Loading...
Search for: mobility
0.016 seconds
Total 736 records

    Investigating the Behavioral Intention in Using Mobile-bank Application Using Theory of Planned Behavior

    , M.Sc. Thesis Sharif University of Technology Ghavam, Mohammad Masoud (Author) ; Kianmehr, Mahdi (Supervisor)
    Abstract
    The use of mobile banking software in today's society is very common and mobile banking applications provide many different services for people. In Iran, on the other hand, most of the transactions take place in the context of the use of ATMs and websites, which have fewer services than mobile apps. In the present study, an attempt had done to find effective factors and their effectiveness on people's intention to use the mobile bank application. To do this, the theory of planned behavior by Ajzen is used in which people intention is affected by three main parts of attitude, subjective norm, and perceived behavioral control. Each of these variables consists of beliefs that constitute the... 

    Mobile cloud management: A new framework

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 48-53 ; 9781467325691 (ISBN) Salehi, M. J ; Khalaj, B. H ; Katz, M ; Fazelnia, G ; Karimi, P ; Sharif University of Technology
    2012
    Abstract
    Smartphones can be viewed as resource pools capable of communicating with their outside world. Such communication capabilities provide unique opportunity for sharing resources, which would result in new possibilities for end users. In this paper, we present a new framework designed for managing mobile local networks, also referred to as Mobile Clouds. In this framework, mobility of nodes is managed by selecting one leader for each cloud, which is responsible for all cloud-level decisions, as well as processing all incoming data from other users. We also evaluate and discuss our proposed framework under different scenarios  

    Minimizing the error of time difference of arrival method in mobile networks

    , Article 2005 International Conference on Wirelessand Optical Communications Networks, Dubai, 6 March 2005 through 8 March 2005 ; 2005 , Pages 328-332 ; 0780390199 (ISBN); 9780780390195 (ISBN) Malekitabar, A ; Aghababa, H ; Radfar, M. H ; Khalaj, B. H ; Sharif University of Technology
    2005
    Abstract
    Estimating the position of a mobile set is of great importance in new mobile services. However, in most cases, the accuracy should be less than 100 meters. This accuracy is hard to reach especially in urban areas. The main problem is that there are a lot of obstacles like buildings between the BTS and the mobile set. Thus the time measured between BTS and the mobile set is somehow greater than the time it takes the wave to travel directly between two points. This paper introduces an optimized solution for TDOA as one of the most efficient ways for finding the location of a mobile phone. Considering the standards and limitations of both GSM and UMTS, the Authors present a solution for... 

    Mobility-Aware content caching using graph-coloring

    , Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 5 , 2022 , Pages 5666-5670 ; 00189545 (ISSN) Javedankherad, M ; Zeinalpour Yazdi, Z ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Caching the popular files in the memories of small base stations (SBSs) is an effective solution to the limited capacity of wireless backhaul links. The efficiency of caching depends on the proper design of the content placement. This is more challenging when the SBSs have overlapped coverage and especially when the users are also mobile. In this letter, we exploit the concept of graph-coloring and model the connection between SBSs and users as well as user mobilities, through a weighted graph in which SBSs are its vertices, and propose some algorithms to color it effectively. Then, we fill the memory of colored SBSs with popular content accordingly. © 1967-2012 IEEE  

    A methodology for mobile network security risk management

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1572-1573 Seify, M ; Bijani, S ; Sharif University of Technology
    Abstract
    Based on the risk analysis done in the GSM network of Iran a methodology for cellular mobile network risk management is established. Primarily we focus on the importance of risk management in the GSM Network and then introduce very briefly the suggested method for managing risk in Iranian GSM security. GSM Security risk evaluation is a method for increasing the efficiency of security policy in the manner that security threats and vulnerabilities against the mobile network is identified and prioritized. © 2009 IEEE  

    MobiSim: A framework for simulation of mobility models in mobile ad-hoc networks

    , Article 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, NY, 8 October 2007 through 10 October 2007 ; December , 2007 ; 0769528899 (ISBN); 9780769528892 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    2007
    Abstract
    A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Since MANETs are not currently deployed on a large scale, research in this area is mostly simulation based. Among other simulation parameters, the mobility model plays a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. In this paper we introduce a new framework for simulation of mobility models in mobile Ad-Hoc networks. This simulator can generate mobility traces in various mobility models. The mobility traces can be... 

    Mobility pattern recognition in mobile ad-hoc networks

    , Article 4th International Conference on Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st International Symposium on Computer Human Interaction in Mobile Technology, IS-CHI 2007, Singapore, 10 September 2007 through 12 September 2007 ; 2007 , Pages 302-309 ; 9781595938190 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    2007
    Abstract
    A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Network nodes in a mobile Ad-hoc network move in some motion patterns called mobility models. The mobility models play a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. If we can recognize the mobility pattern of motion of mobile nodes in our environment we can customize our network protocols to deal with that existing mobility model. In this paper we introduce a new method for classification and pattern recognition of... 

    Analysis of link lifetime in wireless mobile networks

    , Article Ad Hoc Networks ; Volume 10, Issue 7 , September , 2012 , Pages 1221-1237 ; 15708705 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    Abstract
    Link lifetime (LL) analysis is crucially important in designing and evaluating wireless mobile network protocols. Although a considerable amount of research has been conducted on this issue, the current paper studies several aspects of link lifetime for the first time, e.g. a closed form expression for the probability distribution of the residual link lifetime (RLL) for the constant velocity mobility model is obtained, which facilitates marginal studies on the behavior of link lifetime. As a case, using a tail analysis of LL and RLL distributions, we analytically prove that they are heavy-tailed. Using this outcome, a self-similar behavior in the traffic pattern of a sample delay tolerant... 

    Designing an agile methodology for mobile software development: A hybrid method engineering approach

    , Article 2nd International Conference on Research Challenges in Information Science, RCIS 2008, Marrakech, 3 June 2008 through 6 June 2008 ; 2008 , Pages 337-342 ; 1424416779 (ISBN); 9781424416776 (ISBN) Rahimian, V ; Ramsin, R ; Sharif University of Technology
    2008
    Abstract
    New Advances in mobile computer technology and the rapid growth of wireless networks in quality and quantity has introduced new applications and concerns in computer science and industry. The unique requirements and constraints associated with mobile systems have brought new challenges to software development for such environments, as it demands extensive improvements to traditional systems development methodologies in order to fulfill the special needs of this field. We examine the challenges of developing software for mobile systems, starting by reviewing mobile systems' characteristics and investigating the status quo of mobile software development methods. It has been shown that Agile... 

    On social-aware content caching for d2d-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 1 , 2019 , Pages 297-310 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users' social properties to generate the utility functions of the... 

    New Mobility Model for MANETs Based on Real Data of Human Mobility

    , M.Sc. Thesis Sharif University of Technology Foroozani, Ahmad (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to difficulties in setting up real mobile ad hoc networks, researchers must use simulation tools to evaluate their new protocols. One of the most important issues in MANET simulations is node movements. In reality nodes in MANET are transported by peopleand because of this,mobility models are based on human mobility. On the other hand, data of human mobility are rare and they are related to special locations so, none of the existing models have all the human mobility properties. By collecting data of human mobilityin the city of Tehran, new mobility model has been proposed that captures human mobility properties and is more realistic than existing models  

    Response Time Improvement Using Service Migration in Mobile Edge Computing Considering User Mobility

    , M.Sc. Thesis Sharif University of Technology Nejati, Amir Reza (Author) ; Goudarzi, Maziar (Supervisor)
    Abstract
    With the emergence of the 5th generation cellular networks, response time is becoming increasingly more important. One of the solutions to satisfy this requirement is using mobile edge computing. MEC is bringing the cloud computing features to the edge of the network and reduces services response time by reducing the user distance to her services. But for this solution to be effective, we need to migrate user services based on their movements. The main problem in migrating services is predicting user route and do the migration based on these predictions. We must do this procedure in a way that minimizes the service outage. In this research, we predict the user route with the historical... 

    Performance modeling of the LEACH protocol for mobile wireless sensor networks

    , Article Journal of Parallel and Distributed Computing ; Vol. 71, issue. 6 , 2011 , p. 812-821 ; ISSN: 07437315 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In many wireless sensor network applications, nodes are mobile, while many protocols proposed for these networks assume a static network. Thus, it is important to evaluate if a traditional protocol designed for a static network can tolerate different levels of mobility. This paper provides an analytic model to investigate the effect of mobility on a well-known cluster-based protocol, LEACH. The model evaluates data loss after construction of the clusters due to node mobility, which can be used to estimate a proper update interval to balance the energy and data loss ratio. Thus, the results can help the network designer to adjust the topology update interval given a value of acceptable data... 

    Fine-grained access control for hybrid mobile applications in Android using restricted paths

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 85-90 ; 9781509039494 (ISBN) Pooryousef, S ; Amini, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Hybrid Mobile Applications are a new generation of mobile applications that have recently introduced new security challenges. In these applications, untrusted web content, such as an advertisement inside an embedded browser, has the same privileges as the entire application and can directly access the device resources. Unfortunately, existing access control mechanisms are very coarse-grained and do not provide adequate facilities for fine-grained access rule definition and enforcement in hybrid mobile applications. In this paper, we propose a fine-grained access control mechanism for privilege separation in hybrid mobile applications. Our proposed access control mechanism, called... 

    A clustering algorithm to improve routing stability in mobile ad-hoc networks

    , Article 2009 14th International CSI Computer Conference, CSICC 2009, 20 October 2009 through 21 October 2009 ; 2009 , Pages 83-88 ; 9781424442621 (ISBN) Shakarami, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    The dynamic nature of mobile nodes in mobile adhoc networks (MANETs), causes their association and disassociation to and from clusters perturb the stability of network and problem becomes worse if nodes are clusterheads (CH). Therefore cluster maintenance schemes are needed to handle new admissions and releases of node in the clusters. In this paper, we introduce a novel cluster maintenance algorithm which selects a new clusterhead from a trusty area that is defined previously based on some maintenance optimization rules. The election process is done before the current clusterhead leaves the cluster. So the routes which include this clusterhead as a middle node are less probable to break and... 

    3MOKAN: A novel mobility management mechanism based on keeping alternative nodes

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 756-761 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Hasanlou, M ; Fazli, E ; Movaghar, A ; Mohammadi, H ; Sharif University of Technology
    2008
    Abstract
    A mobile ad hoc network (MANET) is a network without any predefined infrastructure in which every node not only enjoys the services from the network, but serves the network as a relaying router. Because of nodes mobility, these kinds of networks are highly dynamic. Therefore, link failure is so frequent. In this paper we propose a novel mobility management method which is independent of underlying routing protocol. Based on this mechanism, a node tries to keep an alternate node for its next hop and when a link breakage occurs, simply node uses its alternate node as next hop. Simulation results show that this mechanism can reduce average number of hop counts, number of selected routes and... 

    Performance evaluation of mobile software systems: Challenges for a software engineer

    , Article 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2008, Mexico City, 12 November 2008 through 14 November 2008 ; December , 2008 , Pages 346-351 ; 9781424424993 (ISBN) Rahimian, V ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    New Advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Unique requirements and constraints of mobile systems bring new challenges to software development for such environments. It demands reconsidering the traditional approaches of information access, software design, and performance evaluation. Despite the various constraints and problems, research endeavors aimed at ameliorating the status quo through enhancing/devising software design and performance evaluation techniques for mobile software systems have been relatively few and far in between.... 

    Approximation of a confidence interval for link distances in mobile ad hoc networks

    , Article 3rd IEEE/Create-Net International Conference on Communication System Software and Middleware, COMSWARE, Bangalore, 6 January 2008 through 10 January 2008 ; 2008 , Pages 520-527 ; 9781424417971 (ISBN) Bagherpour, M ; Sepehri, M. M ; Sharifyazdi, M ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    A Mobile Ad Hoc Network (MANET) is an infrastructure-less network composed of mobile devices. In order to meet the foresight of newly developing MANETs, a method of maintaining a real-time flow despite dynamic topology and random movement of users is required. Mobility prediction is one of the keys to successful design of efficient protocols to find stable and reliable routes in MANETs. An important characteristic of a MANET is the distribution of the link distance between communicating users. In this paper a novel mobility model is developed for users of a MANET wandering in an unlimited area and is used to derive an analytical framework to approximate the communication links distance... 

    Data envelopment analysis based comparison of two hybrid multi-criteria decision-making approaches for mobile phone selection: a case study in Iranian telecommunication environment

    , Article International Journal of Information and Decision Sciences ; Volume 1, Issue 2 , 2008 , Pages 194-220 ; 17567017 (ISSN) Mahdavi, I ; Fazlollahtabar, H ; Mozaffari, E ; Heidari, M ; Mahdavi Amiri, N ; Sharif University of Technology
    2008
    Abstract
    The arrival of the mobile phone and its rapid and widespread growth may well be seen as one of the most significant developments in the fields of communication and information technology over the past two decades. The aim of this study is to compare two hybrid multi-criteria decision-making (MCDM) approaches to evaluate the mobile phone options with respect to user’s preferences. Firstly, we identify the most desirable features influencing the choice of a mobile phone. This is realised through a survey conducted among the target group, the experiences of the telecommunication sector experts and the studies in the literature. Secondly, two MCDM methods are used in the evaluation procedure.... 

    A learning automata-based method for estimating the mobility model of nodes in Mobile Ad-hoc Networks

    , Article 7th IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, CA, 14 August 2008 through 16 August 2008 ; 2008 , Pages 249-254 ; 9781424425389 (ISBN) Jamalian, A. H ; Iraji, R ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2008
    Abstract
    The mobility model of typical Mobile Ad-hoc NETworks (MANET) can be used for more efficient performance evaluation of such networks. There are a large number of researches for generating various mobility models to use in performance evaluation of mobile ad-hoc networks and also on performance evaluation itself of these networks. But in most of these researches the mobility model of MANET is predefined and based on this mobility model, the performance evaluation goes on. Since in real world applications the mobility model of MANETs is unknown or may be changed during the time, the need for a method of detecting or estimating the MANET's mobility model is evident. In this paper a learning...