-
Online Learning Support Service System Architecture Based on Location Service Architecture Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-26 Yongyan Zhao; Shaonan Shan
With the development of network, location-based service architecture is gradually applied to the learning support service system. The purpose of this study is to develop an online learning support system using allocation information service architecture. In this study, the 2019 year of this study was selected as a research material through an online learning support service system within six months
-
Method of Profanity Detection Using Word Embedding and LSTM Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-25 MoungHo Yi; MyungJin Lim; Hoon Ko; JuHyun Shin
With the rising number of Internet users, there has been a rapid increase in cyberbullying. Among the types of cyberbullying, verbal abuse is emerging as the most serious problem, for preventing which profanity is being identified and blocked. However, users employ words cleverly to avoid blocking. With the existing profanity discrimination methods, deliberate typos and profanity using special characters
-
A Hybrid Dynamic Probability Mutation Particle Swarm Optimization for Engineering Structure Design Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-25 Qiuyu Li; Zhiteng Ma
Particle swarm optimization (PSO) is a common metaheuristic algorithm. However, when dealing with practical engineering structure optimization problems, it is prone to premature convergence during the search process and falls into a local optimum. To strengthen its performance, combining several ideas of the differential evolution algorithm (DE), a dynamic probability mutation particle swarm optimization
-
Application of Computational Intelligence Algorithms in Radio Propagation: A Systematic Review and Metadata Analysis Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-24 Quadri Ramon Adebowale; Nasir Faruk; Kayode S. Adewole; Abubakar Abdulkarim; Lukman A. Olawoyin; Abdulkarim A. Oloyede; Haruna Chiroma; Aliyu D. Usman; Carlos T. Calafate
The importance of wireless path loss prediction and interference minimization studies in various environments cannot be over-emphasized. In fact, numerous researchers have done massive work on scrutinizing the effectiveness of existing path loss models for channel modeling. The difficulties experienced by the researchers determining or having the detailed information about the propagating environment
-
Mobile Users’ Online Luxury Consumption in China: The Moderating Role of Face Consciousness Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-24 Liang Ma; Xin Zhang; Peng Yu
Attracting more consumers through mobile online platforms has become the most important thing for luxury brands. However, few studies have explored how cultural context, as exemplified by face consciousness and source credibility, influences the online luxury consumption and promotion of mobile users. To fill that research gap, this study constructed a research model of Chinese consumers to examine
-
Analyzing and Evaluating Smart Cities for IoT Based on Use Cases Using the Analytic Network Process Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-23 Chao Huang; Shah Nazir
With the passage of time, the world population is growing. Proper utilization of resources and other devices is tremendously playing an important role to easily examine, manage, and control the resources of the Internet of Things (IoT) in the smart city. Research in the field of IoT has revolutionized the services mostly in smart cities. In the smart city, the applications of IoT are utilized without
-
Air Quality Prediction Based on a Spatiotemporal Attention Mechanism Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-19 Xiangyu Zou; Jinjin Zhao; Duan Zhao; Bin Sun; Yongxin He; Stelios Fuentes
With the rapid development of the Internet of Things and Big Data, smart cities have received increasing attention. Predicting air quality accurately and efficiently is an important part of building a smart city. However, air quality prediction is very challenging because it is affected by many complex factors, such as dynamic spatial correlation between air quality detection sensors, dynamic temporal
-
A Hyper-Heuristic Heterogeneous Multisensor Node Scheme for Energy Efficiency in Larger Wireless Sensor Networks Using DEEC-Gaussian Algorithm Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-15 Oluwasegun Julius Aroba; Nalindren Naicker; Timothy Adeliyi
A wireless sensor network (WSN) is an intellect-sustainable network that comprises multiple spatially distributed sensor nodes and several sink nodes that collect data from sensors. WSNs remain an active research area in the literature due to challenging factors such as the selection of sensor location according to a given premise, finding optimal routing algorithm, and ensuring energy efficiency and
-
A Dual-Mode Medium Access Control Mechanism for UAV-Enabled Intelligent Transportation System Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-15 Muhammad Asghar Khan; Tanweer Ahmad Cheema; Insaf Ullah; Fazal Noor; Sajjad Ur Rehman; Ateeq Ur Rehman; Muhammad Adnan Aziz
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new landscape requires a stable, flexible, and business-friendly base of connectivity, networking, and computing technology, in which Unmanned Aerial Vehicles (UAVs) can play
-
Brain Exercises Anywhere Anytime: A Self-Training System for Executive Function Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-12 Sheng-Hsiang Yu; Wei-Lun Lin; Sheng-Wei Wang
Smartphones are ideal for tracking individuals’ behavioral responses. Traditional laboratory-based psychological trials aimed at training cognitive functions face a problem when participants cannot finish their tasks within a scheduled time. In this paper, we developed a self-training system that helps people to enhance their cognitive functions through mental exercises. The system utilizes the advantages
-
Hard Disk Drive Failure Prediction for Mobile Edge Computing Based on an LSTM Recurrent Neural Network Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-12 Jing Shen; Yongjian Ren; Jian Wan; Yunlong Lan
With the increase in intelligence applications and services, like real-time video surveillance systems, mobile edge computing, and Internet of things (IoT), technology is greatly involved in our daily life. However, the reliability of these systems cannot be always guaranteed due to the hard disk drive (HDD) failures of edge nodes. Specifically, a lot of read/write operations and hazard edge environments
-
Data Mining Technology Application in False Text Information Recognition Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-11 Jie Wan; Xue Cao; Kun Yao; Donghui Yang; E. Peng; Yong Cao
False information on the Internet is being heralded as serious social harm to our society. To recognize false text information, in this paper, an effective method for mining text features is proposed in the field of false drug advertisements. Firstly, the data of false drug advertisements and real drug advertisements were collected from the official websites to build a database of false and real drug
-
Interinstitutional Research Team Formation Based on Bibliographic Network Embedding Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-11 O-Joun Lee; Seungha Hong; Jin-Taek Kim
This study aims at forming research teams for interinstitutional collaborations. Research institutes have their own purposes and topics of interest. Thus, supporting joint research between multiple institutes, we have to consider not only synergies between scholars but also purposes of the institutes. To solve this problem, we propose a bibliographic network embedding method that can learn characteristics
-
Modelling Reachability in Transport Networks: Using Alternative Visual Representations in Interactive Linked‐Views to Gain Valuable Insights Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-08 Rehmat Ullah; Laiq Hasan; Farman Ullah; Ajmal Khan; You-Ze Cho
Most people use maps for navigation. Geographic maps visually represent physical distance between locations. These maps sometimes provide a false impression of travel times. Two cities geographically close to each other might be “far apart” in terms of travel time because of slower connections, whereas two cities geographically distant might be “nearby” in terms of travel time because of faster connections
-
Innovative Marketing Framework for Enterprises Using Edge-Enabled Data Analysis Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-08 Guangming Wang; Yifeng Wang
An effective marketing strategy has become a challenging task with the development of the social economy for the reform and innovation of many domestic and foreign enterprises. The idea of edge computing is also gaining prominence and is broadly recognized. Edge-enabled solutions provide computing, analysis, storage, and control nearer to the edge of the network. The existing literature highlights
-
Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-02-03 Hongzhi Li; Dezhi Han; Mingdong Tang
With the rapid development of information technology, logistics systems are developing towards intelligence. The Internet of Things (IoT) devices throughout the logistics network could provide strong support for smart logistics. However, due to the limited computing and storage resources of IoT devices, logistics data with user sensitive information are generally stored in a centralized cloud center
-
Big Data Insights and Comprehensions in Industrial Healthcare: An Overview Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-31 Weiwei He; Shah Nazir; Zahid Hussain
Big data are the data which need to be shaped for their volume, size, and shape in order to extract meaningful information for an explicit purpose. Data are ever playing a significant role in organization and industry for their daily activities to functional smoothly. The volume of healthcare data is increasing with the rising of technology and passage of time. This rise in volume of data can be a
-
Community Public Safety Evaluation System Based on Location Information Service Architecture Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-28 Zili Zhao
The establishment of communities is for the better operation and management of cities, and community safety has gradually become a topic of increasing concern. It is not only an important part of the community public safety system, but also the foundation of social and economic development. With the improvement of the overall economic level of society, wireless network coverage has been greatly improved
-
Deep Learning for Mobile Crowdsourcing Techniques, Methods, and Challenges: A Survey Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-28 Bingchen Liu; Weiyi Zhong; Jushi Xie; Lingzhen Kong; Yihong Yang; Chuang Lin; Hao Wang
With the ever-increasing popularity of mobile computing technology and the wide adoption of outsourcing strategy in labour-intensive industrial domains, mobile crowdsourcing has recently emerged as a promising resolution for solving complex computational tasks with quick response requirements. However, the complexity of a mobile crowdsourcing task makes it hard to pursue an optimal resolution with
-
Dimensionality Reduction of Social Media Application Attributes for Ubiquitous Learning Using Principal Component Analysis Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-25 Caitlin Sam; Nalindren Naicker; Marion Adebiyi
Ubiquitous learning is anywhere and anytime learning using e-learning and m-learning platforms. Learning takes place regularly on mobile devices. School-based instructors and learners have capitalised on ubiquitous learning platforms in unprecedented times such as COVID-19. There has been a proliferation of social media applications for ubiquitous learning. There are a vast number of attributes of
-
Adoption of Mobile Government Cloud from the Perspective of Public Sector Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-21 Yikai Liang; Weijie Wang; Kunxiang Dong; Guijie Zhang; Guijie Qi
Mobile cloud computing (MCC) has been widely used in every aspect of our society, bringing both advantages and challenges. However, the adoption of MCC technology is still at an early stage of implementation in the governments. To promote the adoption and diffusion of MCC in the government area, exploring the determinants and influence mechanisms of mobile cloud computing-based government (m-Gov cloud)
-
Analyzing the Dynamic Data Sponsoring in the Case of Competing Internet Service Providers and Content Providers Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-19 Mohamed El Amrani; Hamid Garmani; Driss Ait Omar; Mohamed Baslam; Brahim Minaoui
With a sponsored content plan on the Internet market, a content provider (CP) negotiates with the Internet service providers (ISPs) on behalf of the end-users to remove the network subscription fees. In this work, we have studied the impact of data sponsoring plans on the decision-making strategies of the ISPs and the CPs in the telecommunications market. We develop game-theoretic models to study the
-
Double Auction-Based Two-Level Resource Allocation Mechanism for Computation Offloading in Mobile Blockchain Application Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-19 Li Li; Yue Li; Ruotong Li
It is increasingly popular that platforms integrate various services into mobile applications due to the high usage and convenience of mobile devices, many of which demand high computational capacities and energy, such as cryptocurrency services based on blockchain. However, it is hard for mobile devices to run these services due to the limited storage and computational capacity. In this paper, the
-
Joint Encryption Scheme Based on the Chaotic DCT Matrix and SLM Algorithm in an OFDM-PON System Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-11 Shuai Zhang; Liqun Huang; Mingxu Zhu
In order to effectively solve the problem of data transmission security and peak-to-average ratio (PAPR) in an orthogonal frequency division multiplexing passive optical network (OFDM-PON) transmission system, in this paper, a joint encryption scheme of discrete cosine transform (DCT) and selective mapping (SLM) based on chaotic mapping is proposed. In this scheme, the chaotic sequence of a 3D Lorenz
-
NCDN: A Node-Failure Resilient CDN Solution with Reinforcement Learning Optimization Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-11 Zhihao Wang; Shengyong Du; Min Ren
Content Delivery Networks (CDNs) have enabled large-scale, reliable, and efficient content distribution over the Internet. Although CDNs have been very successful in serving a large portion of Internet traffic, they have several drawbacks. Despite their distributed nature, they rely on largely centralized management and replication. This can affect availability in case of node failure. Further, CDNs
-
