mobile computing Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Location-Based Internationalization and Localization With Mobile Computing

The Android system operates on many smartphones in many locales. Websites and web tools have their own requirements in day-to-day life. To reach the maximum users, the app and website should handle all the resources such as text strings, functions, layouts, graphics, and any other static data that the app/website needs. It requires internationalization and localization of the website and app to support multiple languages. The basic idea of this chapter is to present an approach for localizing the Android application according to the location data that the app received from the device, but many users do not allow the “access location” feature so this approach will be a dead end in this case. The authors have proposed some other techniques to achieve this feature of localization and internationalization by implementing the “choose language” service so that the app can itself optimize its content and translate it into the user's native language.

Why Does Privacy Paradox Exist?

In this exploratory study, the main aim was to find, ‘why do people disclose information when they are concerned about their privacy?’. The reasons that provide a plausible explanation to the privacy paradox have been conjectural. From the analysis of the eighteen in-depth interviews using grounded theory, themes were then conceptualized. We found rational and irrational explanations in terms of cognitive biases and heuristics that explain the privacy paradox among mobile users. We figured out some reasons in this context of mobile computing which were not emphasized earlier in the privacy paradox literature such as Peanut Effect, Fear of Missing Out- FoMo, Learned Helplessness, and Neophiliac Personality. These results add to the privacy paradox discourse and provide implications for smartphone users for making privacy-related decisions more consciously rather than inconsiderately disclosing information. Also, the results would help marketers and policymakers design nudges and choice architectures that consider privacy decision-making hurdles.

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Intelligent multilevel node authentication in mobile computing using clone node, 2021 index ieee transactions on mobile computing vol. 20, mobile computing and sustainable informatics, computer mathematical modeling based on the improved genetic algorithm and mobile computing.

In order to change the problem of data redundancy in a genetic algorithm, this paper proposes a computer mathematical model based on the combination of an improved genetic algorithm and mobile computing. Combined with the least square method, MATLAB software is used to solve the equations, determine the range of parameters, and solve the estimation parameter range and identification problems. The improved genetic algorithm combined with mobile computing and least square method to establish a mathematical model greatly increased the individual search space and increased the operation rate of 90% compared to the basic genetic algorithm or mobile computing. The results show that the improved genetic algorithm and mobile computing have a certain ability to identify the optimal solution and greatly improve the work efficiency.

Integrated Fan‐Out ( InFO ) for Mobile Computing

Mobile computing as a support to teach the concept of function.

We make a proposal to teach the concept of function using mobile computing. This proposal is based on research that has support in education theories such as Constructivism and Problem Solving Learning. In the first part we show the difficulties that undergraduate Computer Science students have in the first semester of Engineering while working with that mathematical concept. And application to be used by the students anywhere and anytime in mobile devices is designed that process data and is intended to show them the concept of function in a problem solving situation. The proposed activities are part of the education methodology used in the research and within this paper we show the diagnostic questionnaire as one of the methodological tools and its results supporting the designed activities and its application to mobile devices

Prediction of Mineralization Prospects Based on Geological Semantic Model and Mobile Computer Machine Learning

Mineral resources are indispensable in the development of human society and are the foundation of national economic development. As the prospecting target shifts from outcrop ore to concealed ore, from shallow to deep, the difficulty of prospecting becomes more and more difficult. Therefore, the prediction of mineralization prospects is of great significance. This paper is aimed at completing the prediction of mineralization prospects by constructing geological semantic models and using mobile computer learning to improve the accuracy of prediction of mineralization prospects and expanding the application of semantic mobile computing. We use five different semantic relations to build a semantic knowledge library, realize semantic retrieval, complete information extraction of geological text data, and study mineral profiles. Through the distributed database of mobile computing, the association rules and random forest algorithm are used to describe the characteristics of minerals and the ore-controlling elements, find the association rules, and finally combine the geological and mineral data of the area and use the random forest algorithm to realize the prospect of mineralization district forecast. The geological semantic model constructed in the article uses the knowledge library for associative search to achieve an accuracy rate of 87.9% and a recall rate of 96.5%. The retrieval effect is much higher than that of traditional keyword retrieval methods. The maximum value of the posterior result of the mineralization prospect is 0.9027, the average value is 0.0421, and the standard deviation is 0.1069. The picture is brighter, and the probability of mineralization is higher.

