nodes, a property known as modularity. Because diseases, information, and behaviors spread faster within communities than between communities, understanding modularity has broad implications for public policy, epidemiology and the social sciences. Explanations for community formation in social networks often incorporate the attributes of individual people, such as gender, ethnicity or shared activities. High modularity is also a property of large-scale social networks, where each node represents a population of individuals at a location, such as call flow between mobile phone towers. However, whether or not place-based attributes, including land cover and economic activity, can predict community membership for network nodes in large-scale networks remains unknown. We describe the pattern of modularity in a mobile phone communication network in the Dominican Republic, and use a linear discriminant analysis (LDA) to determine whether geographic context can explain community membership. Our results demonstrate that place-based attributes, including sugar cane production, urbanization, distance to the nearest airport, and wealth, correctly predicted community membership for over 70% of mobile phone towers. We observed a strongly positive correlation (r = 0.97) between the modularity score and the predictive ability of the LDA, suggesting that place-based attributes can accurately represent the processes driving modularity. In the absence of social network data, the methods we present can be used to predict community membership over large scales using solely place-based attributes.

  10. A model for the distribution of watermarked digital content on mobile networks

    Science.gov (United States)

    Frattolillo, Franco; D'Onofrio, Salvatore

    2006-10-01

    Although digital watermarking can be considered one of the key technologies to implement the copyright protection of digital contents distributed on the Internet, most of the content distribution models based on watermarking protocols proposed in literature have been purposely designed for fixed networks and cannot be easily adapted to mobile networks. On the contrary, the use of mobile devices currently enables new types of services and business models, and this makes the development of new content distribution models for mobile environments strategic in the current scenario of the Internet. This paper presents and discusses a distribution model of watermarked digital contents for such environments able to achieve a trade-off between the needs of efficiency and security.

  11. Social-aware data dissemination in opportunistic mobile social networks

    Science.gov (United States)

    Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Han, Xiaowei

    Opportunistic Mobile Social Networks (OMSNs), formed by mobile users with social relationships and characteristics, enhance spontaneous communication among users that opportunistically encounter each other. Such networks can be exploited to improve the performance of data forwarding. Discovering optimal relay nodes is one of the important issues for efficient data propagation in OMSNs. Although traditional centrality definitions to identify the nodes features in network, they cannot identify effectively the influential nodes for data dissemination in OMSNs. Existing protocols take advantage of spatial contact frequency and social characteristics to enhance transmission performance. However, existing protocols have not fully exploited the benefits of the relations and the effects between geographical information, social features and user interests. In this paper, we first evaluate these three characteristics of users and design a routing protocol called Geo-Social-Interest (GSI) protocol to select optimal relay nodes. We compare the performance of GSI using real INFOCOM06 data sets. The experiment results demonstrate that GSI overperforms the other protocols with highest data delivery ratio and low communication overhead.

  12. An Energy-Efficient Target-Tracking Strategy for Mobile Sensor Networks.

    Science.gov (United States)

    Mahboubi, Hamid; Masoudimansour, Walid; Aghdam, Amir G; Sayrafian-Pour, Kamran

    2017-02-01

    In this paper, an energy-efficient strategy is proposed for tracking a moving target in an environment with obstacles, using a network of mobile sensors. Typically, the most dominant sources of energy consumption in a mobile sensor network are sensing, communication, and movement. The proposed algorithm first divides the field into a grid of sufficiently small cells. The grid is then represented by a graph whose edges are properly weighted to reflect the energy consumption of sensors. The proposed technique searches for near-optimal locations for the sensors in different time instants to route information from the target to destination, using a shortest path algorithm. Simulations confirm the efficacy of the proposed algorithm.

  13. The Impact of Mobile Offloading on Energy Consumption and Capacity of Radio Access Networks – Case of Finland

    Directory of Open Access Journals (Sweden)

    Michail Katsigiannis

    2015-08-01

    Full Text Available The Finnish Mobile Operators face two main challenges: (i mobile data subscriptions penetration and traffic are experiencing rapid growth; and (ii government intervenes in the market to attain contradictory goals related to extensive high-speed mobile networks and energy consumption reduction. The mobile operators have to increase the capacity in their networks, taking energy efficiency into account. The reduction of energy consumption in mobile networks results to the reducing carbon emissions, and possibly to cost savings. The purpose of this study is to investigate the wide-to-local area offloading in urban regions in Finland and examine the impact of such a network on the wide area access network in terms of energy and capacity. The results show that the capacity relief ranges from 9.7 to 38.7 %, depending on the penetration of local area service, but the energy savings in macro cellular network are negligible.

  14. Adaptive training of neural networks for control of autonomous mobile robots

    NARCIS (Netherlands)

    Steur, E.; Vromen, T.; Nijmeijer, H.; Fossen, T.I.; Nijmeijer, H.; Pettersen, K.Y.

