The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low latency. Fog computing is a specialization of the Cloud that promises to overcome the aforementioned limitations by bringing the Cloud closer to end-users. Despite its potential benefits,...
Edge Computing, as a solution to leveraging computation capabilities at the edge of the network, is emerging. One key challenge for edge computing is offering its computing service with a low service blocking and low latency that otherwise translate to an inefficient deployment of a Edge computing system. Unlike cloud computing, the computing resources in edge computing are limited. One way to deal...
Mobile code offloading is a relatively well known proposal for enhancing the capabilities of mobile platforms by migrating resource intensive tasks to resource rich surrogates hosted in the cloud. Yet, most of the research in the area has been focused on theoretical gains achieved through custom OS versions in ideal scenarios. This paper presents MobiCOP, a new code offloading platform that seeks...
Network latency in mobile apps is the first and foremost concern since the majority of apps frequently fetch data from the Internet and mobile devices rely on wireless networks. To minimize network latency, we propose a novel prefetching technique which has the potential of reducing latency to "zero". Our approach aims to prefetch latency-hogging HTTP requests in mobile applications, which...
Mobile data collection systems (MDCS) in the health sector are of great benefit to health care providers and community workers especially in low-resource settings. MDCS enable the extension and provision of health services closer to the community by enabling data collection and diagnosis without the patient being in a hospital setting. MDCS, however, face a number security challenges including authentication...
This paper proposes the design of an intelligent integrated system for sending and processing personalized medical data and storing them in the cloud according to modern standards. A mobile hardware component will be used, that features a set of medical sensors (tonometer, EKG, pulse oximetry, temperature, accelerometer, respiratory rate, electromyography, GPS) and is able to serialize them in the...
Privacy in mobile apps is a fundamental aspect to be considered, particularly with regard to meeting end user expectations. Due to the rigidities of the Android permission model, desirable trade-offs are not allowed. End users are confined into a secondary role, having the only option of choosing between either privacy or functionalities. This work proposes a user-centric approach to the flexible...
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment....
Internet of Things (IoT) devices are typically deployed in resource (energy, computational capacity) constrained environments. Connecting such devices to the cloud is not practical due to variable network behavior as well as high latency overheads. Fog computing refers to a scalable, distributed computing architecture which moves computational tasks closer to Edge devices or smart gateways. As an...
Widespread use of mobile terminal has promoted the rapid movements of information service technology. This paper analyzes the shortcomings of service capabilities in the case of the lack of infrastructure, and presents a service persistence method in mobile environment. Based on distributed service deployment, multiple backup and service session switch and other mechanisms, this method effectively...
This paper proposes a practical non-monetary mechanism that induces the efficient solution to the optimal rate control problem, where each client optimizes its request arrival rate to maximize its own net utility individually, and at the Nash Equilibrium the total net utility of the system is also maximized. Existing mechanisms typically rely on monetary exchange which requires additional infrastructure...
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
By processing sensory data in the vicinity of its generation, edge computing reduces latency, improves responsiveness, and saves network bandwidth in data-intensive applications. However, existing edge computing solutions operate under the assumption that the edge infrastructure will comprise a set of pre-deployed, custom-configured computing devices, connected by a reliable local network. Although...
The consumption of banking applications are more and popular on Android devices but it is not secure. To make secure on those confidential application such as banking, business application and personal data, password is provided to enhance privacy. Nowadays those passwords are easily usurped by hackers through shoulder side attacks or observing videos. To overcome from this inconveniences of accessing...
With the today's the rapid developing of wireless mobile networks, various types of mobile devices have emerged and a variety of applications have been developed. People's desire for more convenient life and more efficient collaboration may be coming true in this era. Meanwhile there are lots of security challenges in wireless mobile networks. To resist conventional attacks and obtain stronger securities...
Botnet-based DDOs attacks progressively using regular-looking application layer requests to exhaust disk capacity as well as server CPU. In the last decade, a number of defense and mitigation mechanisms have emerged to resist botnet. It is important to organise and compare these mechanisms to better understand the problem as well as solutions. Effective defense against botnet-based attacks at OSI...
Monitoring based Mobile applications have been developed as the improvement of portable figuring and correspondence innovations. Mobile computing technologies enable the mobile users to make, get to, process, store and impart data without being obliged to a solitary area. The availability of Mobile computing technologies and smart phones gives new possibilities for a continuous monitoring of Aqua...
Cordova is an open-source mobile application development framework. It allows you to develop mobile applications with web technologies-HTML5, CSS3 and JavaScript. Cordova cross platform target multiple platform with one code base (Code once and Run Everywhere). In this paper we implement simple News Application by using Cordova development framework, to create local Newspaper agency. This Application...
Emergencies and disasters never come with prior warning, and hence detecting them and reporting is a challenge. Gathering of information when such an event occurs can reduce its severity and save lives. The proposed system presents a smart phone based platform where users can take photographs or videos of an incident and sent it to nearby users and emergency services either via online or offline....
The common in use for remote control tasks achieved via specific mobile (e.g. Android or iOS) and this control done only by radio remote control systems, infrared (IR) devices, etc.and limited in the edges of office/house, but not remote control automated for electric/ electronic devices from anywhere (outside of office/house). This paper proposed an Internet of Things (IoT) home automated system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.