CINXE.COM

Search results for: mobile grid computing

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: mobile grid computing</title> <meta name="description" content="Search results for: mobile grid computing"> <meta name="keywords" content="mobile grid computing"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="mobile grid computing" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="mobile grid computing"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3500</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: mobile grid computing</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3500</span> Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing" title="mobile grid computing">mobile grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20authority%20%28CA%29" title=" certificate authority (CA)"> certificate authority (CA)</a>, <a href="https://publications.waset.org/abstracts/search?q=SSL%2FTLS%20protocol" title=" SSL/TLS protocol"> SSL/TLS protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=secured%20service%20certificates" title=" secured service certificates"> secured service certificates</a> </p> <a href="https://publications.waset.org/abstracts/29817/adaptive-certificate-based-mutual-authentication-protocol-for-mobile-grid-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3499</span> Grid Computing for Multi-Objective Optimization Problems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aouaouche%20Elmaouhab">Aouaouche Elmaouhab</a>, <a href="https://publications.waset.org/abstracts/search?q=Hassina%20Beggar"> Hassina Beggar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Solving multi-objective discrete optimization applications has always been limited by the resources of one machine: By computing power or by memory, most often both. To speed up the calculations, the grid computing represents a primary solution for the treatment of these applications through the parallelization of these resolution methods. In this work, we are interested in the study of some methods for solving multiple objective integer linear programming problem based on Branch-and-Bound and the study of grid computing technology. This study allowed us to propose an implementation of the method of Abbas and Al on the grid by reducing the execution time. To enhance our contribution, the main results are presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-objective%20optimization" title="multi-objective optimization">multi-objective optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=integer%20linear%20programming" title=" integer linear programming"> integer linear programming</a>, <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title=" grid computing"> grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20computing" title=" parallel computing"> parallel computing</a> </p> <a href="https://publications.waset.org/abstracts/31941/grid-computing-for-multi-objective-optimization-problems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31941.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">485</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3498</span> A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fat%C3%A9ma%20Zahra%20Benchara">Fatéma Zahra Benchara</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Youssfi"> Mohamed Youssfi</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20Bouattane"> Omar Bouattane</a>, <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Ouajji"> Hassan Ouajji</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Ouadi%20Bensalah"> Mohamed Ouadi Bensalah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title="image processing">image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20environment" title=" distributed environment"> distributed environment</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20and%20distributed%20computing" title=" parallel and distributed computing"> parallel and distributed computing</a> </p> <a href="https://publications.waset.org/abstracts/24158/a-new-distributed-computing-environment-based-on-mobile-agents-for-massively-parallel-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24158.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3497</span> Mobile Cloud Middleware: A New Service for Mobile Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Akherfi">K. Akherfi</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Harroud"> H. Harroud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different technologies such as 3Gs). This paper presents a review on the concept of CC and MCC. Then, it discusses what has been done regarding middleware in CC and MCC. Later, it shows the architecture of our proposed middleware along with its functionalities which will be provided to mobile clients in order to overcome the well-known problems (such as low battery power, slow CPU speed and, little memory etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context-aware" title="context-aware">context-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=middleware" title=" middleware"> middleware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a> </p> <a href="https://publications.waset.org/abstracts/5233/mobile-cloud-middleware-a-new-service-for-mobile-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3496</span> Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aabiah%20Nayeem">Aabiah Nayeem</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariha%20Shafiq"> Fariha Shafiq</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustabshra%20Aftab"> Mustabshra Aftab</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saman%20Pirzada"> Rabia Saman Pirzada</a>, <a href="https://publications.waset.org/abstracts/search?q=Samia%20Ghazala"> Samia Ghazala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today&rsquo;s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20computing" title="embedded computing">embedded computing</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20technologies" title=" wireless technologies"> wireless technologies</a> </p> <a href="https://publications.waset.org/abstracts/82889/comparison-of-security-challenges-and-issues-of-mobile-computing-and-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3495</span> Examining the Importance of the Structure Based on Grid Computing Service and Virtual Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sajjad%20Baghernezhad">Sajjad Baghernezhad</a>, <a href="https://publications.waset.org/abstracts/search?q=Saeideh%20Baghernezhad"> Saeideh Baghernezhad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Vast changes and developments achieved in information technology field in recent decades have made the review of