To see the other types of publications on this topic, follow the link: Pervasive Mobile Computing.

Journal articles on the topic 'Pervasive Mobile Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Pervasive Mobile Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, I. R. "Editorial: Mobile and Pervasive Computing." Computer Journal 47, no. 4 (2004): 404. http://dx.doi.org/10.1093/comjnl/47.4.404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Langheinrich, Marc, and Florian Schaub. "Privacy in Mobile and Pervasive Computing." Synthesis Lectures on Mobile and Pervasive Computing 10, no. 1 (2018): 1–139. http://dx.doi.org/10.2200/s00882ed1v01y201810mpc013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mamei, Marco, and Franco Zambonelli. "Programming pervasive and mobile computing applications." ACM Transactions on Software Engineering and Methodology 18, no. 4 (2009): 1–56. http://dx.doi.org/10.1145/1538942.1538945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skibniewski, Mirosław J. "Mobile and Pervasive Computing in Construction." Construction Management and Economics 32, no. 11 (2014): 1148–50. http://dx.doi.org/10.1080/01446193.2014.949810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saini, Praveen, Rawat D S, Dr Dinesh Kumar Rao, and Javed Alam. "MOBILE AD HOC NETWORKING FOR PERVASIVE COMPUTING." Journal of Technological Advances and Scientific Research 1, no. 3 (2015): 110–18. http://dx.doi.org/10.14260/jtasr/2015/14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alomair, Basel, and Radha Poovendran. "Efficient Authentication for Mobile and Pervasive Computing." IEEE Transactions on Mobile Computing 13, no. 3 (2014): 469–81. http://dx.doi.org/10.1109/tmc.2012.252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Black, Darren, Nils Jakob Clemmensen, and Mikael B. Skov. "Pervasive Computing in the Supermarket." International Journal of Mobile Human Computer Interaction 2, no. 3 (2010): 31–43. http://dx.doi.org/10.4018/jmhci.2010070103.

Full text
Abstract:
Shopping in the real world is becoming an increasingly interactive experience as stores integrate various technologies to support shoppers. Based on an empirical study of supermarket shoppers, the authors designed a mobile context-aware system called the Context-Aware Shopping Trolley (CAST). The purpose of CAST is to support shopping in supermarkets through context-awareness and acquiring user attention, thus, the authors’ interactive trolley guides and directs shoppers in the handling and finding of groceries. An empirical evaluation showed that shoppers using CAST behaved differently than shoppers using a traditional trolley. Specifically, shoppers using CAST exhibited a more uniform pattern of product collection and found products more easily while travelling a shorter distance. As such, the study finds that CAST supported the supermarket shopping activity.
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, PankajDeep, Sandeep Kaur, and Amneet Kaur. "Big Data Compression in Mobile and Pervasive Computing." International Journal of Wireless and Microwave Technologies 6, no. 3 (2016): 1–8. http://dx.doi.org/10.5815/ijwmt.2016.03.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kong, Xiangjie, Jiannong Cao, Hongyi Wu, and Ching-Hsien (Robert) Hsu. "Mobile Crowdsourcing and Pervasive Computing for Smart Cities." Pervasive and Mobile Computing 61 (January 2020): 101114. http://dx.doi.org/10.1016/j.pmcj.2020.101114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brousse, Olivier, Jérémie Guillot, Gilles Sassatelli, Thierry Gil, François Grize, and Michel Robert. "A Mobile Computing Framework for Pervasive Adaptive Platforms." International Journal of Distributed Sensor Networks 8, no. 1 (2011): 193864. http://dx.doi.org/10.1155/2012/193864.

Full text
Abstract:
Ubiquitous computing is now the new computing trend, such systems that interact with their environment require self-adaptability. Bioinspiration is a natural candidate to provide the capability to handle complex and changing scenarios. This paper presents a programming framework dedicated to pervasive platforms programming. This bioinspired and agentoriented framework has been developed within the frame of the PERPLEXUS European project that is intended to provide support for bioinspiration-driven system adaptability. This framework enables the platform to adapt itself to application requirements at high-level while using hardware acceleration at node level. The resulting programming solution has been used to program three collaborative robotic applications in which robots learn tasks and evolve for achieving a better adaptation to their environment.
APA, Harvard, Vancouver, ISO, and other styles
11

R. Nuiaa, Riyadh. "Mobile cloud is the infrastructure that facilitates the offloading of storage and computing resources of mobile devices pertaining mobile applications to cloud computing. Mobile devices can run expensive applications using mobile cloud as they can outsour." Journal of Education College Wasit University 1, no. 22 (2018): 759–72. http://dx.doi.org/10.31185/eduj.vol1.iss22.234.

Full text
Abstract:
Mobile cloud is the infrastructure that facilitates the offloading of storage and computing resources of mobile devices pertaining mobile applications to cloud computing. Mobile devices can run expensive applications using mobile cloud as they can outsource services to cloud while providing interface for mobile users. Emerging mobile applications that are expensive can overcome the inherent problems of hand held devices through the concept of mobile cloud computing. The offloading process provide mobiles a rich platform for pervasive computing with on-demand services linked to cloud computing through mobile cloud infrastructure. Thus the mobile cloud computing is an inevitable phenomenon which bring about plethora of pros besides the mobility. The mobile cloud users can perform their resource intensive operations on the fly without time and geographical restrictions. In spite of the advantages it bestows mobile cloud computing has its own security issues. This paper throws light into the security issues and solutions in terms of secure channels transmission in mobile cloud computing. In this paper, we present state-of-the-art of mobile cloud computing besides its security aspects that are to be taken care of for successful mobile cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
12

David, Beaulah, and Dr R. Santhosh. "Fault Tolerance and QoS based Pervasive Computing using Markov State Transition Model." International Journal of Engineering & Technology 7, no. 4 (2018): 2403. http://dx.doi.org/10.14419/ijet.v7i4.12664.

Full text
Abstract:
Fault-tolerance is significant in pervasive computing environments. Recently, few research works has been developed for reducing the fault, occurring in pervasive computing. However, there is a need for a fault tolerance mechanism to reduce the link failures and unwanted mobile node access (in pervasive computing environment). In order to overcome these limitations, Markov State Transition Based Fault Tolerance (MST-FT) Model is proposed. The main objective of MST-FT Model is to achieve resource efficient QoS in pervasive computing environment by avoiding the link failures and unwanted mobile node usages. Initially, the optimization of link failures is achieved by maintaining Markov chain of high energy mobile nodes on the wireless network communication path. The mobile nodes with higher energy and minimal drain rate are combined to form a chain in its corresponding path of communication in order to minimize the link failures in pervasive computing. Next, the inappropriate mobile node usage is avoided by selecting only the authorized mobile nodes for Markov chain construction to effective network communication, which resulting in improved fault tolerant rate. Therefore, MST-FT Model provides higher resource efficient QoS as compared to existing works. The performance of MST-FT Model is measured in terms of fault tolerant rate, execution time, energy consumption rate and quality of service level. The simulation results show that the MST-FT Model is able to improve the fault tolerant rate by 13% and also reduces the energy consumption rate of resource efficient QoS by 25%, when compared to previous works.
APA, Harvard, Vancouver, ISO, and other styles
13

Dryer, D. C., C. Eisbach, and W. S. Ark. "At what cost pervasive? A social computing view of mobile computing systems." IBM Systems Journal 38, no. 4 (1999): 652–76. http://dx.doi.org/10.1147/sj.384.0652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Nanxi, Nicolas Cardozo, and Siobhan Clarke. "Goal-Driven Service Composition in Mobile and Pervasive Computing." IEEE Transactions on Services Computing 11, no. 1 (2018): 49–62. http://dx.doi.org/10.1109/tsc.2016.2533348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Ken C. K., Wang-Chien Lee, and Sanjay Madria. "Pervasive data access in wireless and mobile computing environments." Wireless Communications and Mobile Computing 8, no. 1 (2007): 25–44. http://dx.doi.org/10.1002/wcm.424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Xiaoliang, and Zhanpeng Jin. "An Overview of Mobile Cloud Computing for Pervasive Healthcare." IEEE Access 7 (2019): 66774–91. http://dx.doi.org/10.1109/access.2019.2917701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

M. Leung, Victor, Min Chen, Mohsen Guizani, and Branka Vucetic. "Cloud-assisted mobile computing and pervasive services [Guest Editorial]." IEEE Network 27, no. 5 (2013): 4–5. http://dx.doi.org/10.1109/mnet.2013.6616108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Moore, P., B. Hu, and J. Wan. "Smart-Context: A Context Ontology for Pervasive Mobile Computing." Computer Journal 53, no. 2 (2008): 191–207. http://dx.doi.org/10.1093/comjnl/bxm104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bertolli, Carlo, Daniele Buono, Gabriele Mencagli, and Marco Vanneschi. "An Approach to Mobile Grid Platforms for the Development and Support of Complex Ubiquitous Applications." International Journal of Advanced Pervasive and Ubiquitous Computing 2, no. 4 (2010): 24–38. http://dx.doi.org/10.4018/ijapuc.2010100102.

