40,380 research outputs found

    Mobile Cloud Computing Architecture Model for Multi-Tasks Offloading

    Get PDF
    In modern era the cell phones has born through the significant technological advancements. But this resides a low multi tasks entity. Many people use mobile devices instead of PC’s. Cell phones has limited number of resources like limited storage, battery time and processing. The cloud computing offloading deals with these limitations. Cloud computing become more attractive as it reduce the cost and also time efficient. Business of all sizes can’t afford to purchase hardware and softwares but cloud computing provide these resources and executes multiple tasks and allows the user to access their data and provide other control in each level of cloud computing.  All of these techniques save smart phones properties or capabilities but it also becomes the reasons of communication cost between cloud and smart phone devices. The main advantage of cloud computing is to provide multiple properties at different prices. These applications has goal to attain versatile performance objective. In this research work, an architecture model for multi tasks offloading designed to overcome this problem. For this purpose CloudSim simulator use with the NetBeans and implement the MCOP algorithm. This algorithm solves the execution timing issue and enhances the mobile system performance. In this tasks are partitioning into two parts and then implemented on cloud site or locally. It reduces the time response and communication cost or tasks execution cost. Keywords: Mobile Cloud Computing, Mobile Computing Offloading, Smart Mobile Devices, Optimal Partitioning Algorithm

    Digital Receipt System Using Mobile Device Technologies

    Get PDF
    Cell phones are the most prevalent computing devices. They come pre-loaded with many different functions such as a digital camera, a mobile web browser, a streaming media player, games, GPS navigation, and more. However, if the banks have their way, the cell phone may become the preferred method of payment for everyday purchases. When that happens, there will be a need to securely send and store the receipt information so that they can be quickly analyzed. This thesis will demonstrate the use of a Digital Receipt system to manage transactions using Bluetooth technology to communicate between mobile devices. This expands on a previous thesis titled Bi-Directional Information Exchange with Handheld Computing Devices. (Qaddoura, 2006) Cell phones have now been added into the setup. Thereby, expanding the Digital Receipt concept to include many more affordable computing devices, thus, increasing the likelihood that this application will be accepted by the general public

    Digital Receipt System Using Mobile Device Technologies

    Get PDF
    Cell phones are the most prevalent computing devices. They come pre-loaded with many different functions such as a digital camera, a mobile web browser, a streaming media player, games, GPS navigation, and more. However, if the banks have their way, the cell phone may become the preferred method of payment for everyday purchases. When that happens, there will be a need to securely send and store the receipt information so that they can be quickly analyzed. This thesis will demonstrate the use of a Digital Receipt system to manage transactions using Bluetooth technology to communicate between mobile devices. This expands on a previous thesis titled Bi-Directional Information Exchange with Handheld Computing Devices. (Qaddoura, 2006) Cell phones have now been added into the setup. Thereby, expanding the Digital Receipt concept to include many more affordable computing devices, thus, increasing the likelihood that this application will be accepted by the general public

    J2ME Programming

    Get PDF
    Handheld devices, such as programmable cell phones and personal digital assistants (PDAs), have already become more numerous than PCs. Students need to be prepared today to work on the most widely available computing platforms of tomorrow. With their small size and mobility, these handheld devices present both new opportunities and unique software engineering challenges. J2ME stands for Java 2 Micro Edition that is one of the three Java Editions (J2SE, J2EE, and J2ME) specially designed for handheld devices. J2ME plus handheld devices are the platforms for wireless Internet and mobile business in the future

    A Termination Detection Protocol for Use in Mobile Ad Hoc Networks

    Get PDF
    As computing devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today\u27s business world, many consider devices such as cell phones, PDAs, and laptops as essential tools. As these and other devices become increasingly independent of the wired infrastructure, new kinds of applications that assume an ad hoc network infrastructure will need to be deployed. Such a setting poses new challenges for the software developer, e.g., the lack of an established network topology, bandwidth limitations, and frequent disconnections. In this paper, we begin to explore design strategies for developing applications over ad hoc networks. The study of termination detection in diffusing computations, along with the formulation of an algorithmic solution amenable to usage in mobile ad joc networks, gives us the opportunity to bring to light several important software engineering concerns and design strategies one might employ in a mobile setting. We view this effort as a first step towards creating a repertoire of commonly used design solutions for frequently encountered problems in the development of applications over mobile ad hoc networks

    It's the Human that Matters: Accurate User Orientation Estimation for Mobile Computing Applications

    Full text link
    Ubiquity of Internet-connected and sensor-equipped portable devices sparked a new set of mobile computing applications that leverage the proliferating sensing capabilities of smart-phones. For many of these applications, accurate estimation of the user heading, as compared to the phone heading, is of paramount importance. This is of special importance for many crowd-sensing applications, where the phone can be carried in arbitrary positions and orientations relative to the user body. Current state-of-the-art focus mainly on estimating the phone orientation, require the phone to be placed in a particular position, require user intervention, and/or do not work accurately indoors; which limits their ubiquitous usability in different applications. In this paper we present Humaine, a novel system to reliably and accurately estimate the user orientation relative to the Earth coordinate system. Humaine requires no prior-configuration nor user intervention and works accurately indoors and outdoors for arbitrary cell phone positions and orientations relative to the user body. The system applies statistical analysis techniques to the inertial sensors widely available on today's cell phones to estimate both the phone and user orientation. Implementation of the system on different Android devices with 170 experiments performed at different indoor and outdoor testbeds shows that Humaine significantly outperforms the state-of-the-art in diverse scenarios, achieving a median accuracy of 1515^\circ averaged over a wide variety of phone positions. This is 558%558\% better than the-state-of-the-art. The accuracy is bounded by the error in the inertial sensors readings and can be enhanced with more accurate sensors and sensor fusion.Comment: Accepted for publication in the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2014

    USING EMBEDDED TECHNOLOGY IN END-USER PROGRAMMING OF SMART SPACES WITH MOBILE DEVICES

    Get PDF
    A recent shift in computing paradigm from stand-alone microcomputers and mainframes towards entirely pervasivecomputing where billions of miniature, ubiquitous inter-connected computing elements weave themselves into thefabric of everyday life. Embedded systems run the computing devices hidden inside every object and appliance suchas cell phones, toys, handheld PDAs, cameras, microwave ovens, cars, airplanes, etc. These numerous, easilyaccessible devices connected to each other and to network infrastructure exhibit context-awareness of anenvironment in order to optimize their operation in that environment. In this paper, we examined embedded systemsin end-user programming of smart spaces with mobile devices. We designed and implemented a microcontrollerbasedsystem capable of monitoring and controlling the electronic appliances in a home from any location. Weadopted a task-driven computing approach of the composition of the semantic web. The end user uses thefunctionality of the networked devices in the home as semantic web services to arbitrarily form his request whichinvolves the typing of SMS through the user-friendly interface of a Java enabled mobile phone. An Arduinomicrocontroller for generating the timing and control signals programmed using Wiring language was used. TheGSM wireless technology was used for transmission and reception of the data. Our work addresses the problem ofenergy wastage and domestic accidents by enabling end-users to easily use their mobile devices to monitor andinstruct their home devices from any location over a wireless network.Keywords: Embedded Technology, Smart Spaces, End-User Programming, Mobile Devices, Pervasive Networkin

    iPhone forensics methodology and tools

    Get PDF
    iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors. The device is considered as a “special” mobile phone due to its ability to perform multi-operations if not multitasking. It can therefore be used as a entertainment media device, a camera, a GPS, Internet surfing via Wi-Fi technology, Internet Mobile Edge Services, personal organizer, and finally performing as a cell phone with all the usual services including sms, and so forth. However, the difference between the iPhone and the other conventional phones vendors is its ability to store and process huge volume of data which is supported by decent computing capabilities of the iPhone processor. As part of every technology, such a device can be used for legal and illegal activities. Therefore the potential risks from such “special” technology are not limited to the possibility of containing illegal materials, such as audios and visuals, including explicit materials, images, documents and the possibility of propagating malicious activities rapidly. Such modification can breach or tamper with the telecommunications network authorities and regulations. The goal of this paper is to focus on both the logical and the physical extraction of the iPhone generation one through the extraction of the iPhone flash drive NAND memory chip and also the logical extraction of data onto the second generation of iPhone using various techniques and methods at our disposal

    The Prospects of M-Voting Implementation in Nigeria

    Get PDF
    Since independence, an average of 50% of registered voters participates in voting [1]. Similarly, an increasing rate of apathy was observed between the electorate and the elect, which was not unconnected with lack of transparency, accountability, and probity on the part of government [2]. Thus the electorate did not see the need to subject itself to any stress. Consequently, government is very committed to implementing the forth coming elections through e-voting. This paper proposes the prospects of m-voting implementation in Nigeria through the use of mobile phones, PDAs, etc. with guaranteed security, secrecy, and convenience in a democratization process. It also reviews the level of adoption of GSM in Nigeria, the implication of voting through the GSM, and finally introducing m-voting innovation in the voting process to increase voters’ access and participation rate in election
    corecore