The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The study presents data on the state of health of smartphone and tablet lithium-ion batteries that were used in devices in the field for up to several years. Data was retrieved from the coconutBattery database, which contains thousands of datasets on batteries from several device models from the same manufacturer. The durability of batteries in the sample data was found to be quite high. Even batteries...
The popularity of smartphones -- small computers that run on battery power -- has exploded in the last decade. Unsurprisingly, power consumption is an overarching concern for mobile app developers, who are anxious to learn about power-related problems that are encountered by others. In this paper, we present an empirical study exploring the characteristics of energy-related questions posed in Stack...
Green IT' practices seek to enhance the sustainability of the information technology infrastructures and devices (platforms) to reach the good environmental, social and economic expectations. This enhancement could be achieved by eliminating or reducing the negative impact of IT on the environment through detecting the negative defects and exploiting the efficient green practices and guidelines to...
The increasing proliferation of mobile handsets, and the migration of the information access paradigm to mobile platforms, leads researchers to study the energy consumption of this class of devices. The literature still lacks metrics and tools that allow software developers to easily measure and optimize the energy efficiency of their code. Energy efficiency can definitely improve user experience...
The cloud seems to be an excellent companion of mobile systems, to alleviate battery consumption on smartphones and to backup user's data on-the-fly. Indeed, many recent works focus on frameworks that enable mobile computation offloading to software clones of smartphones on the cloud and on designing cloud-based backup systems for the data stored in our devices. Both mobile computation offloading...
Software on mobile devices has become increasingly complicated as end users demand a PC-converged user experience on the mobile Internet. This has complicated the software configuration and boot procedures, resulting in a longer boot time. This is damaging to the mobile user experience. Many legacy techniques to enable the fast boot time differentiation in mobile handsets are not applicable to the...
Accidents and sabotages are kinds of environmental disasters that constitute a growing threat to marine ecosystems. Recent events disclosed to the public audience the importance of developing methodologies and systems that can accurately and continuously monitor such events. Sensor networks have been successfully applied to early warning and environmental monitoring both in terrestrial and marine...
Nowadays, process-aware information systems (PAISs) are widely used for the management of “administrative” processes characterized by clear and well-defined structures. Besides those scenarios, PAISs can be used also in mobile and pervasive scenarios, where process participants can be only equipped with smart devices, such as PDAs. This paper illustrates ROME4EU, a fully-fledged PAIS that can be entirely...
The purpose of the research proposed in this paper is to develop a Low-Power Tracking System, which can meet the special needs of the security of a mobile device. The system contains two parts: the GPS terminal in the module receives the locating information of the tracked device, and the control center. This paper discusses both hardware and software design of the tracking system. In the end, the...
This paper portrays recent trends in Radio Frequency Identification (RFID) systems and its commercial relevance. RFID is one of the most researched and rapidly emerging technologies. With the recent technological advancements at International level, it is finding its application in various areas and has a bright future scope. We have proposed a software framework for RFID integrated mobile phones...
Recently, the mobile phones are evolving into mobile multifunctional terminals with the incorporation of various useful functions; the display devices also have advanced in terms of size, design, and resolution as a user interface of the mobile phone. Many low power display techniques have been proposed for example dynamic luminance scaling, liquid crystal orientation shift, variable frame refresh,...
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.