The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A major limitation of mobile Crowd Sourcing (CS) applications is the generation of false (or spam) contributions due to selfish and malicious behaviors of users, or wrong perception of an event. Such false contributions induce loss of revenue through disbursement of undue incentives and also negatively affects the application's operational reliability. In this work, we propose a reputation model,...
In this paper, we jointly consider communication, caching and computation in a multi-user cache-assisted mobile edge computing (MEC) system, consisting of one base station (BS) of caching and computing capabilities and multiple users with computation-intensive and latency-sensitive applications. We propose a joint caching and offloading mechanism which involves task uploading and executing for tasks...
In recent studies, researchers have developed various computation offloading frameworks for bringing cloud services closer to the user via edge networks. Specifically, an edge device needs to offload computationally intensive tasks because of energy and processing constraints. These constraints present the challenge of identifying which edge nodes should receive tasks to reduce overall resource consumption...
All over the world, the crowd management is a big challenge facing the organizations of any event with large number of people. It is clear that this task is becoming more difficult and complicated when the event is larger. In the recent few years, the there are many new technologies developed that can be utilized in crowed management. Among these new technologies is wireless communications, cloud...
SVM (Support Vector Machine), a state of the art classifier model is implemented on a computational mobile platform and its performances are evaluated against a low complexity classifier such as SFSVC (Super Fast Vector Support Classifier) on the same platform. For a better comparison, similar implementation for the two architectures are considered, such as using the same basic linear algebra library...
Recently, computation offloading has become one of the common and efficient ways to minimize the energy expenditure. Considering the aspects of mobile-cloud communication, energy optimization is from the necessities of this offloading. Moreover, the variable and mobile states of mobile devices environments have a significance on this communication. In this article, we are going to suggest an adaptable...
Mobile crowd sensing emerges as a new paradigm which takes advantage of the pervasive sensor-embedded smartphones to collect data efficiently. Many incentive mechanisms for mobile crowd sensing have been proposed. However, none of them takes into consideration the cooperative compatibility of users for multiple cooperative tasks. In this paper, we design truthful incentive mechanisms to minimize the...
The paper shows historical aspects of the application of computer-based information systems, providing the process of cosmonaut training for a space flight at the Gagarin Cosmonaut Training Center. These systems include: systems ensuring the operation of simulation complexes for cosmonaut training, computer-assisted instruction systems (computer-assisted simulators), databases for storing the results...
With the constant increase in the number of interconnected devices in today networks, and the high demand of adaptiveness, more and more computations can be designed according to self-organisation principles. In this context, a key building block for large-scale system coordination, called gradient, is used to estimate distances in a fully-distributed way: it is the basis for a vast variety of higher...
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
Domain-specific languages (DSLs) are small languages tailored to a certain application area, like logistics, web application testing or smart city planning. Traditionally, the use of DSLs has been limited to a static setting in desktop or web editors. However, in this paper, we claim that DSLs can be central components of mobile collaborative applications. In our vision, graphical DSLs can be extended...
Accurate, real-time Automatic Speech Recognition (ASR) comes at a high energy cost, so accuracy has often to be sacrificed in order to fit the strict power constraints of mobile systems. However, accuracy is extremely important for the end-user, and today's systems are still unsatisfactory for many applications. The most critical component of an ASR system is the acoustic scoring, as it has a large...
This paper presents a case study based on the experience of implementing a blended learning (BL) approach by SPOC to a Computer General course for all the first year undergraduates in China University of Geosciences (Beijing). It introduces ubiquitous learning environment (ULE), teaching preparation for student-centered learning, and teaching practice of the BL. The study shows that BL approach has...
Generally, the big data refers to one of the key topics because of the vast growth of the information and communication technology. The main contributor of networks performance is the traffic of the networks. Although the traffic data generated by individual users may not appear to be significant, the overall data generated across networks can produce a significant portion of the big data. Therefore,...
Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud computing is that, sometimes, the physical locations of cloud servers are distant from mobile users and the communication latency is long. As a result, the concept of distributed cloud service, called mobile edge computing (MEC), is being introduced...
This paper presents an extended mobile lattice gas model allowing pedestrian's variable step size and reveals the effects of various walking step size on pedestrian evacuation. The possible sizes are scanned before determining the moving directions and the impacts of the step size on pedestrian's path selection are considered. The evacuation process of pedestrians from a room with an exit is simulated...
Mobile devices are now capable of handling many daily computing tasks that used to be accomplished by desktops or servers. However, these improvements also introduce resource-hungry mobile applications that require richer resource-hungry computing features and more complex functions. Mobile Cloud Computing (MCC) addresses these limitations considering the nature of mobility; this innovative strategy...
Quantization is considered as one of the most effective methods to optimize the inference cost of neural network models for their deployment to mobile and embedded systems, which have tight resource constraints. In such approaches, it is critical to provide low-cost quantization under a tight accuracy loss constraint (e.g., 1%). In this paper, we propose a novel method for quantizing weights and activations...
This paper puts forward a new trust model CTM (Credit Transfer Model) in the mobile P2P (Peer to Peer) network. Applying a hybrid P2P network topology structure, the CTM selects large servers in the cable network as super nodes which maintain the identity information, resource information, transaction records and trust information of ordinary nodes. The CTM simplifies the calculation of the node's...
With the rapid development of wireless communication technology and mobile payment technology, the O2O e-commerce becomes very popular in the world. People can order services online using their smart-phone, and enjoy these services in the local brick-and-mortar service stores offline. However, with the population of O2O e-commerce, there also occur some problems such as service merchants exaggerate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.