Advancing the Next-Generation of Mobile Computing: Emerging Technologies

Advancing the Next-Generation of Mobile Computing: Emerging Technologies

Ismail Khalil (Johannes Kepler University Linz, Austria) and Edgar R. Weippl (Secure Business Austria, Austria)
Release Date: February, 2012|Copyright: © 2012 |Pages: 344
ISBN13: 9781466601192|ISBN10: 1466601191|EISBN13: 9781466601208|DOI: 10.4018/978-1-4666-0119-2
Hardcover + Free E-Book:
E-Book Only:
Free Lifetime E-Book Access with Hardcover Purchase
IGI Global is now offering Free Lifetime E-Access with Print Purchase of any book or journal subscription. In addition to the print copy purchased, this unprecedented offer provides libraries and individuals alike the ability to access the purchased publication through the award winning InfoSci® platform. The InfoSci® platform offers unlimited simultaneous access to full HTML and PDF viewing with the ability to save, print, copy, and paste! No hidden fees! No limitations! Learn More.

Immediate e-access available to existing InfoSci® customers. New customers will be provided access within 48 hours from purchase.


The growth of mobile technology has caused considerable changes in the way we interact with one another within both personal and business environments. Advancements in mobile computing and mobile multimedia resonate with engineers, strategists, developers, and managers while also determining the behavior and interaction of end users.

Advancing the Next-Generation of Mobile Computing: Emerging Technologies offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications. This collection of research aims to inform researchers, designers, and users of mobile technology and promote awareness of new trends and tools in this growing field of study.

Topics Covered

  • Intelligent Mobile Advertising
  • IP-Based Mobile Networks
  • Mobile Clients
  • Mobile Computing Applications
  • Mobility Management Schemes
  • Multimedia Streaming
  • Routing Protocols
  • Security Management for Mobile Ad Hoc Networks
  • WiMAX Systems
  • Wireless sensor networks

Table of Contents and List of Contributors

Search this Book:
Editorial Advisory Board
Table of Contents
Ismail Khalil, Edgar R. Weippl
Chapter 1
Ali H. Al-Bayatti, Hussein Zedan, Antoniuo Cau, François Siewe
Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield... Sample PDF
Security Management for Mobile Ad Hoc Network of Networks (MANoN)
Chapter 2
Gongjun Yan, Stephan Olariu, Shaharuddin Salleh
The key attribute that distinguishes Vehicular Ad hoc Networks (VANET) from Mobile Ad hoc Networks (MANET) is scale. While MANET networks involve up... Sample PDF
A Probabilistic Routing Protocol in VANET
Chapter 3
Neeraj Kumar, R. B. Patel
Wireless mobile adhoc network (MANET) is a dynamic network. Nodes in a MANET have high degree of mobility from one domain to another in a particular... Sample PDF
An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks
Chapter 4
Rajesh Verma, Arun Prakash, Rajeev Tripathi, Neeraj Tyagi
The TCP congestion control mechanism along with unfairness problem poses poor performance when IEEE 802.11 MAC protocol is used in multi-hop ad hoc... Sample PDF
Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission
Chapter 5
Daniel Hughes, Klaas Thoelen, Wouter Horré, Nelson Matthys, Javier Del Cid, Sam Michiels, Christophe Huygens, Wouter Joosen, Jó Ueyama
Considerable research has been performed in applying run-time reconfigurable component models to the domain of wireless sensor networks. The ability... Sample PDF
Building Wireless Sensor Network Applications with LooCI
Chapter 6
Salah Saleh, Martin Fleury
IEEE 802.16e (mobile WiMAX) uplink behavior is a relatively neglected area of investigation, but emerging interactive media services have... Sample PDF
Options for WiMAX Uplink Media Streaming
Chapter 7
Yushi Shen, Pamela C. Cosman, Laurence B. Milstein, Eduardo F. Martinez
In this paper, channel estimation algorithms are proposed and compared for uplink WiMAX systems, which are OFDMA based. These algorithms are... Sample PDF
On Uplink Channel Estimation in WiMAX Systems
Chapter 8
Vlado Menkovski, Georgios Exarchakos, Antonio Liotta, Antonio Cuadra Sánchez
Understanding how quality is perceived by viewers of multimedia streaming services is essential for efficient management of those services. Quality... Sample PDF
Quality of Experience Models for Multimedia Streaming
Chapter 9
Abdellah Jamali, Najib Naja, Driss El Ouadghiri
IPv6 is a next-generation Internet layer protocol designed by the IETF (Internet Engineering Task Force) to solve the problem of IP address... Sample PDF
Utilization of an Improvement Manuel Configuration for Multimedia in 6to4 Tunneling
Chapter 10
Amany M. Sarhan, Mohamed T. Faheem, Rasha Orban Mahmoud
With the widespread use of videos in many fields of our lives, it becomes very important to develop new techniques for video denoising. Spatial... Sample PDF
A Proposed Intelligent Denoising Technique for Spatial Video Denoising for Real-Time Applications
Chapter 11
Siham Ouamour, Halim Sayoud, Salah Khennouf
This paper presents a system of speaker localization for a purpose of speaker tracking by camera. The authors use the information given by the two... Sample PDF
Automatic Speaker Localization and Tracking: Using a Fusion of the Filtered Correlation with the Energy Differential
Chapter 12
Arun Prakash, Rajesh Verma, Rajeev Tripathi, Kshirasagar Naik
Network mobility (NEMO) route optimization support is strongly demanded in next generation networks; without route optimization the mobile network... Sample PDF
Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain
Chapter 13
Paramesh C. Upadhyay, Sudarshan Tiwari
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of... Sample PDF
Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey
Chapter 14
Ioannis T. Christou, Sofoklis Efremidis, Aikaterini Roukounaki
The market for applications developed for mobile devices is growing as the hardware capabilities increase while costs drop. At the same time, the... Sample PDF
A CASE Tool for Java Mobile Computing Applications
Chapter 15
Halim Sayoud, Siham Ouamour
Most existing systems of speaker recognition use “state of the art” acoustic features. However, many times one can only recognize a speaker by his... Sample PDF
Pertinent Prosodic Features for Speaker Identification by Voice
Chapter 16
Quynh Chi Truong, Anh Tuan Truong, Tran Khanh Dang
The rapid development of location-based services, which make use of the location information of the user, presents both opportunities and... Sample PDF
Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services
Chapter 17
Jerry Zeyu Gao, Angela Ji
The fast deployment of wireless networks and mobile technologies and the significant increase in the number of mobile device users have created a... Sample PDF
Building an Intelligent Mobile Advertising System
About the Contributors


This book compiles a series of interesting and timely papers in the areas (1) ad hoc networks, (2) multimedia and streaming, (3) mobile Technologies, and (4) privacy.

In the first section, the first paper (Security Management for Mobile Ad Hoc Network of Networks (MANoN)) uses interval temporal logic to improve security management with a focus on ad hoc networks. Vehicular ad hoc networks (A Probabilistic Routing Protocol in VANET) are a special case since the topology of the network changes all the time; routing is thus a challenge.  Secure communication between clients in ad hoc networks (An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks) requires authentication of nodes and keeping the overhead of communication and computation low. When multiple nodes communicate congestion on the shared communication channel may occur. Concurrent transmission on the MAC layer (Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission) can improve this.  Dynamically deploying and reconfiguring software components is useful in ad hoc networks in the face of node mobility, dynamic environmental conditions and changing application requirements. LooCI (Building Wireless Sensor Network Applications with LooCI) is model that is optimized for such constrained environments such as ad hoc networks or sensor networks.

The second section covers a wide range of topics in the area of multimedia and streaming. WiMAx video delivery (Options for WiMAX Uplink Media Streaming) may be improved by using H.264/AVC to avoid oscillations in buffer load. Moreover, channel estimation algorithms (On Uplink Channel Estimation in WiMAX Systems) are compared for uplink WiMAX systems and improvements are being proposed. Communication channel properties certainly influence how the quality of streaming content is perceived, but in addition to objective figures, a subjective rating of the quality of experience (Quality of Experience Models for Multimedia Streaming) helps to improve prediction models and optimize the usage of communication infrastructure. With small devices becoming ubiquitous, the transition from IPv4 to IPv6 accelerates and several problems need to be addressed (Utilization of an Improvement Manuel Configuration for Multimedia in 6 to 4 Tunneling). Low quality video can be improved by denoising; information from the spatial domain can help to improve this task (A Proposed Intelligent Denoising Technique for Spatial Video Denoising For Real-Time Applications). When recording a talk, the location of the speaker can be determined by the two microphones (Automatic Speaker Localization and Tracking Using a Fusion of the Filtered Correlation with the Energy Differential); this information can be used to decide who the active speaker is and audio-visual recording can then be optimized for the location.

Section 3 covers mobile technologies. The first chapter in this section focuses on route optimization (Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain) since tunnelling the communication from the home network to the mobile device in another network increases delays. A comprehensive literature survey (Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey) is useful for other researchers to build on. On the application level, mobile devices are increasingly diverse in the features they support. Thus a tool box (A CASE Tool for Java Mobile Computing Applications) to create portable apps can help to fight the cost of increased diversity.

The last section addresses privacy such as speaker identification (Pertinent Prosodic Features for Speaker Identification by Voice) or location privacy. Location privacy can be improved by using a trusted middleware (Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–based Services) that organizes space in an adaptive grid and hides the user’s true location. Mobile advertising needs to use specific mechanisms to target the receivers of advertisements (Building an Intelligent Mobile Advertising System) and this has an impact on an individual’s privacy.

Ismail Khalil

Johannes Kepler University Linz, Austria

Edgar Weippl
Secure Business Austria-Security Research, Austria

Author(s)/Editor(s) Biography

Ismail Khalil ( is a senior researcher and lecturer at the institute of telecooperation, Johanes Kepler University Linz, Austria, since October 2002. He is the president of the international organization of Information Integration and Web-based Applications & Services (@WAS). He holds a PhD in computer engineering and received his habilitation degree in applied computer science on his work on agents’ interaction in ubiquitous environments in May 2008. He currently teaches, consults, and conducts research in Mobile Multimedia, Cloud Computing, Agent Technologies, and the Semantic Web and is also interested in the broader business, social, and policy implications associated with the emerging information technologies. Before joining Johannes Kepler University of Linz, he was a research fellow at the Intelligent Systems Group at Utrecht University, Netherlands from 2001-2002 and the project manager of AgenCom project at the Software Competence Center Hagenberg - Austria from 2000-2001. Dr. Khalil has authored around 100 scientific publications, books, and book chapters. He is the editor of the Handbook of Research on Mobile Multimedia series, the book Mobile Multimedia: Communication Engineering Perspective, the book Multimedia Transcoding in Mobile and Wireless Networks, the book Innovations in Mobile Multimedia Communications and Applications: New Technologies and the book Advancing the Next-Generation of Mobile Computing: Emerging Technologies. He serves as the Editor-in-Chief of the International Journal on Web Information Systems (IJWIS), International Journal on Pervasive Computing and Communication (IJPCC) both published by Emerald Group publishing, UK, Journal of Mobile Multimedia (JMM) published by Rinton Press, USA, International Journal of Mobile Computing and Multimedia Communication (IJMCMC) published by IGI Global, USA, Advances in Next Generation Mobile Multimedia book series published by IGI Global, USA, and Atlantis Ambient and Pervasive Intelligence book series published by Atlantis and Springer. He is on the editorial board of several international journals. His work has been published and presented at various conferences and workshops.
Edgar R. Weippl ( is Research Director of Secure Business Austria and Priv.-Doz. at the Vienna University of Technology. His research focuses on applied concepts of IT-security and e-learning. Edgar organizes the ARES conference and is on the editorial board of Computers & Security. After graduating with a Ph.D. from the Vienna University of Technology, Edgar worked for two years in a research startup. He then spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant for an HMO in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and founded together with A Min Tjoa and Markus Klemen the research center SBA Research - Secure Business Austria.


Editorial Board

  • Schahram Dustdar, Vienna University of Technology, Austria
  • Ali Hurson, The Pennsylvania State University, USA
  • Gabriele Kotsis, Johannes Kepler University Linz, Austria
  • Stephan Olariu, Old Dominion University, USA
  • David Taniar, Monash University, Australia