Export Citation Format

Share document.

mobile computing research papers

Mobile Computing and Sustainable Informatics

Proceedings of ICMCSI 2023

  • Conference proceedings
  • © 2023
  • Subarna Shakya 0 ,
  • George Papakostas 1 ,
  • Khaled A. Kamel 2

Pulchowk Campus, Tribhuvan University, Kathmandu, Nepal

You can also search for this editor in PubMed   Google Scholar

Department of Computer Science, International Hellenic University, Kavala, Greece

Computer science department, texas southern university, houston, usa.

  • Presents high-quality research papers in mobile computing and sustainable informatics
  • Features the outcomes of ICMCSI 2023, held in Nepal
  • Serves as a reference resource for researchers and practitioners in academia and industry

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies (LNDECT, volume 166)

13k Accesses

69 Citations

1 Altmetric

This is a preview of subscription content, log in via an institution to check access.

Access this book

  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (56 papers)

Front matter, measuring the technical efficiency of thai rubber export using the spatial stochastic frontier model under the bcg concept.

  • Chanamart Intapan, Chukiat Chaiboonsri

Analysis of Digital Data Consumption of Video Streaming Platforms During COVID-19

  • Lizeth Aracelly Lopez-Orosco, Valeria Alexandra Solano-Guevara, Adriana Margarita Turriate-Guzman, Luis-Rolando Alarcón-Llontop

A Prototype of a Wireless Power Transmission System Based on Arduino

  • Md. Rawshan Habib, Ahmed Yousuf Suhan, Md. Shahnewaz Tanvir, Abhishek Vadher, Md. Mossihur Rahman, Shuva Dasgupta Avi et al.

Short Review on Blockchain Technology for Smart City Security

  • Alanoud Alquwayzani, M. M. Hafizur Rahman

Efficient Analysis of Sequences of Security Problems in Access Control Systems

  • Anh Tuan Truong

Artificial Intelligence in Agriculture: Machine Learning Based Early Detection of Insects and Diseases with Environment and Substance Monitoring Using IoT

  • D. Gnana Rajesh, Yaqoob Yousuf Said Al Awfi, Murshid Qasim Mohammed Almaawali

Design Concepts for Mobile Computing Direction Finding Systems

  • Juliy Boiko, Oleksıy Polıkarovskykh, Vitalii Tkachuk, Hanna Yehoshyna, Lesya Karpova

A Hybrid Machine Learning Model for Urban Mid- and Long-Term Electricity Load Forecasting

  • Xianghua Tang, Zhihui Jiang, Lijuan Zhang, Jiayu Wang, Youran Zhang, Liping Zhang

Optimizing Long Short-Term Memory by Improved Teacher Learning-Based Optimization for Ethereum Price Forecasting

  • Marija Milicevic, Luka Jovanovic, Nebojsa Bacanin, Miodrag Zivkovic, Dejan Jovanovic, Milos Antonijevic et al.

A Sophisticated Review on Open Verifiable Health Care System in Cloud

  • Mandava Varshini, Kolla Akshaya, Katakam Krishna Premika, A. Vijaya Kumar

Fuzzy Metadata Augmentation for Multimodal Data Classification

  • Yuri Gordienko, Maksym Shulha, Yuriy Kochura, Oleksandr Rokovyi, Oleg Alienin, Sergii Stirenko

Development of an Information Accuracy Control System

  • A. M. Mehdiyeva, I. Z. Sardarova, Z. A. Mahmudova

Modelling an Efficient Approach to Analyse Clone Phishing and Predict Cyber-Crimes

  • Bondili Sri Harsha Sai Singh, Mohammed Fathima, Mohammad Sameer, Thota Teja Mahesh, A. Dinesh Kumar, K. Padmanaban

The Application of Mobile Phones to Enable Traffic Flow Optimisation

  • T. Shilowa, J. P. van Deventer, M. J. Hattingh

A Hypothesis on Cloud Sourcing Sharing Users’ Mobile Devices Through Virtualization

  • Nazmus Sakib, Al Hasib Mahamud

An Analytical Assessment of Machine Learning Algorithms for Predicting Campus Placements

  • S. Bala Dhanalakshmi, Raksheka Rajakumar, Swetha Shankar, R. Sowndharya Rani, N. Deepa, C. Subha Priyadharshini

Building Hindi Text Dataset on Stock Market Tweets and Sentiment Analysis Using NLP

  • Choudhary Anushka, Gupta Mohit, S. K. Lavanya

Fine-Tuning of RoBERTa for Document Classification of ArXiv Dataset

  • Kshetraphal Bohara, Aman Shakya, Bishal Debb Pande

Comparative Analysis of Using Event Sourcing Approach in Web Application Based on the LAMP Stack

  • Marian Slabinoha, Stepan Melnychuk, Vitalia Kropyvnytska, Bohdan Pashkovskyi
  • Mobile Cloud Computing Models
  • Mobile and Ubiquitous Computing Architectures
  • Sustainable Data Analytics
  • Sustainable Information Modelling
  • Sustainable Information Systems
  • ICMCSI 2023 Proceedings

About this book

Editors and affiliations.

Subarna Shakya

George Papakostas

Khaled A. Kamel

About the editors

George A. Papakostas  received a diploma in Electrical and Computer Engineering in 1999 and an M.Sc. and Ph.D. degree in Electrical and Computer Engineering in 2002 and 2007, respectively, from the Democritus University of Thrace(DUTH), Greece. Dr. Papakostas is a Tenured Full Professor in the Department of Computer Science, at International Hellenic University, Greece. Dr. Papakostas has 10 years of experience in large-scale systems design, as a senior software engineer and technical manager in INTRACOM TELECOM S.A. and INTALOT S.A. companies. Currently, he is the Director of the “MLV Research Group” (Machine Learning & Vision Research Group). He has (co)authored more than 200 publications in indexed journals, international conferences and book chapters, 1 book (in greek), 2 edited books and 5 journal special issues. His publications have more than 3000 citations with h-index 32 (GoogleScholar). His research interests include machine learning, computer/machine vision, pattern recognition, and computational intelligence. Dr. Papakostas served as a reviewer in numerous journals and conferences, and he is a member of the IAENG, MIR Labs, EUCogIII and the Technical Chamber of Greece (TEE).

Khaled A . Kamel is currently Chairman and Professor at Texas Southern university, College of Science and technology, Department of Computer Science, Houston, TX. He has published many research articles in refereed journals and IEEE conferences. He has more than 30 years of teaching and research experience. He has been General Chair, Session Chair, TPC Chair, and Panelist in several conferences and acted as Reviewer and Guest Editor in referred journals. His research interest includes networks, computing, and communication systems.

Bibliographic Information

Book Title : Mobile Computing and Sustainable Informatics

Book Subtitle : Proceedings of ICMCSI 2023

Editors : Subarna Shakya, George Papakostas, Khaled A. Kamel

Series Title : Lecture Notes on Data Engineering and Communications Technologies

DOI : https://doi.org/10.1007/978-981-99-0835-6

Publisher : Springer Singapore

eBook Packages : Intelligent Technologies and Robotics , Intelligent Technologies and Robotics (R0)

Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023

Softcover ISBN : 978-981-99-0834-9 Published: 27 May 2023

eBook ISBN : 978-981-99-0835-6 Published: 26 May 2023

Series ISSN : 2367-4512

Series E-ISSN : 2367-4520

Edition Number : 1

Number of Pages : XVI, 799

Number of Illustrations : 94 b/w illustrations, 289 illustrations in colour

Topics : Computational Intelligence , Mobile Computing , Mobile and Network Security , Artificial Intelligence

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

TechRepublic

Techrepublic resource library.

IT white papers, webcasts, case studies, and much more - all free to registered TechRepublic members.

  • Find Search or Browse our extensive library
  • Download Free resources at the click of a button
  • Solve If you have a problem, we have the solution

Featured Resources

Hiring kit: web3 technical writer.

Successful Web3 technical writers craft compelling and customer-oriented content by translating complex information and documentation into a simple and cohesive form. With a strong background in emerging technologies like blockchain and Web3, they have the ability to communicate brand vision to end users. This hiring kit, written by Avya Chaudhary for TechRepublic Premium, provides a ...

How to Manage File and Folder Permissions in Linux

From the beginning, Linux has made it possible for admins and users to get fairly granular with file and folder permissions. From the user perspective, it’s simple: If you created a file, you own it and have permission to read or write to the file. But that doesn’t always apply to the ability to execute ...

Employee Termination Policy

Whether due to resignation, layoff or firing, separating employees from the business is never a pleasant process nor is it always easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee terminations and streamline the experience as ...

Hiring Kit: Cryptography Engineer

Cryptography engineers often collaborate with cybersecurity teams to integrate robust cryptographic solutions into software, hardware and network infrastructure, addressing potential vulnerabilities and mitigating risks associated with data breaches or cyberattacks. This hiring kit, written by Franklin Okeke for TechRepublic Premium, provides a practical framework you can use to hire the ideal cryptography engineer for your ...

Quick Glossary: Edge Computing

Edge computing is a distributed computing approach that delivers hosted cloud services, storage resources and other data processing capacities closer to the data’s source. Although its origins began in the late 1990s, edge computing has become more prevalent in recent years as a way to increase the efficiency in data processing. Megan Crouse, writing for ...

How to Optimize the apt Package Manager on Debian-Based Linux Distributions

When it comes to Linux and installing software via the package manager, you can always ensure the system will be aware of the package, updates are easily applied and systems can always be repaired (should they go awry). In this guide, Jack Wallen writing for TechRepublic Premium, explains how to make the most out of ...

10 Programming Habits that Should Be More Common (Free Download)

You learn lots of things when you go to college and get a computer science degree or read a how-to-program book. Unfortunately, a number of good programming habits are either untaught or take a good amount of practice to turn into a way of life. TechRepublic Premium presents 10 such habits you should cultivate to ...

HIPAA Policy

As the health industry continues to modernize and digitally transform — driving growth among healthcare providers and diversifying its supply chain and partners — complying with the Health Insurance Portability and Accountability Act becomes fundamental for the sector to safeguard health operations, PHI, individual rights and mitigate and respond to breaches and incidents. This policy, ...

Find By Topic

  • Artificial Intelligence
  • Collaboration
  • Data Centers
  • Data Management
  • Digital Transformation
  • Virtualization

TechRepublic Premium

  • More Topics 5G After Hours Amazon Android Apple Asean Australia Banking CIO50 CXO Consumerization Decade in Review Digital Health and Wellness E-Commerce EU Enterprise Software GDPR Google Google Hangout IT Policies India Internet of Things Microsoft Open source Printers Project Management SMBs Samsung Security Smart Cities Smart Office Social enterprise Software Start-Ups Tech & Work Tech Industry

Latest From TechRepublic Premium

Premium Resources

Latest from Premium

Hiring Kit: Web3 Technical Writer

Recent Additions

Nist cybersecurity framework: a cheat sheet for professionals (free pdf).

The tech world has a problem: Security fragmentation. There’s no standard set of rules or even language for mitigating cyber risk used to address the growing threats of hackers, ransomware and stolen data, and the threat to data only continues to grow. President Barack Obama recognized the cyber threat in 2013, which led to his ...

Predictions 2024: Executive Edition

Ready or not, here comes 2024. From resilience to board priorities, Splunk executives across security, IT and engineering weigh in on what to expect in the era of AI. AI: The hype will pay off, but business impact will take another 12-24 months. C-suite transformation: CISOs, CTOs and CIOs will have expanded roles in the ...

The AI Philosophy Powering Digital Resilience

3 AI Strategies for Cybersecurity and Observability As organizations embrace dispersed architecture, grapple with an evolving threat landscape and heavily rely on digital systems, AI steps in as a promising solution to control IT chaos. But without clear guardrails that address data privacy and security concerns, we must determine how to build AI models that ...

Vix Makes Travels Safer and Smoother With Proactive Global Visibility

Vix Technology is a global leader in intelligent transportation systems, automated fare collection, and transit analytics. Transit agencies and operators — including the major transportation systems of major cities like Edmonton and Seattle — rely on Vix to help travelers process fare payments and arrive safely and on time at their destination. Previously, Vix relied ...

Observability Buyer’s Guide

This guide is for ITOps and engineering leaders and practitioners who want to lower the cost of unplanned downtime. Learn why Splunk customers like Lenovo, Puma and Rappi lean on observability as a critical solution for modern software development and discover how an observability practice can improve digital resilience. In this guide, you’ll get: An ...

Evolving From Monitoring: Why Observability Is Essential for Your Business

Faster is better, especially for businesses. Cloud-native technologies — while they deliver customer-facing applications and new features faster than ever — come with potential challenges, like complex dependencies. For every deployment, there are new potential errors, slowness or outages. Monitoring solutions have come a long way, but they often fall short in modern environments. That’s ...

Observability Predictions 2024

We’re sitting squarely at the beginning of an AI hype cycle that will cause businesses to rethink their people, processes and technology. What emerging trends do we see around the corner in the observability space? AI: AI will bring an explosion of productivity across environments, applications, microservices — as well as an uptick in data ...

Why You Need a Single Tool for Infrastructure Monitoring and APM

Now, more than ever, many organizations face immense challenges to maximize revenue. Inflation. Tighter budgets. Cost reallocations. Competitive growth opportunities. Whatever the reason, they demand highly available, customer-facing applications and services that rely on a high-performing and reliable underlying infrastructure. And they want it all without excessive spending on engineering resources. To achieve this goal, ...

State of Ecommerce in India

The ecommerce industry is hugely important to India, and opportunities abound for existing and new players alike. But amid such a competitive landscape, it’s crucial for ecommerce organisations to deliver the best possible digital experiences to those making purchases online. The State of Ecommerce in India report provides insights into the current state of the ...

State of Observability in Retail

Today, the retail industry faces new macroeconomic challenges, with the rapid increase in energy costs, high inflation, and supply chain disruptions. As the threat of shrinking margins looms, retailers are focusing on cost reduction and strategic investments to ensure the best possible business value without sacrificing the customer experience. While omnichannel is essential, retailers don’t ...

TechRepublic Premium, directly to your inbox. Sign up today.

Create a techrepublic account.

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

* - indicates required fields

Sign in to TechRepublic

Lost your password? Request a new password

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support .

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

Want to receive more TechRepublic news?

You're all set.

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add [email protected] to your contacts list.

Research on mobile cloud computing: Review, trend and perspectives

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

COMMENTS

  1. 143681 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on MOBILE COMPUTING. Find methods information, sources, references or conduct a literature review on ...

  2. (PDF) Mobile computing: issues and challenges

    mobile. The research papers related to the thin clients are . Think Air [19] and [20] and also Hyrax [21]. One is the other ... This paper review current research effort towards Mobile Computing ...

  3. Pervasive and Mobile Computing

    The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems. Topics include, but not limited to: Pervasive Computing and Communications Architectures and ...

  4. Mobile Computing

    1.1.6 Mobile Computing. Mobile computing is the field of wireless communication and carry-around computers, such as laptop computers. In some ways the mobile computing field spun out of work initialized within the ubiquitous computing area. Likewise, the early focus on wireless networking led to wireless communication mechanism research.

  5. Mobile Data Science and Intelligent Apps: Concepts, AI-Based ...

    Artificial intelligence (AI) techniques have grown rapidly in recent years in the context of computing with smart mobile phones that typically allows the devices to function in an intelligent manner. Popular AI techniques include machine learning and deep learning methods, natural language processing, as well as knowledge representation and expert systems, can be used to make the target mobile ...

  6. A survey of mobile cloud computing: architecture, applications, and

    2 OVERVIEW OF MOBILE CLOUD COMPUTING. The term 'mobile cloud computing' was introduced not long after the concept of 'cloud computing'. It has been attracting the attentions of entrepreneurs as a profitable business option that reduces the development and running cost of mobile applications, of mobile users as a new technology to achieve rich experience of a variety of mobile services ...

  7. Mobile Communications and Networks

    The rise of the fifth generation of mobile wireless communications (5G) is driving significant scientific and technological progress in the area of mobile systems and networks. This first appearance of the new Mobile Communications and Networks Series addresses some of the most significant aspects of 5G networks, providing key insights into relevant system and network design challenges, as ...

  8. mobile computing Latest Research Papers

    The Individual. In order to change the problem of data redundancy in a genetic algorithm, this paper proposes a computer mathematical model based on the combination of an improved genetic algorithm and mobile computing. Combined with the least square method, MATLAB software is used to solve the equations, determine the range of parameters, and ...

  9. Proceedings of the 29th Annual International Conference on Mobile

    This paper presents the design, implementation, and evaluation of TaGroup, a fast, fine-grained, and robust grouping technique for RFIDs. It can achieve a nearly 100% accuracy in distinguishing multiple groups of closely located RFIDs, within only a ...

  10. Mobile cloud computing: Challenges and future research directions

    Mobile cloud computing promises several benefits such as extra battery life and storage, scalability, and reliability. However, there are still challenges that must be addressed in order to enable the ubiquitous deployment and adoption of mobile cloud computing.Some of these challenges include security, privacy and trust, bandwidth and data transfer, data management and synchronization, energy ...

  11. Mobile cloud computing: Current development and research challenges

    Mobile cloud computing has been introduced to be a powerful technology for mobile services by combining mobile computing and cloud computing technology. Though, a direct integration of two technologies can overcome a many of hurdles related to the performance, flexibility, security, and dynamic management discussed in mobile computing. Mobile cloud computing can address these problems by ...

  12. Mobile Cloud Computing Research

    The rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC). This paper first discusses the market trend and related business driving ...

  13. Data Management for Mobile Computing

    Mobile Computing is a new emerging computing paradigm of the future. Data Management in this paradigm poses many challenging probl~m.~ to the database community. In this paper we iden- tify these new challenges and plan to investigate their technical significance. New research prob-

  14. Research on Mobile Cloud Computing: Review, Trend and Perspectives

    introduces the basic model of mobile cloud computing, its background, key technology, current research status, and its further research perspectives as well. II. BACKGROUND As a development and extension of Cloud Computing and Mobile Computing, Mobile Cloud Computing, as a new phrase, has been devised since 2009. In order to help us grasp-

  15. (PDF) MOBILE AD-HOC NETWORKS: APPLICATIONS AND CHALLENGES

    A Mobile Ad-hoc Network (MANET) is a decentralized, infrastructure-less network where. wireless nodes move randomly.Ad-hoc networks can be accessed anytime, anywhere, autonomous with cost ...

  16. Proceedings of the 30th Annual International Conference on Mobile

    This paper presents the design, implementation, and evaluation of MagWear, a novel biomagnetism-based system that can accurately and inclusively monitor the heart rate and respiration rate of mobile users with diverse skin tones. MagWear's contributions ...

  17. Mobile Computing and Sustainable Informatics

    About this book. This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during January 11-12, 2023. The book discusses recent developments in mobile ...

  18. Mobile cloud computing

    The privacy and security issues faced by the Mobile Cloud Computing (MCC) technology are described and the issue faced in integrating green computing technology is discussed in this research paper. The high-speed development and renaissance in mobile devices have produced a fast-growing market. The remarkable progress made within the mobile applications allows the users to accomplish most of ...

  19. Priority-Aware Resource Allocation for RIS-assisted Mobile Edge

    Semantic Scholar extracted view of "Priority-Aware Resource Allocation for RIS-assisted Mobile Edge Computing Networks: A Deep Reinforcement Learning Approach" by Jing Ling et al. ... This paper proposes a pattern-identified online task scheduling (PIOTS) mechanism for the networking infrastructure, where multitier edge computing is provided ...

  20. (PDF) Mobile Cloud Computing: A Review

    ABSTRACT. In today's world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud. computing services, made the Mobile Cloud Computing (MCC) selected as a ...

  21. Resource Library

    Cloud-native technologies — while they deliver customer-facing applications and new features faster than ever — come with potential challenges, like complex dependencies. For every deployment ...

  22. Research on mobile cloud computing: Review, trend and perspectives

    Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the technology in order to point out the direction of future research. With the latter aim, this paper ...

  23. Krasnogorsk, Moscow Oblast

    The street of Krasnogorsk. Krasnogorsk ( Russian: Красногорск) is a city in Moscow Oblast in Russia. It is the administrative center of Krasnogorsky District of Moscow Oblast. As of 2010, Krasnogorsk has 196,896 people. In 2024, Islamic State killed over 130 people in a massacre at Crocus City Hall .

  24. The flag of Elektrostal, Moscow Oblast, Russia which I bought there

    For artists, writers, gamemasters, musicians, programmers, philosophers and scientists alike! The creation of new worlds and new universes has long been a key element of speculative fiction, from the fantasy works of Tolkien and Le Guin, to the science-fiction universes of Delany and Asimov, to the tabletop realm of Gygax and Barker, and beyond.

  25. Elektrostal

    Elektrostal. Elektrostal ( Russian: Электроста́ль) is a city in Moscow Oblast, Russia. It is 58 kilometers (36 mi) east of Moscow. As of 2010, 155,196 people lived there.

  26. Elektrostal

    In 1938, it was granted town status. [citation needed]Administrative and municipal status. Within the framework of administrative divisions, it is incorporated as Elektrostal City Under Oblast Jurisdiction—an administrative unit with the status equal to that of the districts. As a municipal division, Elektrostal City Under Oblast Jurisdiction is incorporated as Elektrostal Urban Okrug.