Academic literature on the topic 'MOBILE COMPUTING MODEL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MOBILE COMPUTING MODEL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MOBILE COMPUTING MODEL"

1

Jararweh, Yaser, Lo’ai Tawalbeh, Fadi Ababneh, Abdallah Khreishah, and Fahd Dosari. "Scalable Cloudlet-based Mobile Computing Model." Procedia Computer Science 34 (2014): 434–41. http://dx.doi.org/10.1016/j.procs.2014.07.051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wojarnik, Grzegorz. "MODEL OF MOBILE DATA SYNCHRONIZATION WITHIN CLOUD COMPUTING SERVICES." Zeszyty Naukowe Uniwersytetu Szczecińskiego. Studia Informatica 44 (2017): 63–72. http://dx.doi.org/10.18276/si.2017.44-06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mora, Higinio, Francisco J. Mora Gimeno, María Teresa Signes-Pont, and Bruno Volckaert. "Multilayer Architecture Model for Mobile Cloud Computing Paradigm." Complexity 2019 (February 11, 2019): 1–13. http://dx.doi.org/10.1155/2019/3951495.

Full text
Abstract:
Mobile Cloud Computing is one of today's more disruptive paradigms of computation due to its effects on the performance of mobile computing and the development of Internet of Things. It is able to enhance the capabilities of devices by outsourcing the workload to external computing platforms deployed along the network, such as cloud servers, cloudlets, or other edge platforms. The research described in this work presents a computational model of a multilayer architecture for increasing the performance of devices using the Mobile Cloud Computing paradigm. The main novelty of this work lies in defining a comprehensive model where all the available computing platforms along the network layers are involved to perform the outsourcing of the application workload. This proposal provides a generalization of the Mobile Cloud Computing paradigm which allows handling the complexity of scheduling tasks in such complex scenarios. The behaviour of the model and its ability of generalization of the paradigm are exemplified through simulations. The results show higher flexibility for making offloading decisions.
APA, Harvard, Vancouver, ISO, and other styles
4

Alakbarov, R. G. "Model of Optimal Placement of Cloudlets in a Wireless Metropolitan Area Network." Informacionnye Tehnologii 29, no. 4 (April 18, 2023): 182–88. http://dx.doi.org/10.17587/it.29.182-188.

Full text
Abstract:
Cloud computing has recently emerged as a new paradigm for processing and storing large amounts of data. The rapid increase in the number of mobile phones and IoT devices benefitingfrom cloud computing services reduces the Internet bandwidth, resulting in delays in delivering data processed on remote cloud servers to the user. Mobile devices use edge computing systems (cloudlet, fog computing, etc.) to overcome resource shortages, power consumption and delays in communication channels. Edge computing systems place processing devices (cloudlets) close to users. The closer the cloudlets to mobile devices, the lower the processing time and energy consumption of the mobile device, and the higher the bandwidth of communication channels. Thus, cloudlet-based mobile computing clouds are widely used to reduce the latency in the Internet communication channels and energy consumption on mobile devices. This article identifies the most popular places for cloud servers in metropolitan mobile networks and discusses the optimal placement of a limited number of cloudlets in those places.
APA, Harvard, Vancouver, ISO, and other styles
5

El-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (January 29, 2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.

Full text
Abstract:
the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of Mobile-based system under cloud computing environment solve some performance and environment related issues include: bandwidth, storage capacity, availability, scalability and heterogeneity. The Mobile-based cloud computing apps are different comparing to mobile computing apps, since in the first model the devices run cloud based web applications not as mobile computing native apps. Services of Mobile-based systems via cloud are accessing and sharing through internet connection thus they are open for attacker to attack on its security. Distributed Denial of Service (DDoS) attacks can cause a big problem in mobile cloud computing security. The main objective of DDoS attacks is to infect wireless devises resources (e.g., software applications, wireless network, etc.) and make them unavailable to the authorized user. In DDoS, the attacker tries to overload the Mobile-based service with traffic. The main objective of this research paper is to introduce novel model for securing Mobile-based systems against DDoS attacks. Efficiency and performance analysis evaluations of the proposed model are presented. The feedbacks of the experimental results were highly promising, for protecting mobile-based cloud computing systems against DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Han, Songyue, Dawei Ma, Chao Kang, Wei Huang, Chaoying Lin, and Chunyuan Tian. "Optimization of Mobile Edge Computing Offloading Model for Distributed Wireless Sensor Devices." Journal of Sensors 2022 (February 28, 2022): 1–9. http://dx.doi.org/10.1155/2022/9047737.

Full text
Abstract:
The development and popularization of mobile Internet and wireless communication technology have spawned a large number of computation-intensive and delay-intensive applications. Limited computing resources and existing technologies cannot meet the performance requirements of new applications. Mobile edge computing technology can use wireless communication technology to offload data to be stored and computing tasks to the nearby assistant or edge server with idle resources. Based on the data offloading of distributed wireless sensor device to device communication, the architecture is designed and the basic framework of distributed mobile edge computing is constructed. To solve the problem of high mobile cloud computing technology, the offloading model of optimized mobile edge computing was proposed, and the stability and convergence of the proposed algorithm were proved. Finally, the system performance of the proposed algorithm is verified by simulation. The results show that the proposed algorithm can converge within a finite number of steps. Compared with other benchmark schemes, the proposed algorithm has better performance in reducing system energy consumption, reducing moving edge response delay and system total delay.
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Chang Li, Chang Liu, and Dan Shi. "Study on the Architecture of Mobile Campus Digital Library System." Applied Mechanics and Materials 608-609 (October 2014): 425–29. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.425.

Full text
Abstract:
Cloud computing and mobile Internet is a new computing model based on Internet business that is a mixture of many technical results, it has the advantage of safe and reliable, massive information storage, fast and convenient. This paper mainly discusses the advantages of mobile digital library, and puts forward the mode of constructing the cloud computing and mobile Internet library based on information platform, analyzes the basic architecture of mobile library, in-depth study cloud computing and mobile Internet in library information platform access model and database model, finally the paper gives general idea to construct digital library using mobile WAP Technology.
APA, Harvard, Vancouver, ISO, and other styles
8

Pham, Hai Son, Hoang Son Le, and The Anh Hoang. "Propose technology and management model of mobile cloud computing for the Vietnam national digital transformation program." Ministry of Science and Technology, Vietnam 65, no. 8 (August 25, 2023): 35–39. http://dx.doi.org/10.31276/vjst.65(8).35-39.

Full text
Abstract:
Cloud computing is considered a digital platform to develop mobile applications for the National Digital Transformation Program 2025 with a vision to 2030. There are many solutions to build a cloud computing platform, but those solutions consume hardware resources, high communication latency and lack of mobility, thus increasing the cost of investment in building a cloud computing platform. To address the disadvantages of the above solutions, this study proposes a mobile cloud computing model aimed at providing services that only implement on mobile devices, enhancing the calculation capacity on mobile devices, minimising resource shortages and performing efficiently for resource-intensive mobile applications. To do that, the solution proposed in this study is to enable the use of the nearest resource-rich mobile devices that can provide computing services to mobile users in the vicinity. Utilising leisure resources to serve resource-intensive mobile applications helps the government to reduce hardware investment for building cloud computing platforms. In addition, this study also proposes a management model for mobile applications through the App Store that is owned and managed by the Vietnamese government. From there, the government will monitor mobile applications and not let them develop spontaneously, causing difficulties and loss of trust for users.
APA, Harvard, Vancouver, ISO, and other styles
9

P., Pavithra, and Balamurugan K. "Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model." Bonfring International Journal of Software Engineering and Soft Computing 8, no. 2 (April 30, 2018): 21–25. http://dx.doi.org/10.9756/bijsesc.8391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Weijin, Yang Wang, Yirong Jiang, Yuhui Xu, Jiahui Chen, Lina Tan, and Guo Liang. "Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing." Computers, Materials & Continua 62, no. 1 (2020): 123–36. http://dx.doi.org/10.32604/cmc.2020.05933.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "MOBILE COMPUTING MODEL"

1

Brander, William. "A model for adaptive multimodal mobile notification." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/699.

Full text
Abstract:
Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
APA, Harvard, Vancouver, ISO, and other styles
2

Momin, Kaleem A. "A transaction execution model for mobile computing environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vieira, André Fonseca dos Santos Dias. "Context-aware personalization environment for mobile computing." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8649.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Currently, we live in a world where the amount of on-line information vastly outstrips any individual’s capability to survey it. Filtering that information in order to obtain only useful and interesting information is a solution to this problem. The mobile computing area proposes to integrate computation in users’ daily activities in an unobtrusive way, in order to guarantee an improvement in their experience and quality of life. Furthermore, it is crucial to develop smaller and more intelligent devices to achieve this area’s goals, such as mobility and energy savings. This computing area reinforces the necessity to filter information towards personalization due to its humancentred paradigm. In order to attend to this personalization necessity, it is desired to have a solution that is able to learn the users preferences and needs, resulting in the generation of profiles that represent each style of interaction between a user and an application’s resources(e.g. buttons and menus). Those profiles can be obtained by using machine learning algorithms that use data derived from the user interaction with the application, combined with context data and explicit user preferences. This work proposes an environment with a generic context-aware personalization model and a machine learning module. It is provided the possibility to personalize an application, based on user profiles obtained from data, collected from implicit and explicit user interaction. Using a provided personalization API (Application Programming Interface) and other configuration modules, the environment was tested on LEY (Less energy Empowers You), a persuasive mobile-based serious game to help people understand domestic energy usage.
APA, Harvard, Vancouver, ISO, and other styles
4

Frank, Christopher E. "An Egocentric Spatial Data Model for Intelligent Mobile Geographic Information Systems." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/FrankCE2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jiajun. "Understanding consumers' acceptance of mobile payments : a theoretical model and empirical validation." Thesis, University of Portsmouth, 2007. https://researchportal.port.ac.uk/portal/en/theses/understanding-consumers-acceptance-of-mobile-payments(5b1ab076-9225-40cb-8e48-ea620ad1d512).html.

Full text
Abstract:
This research investigates consumer acceptance of mobile payments. Mobile payments offer an alternative payment method for consumers, and allow consumers to make point-of-sales payments through mobile devices, such as mobile phones and Personal Digital Assistants (PDAs). It aims to present a better understanding of mobile payments, developing a consumer acceptance model for mobile payments. Moreover, it offers a reference and a source of literature for the industry and academic researchers in this new information systems research domain. This thesis focuses on consumer acceptance of mobile payments, and explores and investigates the factors that influence consumer acceptance of mobile payments. The lack of literature and empirical research in the field of mobile payments encouraged the development of a research framework to elucidate the acceptance of mobile payments by consumers. The present research has been conducted in order to offer a more in-depth understanding of consumers’ perspectives on mobile payments. The Technology Acceptance Model (TAM) and Innovation Diffusion Theory (IDT) have been introduced into this research, offering a solid foundation for this research and the development of a research model. A mixed methods approach was adopted for the research in this thesis. The research started with a qualitative method, using a focus group to investigate potential mobile payment users concerning usage, issues and adoption via open-ended questions. This process was followed by an example of mobile payment being identified and explored to understand mobile payments: a closed-ended questionnaire was used in this part of the research study. Study two is a case study, the selected case being ZOOP mobile payments. At the time of this research, ZOOP was a successful commercial infraredbased mobile payments system. These two studies offer rich information regarding the attitude and behaviour of mobile payments users toward mobile payments, and the expectations and concerns of potential users. The data and results from study one and study two were important as background material and for reference, and they also offer a context for the interpretation of the data from study three. Therefore, through these processes, a solid foundation for this research has been established. The proposed research model has been used in study three to address the research question in conjunction with evaluating the research model. The relationships between the potential factors in the research model have also been identified. The conceptual framework presented in this research is based on two well-known theories, IDT and TAM. Study three obtained two sets of data. The first survey was for all mobile payments users around the globe, and the second survey focused on one particular mobile payments service in the UK. The second set of data is designed to confirm the result from the first set of data. This rigorous process provides a solid model of consumer acceptance of mobile payments. The data has been analysed through Structural Equation Modelling (SEM) via Linear Structural RELationships (LISREL) computer application software. The study has successfully evaluated the research model and obtained results. Moreover, the survey instruments used have also been validated in this study. This empirical research is used to improve the understanding of the phenomenon of mobile payments. Moreover, it offers insight into the attitudes and behaviour of consumers towards using mobile payments. In study one, focus group studies identified the reasons for adopting mobile payment systems, for example, a convenient service. Concerns about using the services, for instance, security, have also been identified. Furthermore, the second study surveyed ZOOP mobile payment users in South Korea: it also identified that convenience, ease of use, and a safe service would attract consumers to use the service. Both studies have provided valuable information for academics and the industry to understand why consumers would like to use mobile payments and also their concerns. The results of the study have confirmed the importance of the identified factors for consumer acceptance of mobile payments. Apart from TAM and IDT, respondents note that perceived costs, perceived trust, perceived system quality, and social influence are important to them. The results of this research study should be of interest to both academic and business communities. The research in this thesis expands the usage of the TAM model in Information Systems (IS) research, validates and extends the TAM model within the mobile payments domain, and develops a new model of mobile payment adoption. Moreover, the results are of value to the business communities interested in developing and implementing mobile payment systems. Potential service providers would benefit from an improved understanding of these aspects. The identification of important factors concerning mobile payments in this study will assist them to develop and implement their systems to ensure the full acceptance and continuous use of the systems. The research framework can also be used for future research related to mobile payments or mobile commerce.
APA, Harvard, Vancouver, ISO, and other styles
6

al, Nabhan Mohammad Mousa. "Adaptive, reliable, and accurate positioning model for location-based services." Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3963.

Full text
Abstract:
This thesis presents a new strategy in achieving highly reliable and accurate position solutions fulfilling the requirements of Location-Based Services (LBS) pedestrians’ applications. The new strategy is divided into two main parts. The first part integrates the available positioning technology within the surrounding LBS application context by introducing an adaptive LBS framework. The context can be described as a group of factors affecting the application behaviour; this includes environmental states, available resources and user preferences. The proposed adaptive framework consists of several stages, such as defining the contextual factors that have a direct effect on the positioning performance, identifying preliminary positioning performance requirements associated with different LBS application groups, and introducing an intelligent positioning services selection function. The second part of this work involves the design and development of a novel positioning model that is responsible for delivering highly reliable, accurate and precise position solutions to LBS users. This new model is based on the single frequency GPS Standard Positioning Service (SPS). Additionally, it is incorporated within the adaptive LBS framework while providing the position solutions, in which all identified contextual factors and application requirements are accounted. The positioning model operates over a client-server architecture including two main components, described as the Localisation Server (LS) and the Mobile Unit (MU). Hybrid functional approaches were developed at both components consisting of several processing procedures allowing the positioning model to operate in two position determination modes. Stand-alone mode is used if enough navigation information was available at the MU using its local positioning device (GPS/EGNOS receiver). Otherwise, server-based mode is utilised, in which the LS intervenes and starts providing the required position solutions. At the LS, multiple sources of GPS augmentation services were received using the Internet as the sole augmentation data transportation medium. The augmentation data was then processed and integrated for the purpose of guaranteeing the availability of valid and reliable information required for the provision of accurate and precise position solutions. Two main advanced position computation methods were developed at the LS, described as coordinate domain and raw domain. The positioning model was experimentally evaluated. According to the reported results, the LS through the developed position computation methods, was able to provide position samples with an accuracy of less than 2 meters, with high precision at 95% confidence level; this was achieved in urban, rural, and open space (clear satellite view) navigation environments. Additionally, the integrity of the position solutions was guaranteed in such environments during more than 90% of the navigation time, taking into consideration the identified integrity thresholds (Horizontal Alert Limits (HAL)=11 m). This positioning performance has outperformed the existing GPS/EGNOS service which was implemented at the MU in all scenarios and environments. In addition, utilising a simulation evaluation facility the developed positioning model performance was quantified with reference to a hybrid positioning service that will be offered by future Galileo Open Service (OS) along with GPS/EGNOS. Using the statistical t-test, it was concluded that there is no significant difference in terms of the position samples’ accuracy achieved from the developed positioning model and the hybrid system at a particular navigation environment described as rural area. The p-value was 0.08 and the level of significance used was 0.05. However, a significant difference in terms of the service integrity for the advantage of the hybrid system was experienced in all remaining scenarios and environments more especially the urban areas due to surrounding obstacles and conditions.
APA, Harvard, Vancouver, ISO, and other styles
7

TaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.

