35 research outputs found

    Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Get PDF

    A literature review on collaborative caching techniques in MANETs: issues and methods used in serving queries

    Get PDF
    Collaborative cache management in Mobile Ad Hoc Networks (MANETs) environment is considered as an efficient technique to increase data accessibility and availability, by sharing and coordination among mobile nodes. Due to nodes’ mobility, limited battery power and insufficient bandwidth, researchers addressed these challenges by developing many different collaborative caching schemes. The objective of this paper is to review various collaborative caching techniques in MANETs. Collaborative caching techniques are classified by methods used in serving queries, such as: hop-by-hop discovering, broadcasting messages, flooding, and query service differentiation. This review reveals that techniques utilizing hop-by-hop methods have better performance compared to others, especially techniques using additional strategies

    Online authentication using smart card technology in mobile phone infrastructure

    Get PDF
    The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability

    Systems development methodology for mobile commerce applications

    Get PDF
    There are several methodologies, including traditional and agile methodologies, being utilized in current systems development. However, it could be argued that existing development methodologies may not be suitable for mobile commerce applications, as these applications are utilized in different contexts from ixed e-commerce applications. This study proposes a system development methodology for mobile commerce applications. In order to achieve this aim, four objectives are proposed: investigating existing systems development methodologies used to develop mobile commence applications, identifying strengths and weaknesses of existing development methodologies, construction of a suitable methodology for mobile commerce applications, and testing for its applicability and practicality.The research methodology used in the study is the design research, which includes the steps of awareness of problems, suggestion, development, evaluation and conclusion. However, this paper only focuses on the first two phases of the whole study, which are awareness of the problem and making suggestions, while the evaluation and conclusion will be conducted as future works

    Data Accessibility Model Using QR Code for Lifetime Healthcare Records

    Get PDF
    One factor that determines the quality of healthcareservices is the accessibility of patient records. Fast and seamless access to patient records is necessary in order to support sharing of complete lifetime patient records among healthcare providers while promoting the greater use of it. Nevertheless, studies on how complete lifetime patient record can be acquired by improving the way these records are accessed are limited. In this paper, the conceptual model of data accessibility in healthcare domain will be presented. QR code technology will be adopted in the model as a tool that enables multi-platforms data access points. Incremental data updates will be used as a mean to share complete, up-to-date lifetime patient records. Software prototype architecture and the interface design of the model will be also presented in this paper. The contribution of the work is on improving lifetime patient records accessibility that consequently promotes sharing of complete patient records among healthcare providers
    corecore