    2017-01-01

    We present an adaptive training procedure for a spiking neural network, which is used for control of a mobile robot. Because of manufacturing tolerances, any hardware implementation of a spiking neural network has non-identical nodes, which limit the performance of the controller. The adaptive

  15. Modelling network and system monitoring over the Internet with mobile agents

    NARCIS (Netherlands)

    Liotta, A.; Knight, G.; Pavlou, G.

    1998-01-01

    Distributed Network Management is gaining importance due to the explosive growth of the size of computer networks. New management paradigms are being proposed as an alternative to the centralised one, and new technologies and programming languages are making them feasible. The use of Mobile Agents

  16. Depiction of global trends in publications on mobile health

    Directory of Open Access Journals (Sweden)

    Shahla Foozonkhah

    2017-07-01

    Full Text Available Background: Variety of mobile health initiatives in different levels have been undertaken across many countries. Trends of these initiatives can be reflected in the research published in m-health domain. Aim: This paper aims to depict global trends in the published works on m-health topic. Materials and Methods: The Web of Science database was used to identify all relevant published papers on mobile health domain worldwide. The search was conducted on documents published from January 1898 to December 2014. The criteria for searching were set to be “mHealth” or “Mobile health” or “m health” or “m_health” or “m-health” in topics. Results: Findings revealed an increasing trend of citations and publications on m-health research since 2012. English was the first most predominant language of the publication. The US had the highest number of publication with 649 papers; however, the Netherlands ranked first after considering publication number in terms of countries population. “Studies in Health Technology and Informatics” was the source title with highest number of publications on mobile health topics. Conclusion: Trend of research observed in this study indicates the continuing growth is happening in mobile health domain. This may imply that the new model of health-care delivery is emerging. Further research is needed to specify directions of mobile health research. It is necessary to identify and prioritize the research gaps in this domain.

  17. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    Science.gov (United States)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  18. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs

    Science.gov (United States)

    Islam, Md. Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly. PMID:22319386

  19. Sensor Proxy Mobile IPv6 (SPMIPv6—A Novel Scheme for Mobility Supported IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-02-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6. We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

  20. Congestion Control and Traffic Scheduling for Collaborative Crowdsourcing in SDN Enabled Mobile Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dawei Shen

    2018-01-01

    Full Text Available Currently, a number of crowdsourcing-based mobile applications have been implemented in mobile networks and Internet of Things (IoT, targeted at real-time services and recommendation. The frequent information exchanges and data transmissions in collaborative crowdsourcing are heavily injected into the current communication networks, which poses great challenges for Mobile Wireless Networks (MWN. This paper focuses on the traffic scheduling and load balancing problem in software-defined MWN and designs a hybrid routing forwarding scheme as well as a congestion control algorithm to achieve the feasible solution. The traffic scheduling algorithm first sorts the tasks in an ascending order depending on the amount of tasks and then solves it using a greedy scheme. In the proposed congestion control scheme, the traffic assignment is first transformed into a multiknapsack problem, and then the Artificial Fish Swarm Algorithm (AFSA is utilized to solve this problem. Numerical results on practical network topology reveal that, compared with the traditional schemes, the proposed congestion control and traffic scheduling schemes can achieve load balancing, reduce the probability of network congestion, and improve the network throughput.

  1. Mobile Router Developed and Tested

    Science.gov (United States)

    Ivancic, William D.

    2002-01-01

    The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP

  2. Mobile-Based Medical Health Application - Medi-Chat App

    Directory of Open Access Journals (Sweden)

    Mustapha Adamu Mohammed

    2017-05-01

    Full Text Available The aftermath of the development and implementation of the Android operating system and its associated Application Programming InterfacesAPI by Google culminated in the development more mobile device-enabled applications designed for our day-to-day businesses and personal use however in recent times we are experiencing a massive revolution in the use of mobile technology in the health sectors of our economy and this revolution is termed as Mobile Health Technology MHT.This new technological breakthrough has enabled the development of powerful android applications that enabled people tract and monitor the treat of heart and kidney related diseases as well as the monitoring and evaluation certain drug prescriptions. It has also changed the way we communicate with our specialist doctors from phone text to mobile-based communication. All these interventions provided by MHT have drastically increased the efficient and effective provision of health care delivery on one side and providing a common platform for prospective patients to easily interact with health professionals for medical advice and subsequent treatment of their diseases. Moreover In Ghana It would provide a much efficient and cost effective way of improving health-care methodologies in this 21st century which is characterized by information and communication technology. In this paper the main goal is to develop a mobile health application that provides common platform prospective patients and specialist doctors give free consultation and health tips on health related conditions thereby reducing the difficulty and challenges uncounted in accessing free medical health care at the already overburdened hospitals polyclinics and health centers in Ghana.

  3. The use of mobile technology in health libraries: a summary of a UK-based survey.

    Science.gov (United States)

    Chamberlain, David; Elcock, Martin; Puligari, Preeti

    2015-12-01

    Health libraries have changed over the past fifteen years in the format of the information they provide. This is driven by developments in technology. To conduct a survey of NHS health libraries in the United Kingdom in order to summarise how mobile technologies are being used, how they are promoted and how they are delivered, highlighting good practice and solutions to issues. An online survey was carried out in 2013 and sent to academic and NHS web-based discussion lists. There were 199 responses. Main replies were from large Acute Hospital Trusts. Only 18% of respondents had conducted research into use of mobile technology (MT) within their Trust. Forty per cent of Trusts offered clinical point of care tools, 29% mobile catalogues, and 30% had mobile enabled web sites. Libraries utilised third-party partnerships rather than develop their own applications or tools. Seventy per cent of Trusts promoted new MT services via e-mail. Network restrictions were the main barrier to development as well as finance and expertise. Uptake and development of MT is sporadic and driven by individuals. There is an opportunity for collaboration and sharing resources and expertise. There are benefits to adopting user-friendly resources. © 2015 Health Libraries Group.

  4. The Mobile Learning Network: Getting Serious about Games Technologies for Learning

    Science.gov (United States)

    Petley, Rebecca; Parker, Guy; Attewell, Jill

    2011-01-01

    The Mobile Learning Network currently in its third year, is a unique collaborative initiative encouraging and enabling the introduction of mobile learning in English post-14 education. The programme, funded jointly by the Learning and Skills Council and participating colleges and schools and supported by LSN has involved nearly 40,000 learners and…

  5. Biologically based neural network for mobile robot navigation

    Science.gov (United States)

    Torres Muniz, Raul E.

    1999-01-01

    The new tendency in mobile robots is to crete non-Cartesian system based on reactions to their environment. This emerging technology is known as Evolutionary Robotics, which is combined with the Biorobotic field. This new approach brings cost-effective solutions, flexibility, robustness, and dynamism into the design of mobile robots. It also provides fast reactions to the sensory inputs, and new interpretation of the environment or surroundings of the mobile robot. The Subsumption Architecture (SA) and the action selection dynamics developed by Brooks and Maes, respectively, have successfully obtained autonomous mobile robots initiating this new trend of the Evolutionary Robotics. Their design keeps the mobile robot control simple. This work present a biologically inspired modification of these schemes. The hippocampal-CA3-based neural network developed by Williams Levy is used to implement the SA, while the action selection dynamics emerge from iterations of the levels of competence implemented with the HCA3. This replacement by the HCA3 results in a closer biological model than the SA, combining the Behavior-based intelligence theory with neuroscience. The design is kept simple, and it is implemented in the Khepera Miniature Mobile Robot. The used control scheme obtains an autonomous mobile robot that can be used to execute a mail delivery system and surveillance task inside a building floor.

  6. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  7. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  8. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    Science.gov (United States)

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  9. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  10. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-09-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  11. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-06-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  12. Cocoon: A lightweight opportunistic networking middleware for community-oriented smart mobile applications

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    Modern society is surrounded by an ample spectrum of smart mobile devices. This ubiquity forms a high potential for community-oriented opportunistic ad hoc networking applications. Nevertheless, today’s smart mobile devices such as smartphones, tablets, and wristbands are still onerous to

  13. Mapping mHealth (mobile health) and mobile penetrations in sub-Saharan Africa for strategic regional collaboration in mHealth scale-up: an application of exploratory spatial data analysis.

    Science.gov (United States)

    Lee, Seohyun; Cho, Yoon-Min; Kim, Sun-Young

    2017-08-22

    Mobile health (mHealth), a term used for healthcare delivery via mobile devices, has gained attention as an innovative technology for better access to healthcare and support for performance of health workers in the global health context. Despite large expansion of mHealth across sub-Saharan Africa, regional collaboration for scale-up has not made progress since last decade. As a groundwork for strategic planning for regional collaboration, the study attempted to identify spatial patterns of mHealth implementation in sub-Saharan Africa using an exploratory spatial data analysis. In order to obtain comprehensive data on the total number of mHelath programs implemented between 2006 and 2016 in each of the 48 sub-Saharan Africa countries, we performed a systematic data collection from various sources, including: the WHO eHealth Database, the World Bank Projects & Operations Database, and the USAID mHealth Database. Additional spatial analysis was performed for mobile cellular subscriptions per 100 people to suggest strategic regional collaboration for improving mobile penetration rates along with the mHealth initiative. Global Moran's I and Local Indicator of Spatial Association (LISA) were calculated for mHealth programs and mobile subscriptions per 100 population to investigate spatial autocorrelation, which indicates the presence of local clustering and spatial disparities. From our systematic data collection, the total number of mHealth programs implemented in sub-Saharan Africa between 2006 and 2016 was 487 (same programs implemented in multiple countries were counted separately). Of these, the eastern region with 17 countries and the western region with 16 countries had 287 and 145 mHealth programs, respectively. Despite low levels of global autocorrelation, LISA enabled us to detect meaningful local clusters. Overall, the eastern part of sub-Saharan Africa shows high-high association for mHealth programs. As for mobile subscription rates per 100 population, the

