{"title":"Big Data Analytics for Sustainable Computing","authors":"A. Haldorai, A. Ramu, C. Chow","doi":"10.4018/978-1-5225-9750-6","DOIUrl":"https://doi.org/10.4018/978-1-5225-9750-6","url":null,"abstract":"Big Data analytics is the process of collecting, organizing and analyzing large sets of data. To analyze such a large volume of data, Big Data analytics is typically performed using specialized software tools and applications for predictive analytics, data mining, text mining, forecasting and data optimization. Big Data analytics can help organizations to better understand the information contained within the data and will also help identify the data that is most important to the business and future business decisions. Collectively these processes are separate but highly integrated functions of high-performance analytics. Using Big Data tools and software enables an organization to process extremely large volumes of data that a business has collected to determine which data is relevant and can be analyzed to drive better business decisions in the future. This issue focused high quality research papers that address significant and new big data application and related system development issues in the emerging sustainable application domains. We anticipate this issue will open new entrance for further research and technology improvements in this important area. This issue features fourteen selected papers with high quality. The first article, “An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing”, presents the hitches of storing healthcare related data on cloud and safeguarding in an astounding way. Diverse technology applications of cloud can be reinforced with wrapping the information of the user’s unsigned verification based on the element based encoding (EBE) is employed and fine grained data access control based on the advanced encryption scheme are tailored. The author researched that the key generation based on various set of elements plays a vital role in hiding the information of the users while gaining access to the data present over the network. Moreover for reducing the setbacks in safeguarding the key of the data containers the personal health records are classified into several associated fields. Thereby, proposed research work focus on effectiveness in terms of safety and secrecy of data over cloud. The second article, “Prediction of Individual’s Character in Social Media Using Contextual Semantic Sentiment Analysis”, proposed Sentiment Analysis Prediction for text mining as well as natural language processing. Paper discussed about people’s opinion towards product, service, tourism, movies, political issues, education systems opinion through social media like Twitter, Facebook etc., The key focus of this paper is to introduce Opinion COW (Opinion Co-Occurrence Word) method for Opinion Circle Method using contextual semantic sentiment analysis and Hybrid method to categorize the twitter users based onMaslow theory and identify the sentiment of each tweet. The third article, “Ensembled Population Rescaled Differential Evolution with Weighted Boosting for Early Breast Cancer D","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless hotspots: current challenges and future directions","authors":"Anand Balachandran, G. Voelker, P. Bahl","doi":"10.1145/941326.941328","DOIUrl":"https://doi.org/10.1145/941326.941328","url":null,"abstract":"In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users and empowering them with the ability to access email, Web, and other Internet applications on the move. In this paper, we observe that while the mobile computing landscape has changed both in terms of number and type of hotspot venues, there are several technological and deployment challenges remaining before hotspots can become an ubiquitous infrastructure. These challenges include authentication, security, coverage, management, location services, billing, and interoperability. We discuss existing research, the work of standards bodies, and the experience of commercial hotspot providers in these areas, and then describe compelling open research questions that remain.","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132116689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Discovery Protocol for Mobile Computing","authors":"C. Perkins, H. Harjono","doi":"10.1007/978-0-387-34980-0_22","DOIUrl":"https://doi.org/10.1007/978-0-387-34980-0_22","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Ad Hoc Networking - Editorial","authors":"M. S. Corson, J. Freebersyser, A. Sastry","doi":"10.1023/A:1019142730539","DOIUrl":"https://doi.org/10.1023/A:1019142730539","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guest Editorial - Special Issue on \"Advances in Modelling and Optimisation of Wireless Networks\"","authors":"D. Miorandi, M. Médard","doi":"10.1007/s11036-010-0286-y","DOIUrl":"https://doi.org/10.1007/s11036-010-0286-y","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocols for Mobile Environments - Editorial","authors":"K. Makki, N. Pissinou","doi":"10.1023/A:1013684701038","DOIUrl":"https://doi.org/10.1023/A:1013684701038","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Twin Framework for Large-Scale Optimization Problems in Supply Chains: A Case of Packing Problem","authors":"J. Saucedo","doi":"10.1007/s11036-021-01856-9","DOIUrl":"https://doi.org/10.1007/s11036-021-01856-9","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121385547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial: Data and Information in Online Environments","authors":"E. Alvarez","doi":"10.1007/s11036-022-02001-w","DOIUrl":"https://doi.org/10.1007/s11036-022-02001-w","url":null,"abstract":"","PeriodicalId":194401,"journal":{"name":"Mob. Networks Appl.","volume":"651 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123118368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}