Дисертації з теми "Mobile fog computing"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Mobile fog computing.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Mobile fog computing".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Mebrek, Adila. "Fog Computing pour l’Internet des objets." Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.

Повний текст джерела
Анотація:
Le Fog Computing constitue une approche prometteuse dans le contexte de l’Internet des Objets (IoT) car il fournit des fonctionnalités et des ressources à l’extrémité du réseau, plus près des utilisateurs finaux. Cette thèse étudie les performances du Fog Computing dans le cadre des applications IoT sensibles à la latence. La première problématique traitée concerne la modélisation mathématique d’un système IoT-fog-cloud, ainsi que les métriques de performances du système en termes d’énergie consommée et de latence. Cette modélisation nous permettra par la suite de proposer diverses stratégies efficaces de distribution de contenu et d’allocation des ressources dans le fog et le cloud. La deuxième problématique abordée dans cette thèse concerne la distribution de contenu et de données des objets dans des systèmes fog/cloud. Afin d’optimiser simultanément les décisions d’offloading et d’allocation des ressources du système, nous distinguons entre deux types d’applications IoT : (1) applications IoT à contenu statique ou avec des mises à jour peu fréquentes ; et (2) applications IoT à contenu dynamique. Pour chaque type d’application, nous étudions le problème d’offloading de requêtes IoT dans le fog. Nous nous concentrons sur les problèmes d'équilibrage de charge afin de minimiser la latence et l’énergie totale consommée par le système
Fog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Peraccini, Simone. "Named Data Networking for Computing in the Mobile Edge." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17059/.

Повний текст джерела
Анотація:
Oggi connettersi a Internet è una pratica di uso comune, destinata a crescere notevolmente con l'avvento dell'Internet of Things. Nonostante il grande successo, Internet presenta diversi limiti architetturali che lo rendono un veicolo povero in confronto alla grande mole di contenuti trasmessi. La seconda importante limitazione riguarda la sicurezza che è applicata solamente a livello di host ma non di contenuto. Per promuovere la prototipizzazione di nuovi paradigmi architetturali, nel 2010 la National Science Fondation crea il programma Future Internet Architecture. Tra i progetti nati, il più emergente è Named Data Networking(NDN). Il suo intento è quello di distogliere l'attenzione da "dove" trovare una risorsa per concentrarsi su "cosa" applicazioni e utenti cerchino. Per questo NDN pensa che l'identificazione non debba più riguardare gli host ma i contenuti. Quest'ultimi sono distinti da un nome univoco, godono di immutabilità e racchiudono la strategia di sicurezza. L'obiettivo di questo progetto è quello di dare un piccolo contributo a Named Data Networking, ideando e sviluppando un protocollo di computazione cooperativa, che operi per mezzo del protocollo NDN. L'intento del protocollo è quello di permettere a generici dispositivi wifi di assegnare l'esecuzione di alcuni dei loro task ad un nodo nelle vicinanze. Inoltre, la tesi accenna come il protocollo si inserisca nel tema dell'Edge computing, che assieme al Fog computing pone le basi per l'evoluzione dell'architettura Cloud. Il lavoro ha portato alla realizzazione di un prototipo del protocollo che è possibile installare sui nodi del simulatore di reti ndnSIM. Esso soddisfa i comportamenti base richiesti ed offre buone prestazioni negli scenari statici. L'elaborato si conclude con alcuni test che ne confermano il corretto funzionamento ma allo stesso tempo denotano alcuni aspetti da migliorare negli sviluppi futuri.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Segura, Danilo Costa Marim. "Integrando grades móveis em uma arquitetura orientada a serviços." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-13122016-095843/.

Повний текст джерела
Анотація:
O aumento no número de dispositivos móveis, como smartphones, tablets e laptops, e o avanço em seu potencial computacional permitiu considerá-los como recursos computacionais. O uso de recursos computacionais com maior proximidade vem crescendo ano após ano, sendo chamado de Fog computing, em que os elementos na borda da Internet são explorados, uma vez que os serviços computacionais convencionais podem estar indisponíveis ou sobrecarregados. Dessa forma, este projeto de Mestrado tem como foco possibilitar o uso de dispositivos móveis no provimento de serviços computacionais entre si de forma colaborativa através da heurística Maximum Regret adaptada, que busca alocar tarefas computacionais em dispositivos locais de forma a minimizar o consumo de energia e evitar dispositivos não confiáveis. Também há uma meta-heurística em um nível global, que interconecta os diferentes aglomerados de dispositivos móveis na borda da Internet, e possui informações globais de Quality of Service (QoS). Foram realizados experimentos que mostraram que evitar dispositivos móveis como recursos com um baixo grau de confiabilidade possibilitou diminuir o impacto no consumo de energia, além de ser possível diminuir os tempos de resposta e de comunicação ao ajustar a política de seleção de aglomerados externos.
The increasing number of mobile devices, such as smartphones, tablets and laptops, as well as advances in their computing power have enabled us to consider them as resources, exploring the proximity. The use of near computing resources is growing year by year, being called as Fog computing, where the elements on the edge of the Internet are exploited, once the computer services providers could be unavailable or overloaded. Thus, this Masters project focuses on using mobile devices to provide computing services among them through a heuristic called Adapted Maximum Regret, which tries to minimize energy consumption and avoid untrustable devices. There is also top-level metaheuristic which interconnects different clusters of devices on the edge of the Internet with global information to guarantee Quality of Services (QoS). We conducted a set of experiments that showed us to avoid devices with a high degree of failures to save more energy when allocating tasks among them, as well as decreasing the applications response time and communication through adjusts in the selection algorithm of external agglomerates.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Abdul, Rehman Bin Omer. "Mobile Edge Computing Clustering Algorithms for Pedestrian Mobility Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Знайти повний текст джерела
Анотація:
The purpose of this study is to provide a general framework for the latest trends of mobile network architectures. Edge computing brings the computing capability of the cloud to the edge of the network for minimizing the latency. In the D2D mode, Fog Nodes interact with each other. With the help of clustering, Fog nodes are categorized into two types: Fog Cluster Head (FCH) and Fog Cluster Member (FCM). In each cluster, FCMs offload the task towards their respective FCHs for computation. The characterization of the performance of system model taking into account the average energy consumption, average task delay, fairness, and packet loss. We provide results based on the numerical simulation performed in Matlab in order to show the difference in the performance of the network using different policies and clustering and cluster update frequencies. In this thesis, a theoretic framework is presented that aims to characterize the performance of Fog network with pedestrian mobility without priority approach and also pedestrian mobility with priority approach using clustering approach and compare the results. The simulation results show how the priority approach has the profound impact on the energy consumption, task delay, and packet loss and solve the problem of coverage constraint.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Guardo, Ermanno Lorenzo. "Edge Computing: challenges, solutions and architectures arising from the integration of Cloud Computing with Internet of Things." Doctoral thesis, Università di Catania, 2018. http://hdl.handle.net/10761/3908.

