The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware...
labeled mobile network traffic traces are the foundation of mobile traffic research. However, traditional label method may be not suitable for mobile traffic. This paper devised a mobilegt to address this problem. It is composed by mobilegt client and mobilegt server. Mobilegt client includes a socket logger and a traffic manager. Mobilegt server includes a VPN server, a traffic logger and a traffic...
With the emergence of a promising technology, Cloud Computing is spreading its usage everywhere. Mobile Cloud Computing (MCC) integrates cloud computing with mobile devices which holds a promise to run powerful and resource-intensive applications on mobile devices irrespective of its performance limitations (e.g., battery life, memory utilization and computation). Overcoming of these limitations is...
We are stepping frontward for an epoch of zeta bytes from Giga/Tera/Peta/Exa bytes in this era of computer science. The data storage in clouds is not the only preference as big data technology is obtainable for processing of both structured and unstructured data. Today a colossal sum of data is engendered by mobile phones (Smartphone) of both the composition types. For the sake of faster processing...
We consider video processing to detect complex activities in a distributed network consisting of mobile devices and video-cloud servers. To address varying task requirements and resource-constraints of mobile devices, we consider fragmentation of the video processing workflow. Fragmentation of the workflow allows for the mobile device to filter video clips based on metadata, process portions of the...
Nowadays, with the fast advancement of mobile technology, mobile devices are more energy hungry. Battery life has become the performance bottleneck of mobile devices. Short battery life greatly reduces user satisfaction. This paper proposes GScheduler – a dynamic energy-aware task scheduler for mobile devices. The goal of GScheduler is to turn mobile devices and computers at home/office into an energy-aware...
We present a method of generation of one-time keys (OTK) for single line authentication using zero knowledge (ZK) computation as undertaken by an authentication client application on a mobile device and a registration server. The method comprises initiation of an activation process on the authentication client by a user associated with the mobile device, a ZK computation sequence on the authentication...
Mobile cloud computing is increasingly being used in recent times to offload parts of an application to the cloud to reduce its finish time. However, quality of offloading decisions depend on network conditions and hence many offloading solutions assume that MAC layer retransmissions will tackle transient frame errors. This can lead to suboptimal solutions, as well as, degrade service level guarantee...
Mobile-edge computing (MEC) has recently emerged as a promising paradigm to liberate mobile devices from increasingly intensive computation workloads, as well as to improve the quality of computation experience. In this paper, we investigate the tradeoff between two critical but conflicting objectives in multi-user MEC systems, namely, the power consumption of mobile devices and the execution delay...
Nowadays people are carrying their mobile devices wherever they go, and as social beings they interact with others all day long. Thus, by exploiting this massive use of smart devices they provide a way to be co-located using only their captured environmental radio signals. In this paper, we design a co-location system that finds groups of people, in real-time, with high accuracy, by exploiting the...
With the proliferation of mobile devices, spatial crowdsourcing is rising as a new paradigm that enables individuals to participate in tasks related to some locations in the physical world. Nevertheless, how to allocate these tasks to proper mobile users and improve communication efficiency are critical in spatial crowdsourcing. In this paper, we propose Fo-DSC, a fog-based deduplicated spatial crowdsourcing...
With the rapid development of portable mobile devices, crowd sensing systems have been recognized as a key technology to utilize the data collected by the portable mobile devices towards scalable and flexible mobile services. However, since the information provided by devices may not be reliable, the aggregated results of the collected data may not be accurate. To tackle this challenge, various truth...
Web service based simulation tools will be an important aspect of discrete-event modeling and simulation (M&S) in Internet of things (IoT) systems. However, efforts to develop this kind of M&S tools are significant and it is difficult to have a tool suite that offer the modeling and the simulation of ubiquitous systems. The combination of the DEVSimPy environment and the DEVSimPy-mob hybrid...
The wide spread of smart mobile devices such as tablets and phones makes mobile crowdsensing a viable approach for collecting data and monitoring phenomena of common interest. Smart devices can sense and compute their surroundings and contribute to mechanisms that examine social and collective behaviours. Crowdsensing offers a feasible alternative to exchange and compute sensing tasks and data between...
The rapid progression of mobile and communication technology resulted in smart hand-held devices, with superior processing and storage capacities, which can be used in conjunction with cloud environment. Insecure internet as an underlying communication medium results in unlock of cryptographic attacks both from outsider (via Internet) and insider (via cloud system) on user and enterprise specific...
We in this paper introduce a novel data visualization package, called the ADD framework, to support responsive and adaptive data-driven visualization. Currently, interactive data visualization, which is generally achieved by Javascript-based libraries such as D3.js, cannot be easily manipulated as the responsive way like the RWD principle in the CSS design. Visualization of abundant information becomes...
Mobile banking, is a hottest topic in the development of banking sector which is expected to be replaced by online or net banking in the near future. Mobile banking is done through tablet or smartphones when you are away from home at any time. Authentication, Confidentiality and Integrity are the three main aspects of security. As the technology develops, there increase a a strong desire to develop...
In this paper, the mobile phone is presented as an alternative device to interact with animation systems and virtual environments, including video games. Basically, we show how the gyroscope of a mobile device can work as a sensor to control the pose and motion of a mobile device controlled object or character in a 3D virtual world. More specifically, we introduce a framework that enables the development...
In recent years, the proliferation of wireless devices has contributed to the emergence of new set of applications termed as Location Based Services (LBS). LBS provide privileges to mobile users based on their proximity to a facility. In order to gain benefits, users may lie or falsely claim their location. Hence, it is essential to verify the legitimacy of users. In this paper, we propose our novel...
During the last decades we have been witnesses of a very rapid technical revolution. Today we are surrounded by smart devices (smart phones, smart TVs, smart houses, smart cars) that have radically transformed our daily life as well. Learning methods and information gathering techniques of the youth has become quite different from that of their parents'. Lecturers have to change their educational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.