Top PDF Data Dissemination in Mobile Computing Environment

Data Dissemination in Mobile Computing Environment

Data Dissemination in Mobile Computing Environment

Flat Broadcast The simplest scheme for data scheduling is flat broadcast. With a flat broadcast program, all data items are broadcast in a round robin manner. The access time for every data item is the same, i.e., half of the broadcast cycle. This scheme is simple, but its performance is poor in terms of average access time when data access probabilities are skewed. Broadcast Disks Hierarchical dissemination architecture, called Broadcast Disk (Bdisk), was introduced in [1]. Data items are assigned to different logical disks so that data items in the same range of access probabilities are grouped on the same disk. Data items are then selected from the disks for broadcast according to the relative broadcast frequencies assigned to the disks. This is achieved by further dividing each disk into smaller, equal size units called chunks, broadcasting a chunk from each disk each time, and cycling through all the chunks sequentially over all the disks. A minor cycle is defined as a sub cycle consisting of one chunk from each disk. Consequently, data items in a minor cycle are repeated only once. The number of minor cycles in a broadcast cycle equals the Least Common Multiple (LCM) of the relative broadcast frequencies of the disks. Conceptually, the disks can be conceived as real physical disks spinning at different speeds, with the faster disks placing more instances of their data items on the broadcast channel.
Mostrar mais

4 Ler mais

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment using Both Cloud and Text Computing

In this research paper presents an design model for file sharing system for ubiquitos mobile devices using both cloud and text computing. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet.File transfer is an important process in any form of computing as we need to really share the data across.The Wireless Network changed the way we were sharing the files.Infra-Red and Bluetooth are the technology we use to share files in mobile phones and Bluetooth is the successful one.In exisiting system there is no immediate predecessor for the proposed system.Bluetooth file transfer is the already existing system. Drawbacks of Existing System are Short Range , Slow transfer rate and Unsecure .But in our research paper the idea is to use Both cloud and text computing network to transfer files.A wireless network is created and the devices connected in this network can share files between them. Benefits over the Existing System are more Secure , Range – upto 300 mts and Data rate is 50-140 mbps. In future without internet connection we can transfer our information very easily.Key words : cloud and text computing, Bluetooth, network, internet, system , file transfer.
Mostrar mais

7 Ler mais

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Practical Isolated Searchable Encryption in a Trusted Computing Environment

Although Cloud computing keeps growing, its users are aware and cite security guaran- tees as their main concern when adopting such services (Columbus, 2017a; Meeker, 2017). These concerns are not without a cause; in recent years, several cases of privacy breaches have surfaced. Some of these are intended company policies, such as using data assumed private for advertising purposes (Rushe, 2013); other breaches may also be the result of government-ordered surveillance programs (Cook, 2016; Greenwald and MacAskill, 2013). These kind of leaks affect not only companies, but also individual users (Hough, 2010; Lewis, 2014; Turner, 2016). Particularly sensitive information, like health records, have also been the subject of several attacks (HCA News, 2018; O’Hara, 2017; Roston, 2017); with the recent growth in personal health apps usage (Khalaf, 2014; Meeker, 2017), the need for data security increases. In light of these concerns and news, Cloud services present themselves as a double-edged sword for its users: how to leverage the advantages of the Cloud without compromising privacy and security?
Mostrar mais

144 Ler mais

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

There are two fundamental data types in Text-Batch: table or indexed table (borrowed from database terminology). A table contains a set of records (rows) that are independent of each other. All records in a 730 table follow the same schema, and each record may contain several fields (columns). Indexed table is SIMILAR to table except that each record also has an associated index, where the index could simply be one of the fields or other data provided by the user. The Text-Batch system consists of two pieces of related software components: the distributed file system (DFS) and the job scheduler .
Mostrar mais

7 Ler mais

An Application Model for Pervasive Computing

An Application Model for Pervasive Computing

Specially, our vision can be summarized in the following precepts: 1. A device is a portal into an application/data space. 2. An application is a means by which a user performs a task.3. The computing environment is the user's information enhanced physical surroundings. A new application model is needed to support this vision. This paper describes the attributes of such a model. Pervasive: Tending to pervade or spread throughout. Definition:” The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it”–Mark Weiser1991 Scientific America.
Mostrar mais

5 Ler mais

Performance Evaluation of Smart Decision Support Systems on Healthcare

Performance Evaluation of Smart Decision Support Systems on Healthcare

Dr. Neeraj Kumar received his Ph.D. in CSE from SMVD University, Katra (J & K), India, and was a postdoctoral research fellow in Coventry University, Coventry, UK. He is working as an Associate Professor in the Department of Computer Science and Engineering, Thapar University, Patiala (Pb.), India since 2014. Dr. Neeraj is an interna- tionally renowned researcher in the areas of VANET & CPS Smart Grid & IoT Mobile Cloud computing & Big Data and Cryptography. He has published more than 150 techni- cal research papers in leading journals and conferences from IEEE, Elsevier, Springer, John Wiley. His paper has been published in some of the high impact factors journals such as-IEEE Transactions on Industrial Informatics, IEEE Transactions on Industrial Electronics, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Dependable and Secure Computing, IEEE Trans- actions on Power Systems, IEEE Transactions on Vehicular Technology, IEEE Systems Journal, IEEE Wireless Communication Magazine, IEEE Vehicular Technology Mag- azine, IEEE Communication Magazine, IEEE Networks Magazine etc. Apart from the journals conferences, he has also published papers in some of the core conferences of his area of specialization such as-IEEE Globecom, IEEE ICC, IEEE Greencom, IEEE CSCWD. He has guided many research scholars leading to Ph.D. and M.E./M.Tech. His research is supported by funding from TCS, CSIT, UGC and UGC in the area of Smart grid, energy management, VANETs, and Cloud computing. He is member of the cyber-physical systems and security research group. He has research funding from DST, CSIR, UGC, and TCS. He has total research funding from these agencies of more than 2 crores. He has got International research project under Indo-Poland and Indo-Austria joint research collaborations in which teams from both the countries will visit to Thapar University, Patiala and Warsaw University, Poland, University of Innsburg, Austria respectively. He has h-index of 25 (according to Google scholar, March 2017) with 2500 citations to his credit. He is editorial board members of International Journal of Communication Systems, Wiley, and Journal of Networks and Computer Applications, Elsevier. He has visited many countries mainly for the academic purposes. He is a visiting research fellow at Coventry University, Coven- try, UK. He has many research collaboration with premier institutions in India and different universities across the globe. He is a member of IEEE.
Mostrar mais

161 Ler mais

Ubiquitous computing approach for mobile health applications

Ubiquitous computing approach for mobile health applications

Development Tools) plugin. The ADT is designed to include a powerful and integrated environment on Android applications. It extends the capabilities of Eclipse to quickly set up new Android projects, debug applications including emulation debug for easy initial debugging of mobile applications. The development tool used to create the web services on Windows Communication Foundation (WCF) that is the framework for building service-oriented applications was the Visual Studio 2010, and the major solution for the web services was C#. The Visual Studio also offers a database system management, which was used to generate and manage the system database. The implemented web service communicates through Simple Object Access protocol (SOAP) messages over Hypertext Transfer Protocol (HTTP) with the PHR and the SapoFitness services. The information is returned to the mobile application in JavaScript Object Notation (JSON) or Extensible Markup Language (XML).
Mostrar mais

106 Ler mais

Service Oriented Sensor Networks for Mobile Computing

Service Oriented Sensor Networks for Mobile Computing

The first category was originally of little interest to us, since these applications do not involve communication. However, the main idea underlying our architecture is to transparently support resource-constrained mobile devices by powerful proxy servers. We are therefore currently exploring how to generalize this idea to support standalone applications as well. Applications in the second category will be used on multiple platforms: a user will have a version of his/her favorite word processor executing on a laptop as well as on the more powerful desktop in the office. This requires the exchange and synchronization of documents between the machines. Depending on the prevailing view of available network connectivity, two possible approaches are imaginable. Windows CE and MS Office exemplify a first solution. To facilitate access to the Internet, only the client side of the application can be adapted to function well in the dynamic and resource constrained mobile environment. The architecture proposed below is intended for applications in this category. Vertically integrated business applications are often structured as client-server applications. Furthermore, the backends (servers) have to support both existing wired desktops and wireless mobile devices. One example is a bank, where the back office has to support account managers in branch offices as well as mobile customer service representatives.
Mostrar mais

7 Ler mais

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.
Mostrar mais

12 Ler mais

How can virgin mobile differentiate itself by focusing on mobile data in collaboration with virgin mobile

How can virgin mobile differentiate itself by focusing on mobile data in collaboration with virgin mobile

A typical scenario planning development requires 15 to 30 participants and involves diverse stakeholders in an organization – managers, customers, suppliers, academics and industry experts (Heidjen, 2003). The exercise entails a solid research component in order to understand what trends are likely to change the industry. According to Wilkinson, these trends or driving forces can be categorized as: social dynamics (e.g. changes in demographics, consumer expectations, social values); economic issues (e.g. fluctuations in exchange rates, labour force, industry structure); political affairs (e.g. changes in regulation, tax legislation, legal environment); technology (e.g. new software or hardware, development of new devices and applications) (Wilkinson, 2012). Participants must agree on the two most critical driving forces, by ranking them according to level of uncertainty and impact to the industry, and combine them in a 2x2 matrix with four possible scenarios of the future. For each of the scenarios, a narrative of how the future may look like must be written as well as the implications to strategy and critical decisions to be made. Finally, a list of early warning signals must be included in order to help business leaders identifying the emergence of one scenario or another (Garvin, 2006).
Mostrar mais

45 Ler mais

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

2. Recently the promises of the wireless communication are the support vehicular safety applications have led to the several research projects over the world. It is clear that VANETs has become the most relevant and realization of mobile ad hoc network. In the case of the VANETs it is possible to strategically place assess point along the side of the road and in turn allow vehicles access the service available from the infrastructure. VANETs (vehicular ad hoc networks) use cars or vehicles as the mobile nodes through MANET. Which allowing approximately 100 to 300 meters of each connection range. When a car falls out to the signal range then the other car will be join it. {3} VANET have the various components. OBU (On-Board Unit) are installed in vehicles the for providing the wireless communication. RSU (Road Side Unit) deploy the hotspot or the intersection to provide the information.AU (Authentication Server) that provides the proper security to the user. Section {1} IEEE 802.11 provide
Mostrar mais

6 Ler mais

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

Infrastructure based routing: Wu et al. (2013) proposed a moving direction and destination location based routing (MEDAL) algorithm, which takes the moving directions of vehicles and the destination location to select a neighbor vehicle as the next hop for forwarding data. Nzouonta et al. (2009) proposed a set of Road-Based Vehicular Traffic routing (RBVT) protocols, areactive protocol RBVT-R and a proactive protocol RBVT-P that leverage real-time vehicular traffic information to create paths consisting of successions of road intersections. Punithavathi and Duraiswamy (2010) proposed a Client-Server based mobile agent for fast reponse and information reteival. However their protocol requires more server units to store and backup the data. Though most of these algorithm ssupports both V2V and V2I communications, they requires all vehicles to store the periodic hello beacons of other vehicles and also depends on the support of intersections.
Mostrar mais

8 Ler mais

Security Risk Assessment of Cloud Computing Services in a Networked Environment

Security Risk Assessment of Cloud Computing Services in a Networked Environment

could serve as a guide to help users and providers make decisions about risk mitigation in their organizations [23]. Reference [17] proposes a comprehensive conceptualization of Perceived IT Security Risks in the CC context that is based on six distinct risk dimensions grounded on an extensive literature review, Q-sorting, and expert interviews. Second, a multiple-indicators and multiple-causes analysis of data collected from 356 organizations is found to support the proposed conceptualization as a second-order aggregate construct. The final set of six security risk dimensions is: Confidentiality, Integrity, Availability, Performance, Accountability and Maintainability risks. Each risk dimension is further categorized to risk items, in total 31 risk items. For example performance risk is categorized to network risks, scalability risks, underperformance risks and internal performance risks. Reference [19] presents a method to assess security risks including a cohesive set of steps to identify a complete set of security risks and also to assess them. The method is based on the integration of qualitative and quantitative models that focus on formal evaluation and assessment. In order to assess risks, risks are categorized to Six-View Perspectives: Threat view, Resource View, Process View, Risk Assessment View, Management View, and Legal View. To summarize, there is no one single framework describing all CC risk factors.
Mostrar mais

12 Ler mais

A Computing and Storage Server Infrastructure for a Mobile Application

A Computing and Storage Server Infrastructure for a Mobile Application

Since the dissemination of smartphones, digital photography has become a highly acces- sible activity. In the past, film size limited the number of photos that could be taken, which made us choose our motives carefully. Reaching the film limit either meant that we would have to stop taking pictures, or replace the film, incurring in an additional cost. Nowadays, smartphones allow us to take a virtually infinite amount of pictures, where the only limiting factor is storage space. This limit is easily extended with a plethora of services such as Google Drive, Flickr or even Instagram, meaning that we can upload our pictures and safely delete them from our smartphones.
Mostrar mais

73 Ler mais

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

A key hurdle to moving IT systems to the cloud is the lack of trust on the cloud provider. The cloud provider, in turn, also needs to enforce strict security policies, which in turn requires additional trust in the clients. To improve the mutual trust between consumer and cloud provider, a good trust foundation needs to be in place. Cloud computing can mean different things to different people. The privacy and security concerns will surely differ between a consumer using a public cloud application and a medium-sized enterprise using a customized suite of business applications on a cloud platform and this brings a different package of benefits and risks. What remains constant, though, is the real value that the user seeks to protect. For an individual, the value
Mostrar mais

5 Ler mais

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

Considering the security issues of a pervasive system, there are two paths in which we can resolve them, One deals with the network security and system security issues. [4], [7] already have different protocols that can be implemented in the architecture of the system so as to avoid such security risks and much more such protocols are on the way. The second path is implementation of some cryptographic techniques in the pervasive environment such that only authenticated users have the access to the real information. Mark Weiser [2] also suggested that cryptographic techniques can be used to transfer secure messages from one ubiquitous computer to another and to safeguard private information stored in networked systems. Michel Collins [5] on the other hand suggested that security of a system should be analysed at the design of frameworks itself and some encryption techniques can be applied while data is being exchanged between devices. This can be of great help for the future coming applications, but for the legacy systems applying an encryption mechanism within the system seems to be more practical.
Mostrar mais

7 Ler mais

Distributed Computing in a Cloud of Mobile Phones

Distributed Computing in a Cloud of Mobile Phones

The execution/process of tasks is mainly assured by the newTask method in Table 4.1. When using a Service with pre-process, the newTask method prepares the data to be pro- cessed, by obtaining the corresponding pre-processed DataItems, if they exist, or in case they do not, uses the preProcess method to pre process data. The pre process only occurs in this phase if the method setWillPreProcess is called priorly by the Application. Be- sides preparing data to be processed, the newTask method returns a new RunningTask which consists on a Callable object that will be submitted to a Java ExecutorService and executed as an asynchronous task in the Computing component in order to process data. The call method of this Callable uses the process operation implemented to process data. In terms of the results of processing data, they are returned by the call method of a RunningTask. A result in our framework consists on a tuple composed of a MDD with the result DataItems and a collection of the corresponding descriptions of each result DataItem. These descriptions are generated by the outputToDescription method, which has the objective of allowing application developers to return a smaller representation of each result DataItem, like the thumbnail of an image or the title of a text. A description is associated with the meta data of a result DataItem and it reaches the mobile device that requested computation through the result notifications, independently of which mechanism was chosen to notify the Client about the results. This can be helpful as it offers users a preview of the results allowing them to know which results are available to be downloaded. If an application developer is not interested in implementing this method he/she can return a null value informing our framework to ignore the description.
Mostrar mais

110 Ler mais

Dynamic Channels: A New Methodology for Mobile Computing Applications

Dynamic Channels: A New Methodology for Mobile Computing Applications

We have shown that the channel metaphor can be the basis of building interfaces for mobile applications and information dissemination, provided that channel models are extended to capture mobility requirements. In addition, we outlined a systematic software development process for capturing these requirements and building push-based mobile applications. We intend to automate much of this process by extending an existing UML CASE tool (Rational Rose) with software to generate class diagrams for each mobile application, with the mobility attributes filled-in directly from the entry forms we developed. In addition, we have already a prototype of a dynamic channel description format (D-CDF) generator from the Rose class diagrams. We intend to assemble this software as a CASE tool for developing the pattern of applications described here.
Mostrar mais

22 Ler mais

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

333 To reduce the stable storage access cost and to cope with the space problem of mobile hosts (MH), the task of logging is assigned to the mobile support stations (MSSs). Since messages heading to the mobile hosts are routed through the mobile support stations, message logging by the mobile support stations does not impose any extra communication overhead. As a MH moves around the cells, the checkpoints and the message log of MH becomes scattered over various MSSs. In case of failure, MH must locate the latest checkpoint and also has to locate the sequence of logged messages, which in turns increases the recovery cost. For fast recovery, it is required that the checkpoints and message log must be nearby. Furthermore, if checkpoints and message log are transferred with every handoff, then the transfer cost will become very much significant. Thus in this paper, I proposed a distance based recovery scheme which restrict the transfer of recovery information as MH moves across the cells and is allowed only when it moves out of a particular range.
Mostrar mais

7 Ler mais

Context-Aware Personalization Environment for Mobile Computing

Context-Aware Personalization Environment for Mobile Computing

When multimodality became available, there was a lot of enthusiasm that was ultimately unjustified because people thought it allowed the usage of every application with their favourite modality while raising performance and user satisfaction at the same time [Kur07]. It was thought that personalization systems would enable this type of "auto- matic adaptation to user needs", but in reality a lot of different approaches were proposed with limited success and different results. Kurze offers an overarching personalization tool that acts independently from individual applications and that detects which modal- ity or modalities are being used, deducting the reason why the user acted in the described way. This is a serious issue because multimodality offers the user a richer choice to se- lect tools and methods to perform his task, resulting in an increase in input, which also increases the level of complexity in the user model. The most prominent key modules of the highly modular framework are the sensors which collect information on the user’s interactions, the user model (profile database) which is implemented as centralized ho- mogeneous storage and management unit and the machine learning unit (classification and recommendation modules). Initial observations showed that the framework pro- duces valid and valuable results for the tested scenarios. Still, no proof was found that multimodal interfaces can benefit from the proposed personalization framework.
Mostrar mais

122 Ler mais

Show all 10000 documents...