Academic literature on the topic 'Mobile IPv6 hand off'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile IPv6 hand off.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile IPv6 hand off"

1

Qin, Gang, Can Chen, and Bao Ping Yan. "Study on IPv6 Capabilities of Mobile Devices." Applied Mechanics and Materials 380-384 (August 2013): 2209–15. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2209.

Full text
Abstract:
With the rapid development of Internet, the current Internet Protocol IPv4 cannot meet the new requirements. Compared with IPv4, IPv6 has more advantages. Fruitful results have been borne in aspects of IPv6 protocol study and network construction in China. On the other hand, application and popularization of IPv6 is far from sufficient. In recent years, mobile devices have popularized very rapidly. More and more people use mobile devices, including smartphones and tablets, to surf online everywhere. If such a gigantic amount of mobile devices can access network with IPv6, it will be very important for application of IPv6. In this paper, we first analyze the market of mobile devices to determine the devices to be tested. Then we introduce how to construct test environment and test cases. After that, we illustrate the test procedure. Then we summarize how the mainstream mobile devices support IPv6. At the end of this paper, we look forward the future work.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Li Jun, and Samuel Pierre. "Mobility Support for IPv6-based Next Generation Wireless Networks." International Journal of Wireless Networks and Broadband Technologies 2, no. 3 (July 2012): 18–41. http://dx.doi.org/10.4018/ijwnbt.2012070103.

Full text
Abstract:
This paper presents an overview of IPv6-based mobility management protocols: mobile IPv6 (MIPv6), fast handovers for mobile IPv6 (FMIPv6), hierarchical mobile IPv6 (HMIPv6), and fast handover for hierarchical mobile IPv6 (F-HMIPv6). All these protocols play an important role in the next generation wireless networks, because in such networks, mobile users need to be freely change their access network or domain with on-going real-time multimedia services. The mobility management procedure for each protocol is described in details. Furthermore, handover performance is compared for host-based mobility protocols using analytical modeling. The effect of various wireless network parameters on the performance is studied carefully. Numerical analysis shows that handoff performance in wireless networks is largely dependent on various system parameters such as the user velocity, subnet radius, and session-to-mobility ratio, domain size and binding lifetime; there is a trade-off between performance metrics and such parameters.
APA, Harvard, Vancouver, ISO, and other styles
3

Jara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.

Full text
Abstract:
Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for constrained devices is feasible.
APA, Harvard, Vancouver, ISO, and other styles
4

Bitar, Esper, Michael McDonnell, and Nicolas D. Georganas. "Channel hand-off strategies in cellular mobile communication systems." Canadian Electrical Engineering Journal 12, no. 3 (July 1987): 99–104. http://dx.doi.org/10.1109/ceej.1987.6593828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yue, Wuyi, and Yutaka Matsumoto. "Performance Analysis of Mobile Radio Networks with Hand-off." Proceedings of the ISCIE International Symposium on Stochastic Systems Theory and its Applications 1996 (May 5, 1996): 225–34. http://dx.doi.org/10.5687/sss.1996.225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muñoz-Rodríguez, D., and K. W. Cattermole. "Multiple criteria for hand-off in cellular mobile radio." IEE Proceedings F Communications, Radar and Signal Processing 134, no. 1 (1987): 85. http://dx.doi.org/10.1049/ip-f-1.1987.0015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
8

Cong, L., E. Gunawan, C. B. Soh, B. H. Soong, P. T. Tan, and W. Weng. "Performance analysis of dynamic channel assignment algorithms in cellular mobile systems with hand-off." International Journal of Communication Systems 15, no. 8 (2002): 683–700. http://dx.doi.org/10.1002/dac.558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nejatian, S., S. K. Syed Yusof, N. M. Abdul Lattif, V. Rezaie, and V. Asadpour. "Fuzzy Based PC-PUSH in CR-MANETs." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/926709.

Full text
Abstract:
In cognitive radio (CR), the secondary user (SU) needs to hand off its ongoing communication to an idle channel in order to avoid interference to the primary user (PU). Spectrum hand off issue becomes challenging in CR mobile ad hoc networks (CR-MANETs) because of the uncertainty in spectrum availability, broad range of spectrum bands and lack of central entity. The purpose of this study is to design a unified spectrum handoff (USH) scheme for CR-MANETs that considers the spectrum heterogeneity and its availability over time and space. A local flow hand off is performed when spectrum hand off cannot be carried out due to the SUs mobility. To improve further USH, preemptive unified spectrum handoff (PUSH) algorithm is proposed in which two different preemptive hand off threshold regions are defined. The PUSH algorithm also predicts the cognitive link availability considering the PU interference boundary. Although the PUSH scheme improves the hand off performance, the number of spectrum hand offs due to the PU activity should be reduced in this scheme. Therefore, the PC-PUSH (Power Controller-PUSH) scheme is proposed in which the fuzzy logic is used to improve the PUSH in terms of the number of spectrum handoffs because of the PU activity. The PC-PUSH decreases the interference to the PUs, while reducing the number of spectrum handoffs. The results show that the proposed scheme improves the link maintenance probability, decreases the hand off delay, and reduces the number of spectrum handoffs.
APA, Harvard, Vancouver, ISO, and other styles
10

De Marco, G., L. Barolli, and Salvatore Loreto. "Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios." Mobile Information Systems 3, no. 2 (2007): 55–70. http://dx.doi.org/10.1155/2007/919807.

Full text
Abstract:
The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP), which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP), which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile IPv6 hand off"

1

Banh, Mai Thi Quynh, and n/a. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Swinburne University of Technology, 2005. http://adt.lib.swin.edu.au./public/adt-VSWT20070608.094836.

Full text
Abstract:
There is a growing range of IP-based data and voice applications using mobile devices (e.g. 3rd , 4th generation mobile phones and PDAs) and new access technologies (e.g. Bluetooth, 802.11, GPRS, ADSL). This growth is driving a desire to support mobility at the IP level � in other words, allowing an IP host to keep on communicating with other hosts while roaming between different IP subnetworks. Mobile IPv6 allows hosts to move their physical and topological attachment points around an IPv6 network while retaining connectivity through a single, well-known Home Address. Although Mobile IPv6 has been the subject of simulation studies, the real-world dynamic behavior of Mobile IPv6 is only gradually being experimentally characterised and analysed. This thesis reviews the use of Mobile IPv6 to support mobility between independent 802.11b-attached IPv6 subnets, and experimentally measures and critically evaluates how long an end to end IP path is disrupted when a Mobile IPv6 node shifts from one subnetwork to another (handoff time). The thesis describes the development of an experimental testbed suitable for gathering real-world Mobile IPv6 handoff data using publicly available, standards compliant implementations of Mobile IPv6. (An open-source Mobile IPv6 stack (the KAME release under FreeBSD) was deployed). The component of handoff time due to 802.11b link layer handoff is measured separately to assess its impact on the overall Mobile IPv6 handoff time. Using Mobile IPv6 handoff results, the likely performance impact of Mobile IPv6 handoff on a common webcam application and a bulk TCP data transfer is also evaluated. The impact of handoff on these applications clearly shows that a default Mobile IPv6 environment would be highly disruptive to real-time and interactive applications during handoff events, even if the underlying link-layer handoff was instantaneous.
APA, Harvard, Vancouver, ISO, and other styles
2

Banh, Mai. "Quantification, characterisation and impact evaluation of mobile IPv6 hand off times." Australasian Digital Thesis Program, 2007. http://adt.lib.swin.edu.au/public/adt-VSWT20070608.094836/index.html.

Full text
Abstract:
Thesis (MEng) - Swinburne University of Technology, Centre for Advanced Internet Architectures, 2005.
[A thesis submitted in total fulfillment of the requirements of for the degree of ] Masters of Engineering by Research, Centre for Advanced Internet Architectures (CAIA), Faculty of Information and Communication Technologies, Swinburne University of Technology, 2005. Typescript. Bibliography p. 153-159.
APA, Harvard, Vancouver, ISO, and other styles
3

Kulavaratharasah, Mohana Dhamayanthi. "Efficient hand-off priority oriented channel allocation algorithms for 3rd generation mobile communication systems." Thesis, King's College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.342321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Jiin Kuen, and 林錦坤. "Application of Fuzzy Associative Memory (FAM) Controller in Hand-off of Cellular Mobile Systems." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/60789821632347999853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Kuang-Hwa, and 李光華. "An analysis of CDMA mobile system on uplink soft hand-off in homogeneous-cell." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/04825602450210720725.

Full text
Abstract:
碩士
國立中央大學
電機工程學系
85
We propose five channel assignment schemes including (1) Sequential channelreselection scheme, (2)Reverse sequential channel reselection scheme, (3)Randomchannel selection scheme, (4)Random channel reselection scheme, and (5)Optimum channel selection scheme, in order to demonstrate several CDMA soft- handoff effects in the seven-homogeneous-cell-structure by using uplink fixed-powercontrol ,and give comparison between soft handoff and hard handoff operation, because the system effects of the central cell is confined with much interferencefrom six surrounding cells, we put stress on the central cell and discuss the difference among these channel assignment schemes.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Guang-Hua, and 李光華. "An analysis of CDMA mobile system on uplink soft hand-off in homogeneous-cell." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/99749874272265846793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

張佑銓. "Simulation Study for Cellular Mobile Radiophone Systems with Hybrid Channel Assignment and Hand-off Guard Channels." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/42210029497596375188.

Full text
Abstract:
碩士
中華大學
電機工程學系
86
In the thesis, we divide it into two parts to discuss the performance of a celluilar mobile radiophone system that employs guard channels to prioritize handoff calls over new calls. For the first part, we adopt hybrid channel allocation strategy in which the whole channels are divided into two groups, that is , fixed and dynamic channels. Four priority oriented multiope access schemes are proposed. In Scheme I and Schem 2, guard channels are accommodated in the fiexd group and in the dynamic group, respectively Scheme 3 is a hybrid of Scheme I and Scheme 2 in a sense that both the fiexd and the dynamic groups contain guard channels. For each of these schemes, we have considered a lost-lost model, in thich new or handoff call ttempts that can not acquire an unoccupied channel are cleared, as well as a delayed-lost model that allows queueing for handoff call. In addition. the effects of spatial traffic volatility on the performance of the three schemes for the lost-lost and the delayed-lost systems are ivestigated. Scheme 4 considers a hierarchical underlaid/overlaid system that uses underlaying microcells and overlaying macrocells to serve low-mobility and high-mobility users, respectively. In this scheme, the channels allocated to the microcellular and the macrocellular network are assigned to the corresponding cells using HCA, guard channels are accommodated in the macrocell and are shared by inter-macrocellular as well as inter-microelluar handoff calls. In this part, we have carried out simulation to investigate the performance of each scheme for a 61-cell system. Performance measures such as the blocking probability of a new call, the handoff failure probability of a handoff call, and the forced termination probability of a call are presented. Finally, for Scheme 5 which constitutes the sedcond part of the thesis, we concentrate on the dynamic channel assignment strategy with guard channels. For the lost-lost model and uniform traffic scenarios, simulation results have been used to find an approximate formula by which the blocking probability of a new call and the handoff failure probability of a handoff call can be calculted.
APA, Harvard, Vancouver, ISO, and other styles
8

Chou, Chingwei, and 周慶威. "The Performance Evaluation of Hand-off in integrated Mobile IP and AODV routing protocol Wireless Network with SIP Applications." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/36744850537979546316.

Full text
Abstract:
碩士
淡江大學
電機工程學系碩士在職專班
95
In recent years, the strong development on IEEE802.11 wireless network and the peripheral industry, the prevailing use of personal handset devices such as PDA and notebook computers and the strong impetus of government strategies towards electronization and mobilization have gradually changed most people''s using habits on information products. But when people enjoy the convenience wireless networks bring, they don''t know that they are limited by the infrastructure Mode of wireless network because the nature of short distance and the lacking of hand off mechanism in IEEE802.11 wireless network make the users have to access it near the fixed points. However, in Wireless Ad-hoc Network, all the mobile nodes play the role of routers. Information can be transmitted through the mobile nodes between the origin node and the destination node. In this way, information can even be sent to multiple distances. Thus the Wireless Ad-hoc Network can solve the problem of insufficient distance encountered in IEEE802.11 wireless network. In addition, the Wireless Ad-hoc Network is also excellent to be used in battlefield and for emergency department. This paper will discuss the integration of AODV routing protocol and mobile IP under SIP environment. AODV will be responsible in moving in the sub-network and Mobile IP will be in charge of hand-off mechanism while crossing sub-networks. The mobility and the hand-off mechanism of the above structure will be presented in the way of software simulation and other possible applications will also be further analyzed.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile IPv6 hand off"

1

Mason, Will, and David Warwick. Bone and joint injuries of the hand. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198757689.003.0005.

Full text
Abstract:
The small bones and joints of the hand are vulnerable to fracture and dislocation. These same structures need to be pain-free, stable, and mobile for proper function. Careful diagnosis and meticulous management is required. This may entail early mobilization (e.g. a metacarpal neck fracture) or temporary splinting (e.g. mallet fracture), early repair (e.g. unstable thumb ulnar collateral avulsion), complex sequential and dynamic splinting (e.g. central slip rupture); percutaneous wires (e.g. Bennett’s fracture) or plate fixation (e.g. displaced index metacarpal shaft). There is often a trade-off between the mobilization required to avoid stiffness and the immobilization required to allow anatomical healing. Rigid surgical fixation with meticulous hand therapy may both contribute in certain patients.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile IPv6 hand off"

1

Acampora, Anthony S., and Mahmoud Naghshineh. "An architecture and methodology for mobile-executed cell hand-off in wireless ATM networks." In Lecture Notes in Computer Science, 552–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-57856-0_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jamadagni, N. S. Satish. "Context Gathering Mobile Agents to Assist in Resource Reservation for Inter-technology Hand-off." In Lecture Notes in Computer Science, 269–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44651-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jasola, Sanjay, and Ramesh C. Sharma. "Mobility in IP Networks." In Handbook of Research in Mobile Business, Second Edition, 422–31. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-156-8.ch039.

Full text
Abstract:
With the ever increasing use of portable and hand held devices for voice and data transfer, there is a growing expectation to access information anytime, anywhere. Today there are different technologies providing access to voice, data, and video. These need to be converged in all Internet protocol (IP) based network. Next generation telecom networks will be having convergence of voice and data traffic and use of IP based mobility solutions. Mobile IP is a TCP/IP-based protocol that has been standardized by the IETF (Internet Engineering Task Force) for supporting mobility. Mobile IP is part of both IPv4 and IPv6 standards. Mobile IP works at network layer (layer 3), influencing the routing of packets and can easily handle mobility among different media. This chapter discusses different technical operations involved in Mobile IPv4 and Mobile IPv6 and compares them.
APA, Harvard, Vancouver, ISO, and other styles
4

Azzuhri, S. "Enabling Mobility in IPv6 Networks." In Encyclopedia of Mobile Computing and Commerce, 253–59. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch043.

Full text
Abstract:
With the explosive growth in Internet usage over the last decade, the need for a larger address space is unavoidable, since all the addresses in IPv4 are nearly fully occupied. IPv6 (Deering & Hinden, 1998), with 128-bit addresses compared to IPv4 with 32-bit addresses and other advantages (like auto-configuration and IP mobility), can overcome many of the problems that IPv4 had before. One of the requirements for the modern Internet is IP mobility support. In IPv4, a special router is needed to act as a foreign agent in the visited/foreign network and the need of a network element in the home network known as a home agent for a mobile host. IPv6 does away with the need for the foreign agent and operates in any location without any special support from a local router. Route optimization is inherent in IPv6, and this feature eliminates the triangle-routing (routing through the home agent) problem that exists in IPv4. IPv6 enjoys many network optimizations that are already built in within IPv6.
APA, Harvard, Vancouver, ISO, and other styles
5

Raoof, Omar, and Hamed Al-Raweshidy. "Simulating Game Applications in Mobile IPv6 Protocol." In Simulation in Computer Network Design and Modeling, 22–40. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch002.

Full text
Abstract:
This chapter proposes a novel game-based green interface/network selection mechanism that is an extension to the multi-interface fast-handover mobile IPv6 protocol and works when the mobile node has more than one wireless interface. The mechanism controls the handover decision process by deciding whether a handover is needed or not and helps the node to choose the right access point at the right time. Additionally, the mechanism switches the mobile nodes interfaces “ON” and “OFF” when needed to control the mobile node’s energy consumption and improves the handover latency.
APA, Harvard, Vancouver, ISO, and other styles
6

Prasad, Rohit, and Varadharajan Sridhar. "Optimal Number of Mobile Service Providers in India." In Mobile Computing, 2306–22. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch184.

Full text
Abstract:
With 225 million subscribers, India has the world’s third largest mobile subscriber base in the world. The Indian mobile industry is also one of the most competitive in the world with 4-7 operators in each service area. A large number of operators bring competition and its associated benefits such as decrease in price and hence corresponding growth of the market. On the other hand in the presence of economies of scale, too many operators may result in inefficient scales and high unit costs. This article analyses the trade-off between competition and economies of scale by estimating the production function for mobile subscribers and traffic carried. Analysis of panel data reveals the existence of economies of scale in the Indian mobile sector. We then derive an upper bound on the optimal number of operators in each license area and discuss policy implications.
APA, Harvard, Vancouver, ISO, and other styles
7

Mensch, Scott E., and LeAnn Wilkie. "Smart Phone Security Practices." In Research Anthology on Securing Mobile Technologies and Applications, 501–16. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch028.

Full text
Abstract:
Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.
APA, Harvard, Vancouver, ISO, and other styles
8

Rodríguez, Ana Victoria, Cristian Mateos, Alejandro Zunino, and Mathias Longo. "An Analysis of the Effects of Bad Smell-Driven Refactorings in Mobile Applications on Battery Usage." In Modern Software Engineering Methodologies for Mobile and Cloud Environments, 155–75. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9916-8.ch009.

Full text
Abstract:
Mobile devices are the most popular kind of computational device in the world. These devices have more limited resources than personal computers and battery consumption is always under user's eye since mobile devices rely on their battery as energy supply. On the other hand, nowadays most applications are developed using object-oriented paradigm, which has some inherent features, like object creation, that consume important amounts of energy in the context of mobile development. These features are responsible for offering maintainability and flexibility, among other software quality-related advantages. Then, this chapter aims to present an analysis to evaluate the trade-off between object-oriented design purity and battery consumption. As a result, developers can design mobile applications taking into account these two issues, giving priority to object design quality and/or energy efficiency as needed.
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Abri, F., E. A. Edirisinghe, and C. Grecos. "Parameter Based Multi-Objective Optimization of Video CODECs." In Applied Signal and Image Processing, 288–308. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-477-6.ch017.

Full text
Abstract:
This chapter presents a generalised framework for multi-objective optimisation of video CODECs for use in off-line, on-demand applications. In particular, an optimization scheme is proposed to determine the optimum coding parameters for a H.264 AVC video codec in a memory and bandwidth constrained environment, which minimises codec complexity and video distortion. The encoding/decoding parameters that have a significant impact on the performance of the codec are initially obtained through experimental analysis. A mathematical formulation by means of regression is subsequently used to associate these parameters with the relevant objectives and define a Multi-Objective Optimization (MOO) problem. Solutions to the optimization problem are reached through a Non-dominated Sorting Genetic Algorithm (NSGA-II). It is shown that the proposed framework is flexible on the number of objectives that can jointly be optimized. Furthermore, any of the objectives can be included as constraints depending on the requirements of the services to be supported. Practical use of the proposed framework is described using a case study that involves video content transmission to a mobile hand.
APA, Harvard, Vancouver, ISO, and other styles
10

Loureiro, Emerson, Frederico Bublitz, Loreno Oliveira, Nadia Barbosa, Angelo Perkusich, Hyggo Almeida, and Glauber Ferreira. "Service Provision for Pervasive Computing Environments." In Human Computer Interaction, 279–89. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-87828-991-9.ch021.

Full text
Abstract:
The fast development on microelectronics has promoted the increase on the computational power of hardware components. On the other hand, we are facing a significant improvement on energy consumption as well as the reduction of the physical size of such components. These improvements and the emergence of wireless networking technologies are enabling the development of small and powered mobile devices. Due to this scenario, the so-called pervasive computing paradigm, introduced by Mark Weiser in 1991 (Weiser, 1991) is becoming a reality. Such a paradigm envisions a world where environments are inhabited by computing devices, all of them seamlessly integrated into peoples’ lives, and effectively helping to carry on their daily tasks. Among others, one major characteristic of Weiser’s vision is that each device in an environment becomes a potential client or provider of resources. Not surprisingly, pervasive computing environments are becoming dynamic repositories of computational resources, all of them available to mobile users from the palm of their hands. However, devices can unpredictably join and leave such environments. Thus, resources can be dynamically made available or unavailable. Such a scenario has a great impact on the way that resources are found and used. In the case of static environments, such as the Web, it is reasonable to look up and access resources, such as Web pages, knowing the address of their providers beforehand. On the other hand, for dynamic environments, such as the pervasive computing ones, this is not a reasonable approach. This is due to the fact that one cannot guarantee that the provider of a resource will be available at any moment, because it may have left the environment or simply turned off. A better approach would be to discover these resources based on their descriptions, or any other feature that does not require the client to know the specific address of their providers. To this end, some of the current pervasive computing solutions, like Wings (Loureiro, Bublitz, Oliveira, Barbosa, Perkusich, Almeida, & Ferreira, 2006), Green (Sivaharan, Blair, & Coulson, 2005), RUNES (Costa, Coulson, Mascolo, Picco, & Zachariadis, 2005), and Scooby (Robinson, Wakeman, & Owen, 2004), are making use of a novel approach from the branch of distributed applications, the service-oriented computing paradigm (Papazoglou, 2003; Huhns & Singh, 2005). This is due to the fact that such a paradigm provides a crucial element for pervasive computing systems, the ability for dynamically binding to remote resources (Bellur & Narenda, 2005), which enables mobile devices to find needed services on demand. However, pervasive environments may be structured in different ways. They can range from wired networks to completely wireless ones, where communication among the devices is performed in an ad hoc way. Such a characteristic indicates that the way services are provisioned in a pervasive computing environment should fit in its organization, in order to enhance the access to the services available. Considering the above discussion, in this article we provide a review on service provision and its applicability in pervasive computing. More precisely, we will list the existing service provision approaches and discuss the characteristics and problems associated with each one, as well as their usage in pervasive computing environments. We start by providing introductory concepts of service-oriented and pervasive computing, respectively in the service-oriented computing and pervasive computing sections. Next, we present the service provision techniques available and how they can be applied for pervasive computing environments. The main current solutions within this scope will be introduced in the service oriented technologies section. Some of the future trends associated with research for service provision in pervasive computing environments will be presented in the future research trends section. Finally, in the conclusions sect
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile IPv6 hand off"

1

Roy, Sumit, Bo Shen, Vijay Sundaram, and Raj Kumar. "Application level hand-off support for mobile media transcoding sessions." In the 12th international workshop. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/507670.507684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Canfora, G., G. Di Santo, G. Venturi, E. Zimeo, and M. V. Zito. "Proxy-based hand-off of Web sessions for user mobility." In The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. IEEE, 2005. http://dx.doi.org/10.1109/mobiquitous.2005.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nurain, Novia, Taslima Akter, Hafsa Zannat, Most Monira Akter, A. B. M. Alim Al Islam, and Md Humayun Kabir. "General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics." In 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2015. http://dx.doi.org/10.1109/wimob.2015.7348047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oliver, M., and J. Borras. "Performance evaluation of variable reservation policies for hand-off prioritization in mobile networks." In IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320). IEEE, 1999. http://dx.doi.org/10.1109/infcom.1999.751675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Feist, J. P., S. Karmaker Biswas, C. Pilgrim, P. Y. Sollazzo, and S. Berthier. "Off-Line Temperature Profiling Utilising Phosphorescent Thermal History Paints and Coatings." In ASME Turbo Expo 2014: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/gt2014-25939.

Full text
Abstract:
Temperature profiling of components in gas turbines is of increasing importance as engineers drive to increase firing temperatures and optimise component’s cooling requirements in order to increase efficiency and lower CO2 emissions. However, on-line temperature measurements and, particularly, temperature profiling are difficult, sometimes impossible, to perform due to inaccessibility of the components. A desirable alternative would be to record the exposure temperature in such a way that it can be determined later, off-line. The commercially available Thermal Paints are toxic in nature and come with a range of technical disadvantages such as subjective readout and limited durability. This paper proposes a novel alternative measurement technique which the authors call Thermal History Paints and Thermal History Coatings. These can be particularly useful in the design process, but further could provide benefits in the maintenance area where hotspots which occurred during operation can be detected during maintenance intervals when the engine is at ambient temperature. This novel temperature profiling technique uses optical active ions in a ceramic host material. When these ions are excited by light they start to phosphoresce. The host material undergoes irreversible changes when exposed to elevated temperatures and since these changes are on the atomic level they influence the phosphorescent properties such as the life time decay of the phosphorescence. The changes in phosphorescence can be related to temperature through calibration such that in-situ analysis will return the temperature experienced by the coating. A major benefit of this technique is in the automated interpretation of the coatings. An electronic instrument is used to measure the phosphorescence signal eliminating the need for a specialist interpreter and thus increasing readout speed. This paper reviews results from temperature measurements made with a water based paint for the temperature range 100°C to 800°C in controlled conditions. Repeatability of the tests and errors will be discussed. Further, some measurements are carried out using an electronic hand-held interrogation device which can scan a component surface and provide a spatial resolution of below 3mm. The instrument enables mobile measurements outside of laboratory conditions. Further a robust Thermal History Coating is introduced demonstrating the capability of the coating to withstand long term exposures. The coating is based on Thermal Barrier Coating architecture with a high temperature bondcoat and deposited using an air plasma spray process to manufacture a reliable long lasting coating. Such a coating could be employed over the life of the component to provide critical temperature information at regular maintenance intervals for example indicating hot spots on engine parts.
APA, Harvard, Vancouver, ISO, and other styles
6

Hartmann, Niklas, and E. Doruk O¨zdemir. "Impact of Different Charging Strategies of Electric Vehicles on the German Grid." In ASME 2010 4th International Conference on Energy Sustainability. ASMEDC, 2010. http://dx.doi.org/10.1115/es2010-90492.

Full text
Abstract:
In this paper the impact of different utilization scenarios of electric vehicles on the German grid is analyzed. Two different charging strategies are tested. Firstly the impact of unmanaged charging of electric vehicles on the national grid is simulated. Secondly charging and usage of the mobile storage in off-peak times is simulated. An important part of the simulation is to analyse the availability of electric vehicles. This part determines the percentage of vehicles, which can be plugged into the grid on hourly basis for all days of a typical week. The analysis of the availability of vehicles shows an overall high availability of plug-in electric passenger cars in Germany. A significant difference in the characteristics between weekdays, Saturdays and Sundays is evident. A high potential to use electric passenger cars for balancing the fluctuating renewable energy can be presumed, on the one hand due to the high availability of electric vehicles and on the other hand due to the large number of vehicles being plugged into the grid in the evening hours for which charging could be delayed into the night. In conclusion the simulation shows that with an unmanaged charging strategy the fluctuations of the demand increase above average assuming a rising number of electric vehicles introduced in Germany. If the whole vehicle fleet is substituted by electric vehicles, the national electricity consumption would increase only by about 18%. Concurrently the fluctuations of the national demand in Germany would almost double. However with an optimized charging strategy, a positive impact of the usage of the mobile storage on the national grid (reduction of fluctuations) can be recognized. Thereby the electric vehicles can be charged completely during the night, when the electricity consumption is low.
APA, Harvard, Vancouver, ISO, and other styles
7

Ko, David, Nalaka Kahawatte, and Harry H. Cheng. "Controlling Modular Reconfigurable Robots With Handheld Smart Devices." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-48415.

Full text
Abstract:
Highly reconfigurable modular robots face unique teleoperation challenges due to their geometry, configurability, high number of degrees of freedom and complexity. Current methodology for controlling reconfigurable modular robots typically use gait tables to control the modules. Gait tables are static data structures and do not readily support realtime teleoperation. Teleoperation techniques for traditional wheeled, flying, or submerged robots typically use a set of joysticks to control the robots. However, these traditional methods of robot teleoperation are not suitable for reconfigurable modular robotic systems which may have dozens of controllable degrees of freedom. This research shows that modern cell phones serve as highly effective control platforms for modular robots because of their programmability, flexibility, wireless communication capabilities, and increased processing power. As a result of this research, a versatile Graphical User Interface, a set of libraries and tools have been developed which even a novice robotics enthusiast can use to easily program their mobile phones to control their hobby project. These libraries will be beneficial in any situation where it is effective for the operator to use an off-the-shelf, relatively inexpensive, hand-held mobile phone as a remote controller rather than a considerably heavy and bulky remote controllers which are popular today. Several usage examples and experiments are presented which demonstrate the controller’s ability to effectively control a modular robot to perform a series of complex gaits and poses, as well as navigating a module through an obstacle course.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography