Search results for "mobile device"

showing 10 items of 144 documents

Edge-Based Missing Data Imputation in Large-Scale Environments

2021

Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis

010504 meteorology & atmospheric sciencesComputer scienceDistributed computingUrban sensingMobile sensingContext (language use)Information technology02 engineering and technology01 natural sciences[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Smart cityEdge intelligence11. Sustainability0202 electrical engineering electronic engineering information engineeringLeverage (statistics)Edge computingVoronoi tessellation0105 earth and related environmental sciencesSmart cityOut-of-order executionSettore INF/01 - InformaticaMulti-agent systemMissing data imputation020206 networking & telecommunicationsT58.5-58.64Variety (cybernetics)Multi-agent system[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Mobile deviceInformation Systems
researchProduct

Energy Efficient Optimization for Computation Offloading in Fog Computing System

2017

In this paper, we investigate the energy efficient computation offloading scheme in a multi-user fog computing system. We consider the users need to make the decision on whether to offload the tasks to the fog node nearby, based on the energy consumption and delay constraint. In particular, we utilize queuing theory to bring a thorough study on the energy consumption and execution delay of the offloading process. Two queuing models are applied respectively to model the execution processes at the mobile device (MD) and fog node. Based on the theoretical analysis, an energy efficient optimization problem is formulated with the objective to minimize the energy consumption subjects to execution…

020203 distributed computingOptimization problemComputer sciencebusiness.industryNode (networking)Distributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionDistributed algorithm0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessMobile deviceEdge computingEfficient energy useGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

On the Use of a GPU-Accelerated Mobile Device Processor for Sound Source Localization

2017

Abstract The growing interest to incorporate new features into mobile devices has increased the number of signal processing applications running over processors designed for mobile computing. A challenging signal processing field is acoustic source localization, which is attractive for applications such as automatic camera steering systems, human-machine interfaces, video gaming or audio surveillance. In this context, the emergence of systems-on-chip (SoC) that contain a small graphics accelerator (or GPU), contributes a notable increment of the computational capacity while partially retaining the appealing low-power consumption of embedded systems. This is the case, for example, of the Sam…

020203 distributed computingSignal processingbusiness.industryComputer scienceReal-time computingMobile computing020206 networking & telecommunicationsContext (language use)02 engineering and technologyAcoustic source localizationcomputer.software_genreField (computer science)Power (physics)0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary SciencesbusinessAudio signal processingMobile devicecomputerComputer hardwareGeneral Environmental ScienceProcedia Computer Science
researchProduct

Advances in Practical Applications of Agents, Multi-Agent Systems, and Sustainability: The PAAMS Collection

2015

This volume presents the papers that have been accepted for the 2015 special sessions of the 13th International Conference on Practical Applications of Agents and Multi-Agent Systems, held at University of Salamanca, Spain, at 3rd-5th June, 2015: Agents Behaviours and Artificial Markets (ABAM); Agents and Mobile Devices (AM); Multi-Agent Systems and Ambient Intelligence (MASMAI); Web Mining and Recommender systems (WebMiRes); Learning, Agents and Formal Languages (LAFLang); Agent-based Modeling of Sustainable Behavior and Green Economies (AMSBGE); Emotional Software Agents (SSESA) and Intelligent Educational Systems (SSIES). The volume also includes the paper accepted for the Doctoral Conso…

0209 industrial biotechnologyAmbient intelligenceManagement scienceComputer scienceMulti-agent system02 engineering and technologyRecommender systemComputingMethodologies_ARTIFICIALINTELLIGENCEEngineering management020901 industrial engineering & automationWeb miningSoftware agentSustainability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMobile deviceDissemination
researchProduct

Customer Views on Problems of Internet Shopping Using Mobile Devices: Results of Recent Survey

2021

Recent developments of information technologies have supported fast development of Internet shopping worldwide and also using mobile devices. Internet shopping creates convenience for customers, bigger selection of goods and services from one side, but also creates several challenges for companies as well as some problems for companies and customers from the other side. Active research on different aspects is done by businesses, academic researchers alone and in co-operation of business and academic researchers. The aim of research is to find recent ideas of customers on Internet shops and problems raised in Internet shopping using mobile devices and to compare the results with other countr…

ATM cardGoods and servicesDigital marketingbusiness.industryGeneral Earth and Planetary SciencesWord of mouthInformation technologyThe InternetAdvertisingBusinessMobile devicePersonally identifiable informationGeneral Environmental ScienceRegional Formation and Development Studies
researchProduct

MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints

2018

As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…

Access network0203 mechanical engineeringComputer scienceDistributed computing020208 electrical & electronic engineering0202 electrical engineering electronic engineering information engineeringResource allocation020302 automobile design & engineering02 engineering and technologyEnhanced Data Rates for GSM EvolutionMarkov decision processMobile device2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

2015

This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…

Ambient intelligenceArticle SubjectExploitDatabaseComputer Networks and CommunicationsComputer sciencebusiness.industryShopping mallCloud computingTK5101-6720computer.software_genreComputer Science ApplicationsTelecommunicationIntelligent environmentUbiquitous commerceSoftware architecturebusinessMobile devicecomputerMobile Information Systems
researchProduct

AHBIM for Wooden Built Heritage Conservation

2019

The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…

Architectural engineeringbusiness.industryComputer scienceConservationAsset (computer security)Built heritageParametric designParametric designBIM Built heritage Parametric design Conservation Facility managementFacility managementBuilding information modelingArchitectural heritageTransmission (telecommunications)BIMSettore ICAR/17 - DisegnoBuilt heritageFacility managementbusinessMobile device
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct