By Topic

Ubi-Media Computing, 2008 First IEEE International Conference on

Date July 31 2008-Aug. 1 2008

Filter Results

Displaying Results 1 - 25 of 109
  • Newsputers: Digitally enhanced printouts supporting pervasive multimodal interactions

    Publication Year: 2008 , Page(s): 1 - 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    In this work we introduce the concept of newsputers as digitally enhanced printouts, allowing real-time access to computer-based multimedia information through paper-based interfaces. Newsputers could serve as conventional newspapers, books, magazines, etc. and in addition as clickable layouts and templates for invoking special functions and for accessing complementary information in different pervasive environments. We further propose a novel software system for providing newsputer-enabling support to publishers and readers, discuss its design and development, and finally report the resulting reference implementation and experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finger gesture interaction on large tabletop for sharing digital documents among multiple users

    Publication Year: 2008 , Page(s): 8 - 13
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    Sharing digital documents among multiple users on large tabletop is one of the typical application scenarios for tabletop systems. In this paper, we elaborate the guidelines of designing user interface for this application scenario. A set of finger gestures are then defined into the interface which includes single finger operation for selecting, moving and delivering a digital document among multiple users, double finger operation for resizing and rotating a digital document, trajectory operation for creating and deleting a user working area, creating, deleting and copying a digital document. A prototype tabletop application called JuTable is developed to explore these gestures. At last, we make a discussion on learnability, usability and naturalness of our interface design for this application scenario. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a collaborative multimodal system with a shared sound display

    Publication Year: 2008 , Page(s): 14 - 19
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (167 KB) |  | HTML iconHTML  

    Ubiquitous computing, or pervasive computing, is an increasing popular technique for developing new human-computer interfaces and computer applications. Computers watch what happens in a physical space where people are and serve them with meaningful information. Here, most of the systems depend on visual interaction, while there are some other interaction media. In this paper we present a collaborative multimodal system toward spatial presence and perceptual realism of sounds. A two-dimensional sound display called Sound Table is its central component, in which 16 speakers are mounted so that multiple users can have a sensation of ldquosounds are here and thererdquo. A stick-shaped device is provided as a means for interaction with the system. The system recognizes manipulation of the device in a 3D space over Sound Table, and then gives users feedback through visual channel as well as auditory one. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QPalm: A gesture recognition system for remote control with list menu

    Publication Year: 2008 , Page(s): 20 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (297 KB)  

    The coming ubiquity of digital media content is driving the need of a solution for improving the interaction between the people and media. In this work, we proposed a novel interaction technique, QPalm, which allows the user to control the media via a list menu shown on a distant display by drawing circles in the air with one hand. To manipulate a list menu remotely, QPalm includes two basic functions, browse and choosing, realized by recognizing the userpsilas palm performing circular and push motions in the air. The circular motion provides fluidity in scrolling a menu up and down, while push motion is intuitive when the user decided to choose an item during a circular motion. Based on this design, we develop a vision system based on a stereo camera to track the userpsilas palm without interfering by intruders behind or next to the operating user. For more specifically, the contribution of the work includes: (1) an intuitive interaction technique, QPalm, for remote control with list menu, and (2) a palm tracking algorithm to support QPalm based on merely depth and motion information of images for a practical consideration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Ubi-media in natural language interfaces of robots

    Publication Year: 2008 , Page(s): 26 - 31
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (94 KB) |  | HTML iconHTML  

    In the area of robotics, a remarkable development is the building and application of service robots. Service robots are built to help ordinary people in their homes and offices perform housework, office duties, and so on. A desirable way for a user to communicate with a service robot is using a natural language. A major challenge in creating a robot natural language interface is handling ambiguity and uncertainty in user instructions. Knowledge about the surrounding world, along with knowledge about the behaviors and actions of both the robot and its user is needed in correct interpretation of user instructions. However, the acquisition of the knowledge is very difficult for a computer system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on lightweight RFID Reader Protocol

    Publication Year: 2008 , Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    Radio frequency identification (RFID) is a kind of widely used contactless automatic recognition technology. Large-scale deployment of RFID readers and tags provides a very good hardware foundation for ubiquitous computing. A typical RFID system is usually composed of four parts: tag, RFID reader, RFID middleware and application system. To make the RFID reader integration uniform and effective, and meet the low calculation requirement of low-cost readers, a lightweight RFID reader protocol is presented. Considering the EPC standard has become a virtual standard of RFID system due to its rapid development, to meet the demand of EPC reader protocol standard (RPS), the presented protocol is specified in three layers, respectively the reader layer, the messaging layer and the transport layer. Differ from EPC RPS, in which different Messaging/Transport Bindings provide for different kinds of transport, the Messaging Layer and the Transport Layer are no longer designed to be working in pairs. Fieldbus technologies (especially PROFIBUS) are used for reference in the implementation of the transport layer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic route sharing protocol for wireless sensor networks

    Publication Year: 2008 , Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    A wireless sensor networks (WSN) comprises of a large number of sensor nodes and a few sink nodes. When multiple sink nodes are interested in collecting the readings of the same monitoring region, itpsilas conducive to exploit the sharing route in order to save bandwidth and power consumption and prolong WSNpsilas lifetime. This paper proposes a dynamic route sharing protocol (DRSP) which constructs sharing routes based upon different attributes (for example, frequency, packet length or delay time) of the commands requested from different sink nodes. The proposed DRSP dynamically adjusts data transmission route to achieve the goals of routes sharing and route length reduction. Simulation study shows that DRSP saves more energy and bandwidth consumptions than the existing work and thus prolongs the WSNpsilas lifetime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An average energy based routing protocol for Mobile Sink in wireless sensor networks

    Publication Year: 2008 , Page(s): 44 - 49
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    The energy efficiency is an important key point in wireless sensor network. In general designing a routing protocol, without only transmitting sensing data back to sink node it need provide better energy efficiency or increase wireless sensor network efficiency. In many proposed network model, we use cluster-based network model to implement our mobile sink routing protocol. By setting up a sink routing schedule queue, mobile sink has a useful path routing through clusters. It also provides an energy efficiency way with decreasing communication, and improves the wireless sensor network lifetime. In this paper, the verification simulation is also executed to prove the proposed "a mobile sink routing protocol" can increase the wireless sensor network lifetime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cluster head decision system for sensor networks using fuzzy logic and number of neighbor nodes

    Publication Year: 2008 , Page(s): 50 - 56
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the networkpsilas communication energy dissipation. However, the selection of cluster head is not easy in different environments which may have different characteristics. In this paper, in order to deal with this problem we propose a power reduction algorithm for sensor networks based on fuzzy logic and number of neighbor nodes. We evaluate the proposed system by simulations and show that proposed system makes a good selection of the cluster head. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture design of video transmission between UMTS and WSN

    Publication Year: 2008 , Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (201 KB) |  | HTML iconHTML  

    The wireless sensor networks (WSN) provide bridges between the virtual world of information technology and the real physical world. The unification of this variety of streams under the same umbrella standard has significance for the design of the supporting architecture that transmits the multimedia streams between video sensor and 3G networks (UMTS). This paper contributes to the effort by introducing a new architecture for video transmission from a sensor to the UMTS terminal at a low cost and power for the purpose that the video sensors can be within the reach of UMTS for best utilization of UMTS coverage. The integration of the mobile network infrastructure and sensor ad hoc networks can reduce the cost of building new infrastructure and enable the large scale deployment of sensor networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic and structure-preserved ontology mapping based on exponential random graph model

    Publication Year: 2008 , Page(s): 63 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (140 KB) |  | HTML iconHTML  

    Ontology has been widely used as the context representation in ubiquitous environment or smart spaces. However, different ontology representations are adopted in different spaces which exhibit great variation both in the vocabulary and level of detail. In this paper, we propose an automatic and structure preserved ontology mapping method based on exponential random graph model, termed ERGMap. Various representations of the sports ontology are adopted to evaluate the mapping accuracy of ERGMap. Our simulation results show that ERGMap achieves more than 86% of the optimal accuracy when two representations to be mapped are highly related and more than 76% of optimal accuracy when the representations are loosely related. To our best knowledge, ERGMap is the first method proposed, which performs full automatic ontology mapping process and generates a structure-preserved ontology as its output. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical modeling of ubiquitous systems

    Publication Year: 2008 , Page(s): 69 - 74
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (98 KB) |  | HTML iconHTML  

    Ubiquitous systems built in the environment of distributed or parallel computing are more complicated than conventional digital systems. This paper describes how ubiquitous systems are modeled mathematically or in a formal way using the incrementally modular abstraction hierarchy. Firstly, the system requirements represented by event sequences are mathematically expressed by the Cartesian product of actors and events using a fiber bundle. Then, the fiber bundles is lifted by the homotopy lifting property to the set of subspaces, each of which describes the behavior of a part of the system. This property is used for modeling the ubiquitous system in a bottom-up way. Assembling behaviors distributed in parts of the system, the behavior of an actor is defined by the homotopy extension property for modeling the system in a top-down way. Finally, the behaviors of the actors are adjoined together by attaching functions to express the system behavior, which is equivalent to the process obtained by process algebra. The problem of process algebra not having the methodology of how the system is modeled from system requirements to formal description is solved by the proposed incrementally modular abstraction hierarchy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal analysis of anonymity based on strand space model

    Publication Year: 2008 , Page(s): 75 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    Anonymous communication protocols can be used in ubiquitous environments to preserve the identity of users. To verify the correctness of the protocol, a formal framework for the analysis of anonymity property of anonymous communication protocols in terms of strand space model was proposed. The key ingredient is the notions of equivalent bundles and extremum pair, which are used to define anonymity. Then we illustrate our approach by proving sender anonymity and unlinkability for two well-known anonymous communication protocols, Crowds and Onion Routing and show how the framework is capable of verifying the correctness of protocols or capturing the flaws. The result shows that sender anonymity will fail in Crowds if there exist a global attacker and relation anonymity will fail in Onion Routing if the attacker knows the onion router's private key. Furthermore, to analyze the particular version of onion routing proposed in [1], it can also find the flaw in the protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evidence theory based anonymity metrics

    Publication Year: 2008 , Page(s): 82 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (113 KB) |  | HTML iconHTML  

    For privacy protection, several anonymous communication systems have been presented in the past a few years, such as Crowds, Onion routing, TOR etc. In order to measure the anonymity these systems provided, an evidence theory based approach is proposed in this paper, which presents Evidence Collection Model (ECM) to collect evidence, i.e. leaked attributes that can be obtained by attackers from userspsila actions; presents Anonymity State Model (ASM) to describe the dynamic transition of anonymity states within a given time period. According to these two models, a new method to quantify the anonymity and the unlinkability of actions is introduced. Compared with the traditional Shannon information theory, our new approach is shown to be more general and useful for evaluating the anonymity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounding data fusion for ubiquitous-applications within wireless sensor networks

    Publication Year: 2008 , Page(s): 88 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    We have formulated the data collection process within wireless sensor networks as a scheduling problem to alleviate workload on the data collection centers. A sensor device has three tasks, which are mainly sensing data, processing and transmitting the collected data. We modeled the sensorpsilas three tasks as a task-flow graph (TFG), and then we combined all TFGs for all sensors within WSN as a super task-flow graph (STFG). We have utilized two scheduling algorithms, as soon as possible (ASAP) and as late as possible (ALAP), to order all tasks within STFG subject to the data collection centerspsila limitations. Our experimental results provide excellent bounds on how early and how late to schedule all sensorspsila tasks with the variation of the number of data collection centers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improve GPS positioning accuracy with context awareness

    Publication Year: 2008 , Page(s): 94 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    This paper presents an approach to calibrate GPS position by using the context awareness technique from the pervasive computing. Previous researches on GPS calibration mostly focus on the methods of integrating auxiliary hardware so that the userpsilas context information and the basic demand of the user are ignored. From the inspiration of the pervasive computing research, this paper proposes a novel approach, called PGPS (Perceptive GPS), to directly improve GPS positioning accuracy from the contextual information of received GPS data. PGPS is started with sampling received GPS data to learning carrierpsilas behavior and building a transition probability matrix based upon HMM (Hidden Markov Model) model and Newtonpsilas Laws. After constructing the required matrix, PGPS then can interactively rectify received GPS data in real time. That is, based on the transition matrix and received online GPS data, PGPS infers the behavior of GPS carrier to verify the rationality of received GPS data. If the received GPS data deviate from the inferred position, the received GPS data is then dropped. Finally, an experiment was conducted and its preliminary result shows that the proposed approach can effectively improve the accuracy of GPS position. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on multimedia ontology bridging “semantic gap” between perceivable world and conceptual world

    Publication Year: 2008 , Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    The producers and customers have difficulties in organizing, finding, retrieving and accessing dasiarightpsila media info, reasons for this problem stem from a lack of interoperability and semantic metadata share between several applications for multimedia processing and understanding. Thus, it is necessary to design a set of media info understanding-oriented MultiMedia Ontology (MMO). In order to effectively solve the problem of ldquosemantic gaprdquo between perceivable media world and high-level conceptual world, a novel method of semantic-layering and semantic-abstracting step by step is adopted, viz. the abstract from primary perceptive level to high-level perceptive level by various perceptual components and the abstract from high-level perceptive level to high-level conceptual level by mathematical model such as Hierarchical Hidden Markov Model (HHMM). MMO is designed by re-engineering MPEG-7 with OWL DL rules, which includes core ontology, media ontology and domain ontology, the reason for such design is to be convenient to adopt existing ontology(such as MPEG-7 and DOLCE) and easy to be extended and reused. A use case of semantic-abstracting and semantic-annotating is showed to testify the effect of MMO. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An individual WEB search framework based on user profile and clustering analysis

    Publication Year: 2008 , Page(s): 106 - 112
    Cited by:  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    The search engine has played an increasingly important role, but nowadays the search engine based on string matching has many intrinsic shortcomings such as a low accuracy and inadequate individual support and so on. The paper introduces an improved framework which is based on the traditional search engine, adds a two-level profile architecture to trace and analyze userspsila previous searching history, recommends information according to some other peoplepsilas search history in the same group, evaluates search result on real time to update the user query model, does Clustering analysis on search result, submits search result to users in different categories. At last people can get information that they are really interested in. The improved framework can greatly improve individual search function and userspsila search satisfaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A effective clustering indexing based on EMD for Web image retrieval

    Publication Year: 2008 , Page(s): 113 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (207 KB) |  | HTML iconHTML  

    In this paper, we develop an effective clustering indexing scheme based on Earth Moverspsila Distance (EMD) for Web image retrieval. By the proposed clustering method, the collected web images can be automatically classified into some image subclasses with the number of the elements less than a given threshold. Then the resulted clustering structure is hierarchical tree, which extremely facilitate to quickly locate the similar image subclass nodes. Additionally, a triple tree structure is presented to effectively represent hierarchical clustering tree, and a query scheme based on approximative EMD measure is developed to achieve fast image retrieval based on the sample image. The experimental results also demonstrate the excellent performance of the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of associated topics for the intelligent browsing

    Publication Year: 2008 , Page(s): 119 - 125
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    Intelligent browsing of topics is one of the key issues of the Web and the knowledge grid, which provides on-demand services to support knowledge discovery and innovation. In this paper, Background of topics composed by Associated Relations (BAR) between keywords belonging to one domain is developed to extend the topicspsila associated relations based on the element fuzzy cognitive maps (E-FCMs), which helps us discover the associated topics that do not have direct associated relation at the keyword level. The matrix of element concepts (MC) is presented to store element concepts of topics. Through MC we can obtain the causal concepts of each topic in one domain; logic operation ldquoANDrdquo is given to get associated topics. Semantic Link Network (SLN) is automatically generated by the associated topics, which can realize the intelligent browsing of topics in Web or knowledge grid. Experimental results show that the browsing path of topics is easier to be built by the proposed algorithm and the associated topic can be recommended automatically. Meanwhile, an application of the associated topics in multimedia provides a good prospect on the cross media intelligent browsing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using TLA for modeling and analysis of Web services composition

    Publication Year: 2008 , Page(s): 126 - 131
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (99 KB) |  | HTML iconHTML  

    With the evolution of service-oriented architecture, providing support for compositing distributed and autonomous Web services into business applications has become a key area in software engineering research. Flexibility of business applications will be obtained through utilizing Web services composition technologies. However, at this stage, the research on these emerging technologies dose not solve the necessary problems to build Web service compositions, especially in Web service composition modeling, composition verification, executable semantics and supporting systems. In this paper, a temporal logic named TLA (Temporal Logic of Actions ) is introduced to solve the problem of composition verification. Particularly, algorithms for the automatic translation from BPEL4WS (Business Process Execution Language for Web Services )to TLA are discussed. The aim is to use model checking to automatically verify Web service behaviors for TLA specifications which is translated from the BPEL specifications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for sharing and storing serendipity moments in human life memory

    Publication Year: 2008 , Page(s): 132 - 137
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (458 KB) |  | HTML iconHTML  

    Every person has their own serendipitous moments; joyful moments that they hope can be kept in their mind forever. Unfortunately our memory can sometimes fail to retrieve all the details of when, where and why something happened. Today, with advances in technology, we are able to capture our serendipitous moments as digital images, videos, audio, text and as other forms of data, making use of the huge capacities of storage available to us. In this paper, we describe a system that can make personal serendipity moments available to be shared with trusted peer group members. We propose a flexible and scalable system for storing serendipitous moments in a human life memory framework and share them with friends without the need for a central server through a peer-to-peer network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handoff decision scheme with guaranteed QoS in heterogeneous network

    Publication Year: 2008 , Page(s): 138 - 143
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (162 KB) |  | HTML iconHTML  

    According to the development of the wireless communication technologies. The wireless communication network should consist of several wireless network technologies in the future. The mobility management could assure of the connection when user is roaming in the heterogeneous wireless networks. Handoff is a very important function for the mobile communication network. It is a procedure of transferring the connection from old base station to new base station which is called vertical handoff in heterogeneous networks. A good handoff decision could avoid the redundant handoffs and reduce the packet lost or communication latency. In this paper, we proposed a handoff decision scheme for heterogeneous networks. We make the decision according to the userpsilas communicating types and the performance of the networks. The results of simulations show that the scheme reduces the frequency of vertical handoff and enhances the performance of the whole network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CGI+AJAX+SVG based monitoring method for distributed and embedded system

    Publication Year: 2008 , Page(s): 144 - 148
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB)  

    This work focuses on the integration of CGI, AJAX and SVG technologies into the B/P/S architecture for monitoring the distributed and embedded Linux system. The traditional monitoring technologies and architectures do not sufficiently satisfy either the transparency of the distributed or the resource limitation of the embedded at the same time, but these two aspects are basic for distributed and embedded system. This paper describes the design decisions on integrating CGI, AJAX and SVG into the B/P/S architecture, analyzes the shortcoming of the traditional monitoring methods, introduces a sample implementation and points out some potential application domains and ideas for future development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a novel efficient location management approach in cellular networks

    Publication Year: 2008 , Page(s): 149 - 154
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (122 KB) |  | HTML iconHTML  

    When a mobile terminal enters a new location area (LA), it always updates its current location information to its home location register(HLR), when a call arrives, the system will page the mobile terminal (MT) based on its most recent updating. If location update (LU)frequency increases, the update cost increases. Decreasing location update would make the paging cost increases. In this paper, we propose an intelligent approach, it is an integrated location management scheme that combines rule base paging scheme (RBPS)and traveling salesman mobility (TSM) model scheme. It applies an intelligent paging scheme with movement based LU strategy to resolve the total cost which is comprised of paging cost and LU cost. Also, it attempts to resolve the issue of inherent tradeoff between the paging cost and LU cost in location management. Analytical results show that proposed integrated new scheme, it does reduce the total cost for location management compared to the previous scheme, and obtain the better performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.