Mobile Computing - Technology and Applications最新文献

筛选
英文 中文
Integrating Cloud Computing with Next-Generation Telematics for Energy Sustainability in Vehicular Networks 集成云计算和下一代远程信息处理技术,实现汽车网络的能源可持续性
Mobile Computing - Technology and Applications Pub Date : 2018-05-30 DOI: 10.5772/INTECHOPEN.74460
M. Liotine
{"title":"Integrating Cloud Computing with Next-Generation Telematics for Energy Sustainability in Vehicular Networks","authors":"M. Liotine","doi":"10.5772/INTECHOPEN.74460","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.74460","url":null,"abstract":"This research focuses on new approaches to enhance the economic viability of newer hybrid/electric vehicle technology utilizing a telematic and cloud computing framework. First, an economic foundation is proposed that rewards drivers for energy efficient driver behavior in units of energy based on a predefined standard. Next, a service model is presented that allows drivers to transfer information regarding their energy efficiency through a telematic and cloud computing network. Based on existing cloud computing technology and telematic standards, a network architecture is proposed to transfer this information to service integrators and content providers that can use this information to create vehicle energy resource management capabilities for vehicle users and fleet own - ers. Such an architecture would enable drivers or fleet owners to redeem energy units for monetary or promotional incentives, thereby realizing more economic value for the vehicle investment.","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"os-34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127776882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Web Service Consumption Through Mobile Cloud Computing 通过移动云计算可靠的Web服务消费
Mobile Computing - Technology and Applications Pub Date : 2018-05-30 DOI: 10.5772/INTECHOPEN.74461
Amr S. Abdelfattah, T. Abdelkader, EI-Sayed M. EI-Horbaty
{"title":"Reliable Web Service Consumption Through Mobile Cloud Computing","authors":"Amr S. Abdelfattah, T. Abdelkader, EI-Sayed M. EI-Horbaty","doi":"10.5772/INTECHOPEN.74461","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.74461","url":null,"abstract":"The mobile intermittent wireless connectivity limits the evolution of the mobile land - scape. Achieving web service reliability results in low communication overhead and cor rect retrieval of the appropriate state response. In this chapter, we discuss and analyze two approaches based on middleware approach, Reliable Service Architecture using Middleware (RSAM), and Reliable Approach using Middleware and WebSocket (RAMWS). These approaches achieve the reliability of web services consumed by mobile devices and propose an enhanced architecture that achieves the reliability under various conditions with minimum communication data overhead. In these experiments, we covered several cases to prove the achievement of reliability. Results also show that the request size was found to be constant, the response size is identical to the traditional architecture, and the increase in the consumption time was less than 5% with the different response sizes.","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Taxonomy of Cloud Lock-in Challenges 云锁定挑战的分类
Mobile Computing - Technology and Applications Pub Date : 2018-05-30 DOI: 10.5772/INTECHOPEN.74459
Justice Opara-Martins
{"title":"Taxonomy of Cloud Lock-in Challenges","authors":"Justice Opara-Martins","doi":"10.5772/INTECHOPEN.74459","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.74459","url":null,"abstract":"This chapter reviews key concepts and terminologies needed for understanding the com- plexity of the vendor lock-in problem being investigated in this book. Firstly, we present aspects of cloud computing that contribute to vendor lock-in and briefly introduce existing results from cloud-related areas of computer science that contributes to understanding and tackling vendor lock-in. Secondly, we explore the literature on proprietary lock-in risks in cloud computing environments to identify its causes (i.e., restrictions), consequences, miti-gations strategies, and related challenges faced by enterprise consumers migrating to cloud- based services. Then, we propose taxonomy of cloud lock-in perspectives based on reports of real experiences on migration to understand the overall cloud SaaS migration challenges. Finally, we narrow down to our perspective on cloud lock-in to three main perspectives which takes the use of sound techniques from IS research discipline and cloud-related literature into consideration, to improve the portability, security and interoperability of cloud (and on-premise) applications in hybrid environments. Collectively, the discussions presented herein, accordingly enables both academia and IT practitioners in the cloud computing community to get an overarching view of the process of combating application and data lock-in challenges, and security risks in the cloud.","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122927784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Validating Activity-Based Travel Demand Models Using Mobile Phone Data 利用手机数据验证基于活动的旅游需求模型
Mobile Computing - Technology and Applications Pub Date : 2018-03-31 DOI: 10.5772/INTECHOPEN.75810
Feng Liu, Ziyou Gao, B. Jia, Xuedong Yan, D. Janssens, GeertWets
{"title":"Validating Activity-Based Travel Demand Models Using Mobile Phone Data","authors":"Feng Liu, Ziyou Gao, B. Jia, Xuedong Yan, D. Janssens, GeertWets","doi":"10.5772/INTECHOPEN.75810","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.75810","url":null,"abstract":"Activity-based travel demand models predict travel sequences on a day for each indi- vidual in a study region. These sequences serve as important input for travel demand estimate and forecast in the area. However, a reliable method to evaluate the generated sequences has been lacking, hampering further development and application of the models. In this chapter, we use travel behavioral information inferred from mobile phone data for such validation purposes. Our method is composed of three major steps. First, locations where a user made calls on a day are extracted from his/her mobile phone records, and these locations form a location trajectory. All the trajectories from the user across multiple days are then transformed into actual travel sequences. The sequences derived from all phone users are further classified into typical patterns which, along with their relative frequencies, define travel profiles. These profiles char- acterize current travel behavior in the study region and can thus be utilized for assessing sequences generated from activity-based models. By comparing the obtained profiles with statistics drawn from conventional travel surveys, the validation potential of the proposed method is demonstrated.","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Services Meet Distributed Cloud: Benefits, Applications, and Challenges 移动服务与分布式云:好处、应用和挑战
Mobile Computing - Technology and Applications Pub Date : 2018-03-29 DOI: 10.5772/INTECHOPEN.75818
Tien-Dung Nguyen, Yunkon Kim, Xuan-Qui Pham, Tri D. T. Nguyen, E. Huh
{"title":"Mobile Services Meet Distributed Cloud: Benefits, Applications, and Challenges","authors":"Tien-Dung Nguyen, Yunkon Kim, Xuan-Qui Pham, Tri D. T. Nguyen, E. Huh","doi":"10.5772/INTECHOPEN.75818","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.75818","url":null,"abstract":"As the explosive growth of smart devices and enormous new applications, the variety of corresponding cloud services has been growing quickly. The conventional centralized cloud was faced with an overhead on backhaul links and high latency. Accordingly, a decentralized cloud paradigm including edge computing, mobile edge computing, cloudlet, and so on, was introduced to distribute cloud services to the edge network which located in proximity to mobile devices few years ago. However, this paradigm was not paid attention at that time since cloud technology and mobile network commu - nication were immature to motivate mobile services. Recently, with the overwhelming growth of mobile communication technology and cloud technology, distributed cloud is emerging as a paradigm well equipped with technologies to support a broad range of mobile services. The 5G mobile communication technology provides high-speed data and low latency. Cloud services can be automatically deployed in the edge networks quickly and easily. Distributed cloud can prove itself to bring many benefits for mobile service such as reducing network latency, as well as computational and network overhead at the central cloud. Besides, we present some applications to emphasize the neces- sity of distributed cloud for mobile service and discuss further technical challenges in distributed cloud.","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129489804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive Security Framework in Internet of Things (IoT) for Providing Mobile Cloud Computing 面向移动云计算的物联网自适应安全框架
Mobile Computing - Technology and Applications Pub Date : 2018-03-22 DOI: 10.5772/INTECHOPEN.75190
F. Alshahwan
{"title":"Adaptive Security Framework in Internet of Things (IoT) for Providing Mobile Cloud Computing","authors":"F. Alshahwan","doi":"10.5772/INTECHOPEN.75190","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.75190","url":null,"abstract":"Internet of Things (IoT) has immense potential to change many of our daily activities, routines and behaviors. The pervasive nature of the information sources means that a great amount of data pertaining to possibly every aspect of human activity, both public and private, will be produced, transmitted, collected, stored and processed. Consequently, integrity and confidentiality of transmitted data as well as the authentication of (and trust in) the services that offer the data is crucial. Hence, security is a critical functionality for the IoT. Enormous growth of mobile devices capability, critical automation of industry fields and the widespread of wireless communication cast need for seamless provision of mobile web services in the Internet of Things (IoT) environment. These are enriched by mobile cloud computing. However, it poses a challenge for its reliability, data authentication, power consumption and security issues. There is also a need for auto self-operated sensors for geo-sensing, agriculture, automatic cars, factories, roads, medicals application and more. IoT is still highly not reliable in points of integration between how its devices are connected, that is, there is poor utilization of the existing IP security protocols. In this chapter, we propose a deep penetration method for the IoT connected set of devices, along with the mobile cloud. An architecture and testing framework for providing mobile cloud computing in the IoT that is based on the object security, power utilization, latency measures and packet loss rate is explained. Our solution is based on the use of existing security protocols between clients and the mobile hosts as well as a key management protocol between the individual mobile hosts implementing an out-of-band key exchange that is simple in practice, flexible and secure. We study the performance of this approach by evaluating a prototype implementation of our security framework. This chapter, in a preliminary manner, discusses the threats, hacks, misguided packets and over read sensor message. These packets are then translated by hardware and pushed through the web for later-on action or support. Our testing of a set of sensor-triggered scenario and setup clearly indicates the security threats from wireless connected small LAN environments and the overestimated sensor messages resulting from the initial set of the sensor readings, while we emphasize more on the security level of the web services serving the IoT-connected device. Also, we add a remark on how mobile web services © 2018 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. and their enabling devices are by far vulnerable to a 4G hack over the utilization of power pack and a serious battery use power draining issu","PeriodicalId":136436,"journal":{"name":"Mobile Computing - Technology and Applications","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信