Mobile Computing and Application Technologies
CIT 54600/ 3 Cr.
This course aims to provide in-depth coverage of mobile computing concepts and technologies. Fundamentals and state of the art developments, such as location and context-based service, cognitive radio and dynamic spectrum access, and security and privacy in mobile networks, will be included. Course will involve readings and discussion of classic and new papers on emerging topics in mobile computing research. The goal of the course is to provide a solid technological and research foundation in the area of mobile computing. In addition, hands-on experience in applying the technology to practice is a critical element.
- Available Online: No
- Credit by Exam: No
- Laptop Required: Yes
Prerequisites/Co-requisites:
Java Programming (CIT 27000)
Textbooks
There is no required text for this course. The main source of material will be papers. However, you can use one or more of the following textbooks and resources as supplemental material to help you understand the papers:
- "Mobile Communications", Jochen Schiller, Addison-Wesley, 2000.
- "Mobile Ad hoc Networking", Basagni, Conti, Giordano and Stojmenovic, Eds., IEEE/Wiley Press, 2004.
- "Fundamentals of Mobile and Pervasive Computing", Adelstein, S.K.S. Gupta, G.G. Richard III and L. Schwiebert, McGraw Hill, 2005.
- "A survey of mobile phone sensing", Lane, N.D. et al., IEEE Communications Magazine 2010.
- "Hello, Android: Introducing Google's Mobile Development Platform", Ed Burnette, The Pragmatic Bookshelf, Raleigh, NC, 2008.
Outcomes
CIT Student Outcomes (What are these?)
(i) Understand the fundamentals of mobile computing, including basic wireless communication technology and models, signal processing methods, and network theories, etc., and how it relates to mobile systems and networks;
(ii) Demonstrate a deep understanding of diverse topics related to mobile computing, including localization in mobile networks, mobility management, vehicle network technologies, mobile software design, hardware design in mobile computing system, and security and privacy in mobile networks, etc.
(iii)Learn emerging techniques in mobile computing systems and models;
(iv) Implement mobile computing techniques into real systems and networks;
(v) Learning how to prepare and present technical papers which is an essential skill for students and researchers.
(vi) Learning how to review papers. Reviewing technical and scientific papers is a skill that you need to develop. Throughout this course, you will review several papers.
(vii) Working in a semester-long project that can potentially lead to a publication.
Topics
Mobile Ad hoc and Sensor Networks · Sensor, IEEE 802.15.4, platforms for simulations and experiments · Data dissemination and routing protocols for ad-hoc networks · Energy Optimized MAC, Broadcast, and Routing |
Vehicle Networks · Wireless communication on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) · Mobile computing based on vehicle electrical system and infrastructure · Emerging mobile computing topics on vehicle systems |
Mobile Hardware Technologies · Wireless channel models and radio propagation · Hardware system and platform, e.g., smartphone, motes, RFID, etc. · Energy-efficient physical layer design on mobile devices · Emerging hardware technologies for mobile computing |
Mobile Software Design Methodologies and Infrastructure · Mobile computing system and Infrastructure · Mobile application development rules, methodologies and platforms · Introduction to mobile software design · Mid-term project assignment |
Location and Context Awareness - 1 · Localization techniques, location sensors, applications, e.g., GPS, RSSI fingerprinting, ToA ranging, etc. · Mobility and activity Pattern Inference and Prediction |
Location and Context Awareness - 2 · Energy management for localization and context awareness systems · Emerging topics on localization and context awareness |
Mid-term Exam |
In-class presentations of advanced topics · Topics selected by the instructor on a per-semester basis, Students present the above topics individually or in group. 20 minutes per presentation. |
Security and Privacy - 1 · Threats faced by mobile computing systems · Security in mobile wireless devices, including both hardware and software levels · Final project assignment |
Security and Privacy - 2 · Security and privacy for mobile social networks · Emerging topics in mobile computing security |
Human Computer Interaction · Basics of HCI, eHCI & iHCI · iHCI use in accompanied smart, wearable and implanted devices · Human Centred Design (HCD) and User Models: Acquisition & Representation · iHCI Design |
Special topics on Mobile Computing |