Loading…
Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks
Opportunistic mobile networks (OMNs), which are formed by mobile devices carried by human users, present an interesting communication paradigm in the absence of access to global network connectivity or any form of network infrastructure. In this work, we combine the natural mobility of the human use...
Saved in:
Published in: | IEEE transactions on computers 2016-04, Vol.65 (4), p.1310-1322 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293 |
---|---|
cites | cdi_FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293 |
container_end_page | 1322 |
container_issue | 4 |
container_start_page | 1310 |
container_title | IEEE transactions on computers |
container_volume | 65 |
creator | Saha, Barun Kumar Misra, Sudip Pal, Sujata |
description | Opportunistic mobile networks (OMNs), which are formed by mobile devices carried by human users, present an interesting communication paradigm in the absence of access to global network connectivity or any form of network infrastructure. In this work, we combine the natural mobility of the human users-which has been shown to resemble Levy Walk-in OMNs, together with intentional explorations . We consider the case where the human users in an OMN undergo explorations, i.e., occasionally visit a set of fixed point of interests (PoI), for example, shopping malls. The objective of this work is two-fold-1) Establishing that limited explorations of the users can help in enhancing the performance of OMNs, and 2) Formulating a method to decide whether or not a user should undergo exploration. In this regard, we propose two schemes based on prospect theory (PT) and expected utility theory (EUT). The results of extensive simulation-based performance evaluation indicate that limited exploration can promote the delivery ratio of messages by large levels-about 7 -33 percent depending on the number of randomly placed PoI, and about 36 percent depending upon the terrain size. Moreover, the time spent in exploration, on an average, is negligibly small-a typical value is about 0.55 percent of the simulation duration, which indicates its feasibility in real life. |
doi_str_mv | 10.1109/TC.2015.2441700 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1786978454</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7118165</ieee_id><sourcerecordid>4045843331</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293</originalsourceid><addsrcrecordid>eNpdkDtPAzEQhC0EEiFQU9CcRENzYf2K7RKi8JACoQi0lrnsCcPlfNiOgH_PRYkoqEZafbO7M4ScUhhRCuZyMRkxoHLEhKAKYI8MqJSqNEaO98kAgOrScAGH5CildwAYMzAD8vKcfePzT3ntEi6L6XfXhOiyD21Rh1g8Yexl5doKi2n7ttEVtrnwbTHvuhDzuvUp-6p4CK--weIR81eIH-mYHNSuSXiy0yFZ3EwXk7tyNr-9n1zNyoozlkvOtFxWdQVMSsq1VMrwGuirE0qA7GNw0CBR91PtaoqaqUo4zZZaoWOGD8nFdm0Xw-caU7YrnypsGtdiWCdLNZXGMEF5j57_Q9_DOrb9c5YqPTZKCyl66nJLVTGkFLG2XfQrF38sBbup2S4mdlOz3dXcO862Do-If7Si_emx5L8_K3dY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1786978454</pqid></control><display><type>article</type><title>Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Saha, Barun Kumar ; Misra, Sudip ; Pal, Sujata</creator><creatorcontrib>Saha, Barun Kumar ; Misra, Sudip ; Pal, Sujata</creatorcontrib><description><![CDATA[Opportunistic mobile networks (OMNs), which are formed by mobile devices carried by human users, present an interesting communication paradigm in the absence of access to global network connectivity or any form of network infrastructure. In this work, we combine the natural mobility of the human users-which has been shown to resemble Levy Walk-in OMNs, together with intentional explorations . We consider the case where the human users in an OMN undergo explorations, i.e., occasionally visit a set of fixed point of interests (PoI), for example, shopping malls. The objective of this work is two-fold-1) Establishing that limited explorations of the users can help in enhancing the performance of OMNs, and 2) Formulating a method to decide whether or not a user should undergo exploration. In this regard, we propose two schemes based on prospect theory (PT) and expected utility theory (EUT). The results of extensive simulation-based performance evaluation indicate that limited exploration can promote the delivery ratio of messages by large levels-about <inline-formula> <tex-math notation="LaTeX">7</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq1-2441700.gif"/> </inline-formula>-<inline-formula><tex-math notation="LaTeX">33</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq2-2441700.gif"/> </inline-formula> percent depending on the number of randomly placed PoI, and about <inline-formula><tex-math notation="LaTeX">36</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq3-2441700.gif"/> </inline-formula> percent depending upon the terrain size. Moreover, the time spent in exploration, on an average, is negligibly small-a typical value is about <inline-formula><tex-math notation="LaTeX">0.55</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq4-2441700.gif"/> </inline-formula> percent of the simulation duration, which indicates its feasibility in real life.]]></description><identifier>ISSN: 0018-9340</identifier><identifier>EISSN: 1557-9956</identifier><identifier>DOI: 10.1109/TC.2015.2441700</identifier><identifier>CODEN: ITCOB4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Computer simulation ; Context ; Delay Tolerant Networks ; Expected utility ; Expected Utility Theory ; Exploration ; Formulas (mathematics) ; Human ; Messages ; Mobile computing ; Mobile nodes ; Networks ; Opportunistic Mobile Networks ; Performance enhancement ; Performance evaluation ; Portable document format ; Prospect Theory ; Visualization</subject><ispartof>IEEE transactions on computers, 2016-04, Vol.65 (4), p.1310-1322</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293</citedby><cites>FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7118165$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,54795</link.rule.ids></links><search><creatorcontrib>Saha, Barun Kumar</creatorcontrib><creatorcontrib>Misra, Sudip</creatorcontrib><creatorcontrib>Pal, Sujata</creatorcontrib><title>Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks</title><title>IEEE transactions on computers</title><addtitle>TC</addtitle><description><![CDATA[Opportunistic mobile networks (OMNs), which are formed by mobile devices carried by human users, present an interesting communication paradigm in the absence of access to global network connectivity or any form of network infrastructure. In this work, we combine the natural mobility of the human users-which has been shown to resemble Levy Walk-in OMNs, together with intentional explorations . We consider the case where the human users in an OMN undergo explorations, i.e., occasionally visit a set of fixed point of interests (PoI), for example, shopping malls. The objective of this work is two-fold-1) Establishing that limited explorations of the users can help in enhancing the performance of OMNs, and 2) Formulating a method to decide whether or not a user should undergo exploration. In this regard, we propose two schemes based on prospect theory (PT) and expected utility theory (EUT). The results of extensive simulation-based performance evaluation indicate that limited exploration can promote the delivery ratio of messages by large levels-about <inline-formula> <tex-math notation="LaTeX">7</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq1-2441700.gif"/> </inline-formula>-<inline-formula><tex-math notation="LaTeX">33</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq2-2441700.gif"/> </inline-formula> percent depending on the number of randomly placed PoI, and about <inline-formula><tex-math notation="LaTeX">36</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq3-2441700.gif"/> </inline-formula> percent depending upon the terrain size. Moreover, the time spent in exploration, on an average, is negligibly small-a typical value is about <inline-formula><tex-math notation="LaTeX">0.55</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq4-2441700.gif"/> </inline-formula> percent of the simulation duration, which indicates its feasibility in real life.]]></description><subject>Computer simulation</subject><subject>Context</subject><subject>Delay Tolerant Networks</subject><subject>Expected utility</subject><subject>Expected Utility Theory</subject><subject>Exploration</subject><subject>Formulas (mathematics)</subject><subject>Human</subject><subject>Messages</subject><subject>Mobile computing</subject><subject>Mobile nodes</subject><subject>Networks</subject><subject>Opportunistic Mobile Networks</subject><subject>Performance enhancement</subject><subject>Performance evaluation</subject><subject>Portable document format</subject><subject>Prospect Theory</subject><subject>Visualization</subject><issn>0018-9340</issn><issn>1557-9956</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNpdkDtPAzEQhC0EEiFQU9CcRENzYf2K7RKi8JACoQi0lrnsCcPlfNiOgH_PRYkoqEZafbO7M4ScUhhRCuZyMRkxoHLEhKAKYI8MqJSqNEaO98kAgOrScAGH5CildwAYMzAD8vKcfePzT3ntEi6L6XfXhOiyD21Rh1g8Yexl5doKi2n7ttEVtrnwbTHvuhDzuvUp-6p4CK--weIR81eIH-mYHNSuSXiy0yFZ3EwXk7tyNr-9n1zNyoozlkvOtFxWdQVMSsq1VMrwGuirE0qA7GNw0CBR91PtaoqaqUo4zZZaoWOGD8nFdm0Xw-caU7YrnypsGtdiWCdLNZXGMEF5j57_Q9_DOrb9c5YqPTZKCyl66nJLVTGkFLG2XfQrF38sBbup2S4mdlOz3dXcO862Do-If7Si_emx5L8_K3dY</recordid><startdate>20160401</startdate><enddate>20160401</enddate><creator>Saha, Barun Kumar</creator><creator>Misra, Sudip</creator><creator>Pal, Sujata</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20160401</creationdate><title>Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks</title><author>Saha, Barun Kumar ; Misra, Sudip ; Pal, Sujata</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer simulation</topic><topic>Context</topic><topic>Delay Tolerant Networks</topic><topic>Expected utility</topic><topic>Expected Utility Theory</topic><topic>Exploration</topic><topic>Formulas (mathematics)</topic><topic>Human</topic><topic>Messages</topic><topic>Mobile computing</topic><topic>Mobile nodes</topic><topic>Networks</topic><topic>Opportunistic Mobile Networks</topic><topic>Performance enhancement</topic><topic>Performance evaluation</topic><topic>Portable document format</topic><topic>Prospect Theory</topic><topic>Visualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saha, Barun Kumar</creatorcontrib><creatorcontrib>Misra, Sudip</creatorcontrib><creatorcontrib>Pal, Sujata</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Explore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on computers</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saha, Barun Kumar</au><au>Misra, Sudip</au><au>Pal, Sujata</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks</atitle><jtitle>IEEE transactions on computers</jtitle><stitle>TC</stitle><date>2016-04-01</date><risdate>2016</risdate><volume>65</volume><issue>4</issue><spage>1310</spage><epage>1322</epage><pages>1310-1322</pages><issn>0018-9340</issn><eissn>1557-9956</eissn><coden>ITCOB4</coden><abstract><![CDATA[Opportunistic mobile networks (OMNs), which are formed by mobile devices carried by human users, present an interesting communication paradigm in the absence of access to global network connectivity or any form of network infrastructure. In this work, we combine the natural mobility of the human users-which has been shown to resemble Levy Walk-in OMNs, together with intentional explorations . We consider the case where the human users in an OMN undergo explorations, i.e., occasionally visit a set of fixed point of interests (PoI), for example, shopping malls. The objective of this work is two-fold-1) Establishing that limited explorations of the users can help in enhancing the performance of OMNs, and 2) Formulating a method to decide whether or not a user should undergo exploration. In this regard, we propose two schemes based on prospect theory (PT) and expected utility theory (EUT). The results of extensive simulation-based performance evaluation indicate that limited exploration can promote the delivery ratio of messages by large levels-about <inline-formula> <tex-math notation="LaTeX">7</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq1-2441700.gif"/> </inline-formula>-<inline-formula><tex-math notation="LaTeX">33</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq2-2441700.gif"/> </inline-formula> percent depending on the number of randomly placed PoI, and about <inline-formula><tex-math notation="LaTeX">36</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq3-2441700.gif"/> </inline-formula> percent depending upon the terrain size. Moreover, the time spent in exploration, on an average, is negligibly small-a typical value is about <inline-formula><tex-math notation="LaTeX">0.55</tex-math> <inline-graphic xlink:type="simple" xlink:href="misra-ieq4-2441700.gif"/> </inline-formula> percent of the simulation duration, which indicates its feasibility in real life.]]></abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TC.2015.2441700</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0018-9340 |
ispartof | IEEE transactions on computers, 2016-04, Vol.65 (4), p.1310-1322 |
issn | 0018-9340 1557-9956 |
language | eng |
recordid | cdi_proquest_journals_1786978454 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Computer simulation Context Delay Tolerant Networks Expected utility Expected Utility Theory Exploration Formulas (mathematics) Human Messages Mobile computing Mobile nodes Networks Opportunistic Mobile Networks Performance enhancement Performance evaluation Portable document format Prospect Theory Visualization |
title | Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T06%3A51%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Utility-Based%20Exploration%20for%20Performance%20Enhancement%20in%20Opportunistic%20Mobile%20Networks&rft.jtitle=IEEE%20transactions%20on%20computers&rft.au=Saha,%20Barun%20Kumar&rft.date=2016-04-01&rft.volume=65&rft.issue=4&rft.spage=1310&rft.epage=1322&rft.pages=1310-1322&rft.issn=0018-9340&rft.eissn=1557-9956&rft.coden=ITCOB4&rft_id=info:doi/10.1109/TC.2015.2441700&rft_dat=%3Cproquest_cross%3E4045843331%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c322t-3285dcfc025513857793f01ba4740517030805e893f8af1e827c4a82d87ea293%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1786978454&rft_id=info:pmid/&rft_ieee_id=7118165&rfr_iscdi=true |