Full text
Abstract:
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul, Rehman Bin Omer. "Mobile Edge Computing Clustering Algorithms for Pedestrian Mobility Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
The purpose of this study is to provide a general framework for the latest trends of mobile network architectures. Edge computing brings the computing capability of the cloud to the edge of the network for minimizing the latency. In the D2D mode, Fog Nodes interact with each other. With the help of clustering, Fog nodes are categorized into two types: Fog Cluster Head (FCH) and Fog Cluster Member (FCM). In each cluster, FCMs offload the task towards their respective FCHs for computation. The characterization of the performance of system model taking into account the average energy consumption, average task delay, fairness, and packet loss. We provide results based on the numerical simulation performed in Matlab in order to show the difference in the performance of the network using different policies and clustering and cluster update frequencies. In this thesis, a theoretic framework is presented that aims to characterize the performance of Fog network with pedestrian mobility without priority approach and also pedestrian mobility with priority approach using clustering approach and compare the results. The simulation results show how the priority approach has the profound impact on the energy consumption, task delay, and packet loss and solve the problem of coverage constraint.
APA, Harvard, Vancouver, ISO, and other styles
9

Pather, Direshin. "A model for context awareness for mobile applications using multiple-input sources." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/2969.

Full text
Abstract:
Context-aware computing enables mobile applications to discover and benefit from valuable context information, such as user location, time of day and current activity. However, determining the users’ context throughout their daily activities is one of the main challenges of context-aware computing. With the increasing number of built-in mobile sensors and other input sources, existing context models do not effectively handle context information related to personal user context. The objective of this research was to develop an improved context-aware model to support the context awareness needs of mobile applications. An existing context-aware model was selected as the most complete model to use as a basis for the proposed model to support context awareness in mobile applications. The existing context-aware model was modified to address the shortcomings of existing models in dealing with context information related to personal user context. The proposed model supports four different context dimensions, namely Physical, User Activity, Health and User Preferences. A prototype, called CoPro was developed, based on the proposed model, to demonstrate the effectiveness of the model. Several experiments were designed and conducted to determine if CoPro was effective, reliable and capable. CoPro was considered effective as it produced low-level context as well as inferred context. The reliability of the model was confirmed by evaluating CoPro using Quality of Context (QoC) metrics such as Accuracy, Freshness, Certainty and Completeness. CoPro was also found to be capable of dealing with the limitations of the mobile computing platform such as limited processing power. The research determined that the proposed context-aware model can be used to successfully support context awareness in mobile applications. Design recommendations were proposed and future work will involve converting the CoPro prototype into middleware in the form of an API to provide easier access to context awareness support in mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Ntawanga, Felix Fred. "A context-aware model to improve usability of information presented on mobile devices." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020768.

Full text
Abstract:
Online information access on mobile devices is increasing as a result of the growth in the use of Internet-enabled handheld (or pocket-size) devices. The combined influence of recent enabling technologies such as Web 2.0, mobile app stores and improved wireless networks have driven the increase in online applications that allow users to access various types of information on mobile devices regardless of time and location. Examples of such applications (usually shortened to app) include: social media, such as FacebookTM App and TwitterTM App, banking applications such as (Standard Bank South Africa)TM Mobile Banking App and First National Bank (FNB) BankingTM App, and news application such as news 24TM App and BBCTM News App. Online businesses involved in buying, selling and business transaction processing activities via the Internet have exploited the opportunity to extend electronic commerce (e-commerce) initiatives into mobile commerce (m-commerce). Online businesses that interact with end user customers implement business to consumer (B2C) m-commerce applications that enable customers to access and browse product catalogue information on mobile devices, anytime, anywhere. Customers accessing electronic product catalogue information on a mobile device face a number of challenges such as a long list of products presented on a small screen and a longer information download time. These challenges mainly originate from the limiting and dynamic nature of the mobile apps operating environment, for example, dynamic location, bandwidth fluctuations and, diverse and limited device features, collectively referred to as context. The goal of this research was to design and implement a context-aware model that can be incorporated into an m-commerce application in order to improve the presentation of product catalogue information on m-commerce storefronts. The motivation for selecting product catalogue is prompted by literature which indicates that improved presentation of information in m-commerce (and e-commerce) applications has a positive impact on usability of the websites. Usable m-commerce (and e-commerce) websites improve efficiency in consumer behaviour that impacts sales, profits and business growth. The context-aware model aimed at collecting context information within the user environment and utilising it to determine optimal retrieval and presentation of product catalogue in m-commerce. An integrated logical context sensor and Mathematical algorithms were implemented in the context-aware model. The integrated logical context sensor was responsible for the collection of different types of predetermined context information such as device specification or capabilities, connection bandwidth, location and time of the day as well as the user profile. The algorithms transformed the collected context information into usable formats and enabled optimal retrieval and presentation of product catalogue data on a specific mobile device. Open-source implementation tools were utilised to implement components of the model including: HTML5, PhP, JavaScript and MySQL database. The context-aware model was incorporated into an existing m-commerce application. Two user evaluation studies were conducted during the course of the research. The first evaluation was to evaluate the accuracy of information collected by the context sensor component of the model. This survey was conducted with a sample of 30 users from different countries across the world. In-between the context sensor and main evaluation surveys, a pilot study was conducted with a sample of 19 users with great experience in mobile application development and use from SAP Next Business and Technology, Africa. Finally an overall user evaluation study was conducted with a sample of 30 users from a remote area called Kgautswane in Limpopo Province, South Africa. The results obtained indicate that the context-aware model was able to determine accurate context information in real-time and effectively determine how much product information should be retrieved and how the information should be presented on a mobile device interface. Two main contributions emerged from the research, first the research contributed to the field of mobile Human Computer Interaction. During the research, techniques of evaluating and improving usability of mobile applications were demonstrated. Secondly, the research made a significant contribution to the upcoming field of context-aware computing. The research brought clarity with regard to context-aware computing which is lacking in existing, current research despite the field’s proven impact of improving usability of applications. Researchers can utilise contributions made in this research to develop further techniques and usable context-aware solutions.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "MOBILE COMPUTING MODEL"

1

Bagchi, Susmit. Ubiquitous multimedia and mobile agents: Models and implementations. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Braun, Peter. Mobile agents: Basic concepts, mobility models, and the Tracy toolkit. San Francisco, CA: Elsevier, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aman, Bogdan. Mobility in Process Calculi and Natural Computing. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Milner, R. Communicating and mobile systems: The [symbol for pi]-calculus. New York: Cambridge University Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

COORDINATION 2010 (2010 Amsterdam, Netherlands). Coordination models and languages: 12th international conference, COORDINATION 2010, Amsterdam, The Netherlands, June 7-9, 2010 : proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mobile Cloud Computing: Foundations and Service Models. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Dijiang, and Huijun Wu. Mobile Cloud Computing: Foundations and Service Models. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Communication Models in Mobile Computing Systems and Mobile Agents. Storming Media, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MOBILE COMPUTING MODEL"

1

Liang, Hongbin, Dijiang Huang, and Daiyuan Peng. "On Economic Mobile Cloud Computing Model." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 329–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29336-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Weijin, Yirong Jiang, Yang Wang, Jiahui Chen, Yuhui Xu, and Li’na Tan. "Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing." In Human Centered Computing, 169–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15127-0_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Cungang, and Chang N. Zhang. "A Privacy Enhanced Role-Based Access Control Model for Enterprises." In Networking and Mobile Computing, 1012–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Weijin, and Yuhui Xu. "Research on Mobile User Dynamic Trust Model Based on Mobile Agent System." In Human Centered Computing, 538–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74521-3_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patil, Rachana Yogesh, and Manjiri Arun Ranjanikar. "A New Network Forensic Investigation Process Model." In Mobile Computing and Sustainable Informatics, 139–46. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1866-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Wei, Yongtian Yang, and Shuqin Zhang. "A Computational Reputation Model in P2P Networks Based on Trust and Distrust." In Networking and Mobile Computing, 501–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Madria, Sanjay Kumar, Mukesh Mohania, and John F. Roddick. "Approximate Query Processing Model for Mobile Computing." In Information Organization and Databases, 207–19. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-1379-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Wei-Jin, Jia-Hui Chen, Yu-Hui Xu, and Yang Wang. "Mobile Agent-Based Mobile Intelligent Business Security Transaction Model." In Computer Supported Cooperative Work and Social Computing, 50–65. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3044-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Xian, and Yupo Chan. "Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model." In Networking and Mobile Computing, 314–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Komiya, Takao, and Makoto Takizawa. "Mobile Agent Model for Fault-Tolerant Objects Systems." In Cooperative Internet Computing, 22–36. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0435-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MOBILE COMPUTING MODEL"

1

du Toit, Jaco, and Ian Ellefsen. "A model for secure mobile computing." In 2015 Science and Information Conference (SAI). IEEE, 2015. http://dx.doi.org/10.1109/sai.2015.7237299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Qing, and Yulei Huang. "A Cost-effective Mobile Edge Computing Model." In Proceedings of the 2018 2nd International Conference on Economic Development and Education Management (ICEDEM 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icedem-18.2018.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zeroual, Abdelhakim, Mohamed Amroune, Makhlouf Derdour, Abdallah Meraoumia, and Atef Bentahar. "Deep authentication model in Mobile Cloud Computing." In 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE, 2018. http://dx.doi.org/10.1109/pais.2018.8598508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ennya, Zainab, Moulay Youssef Hadi, and Amine Abouaomar. "Computing Tasks Distribution in Fog Computing: Coalition Game Model." In 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, 2018. http://dx.doi.org/10.1109/wincom.2018.8629587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bondarchuk, Aleksandr P., Pavel V. Abramov, Svetlana M. Bogdanova, and Denis M. Filatov. "Mobile Robot Model Predictive Control Model." In 2022 XXV International Conference on Soft Computing and Measurements (SCM). IEEE, 2022. http://dx.doi.org/10.1109/scm55405.2022.9794835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Belli, Dimitri, Stefano Chessa, Luca Foschini, and Michele Girolami. "Enhancing Mobile Edge Computing Architecture with Human-Driven Edge Computing Model." In 2018 14th International Conference on Intelligent Environments (IE). IEEE, 2018. http://dx.doi.org/10.1109/ie.2018.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu Wu. "A distributed trust model for mobile computing environments." In 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icicisys.2010.5658581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiaodong Zhang, Dianhui Chu, and Yongdong Xu. "Design and research on mobile computing service model." In 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suh, Wonho. "Graphical Analysis of Mobile Computing Traffic Simulation Model." In 2013 International Conference on IT Convergence and Security (ICITCS). IEEE, 2013. http://dx.doi.org/10.1109/icitcs.2013.6717839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Changxu, Na Jiang, and Libao Chen. "Dynamic model distributing optimization for Mobile Edge Computing." In 2021 International Conference on Computers and Automation (CompAuto). IEEE, 2021. http://dx.doi.org/10.1109/compauto54408.2021.00012.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "MOBILE COMPUTING MODEL"

1

Tkachuk, Viktoriia V., Vadym P. Shchokin, and Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2668.

Full text
Abstract:
Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
APA, Harvard, Vancouver, ISO, and other styles
2

Corum, Zachary, Ethan Cheng, Stanford Gibson, and Travis Dahl. Optimization of reach-scale gravel nourishment on the Green River below Howard Hanson Dam, King County, Washington. Engineer Research and Development Center (U.S.), April 2022. http://dx.doi.org/10.21079/11681/43887.

Full text
Abstract:
The US Army Corps of Engineers, Seattle District, nourishes gravel downstream of Howard Hanson Dam (HHD) on the Green River in Washington State. The study team developed numerical models to support the ongoing salmonid habitat improvement mission downstream of HHD. Recent advancements in computing and numerical modeling software make long-term simulations in steep, gravel, cobble, and boulder river environments cost effective. The team calibrated mobile-bed, sediment-transport models for the pre-dam and post-dam periods. The modeling explored geomorphic responses to flow and sediment regime changes associated with HHD construction and operation. The team found that pre-dam conditions were significantly more dynamic than post-dam conditions and may have had lower spawning habitat quality in the project vicinity. The team applied the Bank Stability and Toe Erosion Model to the site and then calibrated to the post-dam gravel augmentation period. The team implemented a new hiding routine in HEC-RAS that improved the simulated grain size trends but underestimated coarse sediment transport. Models without the hiding function overestimated grain size but matched bed elevations and mass flux very well. Decade-long simulations of four future gravel nourishment conditions showed continued sediment storage in the reach. The storage rate was sensitive to nourishment mass and grain size.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography