Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
"The Future of Mobile Computing takes readers on a comprehensive journey through the rapidly evolving landscape of mobile technologies. Beginning with a detailed examination of foundational concepts in the field, the book provides insights into the transformative technology of edge computing. The subsequent chapters cover various aspects of mobile computing, addressing topics such as sustainable farming solutions, the latest trends in mobile hardware and design, and the significant role of artificial intelligence in mobile contexts. The book focuses on intelligent mobile assistants, emphasizing the impact of machine learning. Readers will find insights into eco-friendly innovations shaping sustainable mobile technologies and the practical application of mobile computing in smart cities. The book takes a close look at addressing privacy and security challenges, offering robust strategies to safeguard user data. Additional chapters provide information on the transformative potential of augmented reality and virtual reality in modern mobile computing environments. Innovative approaches, such as multimodal AI-embedded blockchain security for smart student monitoring, are explored, alongside a unique intersection of mobile computing and mental health analysis. The book concludes with a forward-looking exploration of transformative technologies and their integration with mobile computing, providing valuable insights into navigating the innovation frontier. Overall, the book serves as an accessible and essential resource for individuals seeking a comprehensive understanding of mobile technologies in the years ahead"--
Choose an application
Smartphones and Information on Current Events provides unprecedented insights into young people's news consumption patterns and the ecology of mobile news. Advancing our knowledge of mobile behaviour, the book also highlights the ways in which mobile news impacts the lives of the general public.
Choose an application
Create iOS and Android apps with Flutter using just one codebase. App development on multiple platforms has historically been difficult and complex. This book breaks down complex concepts and tasks into easily digestible segments with examples, pictures, and hands-on labs with starters and solutions. In doing so, you'll develop a basic understanding of the Dart programming language; the entire Flutter development toolchain; the differences between stateful and stateless widgets; and a working knowledge of the architecture of apps. All the most important parts of app development with Flutter are covered in this book. Work with themes and styles. Develop custom widgets. Teach your app to respond to gestures like taps, swipes, and pinches. Design, create and control the layout of your app. Create tools to handle form data entry from users. And ultimately create killer multiscreen apps with navigation, menus, and tabs. Flutter is Google's new framework for creating mobile apps that run on iOS and Android phones both.You had to be a super-developer to write apps for iOS or Android alone. But writing for both? Forget about it! You had to be familiar with Swift, Java/Kotlin, Xcode, Eclipse, and a bunch of other technologies simultaneously. Beginning App Development with Flutter simplifies the entire process.
Mobile computing. --- Apple computer. --- Mobile Computing. --- Apple and iOS.
Choose an application
"This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and deep learning models towards this end. Further, it presents a comprehensive analysis of software vulnerabilities based on different technical parameters such as causes, severity, techniques, and software systems' type. Moreover, the book also presents the current state-of-the-art in the domain of software threats and vulnerabilities. This would help analyze various threats that a system could face, and subsequently, it could guide the security engineer to take proactive and cost-effective countermeasures. Security threats are escalating exponentially, thus posing a serious challenge to mobile platforms. Android and iOS are prominent due to their enhanced capabilities and popularity among users. Therefore, it is important to compare these two mobile platforms based on security aspects. Android proved to be more vulnerable compared to iOS. The malicious apps can cause severe repercussions such as privacy leaks, app crashes, financial losses (caused by malware triggered premium rate SMSs) and arbitrary code installation, etc. Hence, Android security is a major concern amongst researchers as seen in the last few years. This book provides an exhaustive review of all the existing approaches in a structured format. The book also focuses on the detection of malicious applications that compromise users' security and privacy, the detection performance of the different program analysis approach, and the influence of different input generators during static and dynamic analysis on detection performance. This book presents a novel method using an ensemble classifier scheme for detecting malicious applications, which is less susceptible to the evolution of the Android ecosystem and malware compared to previous methods. Further, this book presents an ensemble multi-class classifier scheme to classify malware into known families. Furthermore, we propose a novel framework of mapping malware to vulnerabilities exploited using Android malware's behavior reports leveraging pre-trained language models and deep learning techniques. The mapped vulnerabilities can then be assessed on confidentiality, integrity, and availability on different Android components and sub-systems, and different layers"--
Mobile computing --- Operating systems (Computers) --- Security measures.
Choose an application
Edge computing has been identified as one of the key technologies for 5G networks and beyond due to two prominent advantages: low network latency and reduced core network load. By empowering cloud capabilities and IT service environments at the network edge, edge computing can well support applications of 5G and beyond, such as augmented/virtual reality (AR/VR), vehicular network (ultra-reliable low-latency communication services),Internet of Things (massive machine type communication services), and mobile high-definition video (enhanced mobile broadband services). Therefore, edge computing has attracted the attention of both industry and academia since its emergence. This book highlights the progress of 5G edge computing in both industry and academia according to our long-term efforts, including the current practice of public edge providers, the research process of edge computing from academia, the integration of edge computing with 5G, and the future visions of edge computing in the 6G era. From this book, the readers can benefit from: (1) the first comprehensive measurement study on a leading public edge platform, NEP (next-generation edge platform); 2) a clear and in-depth introduction of the key technologies of 5G edge computing; (3) the latest progress of 5G-integrated edge computing; and (4) pioneering exploration of 6G edge computing based on Tiansuan constellation – an open satellite-terrestrial integrated platform. Both the researchers from academia or practitioners from industry can benefit significantly from this book.
Choose an application
Take a high-level tour of SAP oDATA integrations with frontend technologies like Angular using the SAP Mobile Services Platform. This book will give you a different perspective on executing SAP transactions on iOS using Angular instead of SAP-provided Fiori-based applications. You’ll start by learning about SAP supply chain processes such as Goods Receipt, Transfer Posting, Goods Issue, and Inventory Search. You’ll then move on to understanding the thought process involved in integrating SAP's backend (SAP ECC) with Angular iOS app using SAP Mobile Services running on SAP BTP. All this will serve as a guide tailored to SAP functional and technical consultants actively engaged in client-facing roles. You’ll follow a roadmap for modernizing and streamlining supply chain operations by leveraging Angular iOS apps. Digital Transformation of SAP Supply Chain Processes provides the essential tools for businesses looking to stay competitive in today's technology-driven landscape. You will: Study the fundamental procedures to set up the Authorization Endpoint, Token Endpoint, and base URL within SAP Mobile Services. Manage attachments in mobile applications and store them in an external content repository. Gain proficiency in testing OData services using the POSTMAN API client with OAuth protocol. Acquire knowledge about the JSON messages, CORS protocol, and X-CSRF token exchange. Link Zebra Printers through the Zebra Native Printing app on iOS App to print SAP forms on mobile printers.
Choose an application
Time flies since the debut of this book. In the past ten years, localization technology has evolved from small saplings into towering trees. Robots and drones with autonomous positioning and navigation capabilities, once considered unreachable fantasies, have gradually become a reality. However, while we are being amazed at the groundbreaking changes brought about by technology, as researchers, we still need to remain acutely attentive to the current limitations of localization. Some significant challenges still impede the widespread deployment. For example, traditional Wi-Fi fingerprint-based wireless localization, due to various challenges in fingerprint database collection and maintenance, has remained stay in the laboratory, and even when using smartphones for localization in malls, we still cannot achieve the outdoor GPS-like experience. The list goes on and on. Against this backdrop, the reissue of this book aims to more comprehensively reflect the latest developments in localization technology. We have added introductions to emerging technologies such as passive high-precision localization based on wireless signal CSl and autonomous localization for smart devices. Additionally, we have integrated and further streamlined technical chapters that now appear outdated adapting to the pace of the times. This book aims to provide a comprehensive and in-depth view of location-awareness technology in today’s popular wireless networks. However, the obvious diversity of networks, from short-range Bluetooth to long-range telecommunication networks, makes it very challenging to organize materials. Although general principles exist, the implementation differs from network to network and application to application. The book can serve as a guidebook for the technicians and practitioners in the industry of location systems. They can expect to obtain a comprehensive understanding of the field, in order to compare and select localization solutions fulfilling various application requirements. Abundant references in the book open up a broader domain for advanced study. In addition, the book is tailored toward a textbook for college researchers and graduate students.
Location-based services. --- Wireless localization. --- Wireless LANs --- Wireless communication systems. --- Technological innovations. --- Mobile computing. --- Computer systems. --- Cooperating objects (Computer systems). --- Mobile Computing. --- Computer System Implementation. --- Cyber-Physical Systems.
Choose an application
Covering the principles, enabling technologies and business models behind mobility-as-a-service (MaaS), this book provides a systematic and thorough overview of the field for researchers, consultants, industry professionals, transport operators and policy makers. Wide ranging case studies offer a variety of approaches and perspectives.
Transportation --- Transportation engineering --- Mobile computing. --- Transport --- Transport --- Informatique mobile. --- Technological innovations. --- Data processing. --- Innovations. --- Technologie --- Informatique.
Choose an application
This book offers a comprehensive introduction to technological advances in Internet of Vehicles (IoV), including vehicular communications, vehicular system architectures, data dissemination algorithms, resource allocation schemes, and AI-enabled applications. It focuses on the state-of-the-art IoV with regard to three major directions, namely networking, cooperation, and intelligence, including advanced wireless communication technologies, algorithm theory, optimization mechanisms, and AI technologies. In addition, the book includes a number of case studies with system prototype implementation and hands-on experiments in IoV, making it suitable both as a technical reference work for professionals and as a textbook for graduate students.
Mobile computing. --- Cooperating objects (Computer systems). --- Mathematical optimization. --- Algorithms. --- Internet of things. --- Machine learning. --- Mobile Computing. --- Cyber-Physical Systems. --- Discrete Optimization. --- Design and Analysis of Algorithms. --- Internet of Things. --- Machine Learning.
Choose an application
This book constitutes the refereed proceedings of the 20th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2024, held in Vienna, Austria, during August 19–21, 2024. The 21 full papers and 1 short paper included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: IoT, networks and cloud services; AI, blockchain and security; blockchain techniques and technologies; AI-based applications; and smart cities and knowledge management.
Listing 1 - 10 of 13 | << page >> |
Sort by
|