Mobile Coverage in Rural Sweden: Analysis of a Comparative Measurement Campaign Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-05 P. G. Sudheesh; Jaap van de Beek
Under the umbrella of 1G to 5G, different technologies have been used to provide mobile communication. Various technologies are being proposed to bring a person in remote area under coverage. However, a statistical analysis on what these users get from already existing technologies has not been carried out. We fill this gap by carrying out such a study using a measurement campaign, where we present
-
The Path Optimization Algorithm of Car Navigation System considering Node Attributes under Time-Invariant Network Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-04 Dan-dan Zhu; Jun-qing Sun
Vehicle path planning plays a key role in the car navigation system. In actual urban traffic, the time spent at intersections accounts for a large proportion of the total time and cannot be ignored. Therefore, studying the shortest path planning problem considering node attributes has important practical significance. In this article, we study the vehicle path planning problem in time-invariant networks
-
Two Effective Strategies to Support Cross-Organization Emergency Resource Allocation Optimization Mob. Inf. Syst. (IF 1.508) Pub Date : 2021-01-04 Ying Gao; Cong Liu; Qingtian Zeng; Hua Duan
Cross-organization emergency resource allocation optimization problem is essential to guarantee a successful emergency disposal, and it has become a research focus of modern emergency management. Generally speaking, there are two possible types of resource allocation scenarios: (1) if the emergency resources are overallocated, on the one hand, parallel execution of independent emergency activities
-
Pattern Recognition and Neural Network-Driven Roller Track Analysis via 5G Network Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-30 Yuliang Guo
Roller skating is an important and international physical exercise, which has beautiful body movements to be watched. However, the falling of roller athletes also happens frequently. Upon the roller athletes’ fall, it means that the whole competition is over and even the roller athletes are perhaps injured. In order to stave off the tragedy, the roller track can be analyzed and be notified the roller
-
An Adaptive Grid and Incentive Mechanism for Personalized Differentially Private Location Data in the Local Setting Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-30 Kangsoo Jung; Seog Park
With the proliferation of wireless communication and mobile devices, various location-based services are emerging. For the growth of the location-based services, more accurate and various types of personal location data are required. However, concerns about privacy violations are a significant obstacle to obtain personal location data. In this paper, we propose a local differential privacy scheme in
-
Analysis and Prediction of Overloaded Extra-Heavy Vehicles for Highway Safety Using Machine Learning Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-30 Yi-Hsin Lin; Suyu Gu; Wei-Sheng Wu; Rujun Wang; Fan Wu
Along with the prosperity and rapid development of the national economy, the transportation industry has rapidly developed in China. However, overloaded vehicles have been causing frequent traffic accidents. Thus, to alleviate or resolve the corresponding problems associated with highway engineering safety and the market economy, an improved technique for overload management is urgently required. In
-
The Study of a Five-Dimensional Emotional Model for Facial Emotion Recognition Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-28 Hanzhong Zhang; Jibin Yin; Xiangliang Zhang
Based on basic emotion theory and the PAD emotion model that can describe continuous emotion changes, we first propose a more general concept of a five-dimensional emotion model to better meet the needs in the area of emotion recognition. We determined the relationship between its dimensions and basic emotions and used a Pearson correlation analysis, multilayer perceptron, and other methods to compare
-
Performance Improvement Design of Bluetooth Low Energy-Based Wireless Indoor Positioning Systems Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-28 Kriangkrai Maneerat; Kamol Kaemarungsi
The systematic design of wireless indoor positioning systems can offer another essential approach to achieving the required performance objectives aside from using suitable location determination algorithms. This manuscript investigates Bluetooth Low Energy- (BLE-) based wireless indoor positioning systems and how adjusting the system design parameters can affect their location determination performance
-
A Deep Random Forest Model on Spark for Network Intrusion Detection Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-22 Zhenpeng Liu; Nan Su; Yiwen Qin; Jiahuan Lu; Xiaofei Li
This paper focuses on an important research problem of cyberspace security. As an active defense technology, intrusion detection plays an important role in the field of network security. Traditional intrusion detection technologies have problems such as low accuracy, low detection efficiency, and time consuming. The shallow structure of machine learning has been unable to respond in time. To solve
-
A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-21 Xudong Jia; Ning Hu; Shi Yin; Yan Zhao; Chi Zhang; Xinda Cheng
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency data channels for massive IoT terminals to access the core business network. At the same time, it also brings higher security threats and challenges. Terminal identity authentication is an important security mechanism to ensure the core business network; however, most of the existing solutions adopt a
-
A New Efficient and Secure Secret Reconstruction Scheme (SSRS) with Verifiable Shares Based on a Symmetric Bivariate Polynomial Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-15 Chingfang Hsu; Lein Harn; Shan Wu; Lulu Ke
Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recently, a new type of SS scheme, called the secure secret reconstruction scheme (SSRS), was proposed, which ensures that the secret can only be recovered by participants who present valid shares. In other words, if any outside adversary participated in the secret reconstruction without knowing any valid share
-
User Acceptance of Internet of Vehicles Services: Empirical Findings of Partial Least Square Structural Equation Modeling (PLS-SEM) and Fuzzy Sets Qualitative Comparative Analysis (fsQCA) Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-12 Yikai Liang; Guijie Zhang; Feng Xu; Weijie Wang
Recently, IoV-based services and vehicles have come to the forefront as part of the growing market for the automobile industry. Since IoV-based services and vehicles were introduced, they have been expected to grow rapidly. However, contrary to optimistic expectations for future market growth, the IoV-based services and vehicles market has appeared to hit a roadblock and remains at an early market
-
Self-Image Congruence, Functional Congruence, and Mobile App Intention to Use Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-12 Shuhui Wu; Minglun Ren; Abdul Hameed Pitafi; Tahir Islam
Although the research on the technology acceptance model (TAM) has received much attention, limited research has been done on the role of self-image congruence on the mobile application (app) intention to use. Therefore, leveraging the lens of the self-congruence theory, the primary objective of the present research is to examine the impact of self-image and functional congruence on the mobile app
-
In-Network Caching and Edge Computing-Based Live Broadcasting Optimization for Football Competitions Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-12 Zhigang Li
The business of football competitions is called the number one sport in the world, thanks to more than one billion people’s attention. With the development of big convergence media, the live broadcasting of football competitions gradually becomes industrialization and commercialization, which has a direct relationship with economic growth. For the live broadcasting of football competitions, the users
-
LEO Satellite Channel Allocation Scheme Based on Reinforcement Learning Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-12 Fei Zheng; Zhao Pi; Zou Zhou; Kaixuan Wang
Delay, cost, and loss are low in Low Earth Orbit (LEO) satellite networks, which play a pivotal role in channel allocation in global mobile communication system. Due to nonuniform distribution of users, the existing channel allocation schemes cannot adapt to load differences between beams. On the basis of the satellite resource pool, this paper proposes a network architecture of LEO satellite that
-
Mobile Security: Threats and Best Practices Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-07 Paweł Weichbroth; Łukasz Łysik
Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained
-
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-27 Jiho Shin; Ilsun You; Jung Taek Seo
The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information
-
HAL-Based Resource Manipulation Monitoring on AOSP Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-02 Thien-Phuc Doan; Jungsoo Park; Souhwan Jung
Nowadays, Android malware uses sensitive APIs to manipulate an Android device’s resources frequently. Conventional malware analysis uses hooking techniques to detect this harmful behavior. However, this approach is facing many problems, such as low coverage rate and computational overhead. To solve this problem, we proposed HALWatcher, an alternative technique to monitor resource manipulation on Android
-
Influence of Native Video Advertisement Duration and Key Elements on Advertising Effectiveness in Mobile Feeds Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-12-02 Bingcheng Wang; Man Wu; Pei-Luen Patrick Rau; Qin Gao
This research investigated the influence of advertisement (ad) duration and key elements (titles, logos, and texts) on advertising effectiveness in mobile feeds. We recruited 40 participants (27 men and 13 women) who are aged from 20 to 43 years (M = 29.33, SD = 6.67). The participants were assigned randomly to four groups to watch four different types of ads: 6-second ads with key elements, 15-second
-
Joint Resource Allocation and Power Control Based on Vehicle’s Motion Characteristics in NOMA-Based V2V Systems Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-29 Xinyu Gu; Yiyi Xu; Jiahan Zhang
Due to the high spectrum utilization of Nonorthogonal Multiple Access (NOMA), it becomes one of the potential candidate technologies for future wireless communication systems. Meanwhile, in New Radio, Vehicle to Everything (V2X) has been proposed as a promising issue in the 3rd Generation Partnership Project (3GPP). This paper studies the resource allocation mechanism with power control strategy which
-
Optimization Strategy of Multiarea Interconnected Integrated Energy System Based on Consistency Theory Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-28 Yuan Yu; Tieyan Zhang; Yan Zhao
A collaborative optimization strategy of an integrated energy system aiming at improving energy efficiency is studied in this paper for the cluster optimization of an integrated energy system (IES). In this paper, an improved discrete consistency method based on the coordination optimization method for IES is proposed. An IES model considering the mixed energy supply of electricity, heat, and gas is
-
Failure-Aware and Delay-Predicted Multipath Virtual Queue Scheduling for Multimedia Transmission in Edge IoT Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-27 Jiuren Qin; Zhaoxue Wang; Kai Gao; Lujie Zhong
The spread of Edge Internet of Things (IoT) radically changes our lifestyle. However, the multimedia services in edge IoT are still stuck by inefficiency. The dynamic typologies perplex the transmission of massive real-time data. To solve this problem, multipath transmission control protocol (MPTCP) which has a natural advantage in transmission robustness and bandwidth aggregation is becoming a good
-
Heterogeneous Network Spectrum Allocation Scheme for Network-Assisted D2D Communications Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-25 Sungwook Kim
To meet the drastic growth of mobile traffic, next-generation wireless networks integrate existing technologies such as dual-connectivity (DC) and network-assisted device-to-device (D2D) communications. In this paper, we present a new spectrum allocation scheme for a heterogeneous system, which incorporates both technologies. For the effective collaboration of individual network agents, we employ the
-
DRL-Based Edge Computing Model to Offload the FIFA World Cup Traffic Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-19 Hongyi Li; Xinrui Che
In recent years, the volume of global video traffic has been increasing rapidly and it is considerably significant to offload the traffic during the process of video transmission and improve the experience of users. In this paper, we propose a novel traffic offloading strategy to provide a feasible and efficient reference for the following 2022 FIFA World Cup held in Qatar. At first, we present the
-
A Smart System for Sitting Posture Detection Based on Force Sensors and Mobile Application Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-19 Slavomir Matuska; Martin Paralic; Robert Hudec
The employees’ health and well-being are an actual topic in our fast-moving world. Employers lose money when their employees suffer from different health problems and cannot work. The major problem is the spinal pain caused by the poor sitting posture on the office chair. This paper deals with the proposal and realization of the system for the detection of incorrect sitting positions. The smart chair
-
Different Approximation Algorithms for Channel Scheduling in Wireless Networks Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-16 Qiufen Ni; Chuanhe Huang; Panos M. Pardalos; Jia Ye; Bin Fu
We introduce a new two-side approximation method for the channel scheduling problem, which controls the accuracy of approximation in two sides by a pair of parameters . We present a series of simple and practical-for-implementation greedy algorithms which give constant factor approximation in both sides. First, we propose four approximation algorithms for the weighted channel allocation problem: 1
-
Research and Development of Palmprint Authentication System Based on Android Smartphones Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-16 Xinman Zhang; Kunlei Jing; Guokun Song
The security problems of online transactions by smartphones reveal extreme demand for reliable identity authentication systems. With a lower risk of forgery, richer texture, and more comfortable acquisition mode, compared with face, fingerprint, and iris, palmprint is rarely adopted for identity authentication. In this paper, we develop an effective and full-function palmprint authentication system
-
WiFi-Based Virtual Access Network Scheduling for Downlink Traffic Dominated Smart Spaces Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-06 Pin Lv; Siyu Pan; Jia Xu
WiFi networks are widely and densely deployed as infrastructure in smart spaces. However, differentiated services with guaranteed access bandwidths are not supported in traditional WiFi networks. In this paper, wireless virtual access networks are established to provide guaranteed downlink bandwidths for primary users. For each primary user with a demanded access bandwidth, a group of APs are coordinated
-
Deep Learning-Based Signal-To-Noise Ratio Estimation Using Constellation Diagrams Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-06 Xiaojuan Xie; Shengliang Peng; Xi Yang
Signal-to-noise ratio (SNR) estimation is a fundamental task of spectrum management and data transmission. Existing methods for SNR estimation usually suffer from significant estimation errors when SNR is low. This paper proposes a deep learning (DL) based SNR estimation algorithm using constellation diagrams. Since the constellation diagrams exhibit different patterns at different SNRs, the proposed
-
A New Visual Cryptography-Based QR Code System for Medication Administration Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-03 Yen-Wu Ti; Shang-Kuan Chen; Wen-Chieh Wu
In health care, medication errors can result in serious health risks to patients, and hospitals require a secure medication administration system to prevent such errors. This paper therefore proposes a secure medication administration method based on threshold sharing technology. When a patient visits a doctor and the doctor prescribes n medications, a photo and the personal information of the patient
-
Development of Hepatitis Disease Detection System by Exploiting Sparsity in Linear Support Vector Machine to Improve Strength of AdaBoost Ensemble Model Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-03 Wasif Akbar; Wei-ping Wu; Sehrish Saleem; Muhammad Farhan; Muhammad Asim Saleem; Ashir Javeed; Liaqat Ali
Hepatitis disease is a deadliest disease. The management and diagnosis of hepatitis disease is expensive and requires high level of human expertise which poses challenges for the health care system in underdeveloped and developing countries. Hence, development of automated methods for accurate prediction of hepatitis disease is inevitable. In this paper, we develop a diagnostic system which hybridizes
-
Performance Optimization Mechanism of Adolescent Physical Training Based on Reinforcement Learning and Markov Model Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-11-02 Mingze Wei; Lei Yuan
Upon the teenagers’ failure to obtain the plenty of physical exercises at the growth and development stage, the related central nervous system is prone to degeneration and the physical fitness starts to decline gradually. In fact, through monitoring the exercise process real-timely and quantifying the exercise data, the adolescent physical training can be effectively conducted. For such process, it
-
Human Falling Detection Algorithm Based on Multisensor Data Fusion with SVM Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-10-31 Daohua Pan; Hongwei Liu; Dongming Qu; Zhan Zhang
Falling is a common phenomenon in the life of the elderly, and it is also one of the 10 main causes of serious health injuries and death of the elderly. In order to prevent falling of the elderly, a real-time fall prediction system is installed on the wearable intelligent device, which can timely trigger the alarm and reduce the accidental injury caused by falls. At present, most algorithms based on
-
The Effect of Caching on CP and ISP Policies in Information-Centric Networks Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-10-30 Hamid Garmani; Driss Ait Omar; Mohamed El Amrani; Mohamed Baslam; Mostafa Jourhmane
Internet traffic volume is increasing, and this causes scalability issues in content delivery. Information-centric network has been introduced to support this increase in Internet traffic through caching. While collaborative caching in information-centric network is a crucial feature to improve network performance and reduce delivery costs in content distribution, the current pricing strategies on
-
A Method to Diagnose, Improve, and Evaluate Children’s Learning Using Wearable Devices Such as Mobile Devices in the IoT Environment Mob. Inf. Syst. (IF 1.508) Pub Date : 2020-10-30 Mohammad Moradi; Kheirollah Rahsepar Fard
Every day we see an increasing tendency to use technology in education. In recent years, the impact of technology on the education process has received much attention. One of the important effects of technology is that it increases children’s motivation and self-confidence and increases group collaboration. The purpose of this paper is to transform the traditional classroom into a modern classroom
Contents have been reproduced by permission of the publishers.