  14. Wireless Sensor/Actuator Network Design for Mobile Control Applications

    Directory of Open Access Journals (Sweden)

    Youxian Sung

    2007-10-01

    Full Text Available Wireless sensor/actuator networks (WSANs are emerging as a new generationof sensor networks. Serving as the backbone of control applications, WSANs will enablean unprecedented degree of distributed and mobile control. However, the unreliability ofwireless communications and the real-time requirements of control applications raise greatchallenges for WSAN design. With emphasis on the reliability issue, this paper presents anapplication-level design methodology for WSANs in mobile control applications. Thesolution is generic in that it is independent of the underlying platforms, environment,control system models, and controller design. To capture the link quality characteristics interms of packet loss rate, experiments are conducted on a real WSAN system. From theexperimental observations, a simple yet efficient method is proposed to deal withunpredictable packet loss on actuator nodes. Trace-based simulations give promisingresults, which demonstrate the effectiveness of the proposed approach.

  15. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  16. The Role of Social Networks in Early Adoption of Mobile Devices

    Science.gov (United States)

    Tscherning, Heidi; Mathiassen, Lars

    As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impact the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network, and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

  17. Hop-by-HopWorm Propagation with Carryover Epidemic Model in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun-Won Ho

    2015-10-01

    Full Text Available In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropriate propagation strategy is needed for mobile sensor worms. To meet this need, we discuss a hop-by-hop worm propagation model in mobile sensor networks. In a hop-by-hop worm propagation model, benign nodes are infected by worm in neighbor-to-neighbor spread manner. Since worm infection occurs in hop-by-hop contact, it is not substantially affected by a route breach incurred by node mobility. We also propose the carryover epidemic model to deal with the worm infection quota deficiency that might occur when employing an epidemic model in a mobile sensor network. We analyze worm infection capability under the carryover epidemic model. Moreover, we simulate hop-by-hop worm propagation with carryover epidemic model by using an ns-2 simulator. The simulation results demonstrate that infection quota carryovers are seldom observed where a node’s maximum speed is no less than 20 m/s.

  18. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  19. Impact of dynamic rate coding aspects of mobile phone networks on forensic voice comparison.

    Science.gov (United States)

    Alzqhoul, Esam A S; Nair, Balamurali B T; Guillemin, Bernard J

    2015-09-01

    Previous studies have shown that landline and mobile phone networks are different in their ways of handling the speech signal, and therefore in their impact on it. But the same is also true of the different networks within the mobile phone arena. There are two major mobile phone technologies currently in use today, namely the global system for mobile communications (GSM) and code division multiple access (CDMA) and these are fundamentally different in their design. For example, the quality of the coded speech in the GSM network is a function of channel quality, whereas in the CDMA network it is determined by channel capacity (i.e., the number of users sharing a cell site). This paper examines the impact on the speech signal of a key feature of these networks, namely dynamic rate coding, and its subsequent impact on the task of likelihood-ratio-based forensic voice comparison (FVC). Surprisingly, both FVC accuracy and precision are found to be better for both GSM- and CDMA-coded speech than for uncoded. Intuitively one expects FVC accuracy to increase with increasing coded speech quality. This trend is shown to occur for the CDMA network, but, surprisingly, not for the GSM network. Further, in respect to comparisons between these two networks, FVC accuracy for CDMA-coded speech is shown to be slightly better than for GSM-coded speech, particularly when the coded-speech quality is high, but in terms of FVC precision the two networks are shown to be very similar. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  20. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  1. m-Health 2.0: New perspectives on mobile health, Machine Learning and Big Data Analytics.

    Science.gov (United States)

    Istepanian, Robert S H; Al-Anzi, Turki

    2018-06-08

    Mobile health (m-Health) has been repeatedly called the biggest technological breakthrough of our modern times. Similarly, the concept of big data in the context of healthcare is considered one of the transformative drivers for intelligent healthcare delivery systems. In recent years, big data has become increasingly synonymous with mobile health, however key challenges of 'Big Data and mobile health', remain largely untackled. This is becoming particularly important with the continued deluge of the structured and unstructured data sets generated on daily basis from the proliferation of mobile health applications within different healthcare systems and products globally. The aim of this paper is of twofold. First we present the relevant big data issues from the mobile health (m-Health) perspective. In particular we discuss these issues from the technological areas and building blocks (communications, sensors and computing) of mobile health and the newly defined (m-Health 2.0) concept. The second objective is to present the relevant rapprochement issues of big m-Health data analytics with m-Health. Further, we also present the current and future roles of machine and deep learning within the current smart phone centric m-health model. The critical balance between these two important areas will depend on how different stakeholder from patients, clinicians, healthcare providers, medical and m-health market businesses and regulators will perceive these developments. These new perspectives are essential for better understanding the fine balance between the new insights of how intelligent and connected the future mobile health systems will look like and the inherent risks and clinical complexities associated with the big data sets and analytical tools used in these systems. These topics will be subject for extensive work and investigations in the foreseeable future for the areas of data analytics, computational and artificial intelligence methods applied for mobile health

  2. RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Kwangcheol Shin

    2009-12-01

    Full Text Available At present, RFID is installed on mobile devices such as mobile phones or PDAs and provides a means to obtain information about objects equipped with an RFID tag over a multi-channeled telecommunication networks. To use mobile RFIDs, reader collision problems should be addressed given that readers are continuously moving. Moreover, in a multichannel environment for mobile RFIDs, interference between adjacent channels should be considered. This work first defines a new concept of a reader collision problem between adjacent channels and then suggests a novel reader anti-collision algorithm for RFID readers that use multiple channels. To avoid interference with adjacent channels, the suggested algorithm separates data channels into odd and even numbered channels and allocates odd-numbered channels first to readers. It also sets an unused channel between the control channel and data channels to ensure that control messages and the signal of the adjacent channel experience no interference. Experimental results show that suggested algorithm shows throughput improvements ranging from 29% to 46% for tag identifications compared to the GENTLE reader anti-collision algorithm for multichannel RFID networks.

  3. HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanzhong Bi

    2007-06-01

    Full Text Available Sink mobility has attracted much research interest in recent years because it can improve network performance such as energy efficiency and throughput. An energy-unconscious moving strategy is potentially harmful to the balance of the energy consumption among sensor nodes so as to aggravate the hotspot problem of sensor networks. In this paper, we propose an autonomous moving strategy for the mobile sinks in data-gathering applications. In our solution, a mobile sink approaches the nodes with high residual energy to force them to forward data for other nodes and tries to avoid passing by the nodes with low energy. We performed simulation experiments to compare our solution with other three data-gathering schemes. The simulation results show that our strategy cannot only extend network lifetime notably but also provides scalability and topology adaptability.

  4. A Multiple Mobility Support Approach (MMSA Based on PEAS for NCW in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bong-Joo Koo

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs can be implemented as one of sensor systems in Network Centric Warfare (NCW. Mobility support and energy efficiency are key concerns for this application, due to multiple mobile users and stimuli in real combat field. However, mobility support approaches that can be adopted in this circumstance are rare. This paper proposes Multiple Mobility Support Approach (MMSA based on Probing Environment and Adaptive Sleeping (PEAS to support the simultaneous mobility of both multiple users and stimuli by sharing the information of stimuli in WSNs. Simulations using Qualnet are conducted, showing that MMSA can support multiple mobile users and stimuli with good energy efficiency. It is expected that the proposed MMSA can be applied to real combat field.

  5. Mobile mental health: a challenging research agenda

    Directory of Open Access Journals (Sweden)

    Miranda Olff

    2015-05-01

    Full Text Available The field of mobile health (“m-Health” is evolving rapidly and there is an explosive growth of psychological tools on the market. Exciting high-tech developments may identify symptoms, help individuals manage their own mental health, encourage help seeking, and provide both preventive and therapeutic interventions. This development has the potential to be an efficient cost-effective approach reducing waiting lists and serving a considerable portion of people globally (“g-Health”. However, few of the mobile applications (apps have been rigorously evaluated. There is little information on how valid screening and assessment tools are, which of the mobile intervention apps are effective, or how well mobile apps compare to face-to-face treatments. But how feasible is rigorous scientific evaluation with the rising demands from policy makers, business partners, and users for their quick release? In this paper, developments in m-Health tools—targeting screening, assessment, prevention, and treatment—are reviewed with examples from the field of trauma and posttraumatic stress disorder. The academic challenges in developing and evaluating m-Health tools are being addressed. Evidence-based guidance is needed on appropriate research designs that may overcome some of the public and ethical challenges (e.g., equity, availability and the market-driven wish to have mobile apps in the “App Store” yesterday rather than tomorrow.

  6. Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility

    Directory of Open Access Journals (Sweden)

    Klaus Moessner

    2013-10-01

    Full Text Available This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.

  7. Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks

    OpenAIRE

    Yrjölä, S. (Seppo)

    2017-01-01

    Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, an...

  8. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  9. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  10. Health Impacts Of Radiofrequency Exposure From Mobile Phone ...

    African Journals Online (AJOL)

    Background: The widespread use of mobile phones and indiscriminate siting of transmitter base stations near residential buildings in our environment may have serious health impacts. Objective: To investigate the possible health risks associated with radiofrequency (RF) exposure from mobile phones and other transmitter ...

  11. Mobile Applications and 4G Wireless Networks: A Framework for Analysis

    Science.gov (United States)

    Yang, Samuel C.

    2012-01-01

    Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…

  12. BP-Mobil partnership. The common network takes place

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    After the partnership between BP and Mobil was signed, the program of transformation of the petrol stations network started in November 1996 in the UK and concern 3300 stations in Europe and 800 stations in France. About 9100 stations will be transformed by the end of 1998. BP France is the operator for petroleum products (petrol, fuel, bitumens, LPG..) with a 70% share holding (30% for Mobil) while Mobil is the major shareholder (51%) for the lubricants and special products activities. The chemical, aviation nd maritime activities are not concerned. Thanks to the fusion of their down-file activities in Europe, the benefits of the partnership should reach 600 to 700 million of US Dollars each year. However the restructuring cost should reach 740 millions of US Dollars in two years, which doubles the initial estimation. Short paper. (J.S.)

  13. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  14. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  15. A source-initiated on-demand routing algorithm based on the Thorup-Zwick theory for mobile wireless sensor networks.

    Science.gov (United States)

    Mao, Yuxin; Zhu, Ping

    2013-01-01

    The unreliability and dynamics of mobile wireless sensor networks make it hard to perform end-to-end communications. This paper presents a novel source-initiated on-demand routing mechanism for efficient data transmission in mobile wireless sensor networks. It explores the Thorup-Zwick theory to achieve source-initiated on-demand routing with time efficiency. It is able to find out shortest routing path between source and target in a network and transfer data in linear time. The algorithm is easy to be implemented and performed in resource-constrained mobile wireless sensor networks. We also evaluate the approach by analyzing its cost in detail. It can be seen that the approach is efficient to support data transmission in mobile wireless sensor networks.

  16. Missed Opportunity? Leveraging Mobile Technology to Reduce Racial Health Disparities.

    Science.gov (United States)

    Ray, Rashawn; Sewell, Abigail A; Gilbert, Keon L; Roberts, Jennifer D

    2017-10-01

    Blacks and Latinos are less likely than whites to access health insurance and utilize health care. One way to overcome some of these racial barriers to health equity may be through advances in technology that allow people to access and utilize health care in innovative ways. Yet, little research has focused on whether the racial gap that exists for health care utilization also exists for accessing health information online and through mobile technologies. Using data from the Health Information National Trends Survey (HINTS), we examine racial differences in obtaining health information online via mobile devices. We find that blacks and Latinos are more likely to trust online newspapers to get health information than whites. Minorities who have access to a mobile device are more likely to rely on the Internet for health information in a time of strong need. Federally insured individuals who are connected to mobile devices have the highest probability of reliance on the Internet as a go-to source of health information. We conclude by discussing the importance of mobile technologies for health policy, particularly related to developing health literacy, improving health outcomes, and contributing to reducing health disparities by race and health insurance status. Copyright © 2017 by Duke University Press.

  17. [Mobile IT: Possibilities and barriers of mHealth].

    Science.gov (United States)

    Böckmann, B

    2016-04-01

    The increasing availability of mobile devices and corresponding applications, both for providers and patients, often leads to speculation that mHealth, as the combination of mobile devices and health services is often called, would revolutionize the use of information technology (IT) in healthcare. On the other hand users, providers and operators providing such solutions are often confronted with completely new challenges. This article assesses the options and potential of mHealth and also takes a critical look at potential obstacles. As this field is very broad this critical analysis is illustrated by means of three exemplary application areas: mHealth in radiology, the influence of mHealth on research and mHealth as an enabler of new services, always with examples from other countries.The use of mHealth in radiology currently often develops empirically from existing applications in a relatively unstructured way and benefiting from the dynamic development of mobile technology. The possibilities range from viewing images at the bedside via mobile accessibility of radiologists up to teleradiology. In research there is a huge potential in solutions that actively involve patients with their own mobile devices but the field of data protection is still perceived in Germany as problematic so that only a few research institutions are actively addressing these options. The concept of mHealth allows physicians, hospitals and other service providers to invent entirely new services and a start-up scene is beginning to be established with business models becoming successful particularly with exchanges at the interface with established suppliers.

  18. Mobile Health Applications to Promote Active and Healthy Ageing.

    Science.gov (United States)

    Helbostad, Jorunn L; Vereijken, Beatrix; Becker, Clemens; Todd, Chris; Taraldsen, Kristin; Pijnappels, Mirjam; Aminian, Kamiar; Mellone, Sabato

    2017-03-18

    The European population is ageing, and there is a need for health solutions that keep older adults independent longer. With increasing access to mobile technology, such as smartphones and smartwatches, the development and use of mobile health applications is rapidly growing. To meet the societal challenge of changing demography, mobile health solutions are warranted that support older adults to stay healthy and active and that can prevent or delay functional decline. This paper reviews the literature on mobile technology, in particular wearable technology, such as smartphones, smartwatches, and wristbands, presenting new ideas on how this technology can be used to encourage an active lifestyle, and discusses the way forward in order further to advance development and practice in the field of mobile technology for active, healthy ageing.

  19. The regulation of mobile health applications

    OpenAIRE

    Barton, Amy J

    2012-01-01

    Abstract In July 2011, the United States Food and Drug Administration issued draft guidance concerning the regulation of mobile medical applications (applications on a wireless device that are used as accessories to medical devices or to convert a mobile platform to a medical device). While the suggestion of regulation is rooted in patient safety, concerns about limits on innovation and discovery as well as the evolving nature of both mobile health and current healthcare delivery have emerged...

  20. Mobile phones and health, stakeholder perspectives: occupational health and safety

    International Nuclear Information System (INIS)

    Benke, G.

    2001-01-01

    The use of mobile phones for business and social purposes has attracted concerns regarding possible health impacts. Their use in the workplace has potential for significant exposure. In this paper I outline the role of the occupational health and safety (OHS) professional and the way hazard, risk and dose are defined in the workplace. Also discussed are the other important aspects that need to be considered with exposure to radio-frequency radiation (RFR) from mobile phone exposure in the workplace and current concerns about the possible health effects from workplace exposure. Copyright (2001) Australasian Radiation Protection Society Inc

  1. Coverage Improvement for Wireless Sensor Networks using Grid Quorum based Node Mobility

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    Coverage of wireless sensor networks (WSNs) is an important quality of service (QoS) metric and often the desired coverage is not attainable at the initial deployment, but node mobility can be used to improve the coverage by relocating sensor nodes. Unconstrained node mobility is considered infea...

  2. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  3. Distributed Sensor Fusion for Scalar Field Mapping Using Mobile Sensor Networks.

    Science.gov (United States)

    La, Hung Manh; Sheng, Weihua

    2013-04-01

    In this paper, autonomous mobile sensor networks are deployed to measure a scalar field and build its map. We develop a novel method for multiple mobile sensor nodes to build this map using noisy sensor measurements. Our method consists of two parts. First, we develop a distributed sensor fusion algorithm by integrating two different distributed consensus filters to achieve cooperative sensing among sensor nodes. This fusion algorithm has two phases. In the first phase, the weighted average consensus filter is developed, which allows each sensor node to find an estimate of the value of the scalar field at each time step. In the second phase, the average consensus filter is used to allow each sensor node to find a confidence of the estimate at each time step. The final estimate of the value of the scalar field is iteratively updated during the movement of the mobile sensors via weighted average. Second, we develop the distributed flocking-control algorithm to drive the mobile sensors to form a network and track the virtual leader moving along the field when only a small subset of the mobile sensors know the information of the leader. Experimental results are provided to demonstrate our proposed algorithms.

  4. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  5. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  6. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  7. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  8. Image Finder Mobile Application Based on Neural Networks

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2017-04-01

    Full Text Available Nowadays taking photos via mobile phone has become a very important part of everyone’s life. Almost each and every person who has a smart phone also has thousands of photos in their mobile device. At times it becomes very difficult to find a particular photo from thousands of photos, and it takes time. This research was done to come up with an innovative solution that could solve this problem. The solution will allow the user to find the required photo by simply drawing a sketch on the objects in the required picture, for example a tree or car, etc. Two types of supervised Artificial Neural Networks are used for this purpose; one is trained to identify the handmade sketches and other is trained to identify the images. The proposed approach introduces a mechanism to relate the sketches with the images by matching them after training. The experimentation results for testing the trained neural networks reached 100% for the sketches, and 84% for the images of two objects as a case study.

  9. The Emerging Business Models and Value Proposition of Mobile Health Clinics.

    Science.gov (United States)

    Aung, Khin-Kyemon; Hill, Caterina; Bennet, Jennifer; Song, Zirui; Oriol, Nancy E

    2015-12-01

    Mobile health clinics are increasingly used to deliver healthcare to urban and rural populations. An estimated 2000 vehicles in the United States are now delivering between 5 and 6 million visits annually; however, despite this growth, mobile health clinics represent an underutilized resource that could transform the way healthcare is delivered, especially in underserved areas. Preliminary research has shown that mobile health clinics have the potential to reduce costs and improve health outcomes. Their value lies primarily in their mobility, their ability to be flexibly deployed and customized to fit the evolving needs of populations and health systems, and their ability to link clinical and community settings. Few studies have identified how mobile health clinics can be sustainably utilized. We discuss the value proposition of mobile health clinics and propose 3 potential business models for them-adoption by accountable care organizations, payers, and employers.

  10. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prasan Kumar Sahoo

    2012-09-01

    Full Text Available Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  11. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  12. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  13. [Mobile-phone e-mail use, social networks, and loneliness among Japanese high school students].

    Science.gov (United States)

    Ogata, Yasuko; Izumi, Yukiko; Kitaike, Tadashi

    2006-07-01

    The purposes of this study were to assess the loneliness of Japanese high school students who own and use a mobile phone, to clarify the relationships between students' loneliness and their social network and frequency of use of e-mail feature, and to demonstrate relationships with a student's social network and recognition of the benefits and drawbacks of mobile phone use. The participants were 227 students from two classes in each grade of a high school in the Kanto region of Japan. Participants answered a questionnaire covering the UCLA Loneliness Scale as well as questions pertaining to the circumstances of use of their mobile phones, their social networks (e.g., number of friends), and their perceptions of the benefits and drawbacks of mobile phone use. The questionnaires of students owning a mobile phone were analyzed. Total scores for the UCLA Loneliness Scale were calculated, and factor analysis was performed for the benefits and drawbacks. A total of 220 questionnaires were returned, for which 94.1 percent of respondents owned a mobile phone. The percentages of male and female respondents were 58% and 42%. Chronbach's alpha for the UCLA Loneliness Scale (total score) was 0.87, a result similar to previous studies with high school and university students. Factor analysis revealed five factors associated with the benefits and drawbacks of mobile phone use. Multiple-regression analysis showed that 42.9% of the variance in "frequency of e-mail use" was explained by grade level, frequency of mobile phone use, and two of the five factors from the benefits and drawbacks ("difficulty of communication," and "possible sleep loss due to nighttime e-mailing"). Stepwise multiple-regression analysis revealed that 24.4% of the variance in UCLA Loneliness Score was explained by gender, the frequency of e-mail use, the number of friends and the presence/absence of a girlfriend or boyfriend. Presence of an active social network and frequent e-mailing by mobile phone reduced

  14. Energy-Efficient Crowdsensing of Human Mobility and Signal Levels in Cellular Networks

    Science.gov (United States)

    Foremski, Paweł; Gorawski, Michał; Grochla, Krzysztof; Polys, Konrad

    2015-01-01

    The paper presents a practical application of the crowdsensing idea to measure human mobility and signal coverage in cellular networks. Currently, virtually everyone is carrying a mobile phone, which may be used as a sensor to gather research data by measuring, e.g., human mobility and radio signal levels. However, many users are unwilling to participate in crowdsensing experiments. This work begins with the analysis of the barriers for engaging people in crowdsensing. A survey showed that people who agree to participate in crowdsensing expect a minimum impact on their battery lifetime and phone usage habits. To address these requirements, this paper proposes an application for measuring the location and signal strength data based on energy-efficient GPS tracking, which allows one to perform the measurements of human mobility and radio signal levels with minimum energy utilization and without any engagement of the user. The method described combines measurements from the accelerometer with effective management of the GPS to monitor the user mobility with the decrease in battery lifetime by approximately 20%. To show the applicability of the proposed platform, the sample results of signal level distribution and coverage maps gathered for an LTE network and representing human mobility are shown. PMID:26340633

  15. Double-NAT Based Mobility Management for Future LTE Networks

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture and develop a novel IP mobility management solution for it. The proposed solution can handle traffic redirecting and IP address continuity above the distributed anchor

  16. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  17. Contract-Based Incentive Mechanism for Mobile Crowdsourcing Networks

    Directory of Open Access Journals (Sweden)

    Nan Zhao

    2017-09-01

    Full Text Available Mobile crowdsourcing networks (MCNs are a promising method of data collecting and processing by leveraging the mobile devices’ sensing and computing capabilities. However, because of the selfish characteristics of the service provider (SP and mobile users (MUs, crowdsourcing participants only aim to maximize their own benefits. This paper investigates the incentive mechanism between the above two parties to create mutual benefits. By modeling MCNs as a labor market, a contract-based crowdsourcing model with moral hazard is proposed under the asymmetric information scenario. In order to incentivize the potential MUs to participate in crowdsourcing tasks, the optimization problem is formulated to maximize the SP’s utility by jointly examining the crowdsourcing participants’ risk preferences. The impact of crowdsourcing participants’ attitudes of risks on the incentive mechanism has been studied analytically and experimentally. Numerical simulation results demonstrate the effectiveness of the proposed contract design scheme for the crowdsourcing incentive.

  18. An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Prasad, Ramjee

    deliberation. To tackle these two problems, Mobile Wireless Sensor Networks (MWSNs) is a better choice. In MWSN, Sensor nodes move freely to a target area without the need for any special infrastructure. Due to mobility, the routing process in MWSN has become more complicated as connections in the network can...... such as Average Energy consumption, Control Overhead, Reaction Time, LQI, and HOP Count. The authors study the influence of energy heterogeneity and mobility of sensor nodes on the performance of EMRP. The Performance of EMRP compared with Simple Hybrid Routing Protocol (SHRP) and Dynamic Multi-Objective Routing...

  19. Tracking and Treating Mobile Populations. The TB Net System. Migrant Clinicians Network Monograph Series. = El Sistema de Red para la TB.

    Science.gov (United States)

    Migrant Clinicians Network, Inc., Austin, TX.

    A comprehensive tracking and referral network that helps provide continuity of care for mobile populations with active tuberculosis (TB) or TB infection is considered essential for effective treatment of TB. However, the interstate referral system that exists between state health departments has been highly inefficient for serving migrant…

  20. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can