10 Matching Results

Search Results

Advanced search parameters have been applied.

Efficient Algorithms and Framework for Bandwidth Allocation, Quality-of-Service Provisioning and Location Management in Mobile Wireless Computing

Description: The fusion of computers and communications has promised to herald the age of information super-highway over high speed communication networks where the ultimate goal is to enable a multitude of users at any place, access information from anywhere and at any time. This, in a nutshell, is the goal envisioned by the Personal Communication Services (PCS) and Xerox's ubiquitous computing. In view of the remarkable growth of the mobile communication users in the last few years, the radio frequency spectrum allocated by the FCC (Federal Communications Commission) to this service is still very limited and the usable bandwidth is by far much less than the expected demand, particularly in view of the emergence of the next generation wireless multimedia applications like video-on-demand, WWW browsing, traveler information systems etc. Proper management of available spectrum is necessary not only to accommodate these high bandwidth applications, but also to alleviate problems due to sudden explosion of traffic in so called hot cells. In this dissertation, we have developed simple load balancing techniques to cope with the problem of tele-traffic overloads in one or more hot cells in the system. The objective is to ease out the high channel demand in hot cells by borrowing channels from suitable cold cells and by proper assignment (or, re-assignment) of the channels among the users. We also investigate possible ways of improving system capacity by rescheduling bandwidth in case of wireless multimedia traffic. In our proposed scheme, traffic using multiple channels releases one or more channels to increase the carried traffic or throughput in the system. Two orthogonal QoS parameters, called carried traffic and bandwidth degradation, are identified and a cost function describing the total revenue earned by the system from a bandwidth degradation and call admission policy, is formulated. A channel sharing scheme is proposed for ...
Date: December 1997
Creator: Sen, Sanjoy Kumar
Partner: UNT Libraries

Inferring Social and Internal Context Using a Mobile Phone

Description: This dissertation is composed of research studies that contribute to three research areas including social context-aware computing, internal context-aware computing, and human behavioral data mining. In social context-aware computing, four studies are conducted. First, mobile phone user calling behavioral patterns are characterized in forms of randomness level where relationships among them are then identified. Next, a study is conducted to investigate the relationship between the calling behavior and organizational groups. Third, a method is presented to quantitatively define mobile social closeness and social groups, which are then used to identify social group sizes and scaling ratio. Last, based on the mobile social grouping framework, the significant role of social ties in communication patterns is revealed. In internal context-aware computing, two studies are conducted where the notions of internal context are intention and situation. For intentional context, the goal is to sense the intention of the user in placing calls. A model is thus presented for predicting future calls envisaged as a call predicted list (CPL), which makes use of call history to build a probabilistic model of calling behavior. As an incoming call predictor, CPL is a list of numbers/contacts that are the most likely to be the callers within the next hour(s), which is useful for scheduling and daily planning. As an outgoing call predictor, CPL is generated as a list of numbers/contacts that are the most likely to be dialed when the user attempts to make an outgoing call (e.g., by flipping open or unlocking the phone). This feature helps save time from having to search through a lengthy phone book. For situational context, a model is presented for sensing the user's situation (e.g., in a library, driving a car, etc.) based on embedded sensors. The sensed context is then used to switch the phone into a suitable ...
Date: December 2009
Creator: Phithakkitnukoon, Santi
Partner: UNT Libraries

Quality-of-Service Provisioning and Resource Reservation Mechanisms for Mobile Wireless Networks

Description: In this thesis, a framework for Quality of Service provisioning in next generation wireless access networks is proposed. The framework aims at providing a differentiated service treatment to real-time (delay-sensitive) and non-real-time (delay-tolerant) multimedia traffic flows at the link layer. Novel techniques such as bandwidth compaction, channel reservation, and channel degradation are proposed. Using these techniques, we develop a call admission control algorithm and a call control block as part of the QoS framework. The performance of the framework is captured through analytical modeling and simulation experiments. By analytical modeling, the average carried traffic and the worst case buffer requirements for real-time and non-real-time calls are estimated. Simulation results show a 21% improvement in call admission probability of real-time calls, and a 17% improvement for non-real-time calls, when bandwidth compaction is employed. The channel reservation technique shows a 12% improvement in call admission probability in comparison with another proposed scheme in the literature.
Date: August 1998
Creator: Jayaram, Rajeev, 1971-
Partner: UNT Libraries

Wireless experiments on a Motorola mesh testbed.

Description: Motomesh is a Motorola product that performs mesh networking at both the client and access point levels and allows broadband mobile data connections with or between clients moving at vehicular speeds. Sandia National aboratories has extensive experience with this product and its predecessors in infrastructure-less mobile environments. This report documents experiments, which characterize certain aspects of how the Motomesh network performs when obile units are added to a fixed network infrastructure.
Date: June 1, 2010
Creator: Riblett, Loren E., Jr.; Wiseman, James M. & Witzke, Edward L.
Partner: UNT Libraries Government Documents Department

The Effect of Mobility on Wireless Sensor Networks

Description: Wireless sensor networks (WSNs) have gained attention in recent years with the proliferation of the micro-electro-mechanical systems, which has led to the development of smart sensors. Smart sensors has brought WSNs under the spotlight and has created numerous different areas of research such as; energy consumption, convergence, network structures, deployment methods, time delay, and communication protocols. Convergence rates associated with information propagations of the networks will be questioned in this thesis. Mobility is an expensive process in terms of the associated energy costs. In a sensor network, mobility has significant overhead in terms of closing old connections and creating new connections as mobile sensor nodes move from one location to another. Despite these drawbacks, mobility helps a sensor network reach an agreement more quickly. Adding few mobile nodes to an otherwise static network will significantly improve the network’s ability to reach consensus. This paper shows the effect of the mobility on convergence rate of the wireless sensor networks, through Eigenvalue analysis, modeling and simulation.
Date: August 2014
Creator: Hasir, Ibrahim
Partner: UNT Libraries

Bounded Dynamic Source Routing in Mobile Ad Hoc Networks

Description: A mobile ad hoc network (MANET) is a collection of mobile platforms or nodes that come together to form a network capable of communicating with each other, without the help of a central controller. To avail the maximum potential of a MANET, it is of great importance to devise a routing scheme, which will optimize upon the performance of a MANET, given the high rate of random mobility of the nodes. In a MANET individual nodes perform the routing functions like route discovery, route maintenance and delivery of packets from one node to the other. Existing routing protocols flood the network with broadcasts of route discovery messages, while attempting to establish a route. This characteristic is instrumental in deteriorating the performance of a MANET, as resource overhead triggered by broadcasts is directly proportional to the size of the network. Bounded-dynamic source routing (B-DSR), is proposed to curb this multitude of superfluous broadcasts, thus enabling to reserve valuable resources like bandwidth and battery power. B-DSR establishes a bounded region in the network, only within which, transmissions of route discovery messages are processed and validated for establishing a route. All route discovery messages reaching outside of this bounded region are dropped, thus preventing the network from being flooded. In addition B-DSR also guarantees loop-free routing and is robust for a rapid recovery when routes in the network change.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2003
Creator: George, Glyco
Partner: UNT Libraries

Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals

Description: Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their ...
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2015
Creator: Negahban, Arash
Partner: UNT Libraries

Wireless Handheld Scanners Integrated with Waste Tracking

Description: The US Department of Energy (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) has embraced mobile wireless technology to help the disposition of hazardous and mixed radiological waste. The following paper describes one application the INEEL developed to increase the data accuracy and near-real time reporting requirements for waste management. With the continuous operational demands at the "site", it was difficult to sustain an accurate, up-to-date database required for regulatory compliance audits and reporting. Incorporating wireless mobile technology, the INEEL was able to increase the accuracy while reducing the data delay times previously encountered. Installation issues prolonged the project along with obstacles encountered with operations personnel. However, the success of this project was found in persistence and management support as well as the technology itself. Future wireless, mobile computing will continue at the INEEL for years to come based on a successful project that was able to integrate new technology to an existing waste management system with proven, increased data accuracy.
Date: July 1, 2000
Creator: Anderson, Robert Stephen
Partner: UNT Libraries Government Documents Department

The Longitudinal Impact of Technology Immersion Through a One-to-One Mobile Technology Program on Reading and Math Performance in a Rural Title I Public School District

Description: In conjunction with the Texas Technology Immersion Pilot program (TIP), the State of Texas implemented a four-year annual evaluation called the Evaluation of the Texas Technology Immersion Pilot (eTxTiP). It focused on the technology immersion experience through one-to-one mobile technology of sixth grade students in 22 selected middle schools. Initial findings suggested academic growth, especially in math, increased rigor of student work, greater teacher collaboration, a more positive school environment, and transformation of instructional practices. This study focused on one of the original schools selected to participate in the TIP program, exploring the impact over time of one-to-one mobile technology on one group of students over an 8-year period beginning with their third grade year. The selected school’s demographic makeup reflected a large number of schools within the state, including its size, rural location and economically disadvantaged student population. Based on an interrupted time series design, state assessment data was analyzed using a piecewise growth model. The study revealed no statistically significant academic growth in reading and math performance among the participants.
Date: August 2015
Creator: Ice, Laura R.
Partner: UNT Libraries

Wireless handheld scanners integrated with waste tracking

Description: The US Department of Energy (DOE) Idaho National Engineering and Environmental Laboratory (INEEL) has embraced mobile wireless technology to help the disposition of hazardous and mixed radiological waste. The following paper describes one application the INEEL developed to increase the data accuracy and near-real time reporting requirements for waste management. With the continuous operational demands at the ''site'', it was difficult to sustain an accurate, up-to-date database required for regulatory compliance audits and reporting. Incorporating wireless mobile technology, the INEEL was able to increase the accuracy while reducing the data delay times previously encountered. Installation issues prolonged the project along with obstacles encountered with operations personnel. However, the success of this project was found in persistence and management support as well as the technology itself. Future wireless, mobile computing will continue at the INEEL for years to come based on a successful project that was able to integrate new technology to an existing waste management system with proven, increased data accuracy.
Date: July 23, 2000
Creator: Anderson, R. S.
Partner: UNT Libraries Government Documents Department