Full text
Abstract:
Several complex and time-critical applications require the existence of novel distributed, heterogeneous and dynamic platforms composed of a variety of fixed and mobile processing nodes and networks. Such platforms, that can be called Pervasive Mobile Grids, aim to merge the features of Pervasive Computing and Highperformance Grid Computing onto a new emerging paradigm. In this Chapter we study a methodology for the design and the development of high-performance, adaptive and context-aware applications. We describe a programming model approach, and we compare it with other existing research works in the field of Pervasive Mobile Computing, discussing the rationales of the requirements and the features of a novel programming model for the target platforms and applications. In order to exemplify the proposed methodology we introduce our programming framework ASSISTANT, and we provide some interesting future directions in this research field.
APA, Harvard, Vancouver, ISO, and other styles
20

Choi, Min, Jonghyuk Park, and Young-Sik Jeong. "Mobile cloud computing framework for a pervasive and ubiquitous environment." Journal of Supercomputing 64, no. 2 (2011): 331–56. http://dx.doi.org/10.1007/s11227-011-0681-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

You, Ilsun, Marek R. Ogiela, Yuh-Shyan Chen, and Qingfeng Huang. "Mobile and internet services in ubiquitous and pervasive computing environments." Information Sciences 230 (May 2013): 1–2. http://dx.doi.org/10.1016/j.ins.2013.01.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Maglogiannis, Ilias, and Charalampos Doukas. "Intelligent Health Monitoring Based on Pervasive Technologies and Cloud Computing." International Journal on Artificial Intelligence Tools 23, no. 03 (2014): 1460001. http://dx.doi.org/10.1142/s021821301460001x.

Full text
Abstract:
The proper management of patient data and their accessibility are still remaining issues that prevent the full deployment and usage of pervasive healthcare applications. This paper presents an integrated health monitoring system based on mobile pervasive technologies. The system utilizes Cloud Computing for providing robust and scalable resources for sensor data acquisition, management and communication with external applications like health information systems. A prototype has been developed using both mobile and wearable sensors for demonstrating the usability of the proposed platform. Initial results regarding the performance of the system, the efficiency in data management and user acceptability have been quite promising.
APA, Harvard, Vancouver, ISO, and other styles
23

Taib, Syakirah Mohamad, Rebecca De Coster, and Janerose Nyamu. "An Empirical Study on the Innovation Acceptance of Wearable Mobile Computing: Pervasive Computing Perspective." International Journal of Chaotic Computing 4, no. 2 (2016): 96–102. http://dx.doi.org/10.20533/ijcc.2046.3359.2016.0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Choudhury, Bikash, Subhrabrata choudhury, and Animesh Dutta. "Server selection schemes for service-oriented computing in mobile pervasive environment." Computers & Electrical Engineering 55 (October 2016): 73–87. http://dx.doi.org/10.1016/j.compeleceng.2015.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Fadlallah, Ghassan, Hamid Mcheick, and Djamal Rebaine. "A Pervasive Collaborative Architectural Model at the Network’s Periphery." IoT 2, no. 3 (2021): 524–48. http://dx.doi.org/10.3390/iot2030027.

Full text
Abstract:
Pervasive collaborative computing within the Internet of Things (IoT) has progressed rapidly over the last decade. Nevertheless, emerging architectural models and their applications still suffer from limited capacity in areas like power, efficient computing, memory, connectivity, latency and bandwidth. Technological development is still in progress in the fields of hardware, software and wireless communications. Their communication is usually done via the Internet and wireless via base stations. However, these models are sometimes subject to connectivity failures and limited coverage. The models that incorporate devices with peer-to-peer (P2P) communication technologies are of great importance, especially in harsh environments. However, their power-limited devices are randomly distributed on the periphery where their availability can be limited and arbitrary. Despite these limitations, their capabilities and efficiency are constantly increasing. Accelerating development in these areas can be achieved by improving architectures and technologies of pervasive collaborative computing, which refers to the collaboration of mobile and embedded computing devices. To enhance mobile collaborative computing, especially in the models acting at the network’s periphery, we are interested in modernizing and strengthening connectivity using wireless technologies and P2P communication. Therefore, the main goal of this paper is to enhance and maintain connectivity and improve the performance of these pervasive systems while performing the required and expected services in a challenging environment. This is especially important in catastrophic situations and harsh environments, where connectivity is used to facilitate and enhance rescue operations. Thus, we have established a resilient mobile collaborative architectural model comprising a peripheral autonomous network of pervasive devices that considers the constraints of these resources. By maintaining the connectivity of its devices, this model can operate independently of wireless base stations by taking advantage of emerging P2P connection technologies such as Wi-Fi Direct and those enabled by LoPy4 from Pycom such as LoRa, BLE, Sigfox, Wi-Fi, Radio Wi-Fi and Bluetooth. Likewise, we have designed four algorithms to construct a group of devices, calculate their scores, select a group manager, and exchange inter- and intra-group messages. The experimental study we conducted shows that this model continues to perform efficiently, even in circumstances like the breakdown of wireless connectivity due to an extreme event or congestion from connecting a huge number of devices.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Ge. "Ocarina: Designing the iPhone's Magic Flute." Computer Music Journal 38, no. 2 (2014): 8–21. http://dx.doi.org/10.1162/comj_a_00236.

Full text
Abstract:
Ocarina, created in 2008 for the iPhone, is one of the first musical artifacts in the age of pervasive, app-based mobile computing. It presents a flute-like physical interaction using microphone input, multi-touch, and accelerometers—and a social dimension that allows users to listen in to each other around the world. This article chronicles Smule's Ocarina as a mobile musical experiment for the masses, examining in depth its design, aesthetics, physical interaction, and social interaction, as well as documenting its inextricable relationship with the rise of mobile computing as catalyzed by mobile devices such as the iPhone.
APA, Harvard, Vancouver, ISO, and other styles
27

Lakehal, Abderrahim, Adel Alti, and Philippe Roose. "Context-Aware Multi-layered Ontology for Composite Situation Model in Pervasive Computing." Ingénierie des systèmes d information 25, no. 5 (2020): 543–58. http://dx.doi.org/10.18280/isi.250501.

Full text
Abstract:
With the rapid advancement of technologies and analysis tools in the smart systems, enabling real-time context monitoring of user's living conditions and quality services delivery is increasing. Current studies in this area are focused on developing mobile applications with specific services, based on toolkit that allow developers to obtain context information from sensors. However, there exists a notable lack of ontology able to represent all the necessary context information starting from distributed users, and constantly changing environment. The modeling of user’s domains to represent diverse mobile and IoT devices, and finalizing with the description of user’s composite situations in smart-*(health, home, cities, car, office, etc.) domains. Considering interoperability, reusability, and flexibility, a new context composite situation ontology for smart systems is proposed with better representation of heterogeneous context. The ontology enables to sense, reason, and infer composite situations in various smart domains, prioritizes critical situations and facilitates the delivery of smart mobile service. Proposed ontology is formalized and validated on different smart environments with different user’s situations. Several experiments were carried out with a real-life motivating scenario. Experimental results showed that the proposed approach has reduced queries times and improved flexibility.
APA, Harvard, Vancouver, ISO, and other styles
28

FININ, TIM, ANUPAM JOSHI, LALANA KAGAL, et al. "INTELLIGENT AGENTS FOR MOBILE AND EMBEDDED DEVICES." International Journal of Cooperative Information Systems 11, no. 03n04 (2002): 205–30. http://dx.doi.org/10.1142/s021884300200056x.

Full text
Abstract:
The pervasive computing environments of the near future will involve the interactions, coordination and cooperation of numerous, casually accessible, and often invisible computing devices. These devices, whether carried on our person or embedded in our homes, businesses and classrooms, will connect via wireless and wired links to one another and to the global networking infrastructure. The result will be a networking milieu with a new level of openness. The localized and dynamic nature of their interactions raises many new issues that draw on and challenge the disciplines of agents, distributed systems, and security. This paper describes recent work by the UMBC Ebiquity research group which addresses some of these issues.
APA, Harvard, Vancouver, ISO, and other styles
29

Conti, Marco, Andrea Passarella, and Sajal K. Das. "The Internet of People (IoP): A new wave in pervasive mobile computing." Pervasive and Mobile Computing 41 (October 2017): 1–27. http://dx.doi.org/10.1016/j.pmcj.2017.07.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jungum, Nevin Vunka, Nawaz Mohamudally, and Nimal Nissanke. "Partitioning Application Using Graph Theory for Mobile Devices in Pervasive Computing Environments." Procedia Computer Science 94 (2016): 105–12. http://dx.doi.org/10.1016/j.procs.2016.08.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lim, Sung-Hwa, Byoung-Hoon Lee, and Jai-Hoon Kim. "Voluntary Disconnected Operations for Energy Efficient Mobile Devices in Pervasive Computing Environments." Intelligent Automation & Soft Computing 19, no. 1 (2013): 39–49. http://dx.doi.org/10.1080/10798587.2013.771421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Banavar, Guruduth, John Barton, Nigel Davies, and Kimmo Raatikainen. "Introduction to the special feature on Middleware for Mobile and Pervasive Computing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 4 (2002): 14–15. http://dx.doi.org/10.1145/643550.643565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hussein, Safaa, and Asmaa Abdelhamid. "Technology Acceptance Model for Pervasive Computing: Mobile Business Intelligence Applications in Egypt." مجلة جامعة الإسکندریة للعلوم الإداریة 58, no. 2 (2021): 291–326. http://dx.doi.org/10.21608/acj.2021.167940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lampe, Matthias, and Steve Hinske. "Von traditionellem Spielzeug zu smarten Spielumgebungen: Die Integration mobiler Geräte in Pervasive-Computing-Spielen (From Traditional Toys to Smart Playsets: The Integration of Mobile Devices into Pervasive Computing Toy Environments)." i-com 5, no. 3 (2006): 12–18. http://dx.doi.org/10.1524/icom.2006.5.3.12.

Full text
Abstract:
Wir stellen eine Pervasive-Computing-Spielumgebung vor, die das freie Spiel von Kindern bereichert und zudem als interaktive Lernumgebung fungiert. Wir haben eine traditionelle Spielumgebung, die Ritterburg von Playmobil, mit Hilfe von verschiedenen Technologien um multimediale Inhalte erweitert. Basierend auf dem aktuellen Spielgeschehen werden eine passende Hintergrundmusik, Geräusche und Sprachaufnahmen wiedergegeben. Die Radiofrequenz-Identifikations-Technik (RFID) erlaubt dabei eine automatische und unauffällige Identifikation der Spielobjekte. Um die Interaktion im Spiel noch weiter zu fördern, fügen wir mobile Geräte dem Spielkonzept hinzu, die das sog. Touch-Me-Paradigma mit Hilfe der RFID-Technik umsetzen. Mit Hilfe eines solchen mobilen Geräts kann ein Kind auf Spielfiguren oder andere Spielelemente zeigen, diese berühren und eine Reaktion auslösen. Wir beschreiben zwei Ansätze zur Umsetzung dieses Paradigmas (Mobiltelefone bzw. in Spielfiguren integrierte Mini-Computer) und analysieren deren Vor- und Nachteile.
APA, Harvard, Vancouver, ISO, and other styles
35

He, Yang, Shah Nazir, Baisheng Nie, Sulaiman Khan, and Jianhui Zhang. "Developing an Efficient Deep Learning-Based Trusted Model for Pervasive Computing Using an LSTM-Based Classification Model." Complexity 2020 (September 9, 2020): 1–6. http://dx.doi.org/10.1155/2020/4579495.

Full text
Abstract:
Mobile and pervasive computing is one of the recent paradigms available in the area of information technology. The role of pervasive computing is foremost in the field where it provides the ability to distribute computational services to the surroundings where people work and leads to issues such as trust, privacy, and identity. To provide an optimal solution to these generic problems, the proposed research work aims to implement a deep learning-based pervasive computing architecture to address these problems. Long short-term memory architecture is used during the development of the proposed trusted model. The applicability of the proposed model is validated by comparing its performance with the generic back-propagation neural network. This model results with an accuracy rate of 93.87% for the LSTM-based model much better than 85.88% for the back-propagation-based deep model. The obtained results reflect the usefulness and applicability of such an approach and the competitiveness against other existing ones.
APA, Harvard, Vancouver, ISO, and other styles
36

Khalfi, Mohammed Fethi, and Sidi Mohamed Benslimane. "Evaluating Characteristics Adherence Level to Design Framework for Pervasive Projects." International Journal of Advanced Pervasive and Ubiquitous Computing 7, no. 4 (2015): 18–29. http://dx.doi.org/10.4018/ijapuc.2015100103.

Full text
Abstract:
The proliferation of wireless communications and mobile computing is producing a revolutionary change in information society. Ubiquitous Computing is a recent paradigm whose objective is to support users in accomplishing their tasks, accessing information, or communicating with other users anytime, anywhere. In this paper, the authors present novel characteristics of pervasive projects; they display different levels of adherence to the ubiquity characteristics. They suppose this can be considered an important step towards to provide the core elements of an architecture for intelligent environment. This framework can be used to support the characterization of ubiquitous projects according to their ubiquity adherence level from different application domains (smart house, pervasive healthcare, U-learning and urban space).
APA, Harvard, Vancouver, ISO, and other styles
37

Arabo, Abdullahi, Qi Shi, and Madjid Merabti. "Context-Aware Identity Management in Pervasive Ad-hoc Environments." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 4 (2009): 29–42. http://dx.doi.org/10.4018/japuc.2009100103.

Full text
Abstract:
Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. In this article, the authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.
APA, Harvard, Vancouver, ISO, and other styles
38

Sangeetha, S., and G. Deepalakshmi. "EMERGING TRENDS IN PERVASIVE COMPUTING ARCHITECTURE FOR BIG DATA ANALYTICS IN MOBILE DEVICE." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (2020): 586–90. http://dx.doi.org/10.33564/ijeast.2020.v05i01.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Syukur, Evi, and Seng Wai Loke. "Implementing context-aware regulation of context-aware mobile services in pervasive computing environments." International Journal of Web and Grid Services 2, no. 3 (2006): 260. http://dx.doi.org/10.1504/ijwgs.2006.011357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kamangar, Farhad, David Levine, Gergely V. Záruba, and Renjith Thomas. "Mobile Agent Connection Establishment and Management (CEMA)—Message Exchange for Pervasive Computing Environments." Journal of Supercomputing 31, no. 1 (2005): 79–99. http://dx.doi.org/10.1023/b:supe.0000049326.25067.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bello Usman, Aminu, and Jairo Gutierrez. "Toward trust based protocols in a pervasive and mobile computing environment: A survey." Ad Hoc Networks 81 (December 2018): 143–59. http://dx.doi.org/10.1016/j.adhoc.2018.07.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ai, Dan Xiang, Hui Zuo, and Jun Yang. "Personalized Mobile Catering Recommender System Based on Context Ontology Model and Rule Inference." Advanced Materials Research 717 (July 2013): 708–13. http://dx.doi.org/10.4028/www.scientific.net/amr.717.708.

Full text
Abstract:
With the development of smart mobile terminals and pervasive computing, mobile recommender systems are proposed to realize context-aware personalized recommendation services. A context model plays a key role in a mobile recommender. We discussed the context ontology modeling approach specific for mobile recommendation, and developed a two-level context model including a upper ontology and a domain ontology. We also designed a personalized mobile catering recommender system based on the context ontology model and rule inference. The framework of the system is depicted. And the process of rule generation and rule inference based on the context ontologies is demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
43

Alkhalil, Adel. "Evolution of existing software to mobile computing platforms: Framework support and case study." International Journal of ADVANCED AND APPLIED SCIENCES 8, no. 3 (2021): 100–111. http://dx.doi.org/10.21833/ijaas.2021.03.013.

Full text
Abstract:
Mobile computing as ubiquitous and pervasive technology supports portable and context-aware computation. To date, there exist a significant number of traditional computing systems–running on the web and/or workstation-based platforms–that lack features of mobile computing, including but not limited to ubiquity, context-sensing, and high interactivity. Software that executes on these traditional computing systems is referred to as legacy software that can be upgraded to exploit the features of mobile technologies. However, legacy software may contain critical data, logic, and processes that cannot be easily replaced. One of the solutions is to evolve legacy software systems by (a) upgrading their functionality while (b) preserving their data and logic. Recently research and development efforts are focused on modernizing the legacy systems as per the needs of service and cloud-based platforms. However, there does not exist any research that supports a systematic modernization of legacy software as per the requirements of the mobile platforms. We propose a framework named Legacy-to-Mobile as a solution that supports an incremental and process-driven evolution of the legacy software to mobile computing software. The proposed Legacy-to-Mobile framework unifies the concepts of software reverse engineering (recovering software artifacts) and software change (upgrading software artifacts) to support the legacy evolution. The framework follows an incremental approach with four processes that include (i) evolution planning, (ii) architecture modeling, (iii) architecture change, and (iv) software validation of mobile computing software. The framework provides the foundation (as part of futuristic research) to develop a tool prototype that supports automation and user decision support for incremental and process-driven evolution of legacy software to mobile computing platforms.
APA, Harvard, Vancouver, ISO, and other styles
44

Ettazi, Widad, Hatim Hafiddi, and Mahmoud Nassar. "A Context-Driven Commit Protocol for Enhancing Transactional Services Performance in Pervasive Environments." International Journal of Advanced Pervasive and Ubiquitous Computing 10, no. 4 (2018): 14–28. http://dx.doi.org/10.4018/ijapuc.2018100102.

Full text
Abstract:
The proposed techniques for wireless environments during the last decade have limited support for dynamically changing environments. Due to its nature, the mobile computing environment is extremely dynamic and subject to rapid and unpredictable changes. Similarly, the characteristics of mobile applications affect their transactional requirements. The challenge is to reflect on solutions offering more flexibility and adaptability. In this article, the contribution was focused mainly on the problem of atomic commit that ensures the atomicity property. The trail of adapting mobile transaction commit protocols to context changes has been explored. This has led to the formalization of a flexible transaction model CATSM that supports adaptable properties and a commit protocol CA-TCP that enables adaptation to application requirements and mobile context in terms of transactional properties and execution cost. An architecture based on the concept of adaptation policy has also been designed for the implementation of the proposed solution.
APA, Harvard, Vancouver, ISO, and other styles
45

Hussain, Abid, Muddesar Iqbal, Sohail Sarwar, et al. "Servicing delay sensitive pervasive communication through adaptable width channelization for supporting mobile edge computing." Computer Communications 162 (October 2020): 152–59. http://dx.doi.org/10.1016/j.comcom.2020.07.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Alshattnawi, Sawsan. "Utilizing Cloud Computing in Developing a Mobile Location-Aware Tourist Guide System." International Journal of Advanced Pervasive and Ubiquitous Computing 5, no. 2 (2013): 9–18. http://dx.doi.org/10.4018/japuc.2013040102.

Full text
Abstract:
Cloud Computing technologies support mobile applications and overcome the low computation resources and limited data storage by providing an on-demand access with pay-as-use rule to large number of computing resources. In this paper, the author describes the architecture of an electronic tourist guide system (Trip@Cloud) as mobile cloud computing application wherein the tourists can access cloudy information in ubiquitous and pervasive manner. The information needs not to be over the user's mobile device, but it will be downloaded to user's device according to user's location and the Internet status connection. The interaction between the mobile device and the cloud is done when possible and transparently from the user. The existing architectures of partitioning the application between the device and the cloud depends deeply on the CPU workloads. The author’s application's nature is different from these applications and this represents the main contribution. The idea is to download the data to the user's device according to the current user location. Therefore the partitioning is done for the data to be sent to the mobile device. This idea is applied by developing a tourist guide application where the data to be installed is very huge and the mobile storage device is very limited.
APA, Harvard, Vancouver, ISO, and other styles
47

Manzalini, Antonio. "QUANTUM COMPUTING AND COMMUNICATIONS." Azerbaijan Journal of High Performance Computing 4, no. 1 (2021): 53–59. http://dx.doi.org/10.32010/26166127.2021.4.1.53.59.

Full text
Abstract:
Today, like never before, we are witnessing a pervasive diffusion of ultra-broadband fixed-mobile connectivity, the deployment of Cloud-native 5G network and service platforms, and the wide adoption of Artificial Intelligence. It has the so-called Digital Transformation of our Society: as a matter of fact, the transformative role of Telecommunications and Information Communication Technologies (ICT) has long been witnessed as a precursor of scientific progress and economic growth in the modern world. Nevertheless, this transformation is still laying its foundations on Electronics and the impending end of Moore’s Law: therefore, a rethinking of the long-term ways of doing computation and communications has been already started. Among these different ways, quantum technologies might trigger the next innovation breakthrough in the medium long-term. In this direction, the paper provides an overview of the state of the art, challenges, and opportunities posed by an expected second wave of quantum technologies and services.
APA, Harvard, Vancouver, ISO, and other styles
48

Fadlallah, Ghassan, Djamal Rebaine, and Hamid Mcheick. "A Greedy Scheduling Approach for Peripheral Mobile Intelligent Systems." IoT 2, no. 2 (2021): 249–74. http://dx.doi.org/10.3390/iot2020014.

Full text
Abstract:
Smart, pervasive devices have recently experienced accelerated technological development in the fields of hardware, software, and wireless connections. The promotion of various kinds of collaborative mobile computing requires an upgrade in network connectivity with wireless technologies, as well as enhanced peer-to-peer communication. Mobile computing also requires appropriate scheduling methods to speed up the implementation and processing of various computing applications by better managing network resources. Scheduling techniques are relevant to the modern architectural models that support the IoT paradigm, particularly smart collaborative mobile computing architectures at the network periphery. In this regard, load-balancing techniques have also become necessary to exploit all the available capabilities and thus the speed of implementation. However, since the problem of scheduling and load-balancing, which we addressed in this study, is known to be NP-hard, the heuristic approach is well justified. We thus designed and validated a greedy scheduling and load-balancing algorithm to improve the utilization of resources. We conducted a comparison study with the longest cloudlet fact processing (LCFP), shortest cloudlet fact processing (SCFP), and Min-Min heuristic algorithms. The choice of those three algorithms is based on the efficiency and simplicity of their mechanisms, as reported in the literature, for allocating tasks to devices. The simulation we conducted showed the superiority of our approach over those algorithms with respect to the overall completion time criterion.
APA, Harvard, Vancouver, ISO, and other styles
49

WANG, QIAN, YANG YU, YONGQIANG LV, and JING LIU. "MOBILE PHONE AS PERVASIVE ELECTRONIC MEDIA TO RECORD AND EVALUATE HUMAN GAIT BEHAVIOR." Journal of Innovative Optical Health Sciences 05, no. 01 (2012): 1150004. http://dx.doi.org/10.1142/s1793545811500040.

Full text
Abstract:
Gait recognition has been of great importance for disease diagnosis, rehabilitation assessment, as well as personal identification. Conventional gait analysis generally has to rely heavily on complex, expensive data acquisition and computing apparatus. To significantly simplify the evaluation process the mobile phone, which is one of the most indispensable electronic media in human daily life, was adopted as a pervasive tool for gait study, by using its digital imaging recording and analysis function. The basic procedure to record and quantify the video of human gait was illustrated and demonstrated through conceptual experiments. Potential applications were discussed. Some fundamental and practical issues raised in such flexible technology were pointed out. This method is expected to be widely used in future human analysis.
APA, Harvard, Vancouver, ISO, and other styles
50

Tiwari, Vivek, and Basant Tiwari. "A Data Driven Multi-Layer Framework of Pervasive Information Computing System for eHealthcare." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 66–85. http://dx.doi.org/10.4018/ijehmc.2019100106.

Full text
Abstract:
In the last decade, significant advancements in telecommunications and informatics have seen which incredibly boost mobile communications, wireless networks, and pervasive computing. It enables healthcare applications to increase human livelihood. Furthermore, it seems feasible to continuous observation of patients and elderly individuals for their wellbeing. Such pervasive arrangements enable medical experts to analyse current patient status, minimise reaction time, increase livelihood, scalability, and availability. There is found plenty of remote patient monitoring model in literature, and most of them are designed with limited scope. Most of them are lacking to give an overall unified, complete model which talk about all state-of-the-art functionalities. In this regard, remote patient monitoring systems (RPMS's) play important roles through wearable devices to monitor the patient's physiological condition. RPMS also enables the capture of related videos, images, and frames. RPMS do not mean to enable only capturing various sorts of patient-related information, but it also must facilitate analytics, transformation, security, alerts, accessibility, etc. In this view, RPMS must ensure some broad issues like, wearability, adaptability, interoperability, integration, security, and network efficiency. This article proposes a data-driven multi-layer architecture for pervasively remote patient monitoring that incorporates these issues. The system has been classified into five fundamental layers: the data acquisition layer, the data pre-processing layer, the network and data transfer layer, the data management layer and the data accessing layer. It enables patient care at real-time using the network infrastructure efficiently. A detailed discussion on various security issues have been carried out. Moreover, standard deviation-based data reduction and a machine-learning-based data access policy is also proposed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography