Advances in Mobility Services and Protocols for Cognitive and Ubiquitous Applications
نویسنده
چکیده
With the ever-increasing number of mobile, smart devices and applications, mobility services have become an important issue in recent research and is attracting the attention of many researchers and developers from mobile and computing domain. Current research efforts try to advance the state in the art in the definition, discovery and use of advanced mobile services for transportation systems, patterns of user mobility, dynamic service management, computer forensics and cognitive ubiquitous applications. Due to the importance of mobility services and protocols for cognitive and ubiquitous applications, we edit this special issue, which collects high quality papers that cover and discuss different aspects of mobile services and applications. The main focus of the selected articles is on technical approaches to analyze and propose new mobile services for a wide range of applications. The special issue consists of six high quality papers carefully selected after a strict review process during several rounds of review. The special issue is organized as follows. The first article [1], ‘‘Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs” by Chyi-Ren Dow, Yu-Hong Lee, Pa Hsuan, Yi-Tung Lee, and Shiow-Fen Hwang, proposes schemes to effectively circulate and discover service information with the aid of public transportation systems. The authors have proposed an architecture based on bus routes that can effectively disseminate and discover the required data through the traffic infrastructure and mobile vehicles. The second article [2], “Behavioural Patterns Analysis of Low Entropy People Using Proximity Data” by Muhammad Awais Azamy, Jonathan Loo, Sardar Kashif Ashraf Khan, Usman Naeem, Muhammad Adeel, and Waleed Ejaz, aims to find repeated patterns in daily life activities and individual behaviours from wireless proximity data (Bluetooth proximity data). Their approach showed the usefulness for activities and behaviour detection of individuals for both short term daily routines and the long term routines. The next article [3], “Rethinking IP Mobility Management” by Karl Andersson and Muslim Elkotob, overviews existing solutions and suggests a new distributed and dynamic mobility management scheme. For that, the authors have analyzed existing protocols such as the GPRS Tunneling Protocol (GTP), Mobile IP, Proxy Mobile IP, and the Locator/ Identifier Split Protocol (LISP). The proposed scheme is then evaluated against existing static approaches. In [4], “Digital scene of crime: technique of profiling users” by Clara Colombiniy and Antonio Colella, investigates a method of computer forensics for analyzing digital memories of electronic devices. The method is used for reconstructing the users’ identity from the “digital footprints of users” discovered on the device, such as personal computers, mobile phones, storage areas, etc. Their approach is useful in operations against organized crime, anti-terrorism and intelligence operations.
منابع مشابه
Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملA Fuzzy Realistic Mobility Model for Ad hoc Networks
Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...
متن کاملNetwork Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...
متن کاملUbiquitous Application Model
Advances in network communications and embedded technologies, and the increasing popularity of personal digital assistants and cell-phones is turning Ubiquitous Computing into a reality. The high availability of data and services promotes a new computational environment that goes beyond the physical limits of personal computers. This paper presents a generic model for ubiquitous applications, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JoWUA
دوره 3 شماره
صفحات -
تاریخ انتشار 2012