Journal profile
Mobile Information Systems publishes original research articles as well as review articles that report the theory and/or application of new ideas and concepts in the field of mobile information systems.
Editor spotlight
Mobile Information Systems maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.
Special Issues
Latest Articles
More articlesInfluence of Native Video Advertisement Duration and Key Elements on Advertising Effectiveness in Mobile Feeds
This research investigated the influence of advertisement (ad) duration and key elements (titles, logos, and texts) on advertising effectiveness in mobile feeds. We recruited 40 participants (27 men and 13 women) who are aged from 20 to 43 years (M = 29.33, SD = 6.67). The participants were assigned randomly to four groups to watch four different types of ads: 6-second ads with key elements, 15-second ads with key elements, 15-second ads without key elements, and 30-second ads without key elements. We measured advertising effectiveness from four aspects: users’ attention, emotion, memory, and attitudes. During the experiment, a researcher recorded participants’ electroencephalography and eye movements. After the experiment, participants were required to complete a questionnaire and were interviewed. Results showed that participants felt more positive when watching 6-second duration ads in mobile feeds than the 15-second and 30-second ads; however, their memory of the ads was worse. The participants paid more attention to the key elements rather than the content of the ads. This research elucidated the features of native video ads in mobile feeds and provided some useful suggestions for advertisers who design video ads.
Joint Resource Allocation and Power Control Based on Vehicle’s Motion Characteristics in NOMA-Based V2V Systems
Due to the high spectrum utilization of Nonorthogonal Multiple Access (NOMA), it becomes one of the potential candidate technologies for future wireless communication systems. Meanwhile, in New Radio, Vehicle to Everything (V2X) has been proposed as a promising issue in the 3rd Generation Partnership Project (3GPP). This paper studies the resource allocation mechanism with power control strategy which makes full use of vehicles’ moving characteristics in the NOMA-based Vehicle to Vehicle (V2V) communication system. Firstly, vehicles are grouped according to their moving characteristics by spectral clustering. Then, vehicles which are in the same group are allocated the same wireless resource with NOMA strategy. Two grouping methods have been designed for freeway and urban scenarios separately. After that, the transmission power of vehicles is adjusted based on the result of power control strategy utilizing Q-learning. The simulation results show that the performance of the V2V system in terms of Packet Received Ratio (PRR) can be evidently improved by the proposed joint NOMA resource allocation and power control mechanism compared to typical energy sensing-based resource allocation method.
Optimization Strategy of Multiarea Interconnected Integrated Energy System Based on Consistency Theory
A collaborative optimization strategy of an integrated energy system aiming at improving energy efficiency is studied in this paper for the cluster optimization of an integrated energy system (IES). In this paper, an improved discrete consistency method based on the coordination optimization method for IES is proposed. An IES model considering the mixed energy supply of electricity, heat, and gas is constructed in a single region. And then an objective function with the maximum return is established, on the premise of assuming that the prices of electricity, heat, and gas can be used as an economical means to adjust the energy utilization. Finally, the consistency theory is applied to the IES, and the improved discrete consistency algorithm is utilized to optimize the objective function. In the case study, a certain region IES is taken as an example in Northeast China. The case study demonstrates the effectiveness and accuracy of the coordination optimization method for IES.
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process
The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information Security Requirements) proposed by the National Security Research Institute (NSRI) and established by the Telecommunications Technology Association (TTA) is being used. However, it is difficult to apply security requirements of TTAK.KO-12.0307 uniformly because of the reason that the characteristics of the ICS in each layer are different. There is also a limit to invest the security resources with equivalent priority for all requirements and ICS layers. It is still unresolved in the previous research studies which are related to information security resources, for example, Choi (2013), Ko et al. (2013), and Nah et al.’s (2016) studies. Therefore, this study tried to focus on what a top priority of information security requirements by the ICS in each layer is, using the analytic hierarchy process. As a result, we derived that the top priority requirement in the operation layer is “Identification Authentication Access Control,” in the control layer is “Event Response,” and in the field device layer is “Physical Interface Protection” with the highest importance. The results of this study can be utilized as a guideline for the security strategy and policy design by determining security requirements that should be prioritized in each layer of the ICS.
Failure-Aware and Delay-Predicted Multipath Virtual Queue Scheduling for Multimedia Transmission in Edge IoT
The spread of Edge Internet of Things (IoT) radically changes our lifestyle. However, the multimedia services in edge IoT are still stuck by inefficiency. The dynamic typologies perplex the transmission of massive real-time data. To solve this problem, multipath transmission control protocol (MPTCP) which has a natural advantage in transmission robustness and bandwidth aggregation is becoming a good choice. In this paper, failure-aware and delay-predicted multipath virtual queue scheduling (FD-MVQS) is proposed to optimize the MPTCP performance in edge IoT. FD-MVQS constructs a two-plane cooperative scheduling system. In the control plane, the transmission failure estimation and chaos theory-based arrival delay prediction methods are introduced to provide the foundation for prescheduling. In the data plane, the multipath virtual queue scheduling is designed to allocate segments to different subflows. Simulation results showed that the proposed FD-MVQS performed better than standard and typical multipath transmission solutions in throughput, delay, and segment disorder.
Heterogeneous Network Spectrum Allocation Scheme for Network-Assisted D2D Communications
To meet the drastic growth of mobile traffic, next-generation wireless networks integrate existing technologies such as dual-connectivity (DC) and network-assisted device-to-device (D2D) communications. In this paper, we present a new spectrum allocation scheme for a heterogeneous system, which incorporates both technologies. For the effective collaboration of individual network agents, we employ the ideas of cooperative games, and the spectrum allocation algorithm is implemented as a novel joint-bargaining process. Based on the bargaining solutions of classical Nash, weighted Nash, and Nash bargaining with coalition structure, our three-step interactive approach can leverage the full synergy of different bargaining concepts. Under the dynamic changing HetNet environments, we can take various benefits in a rational way while handling comprehensively the DC-based D2D communication issue and reach an agreement that gives mutual advantage. The main novelty of our proposed scheme is to ensure a relevant tradeoff between conflicting requirements during HetNet operations. Finally, we conduct extensive simulation study and illustrate that the proposed scheme provides a considerable performance improvement by comparison with the existing protocols.