The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile applications are usually developed in a native way, using languages and APIs specific for a given platform, hindering the portability. As an alternative, web technologies as JavaScript and PHP have been employed enabling a same implementation to be executed in different mobile platforms without any recompilation or recoding process. This paper compares the efficiency of Android applications...
Push notification is a mechanism that allows individuals to receive updated information quickly. Push notification delivery needs to be effectived and has to be paid attention to time zone differences between countries in order to generate time-appropriate notifications. This push notification system was developed using distributed event-based system approach. The research methodology consists of...
Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities...
In the latest years, we observed an exponential growth of the market of the mobile devices. In this scenario, it assumes a particular relevance the rate at which mobile devices are replaced. According to the International Telecommunicaton Union in fact, smart-phone owners replace their device every 20 months, on average. The side effect of this trend is to deal with the disposal of an increasing amount...
Mobile devices such as smartphones and tablets are provisioned with multiple network interfaces capable of data connectivity such as the cellular radio, WiFi, bluetooth, and others. However, restrictions from the carrier side allow us to use only one of the interfaces at any given time, and not allow us to fully utilize all the data links in a mobile device's arsenal. We propose MIC, an architecture...
Smart mobile devices have become ubiquitous, and people prefer to choose smartphone in daily life rather than use traditional personal computer. However, due to the hardware capability, performance of smartphones varies greatly and sometimes it cannot meet the demand of users. Furthermore, if smartphone is attacked by malicious application, the local private sensitive information will be leaked which...
Location based services (LBS) is one of the new technologies to gain a position in the geographic presence of mobile devices. The presence of LBS technology can be used for information mapping of an area such as the existence of the event. The existence of event is influenced by the number of visitor to the event, because it can be attract people to attend the event. Haversine formula is the method...
The current security models on mobile devices do not provide the level of protection required to handle sensitive data, such as protected healthcare information. In this paper, we introduce a Distributed Android Security Framework (DASF). DASF is a custom security framework for Android-based mobile devices that allows the enforcement of dynamic security policies on an application's privileges and...
This paper discusses a process of data collection from remote sensors and presentation on mobile devices. The presented research and work in this paper is done in the scope of REDIRNET project. The main motivation in the project is to support the rescuers facing operational problems in accessing and analyzing information from multiple sources, and providing advanced features for command and control...
Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored. The concept of port-based authentication using IEEE 802.1x restricts access and may provide statistical data about users...
Smartphone applications are becoming increasingly popular. However, these applications can suffer limited power budgets or malfunctioned sensing issues from their host devices. Computation offloading addresses this issue by delegating local computation workloads to remote servers. In this paper, we present Cose Droid, a framework that supports dynamic computation- and sensing-offloading across different...
With the significant increase and the availability of functionality via mobile devices and applications, a key problem of limited computation capabilities and short-life battery has arisen, Mobile Cloud Computing(MCC) has been emerged as a potential solution to the limitations of mobile devices. Within MCC research, mobile JavaScript offloading has been proposed as a solution for saving energy on...
Cloud computing has paved a way for resource-constrained mobile devices to speed up their computing tasks and to expand their storage capacity. However, cloud computing is not necessary a panacea for all mobile applications. The high network latency to cloud data centers may not be ideal for delay-sensitive applications while storing everything on public clouds risks users’ security and privacy. In...
As mobile devices increasingly become bigger in terms of display and reliable in delivering paid entertainment and video content, we also see a rise in the presence of mobile applications that attempt to profit by streaming pirated content to unsuspected end-users. These applications are both paid and free and in the case of free applications, the source of funding appears to be advertisements that...
Initially, MetaXA (Metadata-processing XMPP-based Architecture) was targeted towards notification distribution and device theft detection. However, since MetaXA is extensible, it can be adapted to many other usage scenarios in the mobile computing domain. For example, in this paper, we demonstrate how to use MetaXA for mobile application management (MAM), without exhausting the battery power of mobile...
Nowadays smartphone is widely used in every part of the world. Trend that is happening now is mobile phone penetration tends to decrease while the smartphone tend to increase. More and more newly launched smartphone offers support for Near Field Communication (NFC). NFC technology enables simple and safe two-way interactions between electronic devices. This research has developed a smartphone-based...
The focus on this paper is to build an Android platform based mobile application for the healthcare domain, which uses the idea of Internet of Things (IoT) and cloud computing. We have built an application called 'ECG Android App' which provides the end user with visualization of their Electro Cardiogram (ECG) waves and data logging functionality in the background. The logged data can be uploaded...
The number and variety of applications for mobile devices continue to grow. However, the resources on mobile devices including computation and storage do not keep pace with the growth. Incorporating the computation capacity on cloud servers into mobile computing has been desired. However, there are numbers of challenging issues to realize it. In this work, we design and implement an elastic computation...
With network developing and virtualization rising, more and more indoor environment (POIs) such as cafe, library, office, even bus and subway can provide plenty of bandwidth and computing resources. Meanwhile many people daily spending much time in them are still suffering from the mobile device with limited resources. This situation implies a novel local cloud computing paradigm in which mobile device...
Video streaming on mobile devices is on the rise. According to recent reports, mobile video streaming traffic accounted for 52.8% of total mobile data traffic in 2011, and it is forecast to reach 66.4% in 2015. We analyzed the network traffic behaviors of the two most popular HTTP-based video streaming services: YouTube and Netflix. Our research indicates that the network traffic behavior depends...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.