Повний текст джерела
Анотація:
The rapid spread of the Internet of Things (IoT) is causing the exponential growth of objects connected to the network, in fact, according to estimates, in 2020 there will be about 3/4 devices per person totaling of over 20 billion connected devices. Therefore, the use of content that requires intensive bandwidth consumption is growing. In order to meet these growing needs, the computing power and storage space are transferred to the network edge to reduce the network latency and increase the bandwidth availability. Edge computing allows to approach high-bandwidth content and sensitive apps to the user or data source and is preferred to use it for many IoT applications respect to cloud computing. Its distributed approach addresses the needs of IoT and industrial IoT, as well as the immense amount of data generated by smart sensors and IoT devices, which would be costly and time-consuming to send to the cloud for processing and analysis. Edge computing reduces both the bandwidth needed and the communication among sensors and cloud, which can negatively affect the IoT performance. The goal of edge computing is to improve efficiency and reduce the amount of data transported to the cloud for processing, analysis and storage. The research activity carried out during the three years of the Ph.D. program focused on the study, design and development of architectures and prototypes based on the Edge Computing in various contexts such as smart cities and agriculture. Therefore, the well-known paradigms of Fog Computing and Mobile Edge Computing have been faced. In this thesis, will be discussed the work carried out through the exploitation of the Fog Computing and Mobile Edge Computing paradigms, considered suitable solutions to address the challenges of the fourth industrial revolution.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Singh, Navjot. "Planning of Mobile Edge Computing Resources in 5G Based on Uplink Energy Efficiency." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38444.

Повний текст джерела
Анотація:
Increasing number of devices demand for low latency and high-speed data transmission require that the computation resources to be closer to users. The emerging Mobile Edge Computing (MEC) technology aims to bring the advantages of cloud computing which are computation, storage and networking capabilities in close proximity of user. MEC servers are also integrated with cloud servers which give them flexibility of reaching vast computational power whenever needed. In this thesis, leveraging the idea of Mobile Edge Computing, we propose algorithms for cost-efficient and energy-efficient the placement of Mobile Edge nodes. We focus on uplink energy-efficiency which is essential for certain applications including augmented reality and connected vehicles, as well as extending battery life of user equipment that is favorable for all applications. The experimental results show that our proposed schemes significantly reduce the uplink energy of devices and minimizes the number of edge nodes required in the network.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Solimando, Michele. "Infrastrutture basate su Edge Computing per Supporto a Servizi Mobili in Ambienti Ostili." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/11331/.

Повний текст джерела
Анотація:
Questa tesi è incentrata sulla revisione del classico modello di infrastruttura Cloud. Le motivazioni sono da ricercare nelle condizioni operative reali della maggior parte dei dispositivi connessi alla rete attualmente. Si parla di ambiente ostile riferendosi a network popolate da molti dispositivi dalle limitate caratteristiche tecniche e spesso collegati con canali radio, molto più instabili delle connessioni cablate. Allo scenario va ad aggiungersi la necessità crescente di mobilità che limita ulteriormente i vantaggi derivanti dall'utilizzo dell’infrastruttura Cloud originale. La trattazione propone il modello Edge come estensione del Cloud. Esso ne amplia il ventaglio di utilizzo, favorendo aree di applicazione che stanno acquisendo maggiore influenza negli ultimi periodi e che richiedono una revisione delle vecchie infrastrutture Cloud, dettata dalle caratteristiche stringenti che necessitano per un'operatività soddisfacente.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Badokhon, Alaa. "An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1492450137643915.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

CONCONE, Federico. "EFFICIENT AND SECURE ALGORITHMS FOR MOBILE CROWDSENSING THROUGH PERSONAL SMART DEVICES." Doctoral thesis, Università degli Studi di Palermo, 2021. http://hdl.handle.net/10447/481969.

Повний текст джерела
Анотація:
The success of the modern pervasive sensing strategies, such as the Social Sensing, strongly depends on the diffusion of smart mobile devices. Smartwatches, smart- phones, and tablets are devices capable of capturing and analyzing data about the user’s context, and can be exploited to infer high-level knowledge about the user himself, and/or the surrounding environment. In this sense, one of the most relevant applications of the Social Sensing paradigm concerns distributed Human Activity Recognition (HAR) in scenarios ranging from health care to urban mobility management, ambient intelligence, and assisted living. Even though some simple HAR techniques can be directly implemented on mo- bile devices, in some cases, such as when complex activities need to be analyzed timely, users’ smart devices should be able to operate as part of a more complex architecture, paving the way to the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis to- wards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. This logic represents the main core of the fog computing paradigm, and this thesis investigates its adoption in distributed sensing frameworks. Specifically, the conducted analysis focused on the design of a novel distributed HAR framework in which the heavy computation from the sensing layer is moved to intermediate devices and then to the cloud. Smart personal devices are used as processing units in order to guarantee real-time recognition, whereas the cloud is responsible for maintaining an overall, consistent view of the whole activity set. As compared to traditional cloud-based solutions, this choice allows to overcome processing and storage limitations of wearable devices while also reducing the overall bandwidth consumption. Then, the fog-based architecture allowed the design and definition of a novel HAR technique that combines three machine learning algorithms, namely k-means clustering, Support Vector Machines (SVMs), and Hidden Markov Models (HMMs), to recognize complex activities modeled as sequences of simple micro- activities. The capability to distribute the computation over the different entities in the network, allowing the use of complex HAR algorithms, is definitely one of the most significant advantages provided by the fog architecture. However, because both of its intrinsic nature and high degree of modularity, the fog-based system is particularly prone to cyber security attacks that can be performed against every element of the infrastructure. This aspect plays a main role with respect to social sensing since the users’ private data must be preserved from malicious purposes. Security issues are generally addressed by introducing cryptographic mechanisms that improve the system defenses against cyber attackers while, at the same time, causing an increase of the computational overhead for devices with limited resources. With the goal to find a trade-off between security and computation cost, the de- sign and definition of a secure lightweight protocol for social-based applications are discussed and then integrated into the distributed framework. The protocol covers all tasks commonly required by a general fog-based crowdsensing application, making it applicable not only in a distributed HAR scenario, discussed as a case study, but also in other application contexts. Experimental analysis aims to assess the performance of the solutions described so far. After highlighting the benefits the distributed HAR framework might bring in smart environments, an evaluation in terms of both recognition accuracy and complexity of data exchanged between network devices is conducted. Then, the effectiveness of the secure protocol is demonstrated by showing the low impact it causes on the total computational overhead. Moreover, a comparison with other state-of-art protocols is made to prove its effectiveness in terms of the provided security mechanisms.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Houacine, Fatiha. "Service-Oriented Architecture for the Mobile Cloud Computing." Thesis, Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1110/document.

Повний текст джерела
Анотація:
La croissance des appareils connectés, principalement due au grand nombre de déploiements de l'internet des objets et à l'émergence des services de cloud mobile, introduit de nouveaux défis pour la conception d'architectures de services dans le Cloud Computing Mobile (CCM) du cloud computing mobile. Nous montrons dans cette thèse comment l'architecture orientée services SOA peut être une solution clé pour fournir des services cloud mobiles distribués et comment la plate-forme OSGi peut être un cadre adaptatif et efficace pour fournir une telle implémentation. Nous adaptons le cadre CCM proposé à différents contextes d'architecture. Le premier est un modèle centré traditionnel, où les appareils mobiles sont réduits à consommer des services. Le second est un modèle distribué où la puissance de l'interaction de mobile à mobile offre des opportunités illimitées de services de valeur, et enfin, l'architecture à trois niveaux est considérée avec l'introduction de la notion de cloudlet. Pour chaque contexte, nous explorons la performance de notre cadre axé sur le service et le comparons à d'autres solutions existantes
The growth of connected devices, mostly due to the large number of internet of things IoT deployments and the emergence of mobile cloud services, introduces new challenges for the design of service architectures in mobile cloud computing MCC. An MCC framework should provide elasticity and scalability in a distributed and dynamic way while dealing with limited environment resources and variable mobile contexts web applications, real-time, enterprise services, mobile to mobile, hostile environment, etc. that may include additional constraints impacting the design foundation of cloud services. We show in this thesis how service-oriented architecture SOA can be a key solution to provide distributed mobile cloud services and how OSGi platform can be an adaptive and efficient framework to provide such implementation. We adapt the proposed MCC framework to different architecture contexts. The first one is a traditional centric model, where mobile devices are reduced to consuming services. The second one is a distributed model where the power of mobile-to-mobile interaction offers unlimited value-services opportunities, and finally, three-tier architecture is considered with the introduction of the cloudlet notion. For each context, we explore the performance of our service-oriented framework, and contrast it with alternative existing solutions
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Pope, Steven Leslie. "Application support for mobile computing." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627051.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Phanse, Vivek 1974. "Enabling technology for mobile computing." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9034.

Повний текст джерела
Анотація:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Materials Science and Engineering; and, (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.
Includes bibliographical references (p. 75).
A strategic, technical, and organizational examination of the customer enabling effort at Intel Corporation was undertaken. The context of this study was the launch of the first boxed mobile processor in the company's history. The technical component of the work consisted of the design and development of a thermal solution to complement the boxed processor. The organizational component involved an examination of the way the team was structured to execute the project. The strategic component looked at the effect of the enabling effort on the mobile computing industry at large. Thermal solutions that met the technical specifications of the boxed mobile processor were successfully designed and prototyped. The implication of a specific thermal solution design on the level of standardization of the notebook computer platform is discussed. The conclusion is that the level of standardization in the industry is already high and is unlikely to be influenced by the boxed mobile processor. Tactics for organizational structure design are suggested for future project staffing.
by Vivek Phanse.
S.M.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Chan, Ka Chun. "A dual channel location estimation system for mobile computing." HKBU Institutional Repository, 2003. http://repository.hkbu.edu.hk/etd_ra/445.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Oh, Sangyoon. "Web service architecture for mobile computing." [Bloomington, Ind.] : Indiana University, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3229598.

Повний текст джерела
Анотація:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2006.
"Title from dissertation home page (viewed July 11, 2007)." Source: Dissertation Abstracts International, Volume: 67-08, Section: B, page: 4529. Adviser: Geoffrey C. Fox.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Wagealla, Waleed. "Reliable mobile agents for distributed computing." Thesis, Nottingham Trent University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272441.

Повний текст джерела
Анотація:
The emergence of platform-independent, mobile code technologies has created big opportunities for Internet-based applications. Mobile agents are being utilized to perform a variety of tasks from personalized computing to business-critical transactions. Unfortunately, these advances were not matched by correspondent research into the reliability of these new technologies. This work has been undertaken to investigate the faulttolerance of this new paradigm. Agent programs' mobility and autonomy of execution has introduced a new class of failures different to that of traditional distributed systems. Therefore, fault tolerance is one of the main problems that must be resolved to improve the adoption of an agents' paradigm. The investigation of mobile agents reliability in this thesis resulted in the development of REMA (REliable Mobile Agents), which guarantees the reliable execution, migration, and communication of mobile agents in the presence of faults that might affect the agents hosts or their communication network. We introduced an algorithm for the transparent detection of faults that might affect agent execution, migration, and communication. A decentralized structure was used to divide the agent dynamic distributed system into network-partitioning proof spaces. Lightweight messaging was adopted as the basic error detection engine, which together with the loosely coupled detection managers provided an efficient, low overhead detection mechanism for agent-based distributed processing. The problem of taking checkpoint of agent execution is hampered by the lack of the accessibility of the underlying structure of the JVM. Thus, an alternative solution has been achieved through the REMA Checkpoint and Recovery (REMA-CR) package. REMA-CR provides the developer with powerful classes and methods that allow for capturing the critical data of agents' execution. The developed recovery protocol offers a communication-pairs, independent checkpointing strategy at a low-cost, that covers all possible faults that might invalidate reliable agent execution, migration and communication and maintains the exactly once execution property. The results and the performance of REMA confirmed our objectives of providing a fault tolerant wrapper for agents and their applications with acceptable overhead cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Rusanova, Olga, Alexander Korochkin, and Oleg Shevelo. "Scheduling problems for mobile cloud computing." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50689.

Повний текст джерела
Анотація:
Nowadays the popularity of mobile devices is rapidly increased. New facilities of them (Wi-Fi, GPS, high speed processors etc.) allows to improve mobile applications in commerce, learning, gaming, health monitoring, sports etc. But really there are several reasons that limit mobile computing: limited storage capacity, limited battery life and limited processing power of mobile devices. This paper is dedicated to Mobile cloud computing (MCC). We consider MCC as combination of mobile and cloud computing where both data storage and data processing are performed outside the mobile device but inside the cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Ha, Kiryong. "System Infrastructure for Mobile-Cloud Convergence." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/704.

Повний текст джерела
Анотація:
The convergence of mobile computing and cloud computing enables new mobile applications that are both resource-intensive and interactive. For these applications, end-to-end network bandwidth and latency matter greatly when cloud resources are used to augment the computational power and battery life of a mobile device. This dissertation designs and implements a new architectural element called a cloudlet, that arises from the convergence of mobile computing and cloud computing. Cloudlets represent the middle tier of a 3-tier hierarchy, mobile device — cloudlet—cloud, to achieve the right balance between cloud consolidation and network responsiveness. We first present quantitative evidence that shows cloud location can affect the performance of mobile applications and cloud consolidation. We then describe an architectural solution using cloudlets that are a seamless extension of todays cloud computing infrastructure. Finally, we define minimal functionalities that cloudlets must offer above/beyond standard cloud computing, and address corresponding technical challenges.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

林偉業 and Wai-yip Vincent Lum. "Effective content adaptation strategies for mobile computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31226450.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Lum, Wai-yip Vincent. "Effective content adaptation strategies for mobile computing /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B25151265.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Thomas, Godwin Dogara Ayenajeh. "A framework for secure mobile computing in healthcare." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/618.

Повний текст джерела
Анотація:
Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Sylverberg, Tomas. "A Framework for Mobile Paper-based Computing." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8415.

Повний текст джерела
Анотація:

Military work-practice is a difficult area of research where paper-based approaches are still extended. This thesis proposes a solution which permits the digitalization of information at the same time as workpractice remains unaltered for soldiers working with maps in the field. For this purpose, a mobile interactive paper-based platform has been developed which permits the users to maintain their current work-flow. The premise of the solution parts from a system consisting of a prepared paper-map, a cellular phone, a desktop computer, and a digital pen with bluetooth connection. The underlying idea is to permit soldiers to take advantage of the information a computerized system can offer, at the same time as the overhead it incurs is minimized. On one hand this implies that the solution must be light-weight, on the other it must retain current working procedures as far as possible. The desktop computer is used to develop new paper-driven applications through the application provided in the development framework, thus allowing the tailoring of applications to the changing needs of military operations. One major component in the application suite is a symbol recognizer which is capable of recognizing symbols parting from a template which can be created in one of the applications. This component permits the digitalization of information in the battlefield by drawing on the paper-map. The proposed solution has been found to be viable, but still there is a need for further development. Furthermore, there is a need to adapt the existing hardware to the requirements of the military to make it usable in a real-world situation.

Стилі APA, Harvard, Vancouver, ISO та ін.
22

Bridle, Robert Angus, and robert bridle@gmail com. "Adaptive User Interfaces for Mobile Computing Devices." The Australian National University. College of Engineering and Computer Sciences, 2008. http://thesis.anu.edu.au./public/adt-ANU20081117.184430.

Повний текст джерела
Анотація:
This thesis examines the use of adaptive user interface elements on a mobile phone and presents two adaptive user interface approaches. The approaches attempt to increase the efficiency with which a user interacts with a mobile phone, while ensuring the interface remains predictable to a user. ¶ An adaptive user interface approach is presented that predicts the menu item a user will select. When a menu is opened, the predicted menu item is highlighted instead of the top-most menu item. The aim is to maintain the layout of the menu and to save the user from performing scrolling key presses. A machine learning approach is used to accomplish the prediction task. However, learning in the mobile phone environment produces several difficulties. These are limited availability of training examples, concept drift and limited computational resources. A novel learning approach is presented that addresses these difficulties. This learning approach addresses limited training examples and limited computational resources by employing a highly restricted hypothesis space. Furthermore, the approach addresses concept drift by determining the hypothesis that has been consistent for the longest run of training examples into the past. Under certain concept drift restrictions, an analysis of this approach shows it to be superior to approaches that use a fixed window of training examples. An experimental evaluation on data collected from several users interacting with a mobile phone was used to assess this learning approach in practice. The results of this evaluation are reported in terms of the average number of key presses saved. The benefit of menu-item prediction can clearly be seen, with savings of up to three key presses on every menu interaction. ¶ An extension of the menu-item prediction approach is presented that removes the need to manually specify a restricted hypothesis space. The approach uses a decision-tree learner to generate hypotheses online and uses the minimum description length principle to identify the occurrence of concept shifts. The identification of concept shifts is used to guide the hypothesis generation process. The approach is compared with the original menu-item prediction approach in which hypotheses are manually specified. Experimental results using the same datasets are reported. ¶ Another adaptive user interface approach is presented that induces shortcuts on a mobile phone interface. The approach is based on identifying shortcuts in the form of macros, which can automate a sequence of actions. A means of specifying relevant action sequences is presented, together with several learning approaches for predicting which shortcut to present to a user. A small subset of the possible shortcuts on a mobile phone was considered. This subset consisted of shortcuts that automated the actions of making a phone call or sending a text message. The results of an experimental evaluation of the shortcut prediction approaches are presented. The shortcut prediction process was evaluated in terms of predictive accuracy and stability, where stability was defined as the rate at which predicted shortcuts changed over time. The importance of stability is discussed, and is used to question the advantages of using sophisticated learning approaches for achieving adaptive user interfaces on mobile phones. Finally, several methods for combining accuracy and stability measures are presented, and the learning approaches are compared with these methods.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Wei, Jian. "Hybrid mobile computing for connected autonomous vehicles." Thesis, Aston University, 2018. http://publications.aston.ac.uk/37533/.

Повний текст джерела
Анотація:
With increasing urbanization and the number of cars on road, there are many global issues on modern transport systems. Autonomous driving and connected vehicles are the most promising technologies to tackle these issues. The so-called integrated technology connected autonomous vehicles (CAV) can provide a wide range of safety applications for safer, greener and more efficient intelligent transport systems (ITS). As computing is an extreme component for CAV systems, various mobile computing models including mobile local computing, mobile edge computing and mobile cloud computing are proposed. However it is believed that none of these models fits all CAV applications, which have highly diverse quality of service (QoS) requirements such as communication delay, data rate, accuracy, reliability and/or computing latency. In this thesis, we are motivated to propose a hybrid mobile computing model with objective of overcoming limitations of individual models and maximizing the performances for CAV applications. In proposed hybrid mobile computing model three basic computing models and/or their combinations are chosen and applied to different CAV applications, which include mobile local computing, mobile edge computing and mobile cloud computing. Different computing models and their combinations are selected according to the QoS requirements of the CAV applications. Following the idea, we first investigate the job offloading and allocation of computing and communication resources at the local hosts and external computing centers with QoS aware and resource awareness. Distributed admission control and resource allocation algorithms are proposed including two baseline non-cooperative algorithms and a matching theory based cooperative algorithm. Experiment results demonstrate the feasibility of the hybrid mobile computing model and show large improvement on the service quality and capacity over existing individual computing models. The matching algorithm also largely outperforms the baseline non-cooperative algorithms. In addition, two specific use cases of the hybrid mobile computing for CAV applications are investigated: object detection with mobile local computing where only local computing resources are used, and movie recommendation with mobile cloud computing where remote cloud resources are used. For object detection, we focus on the challenges of detecting vehicles, pedestrians and cyclists in driving environment and propose three methods to an existing CNN based object detector. Large detection performance improvement is obtained over the KITTI benchmark test dataset. For movie recommendation we propose two recommendation models based on a general framework of integrating machine learning and collaborative filtering approach. The experiment results on Netflix movie dataset show that our models are very effective for cold start items recommendation.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Vieira, André Fonseca dos Santos Dias. "Context-aware personalization environment for mobile computing." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8649.

Повний текст джерела
Анотація:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Currently, we live in a world where the amount of on-line information vastly outstrips any individual’s capability to survey it. Filtering that information in order to obtain only useful and interesting information is a solution to this problem. The mobile computing area proposes to integrate computation in users’ daily activities in an unobtrusive way, in order to guarantee an improvement in their experience and quality of life. Furthermore, it is crucial to develop smaller and more intelligent devices to achieve this area’s goals, such as mobility and energy savings. This computing area reinforces the necessity to filter information towards personalization due to its humancentred paradigm. In order to attend to this personalization necessity, it is desired to have a solution that is able to learn the users preferences and needs, resulting in the generation of profiles that represent each style of interaction between a user and an application’s resources(e.g. buttons and menus). Those profiles can be obtained by using machine learning algorithms that use data derived from the user interaction with the application, combined with context data and explicit user preferences. This work proposes an environment with a generic context-aware personalization model and a machine learning module. It is provided the possibility to personalize an application, based on user profiles obtained from data, collected from implicit and explicit user interaction. Using a provided personalization API (Application Programming Interface) and other configuration modules, the environment was tested on LEY (Less energy Empowers You), a persuasive mobile-based serious game to help people understand domestic energy usage.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Moran, Kevin Patrick. "Automating Software Development for Mobile Computing Platforms." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153845.

Повний текст джерела
Анотація:
Mobile devices such as smartphones and tablets have become ubiquitous in today's computing landscape. These devices have ushered in entirely new populations of users, and mobile operating systems are now outpacing more traditional "desktop" systems in terms of market share. The applications that run on these mobile devices (often referred to as "apps") have become a primary means of computing for millions of users and, as such, have garnered immense developer interest. These apps allow for unique, personal software experiences through touch-based UIs and a complex assortment of sensors. However, designing and implementing high quality mobile apps can be a difficult process. This is primarily due to challenges unique to mobile development including change-prone APIs and platform fragmentation, just to name a few. in this dissertation we develop techniques that aid developers in overcoming these challenges by automating and improving current software design and testing practices for mobile apps. More specifically, we first introduce a technique, called Gvt, that improves the quality of graphical user interfaces (GUIs) for mobile apps by automatically detecting instances where a GUI was not implemented to its intended specifications. Gvt does this by constructing hierarchal models of mobile GUIs from metadata associated with both graphical mock-ups (i.e., created by designers using photo-editing software) and running instances of the GUI from the corresponding implementation. Second, we develop an approach that completely automates prototyping of GUIs for mobile apps. This approach, called ReDraw, is able to transform an image of a mobile app GUI into runnable code by detecting discrete GUI-components using computer vision techniques, classifying these components into proper functional categories (e.g., button, dropdown menu) using a Convolutional Neural Network (CNN), and assembling these components into realistic code. Finally, we design a novel approach for automated testing of mobile apps, called CrashScope, that explores a given android app using systematic input generation with the intrinsic goal of triggering crashes. The GUI-based input generation engine is driven by a combination of static and dynamic analyses that create a model of an app's GUI and targets common, empirically derived root causes of crashes in android apps. We illustrate that the techniques presented in this dissertation represent significant advancements in mobile development processes through a series of empirical investigations, user studies, and industrial case studies that demonstrate the effectiveness of these approaches and the benefit they provide developers.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Tang, Yutao. "Exploring New Paradigms for Mobile Edge Computing." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550154000.

Повний текст джерела
Анотація:
Edge computing has been rapidly growing in recent years to meet the surging demands from mobile apps and Internet of Things (IoT). Similar to the Cloud, edge computing provides computation, storage, data, and application services to the end-users. However, edge computing is usually deployed at the edge of the network, which can provide low-latency and high-bandwidth services for end devices. So far, edge computing is still not widely adopted. One significant challenge is that the edge computing environment is usually heterogeneous, involving various operating systems and platforms, which complicates app development and maintenance. in this dissertation, we explore to combine edge computing with virtualization techniques to provide a homogeneous environment, where edge nodes and end devices run exactly the same operating system. We develop three systems based on the homogeneous edge computing environment to improve the security and usability of end-device applications. First, we introduce vTrust, a new mobile Trusted Execution Environment (TEE), which offloads the general execution and storage of a mobile app to a nearby edge node and secures the I/O between the edge node and the mobile device with the aid of a trusted hypervisor on the mobile device. Specifically, vTrust establishes an encrypted I/O channel between the local hypervisor and the edge node, such that any sensitive data flowing through the hosted mobile OS is encrypted. Second, we present MobiPlay, a record-and-replay tool for mobile app testing. By collaborating a mobile phone with an edge node, MobiPlay can effectively record and replay all types of input data on the mobile phone without modifying the mobile operating system. to do so, MobiPlay runs the to-be-tested application on the edge node under exactly the same environment as the mobile device and allows the tester to operate the application on a mobile device. Last, we propose vRent, a new mechanism to leverage smartphone resources as edge node based on Xen virtualization and MiniOS. vRent aims to mitigate the shortage of available edge nodes. vRent enforces isolation and security by making the users' android OSes as Guest OSes and rents the resources to a third-party in the form of MiniOSes.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Bridle, Robert Angus. "Adaptive user interfaces for mobile computing devices /." View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081117.184430/index.html.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Shi, Cong. "Addressing connectivity challenges for mobile computing and communication." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52252.

Повний текст джерела
Анотація:
Mobile devices are increasingly being relied on for computation intensive and/or communication intensive applications that go beyond simple connectivity and demand more complex processing. This has been made possible by two trends. First, mobile devices, such as smartphones and tablets, are increasingly capable devices with processing and storage capabilities that make significant step improvements with every generation. Second, many improved connectivity options (e.g., 3G, WiFi, Bluetooth) are also available to mobile devices. In the rich computing and communication environment, it is promising but also challenging for mobile devices to take advantage of various available resources to improve the performance of mobile applications. First, with varying connectivity, remote computing resources are not always accessible to mobile devices in a predictable way. Second, given the uncertainty of connectivity and computing resources, their contention will become severe. This thesis seeks to address the connectivity challenges for mobile computing and communication. We propose a set of techniques and systems that help mobile applications to better handle the varying network connectivity in the utilization of various computation and communication resources. This thesis makes the following contributions: We design and implement Serendipity to allow a mobile device to use other encountered, albeit intermittently, mobile devices to speedup the execution of parallel applications through carefully allocating computation tasks among intermittently connected mobile devices. We design and implement IC-Cloud to enable a group of mobile devices to efficiently use the cloud computing resources for computation offloading even when the connectivity is varying or intermittent. We design and implement COSMOS to provide scalable computation offloading service to mobile devices at low cost by efficiently managing and allocating cloud computing resources. We design and implement CoAST to allow collaborative application-aware scheduling of mobile traffic to reduce the contention for bandwidth among communication-intensive applications without affecting their user experience.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Brander, William. "A model for adaptive multimodal mobile notification." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/699.

Повний текст джерела
Анотація:
Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Ma, Ka-kui, and 馬家駒. "Lightweight task mobility support for elastic cloud computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47869513.

Повний текст джерела
Анотація:
Cloud computing becomes popular nowadays. It allows applications to use the enormous resources in the clouds. With the combination of mobile computing, mobile cloud computing is evolved. With the use of clouds, mobile applications can offload tasks to clouds in client-server model. For cloud computing, migration is an important function for supporting elasticity. Lightweight and portable task migration support allows better resource utilization and data access locality, which are essentials for the success of cloud computing. Various migration techniques are available, such as process migration, thread migration, and virtual machine live migration. However, for these existing migration techniques, migrations are too coarse-grained and costly, and this offsets the benefits from migration. Besides, the migration path is monotonic, and mobile and clouds resources cannot be utilized. In this study, we propose a new computation migration technique called stack-on-demand (SOD). This technique is based on the stack structure of tasks. Computation migration is carried out by exporting parts of the execution state to achieve lightweight and flexible migration. Compared to traditional task migration techniques, SOD allows lightweight computation migration. It allows dynamic execution flows in a multi-domain workflow style. With its lightweight feature, tasks of a large process can be migrated from clouds to small-capacity devices, such as iPhone, in order to use the unique resources, such as photos, found in the devices. In order to support its lightweight feature, various techniques have been introduced. To allow efficient access to remote objects in task migration, we propose an object faulting technique for efficient detection of remote objects. This technique avoids the checking of object status. To allow portable, lightweight application-level migration, asynchronous migration technique and twin method hierarchy instrumentation technique are proposed. This allows lightweight task migration from mobile device to cloud nodes, and vice versa. We implement the SOD concept as a middleware in a mobile cloud environment to allow transparent execution migration of Java programs. It has shown that SOD migration cost is pretty low, comparing to several existing migration mechanisms. We also conduct experiments with mobile devices to demonstrate the elasticity of SOD, in which server-side heavyweight processes can run adaptively on mobile devices to use the unique resources in the devices. On the other hand, mobile devices can seamlessly offload tasks to the cloud nodes to use the cloud resources. In addition, the system has incorporated a restorable communication layer, and this allows parallel programs to communicate properly with SOD migration.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Barrios, Rita M., and Michael R. Lehrfeld. "Mobile Device Management: Policies for a Secured Mobile Workforce." Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/3045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Liu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.

Повний текст джерела
Анотація:
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Pakkala, Daniel. "Lightweight distributed service platform for adaptive mobile services /." Espoo [Finland] : VTT Technical Research Centre of Finland, 2004. http://www.vtt.fi/inf/pdf/publications/2004/P519.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Krishna, Nitesh. "Software-Defined Computational Offloading for Mobile Edge Computing." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37580.

Повний текст джерела
Анотація:
Computational offloading advances the deployment of Mobile Edge Computing (MEC) in the next generation communication networks. However, the distributed nature of the mobile users and the complex applications make it challenging to schedule the tasks reasonably among multiple devices. Therefore, by leveraging the idea of Software-Defined Networking (SDN) and Service Composition (SC), we propose a Software-Defined Service Composition model (SDSC). In this model, the SDSC controller is deployed at the edge of the network and composes service in a centralized manner to reduce the latency of the task execution and the traffic on the access links by satisfying the user-specific requirement. We formulate the low latency service composition as a Constraint Satisfaction Problem (CSP) to make it a user-centric approach. With the advent of the SDN, the global view and the control of the entire network are made available to the network controller which is further leveraged by our SDSC approach. Furthermore, the service discovery and the offloading of tasks are designed for MEC environment so that the users can have a complex and robust system. Moreover, this approach performs the task execution in a distributed manner. We also define the QoS model which provides the composition rule that forms the best possible service composition at the time of need. Moreover, we have extended our SDSC model to involve the constant mobility of the mobile devices. To solve the mobility issue, we propose a mobility model and a mobility-aware QoS approach enabled in the SDSC model. The experimental simulation results demonstrate that our approach can obtain better performance than the energy saving greedy algorithm and the random offloading approach in a mobile environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Momin, Kaleem A. "A transaction execution model for mobile computing environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Thakre, Anupam S. "Asynchronous checkpointing scheme for distributed mobile computing environment /." Available to subscribers only, 2005. http://proquest.umi.com/pqdweb?did=1095439851&sid=1&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Chen, Yuan. "Using mobile computing for construction site information management." Thesis, University of Newcastle Upon Tyne, 2008. http://hdl.handle.net/10443/164.

Повний текст джерела
Анотація:
In recent years, construction information management has greatly benefited from advancesin Information and Communication Technology (ICT) increasing the speed of information flow, enhancing the efficiency and effectiveness of information communication, and reducing the cost of information transfer. Current ICT support has been extended to construction site offices. However, construction projects typically take place in the field where construction personnel have difficulty in gaining access to conventional information systems for their information requirements. The advances in affordable mobile devices, increases in wireless network transfer speeds and enhancements in mobile application performance, give mobile computing a powerful potential to improve on-site construction information management. This research project aims to explore how mobile computing can be implemented to manage information on construction sites through the development of a framework. Various research methods and strategies were adopted to achieve the defined aim of this research. These methods include an extensive literature review in both areas of construction information management and mobile computing; case studies that investigate construction information management on construction sites; a web-based survey for the investigation of the existing mechanism for on-site information retrieval and transfer; and a case study of the validation of the framework. Based on the results obtained from the literature review, case studies and the survey,the developed framework identifies the primary factors that influence the implementation of mobile computing in construction site information management, and the inter relationships between those factors. Each of these primary factors is further divided into sub-factors that describe the detailed features of relevant primary factors. In order to explore links between sub-factors, the top-level framework is broken down into different sub-frameworks, each of which presents the specific links between two primary factors. One of the applications for the developed framework is the selection of a mobile computing strategy for managing on-site construction information. The overall selection procedure has three major steps: the definition of on-site information management objectives; the identification of mobile computing strategy; and the selection of appropriate mobile computing technologies. The evaluation and validity of the selection procedure is demonstrated through an illustrative constructions cenario.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Drakatos, Stylianos. "Context-aware data caching for mobile computing environments." FIU Digital Commons, 2006. http://digitalcommons.fiu.edu/etd/3082.

Повний текст джерела
Анотація:
The deployment of wireless communications coupled with the popularity of portable devices has led to significant research in the area of mobile data caching. Prior research has focused on the development of solutions that allow applications to run in wireless environments using proxy based techniques. Most of these approaches are semantic based and do not provide adequate support for representing the context of a user (i.e., the interpreted human intention.). Although the context may be treated implicitly it is still crucial to data management. In order to address this challenge this dissertation focuses on two characteristics: how to predict (i) the future location of the user and (ii) locations of the fetched data where the queried data item has valid answers. Using this approach, more complete information about the dynamics of an application environment is maintained. The contribution of this dissertation is a novel data caching mechanism for pervasive computing environments that can adapt dynamically to a mobile user's context. In this dissertation, we design and develop a conceptual model and context aware protocols for wireless data caching management. Our replacement policy uses the validity of the data fetched from the server and the neighboring locations to decide which of the cache entries is less likely to be needed in the future, and therefore a good candidate for eviction when cache space is needed. The context aware driven prefetching algorithm exploits the query context to effectively guide the prefetching process. The query context is defined using a mobile user's movement pattern and requested information context. Numerical results and simulations show that the proposed prefetching and replacement policies significantly outperform conventional ones. Anticipated applications of these solutions include biomedical engineering, telehealth, medical information systems and business.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Seet, Siong Leng Henry. "Analysis of noncoherent orthogonal modulation for mobile computing." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/55206.

Повний текст джерела
Анотація:
Approved for public release; distribution is unlimited.
Wireless communication is employed to connect mobile computers in a networked environment for information exchange. In a tactical space, sensors and computers typically need to operate on-the-move while transmitting data over both short and long distances in different terrain and conditions. The wireless communication is thus susceptible to effects of Doppler shift and channel fading. In addition, when security and anti jamming features are required, such as frequency-hopping techniques, then coherent signal detection is difficult and noncoherent modulation is used instead. Our study will focus on the bit error rate (BER) performance analysis of noncoherent orthogonal modulation, specifically M-ary frequency-shift keying (MFSK) and code-shift keying (CSK) modulation, in both additive white Gaussian noise (AWGN) and for a Rayleigh fading channel with Doppler shift. The potential applications include communications between mobile computer-sensor devices, such as a mobile ground control station maintaining a datalink with UAV.
Civilian
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Rosenberg, Robert. "Computing without mice and keyboards : text and graphic input devices for mobile computing." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Sen, Sanjoy Kumar. "Efficient Algorithms and Framework for Bandwidth Allocation, Quality-of-Service Provisioning and Location Management in Mobile Wireless Computing." Thesis, University of North Texas, 1997. https://digital.library.unt.edu/ark:/67531/metadc278885/.

Повний текст джерела
Анотація:
The fusion of computers and communications has promised to herald the age of information super-highway over high speed communication networks where the ultimate goal is to enable a multitude of users at any place, access information from anywhere and at any time. This, in a nutshell, is the goal envisioned by the Personal Communication Services (PCS) and Xerox's ubiquitous computing. In view of the remarkable growth of the mobile communication users in the last few years, the radio frequency spectrum allocated by the FCC (Federal Communications Commission) to this service is still very limited and the usable bandwidth is by far much less than the expected demand, particularly in view of the emergence of the next generation wireless multimedia applications like video-on-demand, WWW browsing, traveler information systems etc. Proper management of available spectrum is necessary not only to accommodate these high bandwidth applications, but also to alleviate problems due to sudden explosion of traffic in so called hot cells. In this dissertation, we have developed simple load balancing techniques to cope with the problem of tele-traffic overloads in one or more hot cells in the system. The objective is to ease out the high channel demand in hot cells by borrowing channels from suitable cold cells and by proper assignment (or, re-assignment) of the channels among the users. We also investigate possible ways of improving system capacity by rescheduling bandwidth in case of wireless multimedia traffic. In our proposed scheme, traffic using multiple channels releases one or more channels to increase the carried traffic or throughput in the system. Two orthogonal QoS parameters, called carried traffic and bandwidth degradation, are identified and a cost function describing the total revenue earned by the system from a bandwidth degradation and call admission policy, is formulated. A channel sharing scheme is proposed for co-existing real-time and non-real-time traffic and analyzed using a Markov modulated Poisson process (MMPP) based queueing model. The location management problem in mobile computing deals with the problem of a combined management of location updates and paging in the network, both of which consume scarce network resources like bandwidth, CPU cycles etc. An easily implementable location update scheme is developed which considers per-user mobility pattern on top of the conventional location area based approach and computes an update strategy for each user by minimizing the average location management cost. The cost optimization problem is elegantly solved using a genetic algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Alamoud, Muhammad Y. "Mobile Computing for Trauma and Surgical Care Continuous Education." Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1367327340.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

de, Souza Pereira Candello Heloisa Caroline. "Design for outdoor mobile multimedia : representation, content and interactivity for mobile tourist guides." Thesis, University of Brighton, 2012. https://research.brighton.ac.uk/en/studentTheses/0de623b2-11d7-462b-aa8b-06433c9f78e7.

Повний текст джерела
Анотація:
The research reported in this thesis explores issues of information design for mobile devices, in particular those relating to selection and presentation of on-screen information and interactive functionality for users of mobile phones. The example domain is that of mobile tour guides for tourists, local people, students and families. Central to the research is the issue of multimodality, particularly the graphic and interaction design issues involved in viewing video, in combination with other media, on a mobile device, in an outdoor context. The study produced three main results: 1. An analytical framework for user-experience concerns in cultural heritage settings, 2. Design recommendations for outdoor mobile multimedia guides and 4. Refinements in methods for collecting and analysing data from fieldwork with visitors in cultural heritage settings. Those results were formulated for the use of mobile guide designers. The methodology used to inform and structure the work was Design Research, involving literature review and empirical work, including user trials of a prototype tourist guide developed in the project. The literature review covered areas of tourism, multimedia design, mobile HCI and existing mobile guides. Outdoor fieldwork exercises were carried out with three different cultural information sources - human tour guide, paper based guide and mobile guide app - in order to identify any problems that visitors might have and to gather requirements for the development of a mobile cultural guide. Qualitative analysis was applied to analyse the video observations and questionnaires completed during the tours. Requirements were grouped and analysed to give substantial information for a conceptual design. Personas and scenarios were created based on real participants and situations that occurred on the tours. A mobile guide prototype was developed and evaluated in the field with visitors. Qualitative analysis and descriptive statistics were used to analyse the data. Visitors were asked about their preferences among various multimedia design elements and answered a questionnaire on their experience. The elements that affect the user experience with outdoor mobile guides were categorised and organised into a framework. It became apparent that users' experience of technology (in this case the mobile tourist guide) and environment are affected by context, content and look and feel elements. This framework of user experience generated a design toolkit with a collection of recommendations for designers of such systems. The recommendations are described in context of usage and have a rating system with strength of evidence and confidence based on how often they appeared in the field works and solutions tested.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Ruchter, Markus. "A new concept for mobile environmental education." Karlsruhe : Univ.-Verl. Karlsruhe, 2007. http://d-nb.info/985953829/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Dargie, Waltenegus. "A Distributed Architecture for Computing Context in Mobile Devices." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2006. http://nbn-resolving.de/urn:nbn:de:swb:14-1151308912028-83795.

Повний текст джерела
Анотація:
Context-aware computing aims at making mobile devices sensitive to the social and physical settings in which they are used. A necessary requirement to achieve this goal is to enable those devices to establish a shared understanding of the desired settings. Establishing a shared understanding entails the need to manipulate sensed data in order to capture a real world situation wholly, conceptually, and meaningfully. Quite often, however, the data acquired from sensors can be inexact, incomplete, and/or uncertain. Inexact sensing arises mostly due to the inherent limitation of sensors to capture a real world phenomenon precisely. Incompleteness is caused by the absence of a mechanism to capture certain real-world aspects; and uncertainty stems from the lack of knowledge about the reliability of the sensing sources, such as their sensing range, accuracy, and resolution. The thesis identifies a set of criteria for a context-aware system to capture dynamic real-world situations. On the basis of these criteria, a distributed architecture is designed, implemented and tested. The architecture consists of Primitive Context Servers, which abstract the acquisition of primitive contexts from physical sensors; Aggregators, to minimise error caused by inconsistent sensing, and to gather correlated primitive contexts pertaining to a particular entity or situation; a Knowledge Base and an Empirical Ambient Knowledge Component, to model dynamic properties of entities with facts and beliefs; and a Composer, to reason about dynamic real-world situations on the basis of sensed data. Two additional components, namely, the Event Handler and the Rule Organiser, are responsible for dynamically generating context rules by associating decision events ? signifying a user?s activity ? with the context in which those decision events are produced. Context-rules are essential elements with which the behaviour of mobile devices can be controlled and useful services can be provided. Four estimation and recognition schemes, namely, Fuzzy Logic, Hidden Markov Models, Dempster-Schafer Theory of Evidence, and Bayesian Networks, are investigated, and their suitability for the implementation of the components of the architecture of the thesis is studied. Subsequently, fuzzy sets are chosen to model dynamic properties of entities. Dempster-Schafer?s combination theory is chosen for aggregating primitive contexts; and Bayesian Networks are chosen to reason about a higher-level context, which is an abstraction of a real-world situation. A Bayesian Composer is implemented to demonstrate the capability of the architecture in dealing with uncertainty, in revising the belief of the Empirical Ambient Knowledge Component, in dealing with the dynamics of primitive contexts and in dynamically defining contextual states. The Composer could be able to reason about the whereabouts of a person in the absence of any localisation sensor. Thermal, relative humidity, light intensity properties of a place as well as time information were employed to model and reason about a place. Consequently, depending on the variety and reliability of the sensors employed, the Composer could be able to discriminate between rooms, corridors, a building, or an outdoor place with different degrees of uncertainty. The Context-Aware E-Pad (CAEP) application is designed and implemented to demonstrate how applications can employ a higher-level context without the need to directly deal with its composition, and how a context rule can be generated by associating the activities (decision events) of a mobile user with the context in which the decision events are produced.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Worgan, Paul. "Inductive energy transfer systems for mobile and wearable computing." Thesis, University of Bristol, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.720835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Ekanayake, Mudiyanselage Wijaya Dheeshakthi. "An SDN-based Framework for QoSaware Mobile Cloud Computing." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35117.

Повний текст джерела
Анотація:
In mobile cloud computing (MCC), rich mobile application data is processed at the cloud infrastructure by reliving resource limited mobile devices from computationally complex tasks. However, due to the ubiquitous and mobility nature, providing time critical rich applications over remote cloud infrastructure is a challenging task for mobile application service providers. Therefore, according to the literature, close proximity placement of cloud services has been identified as a way to achieve lower end-to-end access delay and thereby provide a higher quality of experience (QoE) for rich mobile application users. However, providing a higher Quality of Service (QoS) with mobility is still a challenge within close proximity clouds. Access delay to a closely placed cloud tends to be increased over time when users move away from the cloud. However, reactive resource relocation mechanism proposed in literature does not provide a comprehensive mechanism to guarantee the QoS and as well as to minimize service provisioning cost for mobile cloud service providers. As a result, using the benefits of SDN and the data plane programmability with logically centralized controllers, a resource allocation framework was proposed for IaaS mobile clouds with regional datacenters. The user mobility problem was analyzed within SDN-enabled wireless networks and addressed the possible service level agreement violations that could occur with inter-regional mobility. The proposed framework is composed of an optimization algorithm to provide seamless cloud service during user mobility. Further a service provisioning cost minimization criteria was considered during an event of resource allocation and inter-regional user mobility.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Antonopoulos, Nikolaos. "MASIC : a secure mobile agent framework for Internet computing." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/843023/.

Повний текст джерела
Анотація:
Software mobile agents is a new distributed computing paradigm which was developed to support efficient computing over the Internet. Since its inception there has been a significant research effort to produce concrete agent-based artefacts. This phenomenon resulted in the proliferation of a large number of agent systems, mostly based on proprietary programming languages, each with its own characteristics, peculiarities and assumptions. Hence the agent technology has largely remained hidden and incomprehensible by Internet end users. Moreover the issue of interoperability and integration of agents with existing legacy software has only just started to be addressed by the agent research community in a rather ad hoc way. In this thesis we attempt to design an agent architecture which is independent of any programming language and therefore is directly suitable for Internet end users. The proposed architecture, labelled as Mobile Agent System for Internet Computing (MASIC), addresses several important contemporary issues in agent research. It defines an agent as a container of reusable components that can be copied or moved to other agents. Each agent has a symmetric I/O access control module and is also equipped with associative access collaboration facilities. Additionally every agent contains a navigator module which stores the agent's itinerary plan and provides an interface via which the agent itself or other authorised agents can dynamically adapt the plan to reflect run-time events and constraints. The agent system provides an integrated access control architecture which enables an agent to define customised access control structures that can be fully or partially shared with other agents. Existing access control structures can be combined to create new structures that represent more complex access mechanisms. Agents can discover other agents offering pertinent services via an adaptive, customisable agent discovery architecture incorporated in MASIC. This discovery architecture enables the full interaction of links with queries and supports the definition of access paths which are tightly coupled with access control and. other customised services. MASIC also provides the conceptual architecture of a message-oriented agent communication system integrated with a mobility management scheme. Finally, this thesis presents the design and implementation of a prototype graphical interface which enables the potential user of the system to create, manage and interact with agents in real time. In conclusion the research presented in this thesis aims to provide a comprehensive, language-neutral, secure, collaborative environment within which mobile agents can interact with their peers in order to perform their tasks efficiently while human operators can oversee and manage these activities through a user friendly interface. The architecture is generic in nature as it can support general-purpose, agent-based computations. Its concepts, entities and mechanisms can be fully or partially re-used to provide architectural solutions to challenges in various application domains such as Knowledge Management, the GRID and E-Commerce.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії