mobile computing 2021




Programming Agent-based Mobile Apps: The JaCa-Android Framework
free download

Agent-based technologies applied in the context of mobile computing started with mobile agent (MA) technologies [ 1 1 28]. First con- crete examples in agent literature include 3APL-M [17] 2001. Mobile agent middleware for mobile computing

A Machine Learning based Context-aware Prediction Framework for Edge Computing Environments.
free download

A survey on engineering approaches for self-adaptive systems. Pervasive and Mobile Computing 1 184 206. Kumar, J., and Singh, AK (2018) Wireless Communications and Mobile Computing 2018. Liu, B., Guo, J., Li, C., and Luo, Y. (2020) P. Zheng and L. Li, smart phone next generation mobile computing 1st ed. Oxford: Morgan Kaufmann, pp. 6- His research interests include web and mobile computing 4IR, wireless communication, software development, system simulations and signal processing

The Review of Mobile Applications and Wireless Technologies in Sustaining K-12 Schools during COVID-19.
free download

Standardization Advances for Cellular and Wi-Fi Coexistence in the Unlicensed 5 and 6 GHz Bands. GetMobile: Mobile Computing and Communications, vol. 2 no. Aug. 20 pp. 5 15. March 20 doi:10.1145/3417084.3417086. 5. Akpakwu, GA, et al

A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments.
free download

User authentication is a critical security requirement for accessing resources in cloud computing systems. A text-based password is a standard user authentication way and it is still extensively used so far. However, textual passwords are difficult to remember, which

A Survey Based Study on Fog Computing Awareness
free download

vol. no. pp. 22-2 2018. P. Bellavista, J. Berrocal, A. Corradi, SK Das, L. Foschini and A. Zanni, A Survey on fog computing for the Internet of Things, Pervasive and Mobile Computing vol. 5 pp. 71-9 2018. AV

Cross-Platform Mobile App Development in Industry: A Multiple Case-Study
free download

Cross-platform frameworks for mobile application development are pervasive and allow developers to build applications that can operate on a spectrum of mobile platforms. With the high availability of such frameworks, it is imperative to give better understanding about the

A novel fog computing approach for minimization of latency in healthcare using machine learning
free download

Kao et al. [23] introduced the time-critical data analysis in mobile computing for latency minimization the author presented a novel technique with the name of Hermes. The optimization technique based on NP-hard is used for the task data. Li et alAbstract With the development of mobile edge computing (MEC), some late-model application technologies, such as self-driving, augmented reality (AR) and traffic perception, emerge as the times require. Nevertheless, the

Graph model of Fog Computing system
free download

The graph model of calculations will allow bringing effectively computing power Fog to the mobile user N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing : A survey, IEEE Internet of Things Journal 5 (2017) 450 465. doi:10.1109/JIOT.2017.2750180

Structure-aware reinforcement learning for node-overload protection in mobile edge computing
free download

Mobile Edge Computing (MEC) refers to the concept of placing computational capability at the edge of the network to reduce the latency in handling the client requests. The performance of an edge server is adversely affected when it is overloaded, especially if it

Robust machine learning-enabled routing for highly mobile vehicular networks with PARRoT in ns-3
free download

In Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA, 243 254. [17] Muhammad Khan and Kok-Lim Yau Second IEEE Workshop on Mobile Computing Systems and Applications. New Orleans, LA, USA, 90 100

Design of Environmental Perception System Based on Edge Computing
free download

M. Satyanarayanan, P. Bahl, N. Davies, The case for VM-based cloudlets in mobile computing IEEE Pervasive Computing 8(4)(2009) 14-23 320-323. Y. Mao, J. Zhang, K.-B. Letaief, Dynamic computation offloading for mobileedge computing with energy harvesting

Mobile and Intelligent Sensing for Video Watermarking Using Spectral Centroid and Haar Wavelet Transformation on High Performace Computing
free download

Some technologies are technologically advanced to provide security from illegal copying. Two complementary methods are encryption and watermarking. Encryption safeguards the information throughout the communication from the sender to the receiver. The data might

Cuckoo-Neural Approach for Secure Execution and Energy Management in Mobile Cloud Computing
free download

Along with an explosive growth in mobile applications and the emergence of the concept of cloud computing in mobile cloud computing (MCC) has been familiarized as a potential technology for mobile users. Employing MCC to enable mobile users to realize the benefits

Are There Mobile Applications Related to Nail Disorders
free download

REFERENCES 1. Wallace S, Clark M, White J. Its on my iPhone: attitudes to the use of mobile computing devices in medical education, a mixed-methods study. BMJ Open. 2012;2:e001099. 2. ODea S. Number of smartphoneKeywords: Edge Computing ; Fog Computing ; Internet of Things; Mobile edge computing ; [26] HT Dinh, C. Lee, D. Niyato, and P. Wang, A survey of mobile cloud computing : architecture applications and approaches, Wireless Communications and Mobile Computing

Wearable IoT based Distributed Framework for Ubiquitous Computing
free download

Cloudlet, Fog computing mobile edge computing and transparent computing IoT based paradigms are compared with the proposed model to verify its reliability using mobile and wearable sensors. In International Conference on Computing of e-learning education development paradigm, providing numerous benefits such as strengthening learning and knowledge transmission, enabling better access to curriculum of education and training, cost reduction and ubiquitous utilization of mobile computing platform

An Overview of Advantages and Security Challenges of Cloud Computing
free download

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol [20]. Vijay Kumar, Brief Review on Cloud Computing , International Journal of Computer Science and Mobile Computing vol

Novel Dynamic Scaling (NDS) Algorithm to Balance Energy Level in Eiot For Efficient Cloud Computing Process
free download

The smart devices like mobile phones, Bluetooths, wearable smart devices perform internetworking using emerging IoT devices [ 2]. At present, sensors, RFID embedded with smart devices and connected to network forms mobile computing more popular

Improving Student Learning and Engagement by Integrating Mobile Technology and Rebuttal Writing in Teachers Feedback
free download

Nonetheless, despite the advantages presented concerning mobile computing technology use in order to elevate diverse teaching methods, academic achievements, feedback provision, and computer accessibility, researchers reported mixed results with respect to the In: 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 139 145 Mobile Web infrastructure, remote communication, and networking can cause data and other delays Fuzzy Assisted Fog and Cloud Computing (FAFCC) with MIoT devices become the most favored traditional healthcare surveillance system approachAbstract We present a calculus of Higher-Order Mobile Embedded Resources (Homer), extending Thomsens Plain CHOCS, a higher-order calculus with local names, to allow for strongly mobile computing resources in nested locationsInternational Journal of Computer Science and Mobile Computing . AZ Alqadi, Mohammed K Abu Zalata, Ghazi M Qaryouti, Comparative analysis of color image steganography, International Journal of Computer Science and Mobile Computing vol. issue 1 ppEasy availability of mobile computing devices has facilitated online shopping and mobile payment is gaining popularity (Thakur Srivastava; Dahlberg, Guo, Ondrus; Li bana-Cabanillas, Sánchez- Fernández, Muñoz-Leiva; Perez, Zeadally, Jabeur

Code-Level Dark Patterns: Exploring Ad Networks Misleading Code Samples with Negative Consequences for Users
free download

2021. MAdLens: Investigating into Android In-App Ad Practice at API Granularity. IEEE Transactions on Mobile Computing 3 (2021), 1138 1155 In Proceedings of the Twelfth Workshop on Mobile Computing Systems Applications (San Diego, California) (HotMobile2.5. Cloud Applications Cloud is being used in almost all areas be it Healthcare, Energy System, Transportation System, Manufacturing Industry, Government Sector, Education and Mobile Communication. Some important areas of cloud computing are discussed below

Factors Affecting the Decision of Adoption Cloud Computing Technology: The Case of Jordanian Business Organizations
free download

and compliance. As in the cloud computing mechanism, data are divided into various locations of machines like PCs, mobile phones, servers, and storage devices, the problem of data security converts more serious. The study

AN EFFICIENT COMPACT SLOTTED WEARABLE MICROSTRIP PATCH ANTENNA
free download

The objectives of this research are performance analysis, characterization, design and development of compact wearable Micro Strip Patch Antennas for various wireless applications includes tracking and navigation, mobile computing and public safetyChapter 2 aims to critically present a comprehensive literature to review the mobile computing for enhanced living environments and mobile health applications published from to 2020. The main contribution of this paper

Application of Soft Computing Approach in Seven-segment Display Hardware as Applied to Business Strategies
free download

situated displays and home appliances. Mobile phones usage interface for ubiquitous computing applications signage. Synthesis Lectures on Mobile and Pervasive Computing 8(1), pp.1-128. 4. Ahn, S., Song, S., Yang, J., Oh, H. and Choi, JK, 201 October

Cloud and Edge Computing Security Challenges, Demands, Known Threats, and Vulnerabilities
free download

computing : Fog Computing , Cloudlets , and Mobile Edge Computing . Cloud and edge computing have carried as many gains as much other technology on the advanced computing area such as Mobile Edge computing that concentrates on special app areas

BSc INFORMATION TECHNOLOGY
free download

Max. Marks Credit points CA CE Total Fifth Semester PART III 14ITU25 Web Technology 3 25 75 100 3 14ITU26 Operating System 3 25 75 100 3 14ITU27 Mobile Computing 3 25 75 100 4 14ITU28 TCP/IP Protocol suite- 100- 100 3 14ITU29A 14ITU29B

APPLICATION OF KMEANS CLUSTERING ALGORITHM FOR SELECTION OF RELAY NODES IN WIRELESS SENSOR NETWORK
free download

A framework for knowledge discovery from wireless sensor networks in rural environments: a crop irrigation systems case study. Wireless Communications and Mobile Computing 2018. 6. Bader, S. (2011) Wireless Communications and Mobile Computing 2018. 15

A Survey on Secure Fog- Computing Infrastructure for Internet of Vehicles
free download

of Vehicle Environment, IEEE Access,vol no- pp 19239 1924 201 DOI:10.1109/ACCESS. 2017.2752420 Shanhe Yi, Cheng Li, Qun Li, A Survey of Fog Computing : Concepts, Applications and Issues, Mobidata 15: proceedings of the Workshop on Mobile Big Data

AN ANALYSIS OF ENERGY CONSUMPTION MODEL FOR INTERNET CONNECTIVITY IN MANETS
free download

References S. Singh, M. Woo, and CS Raghavendra 199 Power- aware routing in mobile ad hoc networks. In Proceedings of the 4th Annual ACM/IEEE international Conference on Mobile Computing and Networking (Dallas, Texas, United States, October 25 1998)

A COMPARATIVE ANALYSIS OF SELFORGANIZING MAP AND K-MEANS MODELS FOR SELECTION OF CLUSTER HEADS IN OUT-OF-BAND DEVICE-TO
free download

www.jmess.org JMESSP13420758 3866 communications. Journal of Wireless Communications and Mobile Computing 32(11): 54-58. 10 Journal of Wireless Communications and Mobile Computing 11(15): 54-57. 13. Gandotra, P. and Jha, R. (2016)

Chaotic Searchable Mobile Cloud Storage Encryption
free download

Journal of Xian University of Architecture Technology Volume XIII, Issue I ISSN No : 1006-7930 Page No: 140 Page 3. distantly put away encoded information in mobile distributed computing applications. Numerous methodologies are proposed to empower fuzzy hunt