different issues such as organizational structures unavoidable. Applying informative technologies such as internet and also vast use of computer and related networks have led to new organizational formations with a nature completely different from the traditional, great and bureaucratic ones; some common specifications of such organizations are transfer of the affairs out of the organization, benefiting from informative and communicative networks and centered-science workers. Such communicative necessities have led to network sciences development including grid computing. First, the grid computing was only to relate some sites for short – time and use their sources simultaneously, but now it has gone beyond such idea. In this article, the grid computing technology was examined, and at the same time, virtual organization concept was discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title="grid computing">grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20organizations" title=" virtual organizations"> virtual organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a> </p> <a href="https://publications.waset.org/abstracts/65992/examining-the-importance-of-the-structure-based-on-grid-computing-service-and-virtual-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65992.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3494</span> Mobile Cloud Computing: How to Improve</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Aljumah">Abdullah Aljumah</a>, <a href="https://publications.waset.org/abstracts/search?q=Tariq%20Ahamad"> Tariq Ahamad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cloud%20Computing" title="Cloud Computing">Cloud Computing</a>, <a href="https://publications.waset.org/abstracts/search?q=MCC" title=" MCC"> MCC</a>, <a href="https://publications.waset.org/abstracts/search?q=SAAS" title=" SAAS"> SAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20interaction" title=" computer interaction"> computer interaction</a> </p> <a href="https://publications.waset.org/abstracts/20811/mobile-cloud-computing-how-to-improve" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3493</span> Utilizing Grid Computing to Enhance Power Systems Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rafid%20A.%20Al-Khannak">Rafid A. Al-Khannak</a>, <a href="https://publications.waset.org/abstracts/search?q=Fawzi%20M.%20Al-Naima"> Fawzi M. Al-Naima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DeskGrid" title="DeskGrid">DeskGrid</a>, <a href="https://publications.waset.org/abstracts/search?q=Grid%20Server" title=" Grid Server"> Grid Server</a>, <a href="https://publications.waset.org/abstracts/search?q=idle%20contributor%28s%29" title=" idle contributor(s)"> idle contributor(s)</a>, <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title=" grid computing"> grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20forecasting" title=" load forecasting"> load forecasting</a> </p> <a href="https://publications.waset.org/abstracts/7716/utilizing-grid-computing-to-enhance-power-systems-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7716.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3492</span> Dynamic Ad-hoc Topologies for Mobile Robot Navigation Based on Non-Uniform Grid Maps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peter%20Sauer">Peter Sauer</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Hinze"> Thomas Hinze</a>, <a href="https://publications.waset.org/abstracts/search?q=Petra%20Hofstedt"> Petra Hofstedt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To avoid obstacles in the surrounding environment and to navigate to a given target belong to the most important tasks for mobile robots. According to these tasks different data structures are suitable. To avoid near obstacles, occupancy grid maps are an ideal representation of the surroundings. For less fine grained tasks, such as navigating from one room to another in an apartment, pure grid maps are inappropriate. Grid maps are very detailed, calculating paths to navigate between rooms based on grid maps would take too long. Instead, graph-based data structures, so-called topologies, turn out to be a proper choice for such tasks. In this paper we present two methods to dynamically create topologies from grid maps. Both methods are based on non-uniform grid maps. The topologies are generated on-the-fly and can easily be modified to represent changes in the environment. This allows a hybrid approach to control mobile robots, where, depending on the situation and the current task, either the grid map or the generated topology may be used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=robot%20navigation" title="robot navigation">robot navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=occupancy%20grids" title=" occupancy grids"> occupancy grids</a>, <a href="https://publications.waset.org/abstracts/search?q=topological%20maps" title=" topological maps"> topological maps</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20map%20creation" title=" dynamic map creation"> dynamic map creation</a> </p> <a href="https://publications.waset.org/abstracts/22654/dynamic-ad-hoc-topologies-for-mobile-robot-navigation-based-on-non-uniform-grid-maps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">563</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3491</span> Towards Reliable Mobile Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Darwish">Khaled Darwish</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam%20El%20Madahh"> Islam El Madahh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoda%20Mohamed"> Hoda Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadia%20El%20Hennawy"> Hadia El Hennawy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=availability" title=" availability"> availability</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenStack" title=" OpenStack"> OpenStack</a> </p> <a href="https://publications.waset.org/abstracts/37013/towards-reliable-mobile-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3490</span> Keynote Talk: The Role of Internet of Things in the Smart Cities Power System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdul-Rahman%20Al-Ali">Abdul-Rahman Al-Ali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the number of mobile devices is growing exponentially, it is estimated to connect about 50 million devices to the Internet by the year 2020. At the end of this decade, it is expected that an average of eight connected devices per person worldwide. The 50 billion devices are not mobile phones and data browsing gadgets only, but machine-to-machine and man-to-machine devices. With such growing numbers of devices the Internet of Things (I.o.T) concept is one of the emerging technologies as of recently. Within the smart grid technologies, smart home appliances, Intelligent Electronic Devices (IED) and Distributed Energy Resources (DER) are major I.o.T objects that can be addressable using the IPV6. These objects are called the smart grid internet of things (SG-I.o.T). The SG-I.o.T generates big data that requires high-speed computing infrastructure, widespread computer networks, big data storage, software, and platforms services. A company’s utility control and data centers cannot handle such a large number of devices, high-speed processing, and massive data storage. Building large data center’s infrastructure takes a long time, it also requires widespread communication networks and huge capital investment. To maintain and upgrade control and data centers’ infrastructure and communication networks as well as updating and renewing software licenses which collectively, requires additional cost. This can be overcome by utilizing the emerging computing paradigms such as cloud computing. This can be used as a smart grid enabler to replace the legacy of utilities data centers. The talk will highlight the role of I.o.T, cloud computing services and their development models within the smart grid technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intelligent%20electronic%20devices%20%28IED%29" title="intelligent electronic devices (IED)">intelligent electronic devices (IED)</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20energy%20resources%20%28DER%29" title=" distributed energy resources (DER)"> distributed energy resources (DER)</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20home%20appliances" title=" smart home appliances"> smart home appliances</a> </p> <a href="https://publications.waset.org/abstracts/44583/keynote-talk-the-role-of-internet-of-things-in-the-smart-cities-power-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44583.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3489</span> Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandeep%20Mehmi">Sandeep Mehmi</a>, <a href="https://publications.waset.org/abstracts/search?q=Harsh%20Verma"> Harsh Verma</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20L.%20Sangal"> A. L. Sangal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20networks" title="artificial neural networks">artificial neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20systems" title=" intrusion detection systems"> intrusion detection systems</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20issues" title=" security issues"> security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a> </p> <a href="https://publications.waset.org/abstracts/70795/artificial-neural-network-based-model-for-detecting-attacks-in-smart-grid-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70795.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">318</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3488</span> Mobile Agents-Based Framework for Dynamic Resource Allocation in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Safia%20Rabaaoui">Safia Rabaaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=H%C3%A9la%20Hachicha"> Héla Hachicha</a>, <a href="https://publications.waset.org/abstracts/search?q=Ezzeddine%20Zagrouba"> Ezzeddine Zagrouba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, cloud computing is becoming the more popular technology to various companies and consumers, which benefit from its increased efficiency, cost optimization, data security, unlimited storage capacity, etc. One of the biggest challenges of cloud computing is resource allocation. Its efficiency directly influences the performance of the whole cloud environment. Finding an effective method to address these critical issues and increase cloud performance was necessary. This paper proposes a mobile agents-based framework for dynamic resource allocation in cloud computing to minimize both the cost of using virtual machines and the makespan. Furthermore, its impact on the best response time and power consumption has been studied. The simulation showed that our method gave better results than here. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent%20system" title=" multi-agent system"> multi-agent system</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agent" title=" mobile agent"> mobile agent</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20resource%20allocation" title=" dynamic resource allocation"> dynamic resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=cost" title=" cost"> cost</a>, <a href="https://publications.waset.org/abstracts/search?q=makespan" title=" makespan"> makespan</a> </p> <a href="https://publications.waset.org/abstracts/168460/mobile-agents-based-framework-for-dynamic-resource-allocation-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168460.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3487</span> Sharing Experience in Authentic Learning for Mobile Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kai%20Qian">Kai Qian</a>, <a href="https://publications.waset.org/abstracts/search?q=Lixin%20Tao"> Lixin Tao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title="mobile computing">mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=labware" title=" labware"> labware</a> </p> <a href="https://publications.waset.org/abstracts/7212/sharing-experience-in-authentic-learning-for-mobile-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3486</span> Virtualizing Attendance and Reducing Impacts on the Environment with a Mobile Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paulo%20R.%20M.%20Andrade">Paulo R. M. Andrade</a>, <a href="https://publications.waset.org/abstracts/search?q=Adriano%20B.%20Albuquerque"> Adriano B. Albuquerque</a>, <a href="https://publications.waset.org/abstracts/search?q=Ot%C3%A1vio%20F.%20Frota"> Otávio F. Frota</a>, <a href="https://publications.waset.org/abstracts/search?q=Robson%20V.%20Silveira"> Robson V. Silveira</a>, <a href="https://publications.waset.org/abstracts/search?q=F%C3%A1tima%20A.%20da%20Silva"> Fátima A. da Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information technology has been gaining more and more space whether in industry, commerce or even for personal use, but the misuse of it brings harm to the environment and human health as a result. Contribute to the sustainability of the planet is to compensate the environment, all or part of what withdraws it. The green computing also came to propose practical for use in IT in an environmentally correct way in aid of strategic management and communication. This work focuses on showing how a mobile application can help businesses reduce costs and reduced environmental impacts caused by its processes, through a case study of a public company in Brazil. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=green%20computing" title="green computing">green computing</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title=" sustainable development"> sustainable development</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a> </p> <a href="https://publications.waset.org/abstracts/25973/virtualizing-attendance-and-reducing-impacts-on-the-environment-with-a-mobile-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25973.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3485</span> Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title="grid computing">grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=onion%20routing" title=" onion routing"> onion routing</a>, <a href="https://publications.waset.org/abstracts/search?q=ECC" title=" ECC"> ECC</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a> </p> <a href="https://publications.waset.org/abstracts/28834/performance-analysis-of-elliptic-curve-cryptography-using-onion-routing-to-enhance-the-privacy-and-anonymity-in-grid-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3484</span> Audio Information Retrieval in Mobile Environment with Fast Audio Classifier</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20T.%20Gomes">Bruno T. Gomes</a>, <a href="https://publications.waset.org/abstracts/search?q=Jos%C3%A9%20A.%20Menezes"> José A. Menezes</a>, <a href="https://publications.waset.org/abstracts/search?q=Giordano%20Cabral"> Giordano Cabral</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the popularity of smartphones, mobile apps emerge to meet the diverse needs, however the resources at the disposal are limited, either by the hardware, due to the low computing power, or the software, that does not have the same robustness of desktop environment. For example, in automatic audio classification (AC) tasks, musical information retrieval (MIR) subarea, is required a fast processing and a good success rate. However the mobile platform has limited computing power and the best AC tools are only available for desktop. To solve these problems the fast classifier suits, to mobile environments, the most widespread MIR technologies, seeking a balance in terms of speed and robustness. At the end we found that it is possible to enjoy the best of MIR for mobile environments. This paper presents the results obtained and the difficulties encountered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=audio%20classification" title="audio classification">audio classification</a>, <a href="https://publications.waset.org/abstracts/search?q=audio%20extraction" title=" audio extraction"> audio extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=environment%20mobile" title=" environment mobile"> environment mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=musical%20information%20retrieval" title=" musical information retrieval"> musical information retrieval</a> </p> <a href="https://publications.waset.org/abstracts/36642/audio-information-retrieval-in-mobile-environment-with-fast-audio-classifier" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">544</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3483</span> Load Balancing Algorithms for SIP Server Clusters in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tanmay%20Raj">Tanmay Raj</a>, <a href="https://publications.waset.org/abstracts/search?q=Vedika%20Gupta"> Vedika Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20balancing" title=" load balancing"> load balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=computing" title=" computing"> computing</a>, <a href="https://publications.waset.org/abstracts/search?q=SIP%20server%20clusters" title=" SIP server clusters"> SIP server clusters</a> </p> <a href="https://publications.waset.org/abstracts/150361/load-balancing-algorithms-for-sip-server-clusters-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150361.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3482</span> Comparative Study on Manet Using Soft Computing Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amarjit%20Singh">Amarjit Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Tripatdeep%20Singh%20Dua"> Tripatdeep Singh Dua</a>, <a href="https://publications.waset.org/abstracts/search?q=Vikas%20Attri"> Vikas Attri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20ad-hoc%20network" title="mobile ad-hoc network">mobile ad-hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20improved%20genetic%20approach" title=" fuzzy improved genetic approach"> fuzzy improved genetic approach</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=routing%20protocol" title=" routing protocol"> routing protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20mesh%20network" title=" wireless mesh network"> wireless mesh network</a> </p> <a href="https://publications.waset.org/abstracts/40121/comparative-study-on-manet-using-soft-computing-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3481</span> Enhancing Cloud Computing with Security Trust Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Ayoade">John Ayoade</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20authority" title=" certificate authority"> certificate authority</a>, <a href="https://publications.waset.org/abstracts/search?q=PKI" title=" PKI"> PKI</a> </p> <a href="https://publications.waset.org/abstracts/16186/enhancing-cloud-computing-with-security-trust-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16186.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">484</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3480</span> Path Planning for Orchard Robot Using Occupancy Grid Map in 2D Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Satyam%20Raikwar">Satyam Raikwar</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Herlitzius"> Thomas Herlitzius</a>, <a href="https://publications.waset.org/abstracts/search?q=Jens%20Fehrmann"> Jens Fehrmann</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the autonomous navigation of orchard and field robots is an emerging technology of the mobile robotics in agriculture. One of the core aspects of autonomous navigation builds upon path planning, which is still a crucial issue. Generally, for simple representation, the path planning for a mobile robot is performed in a two-dimensional space, which creates a path between the start and goal point. This paper presents the automatic path planning approach for robots used in orchards and vineyards using occupancy grid maps with field consideration. The orchards and vineyards are usually structured environment and their topology is assumed to be constant over time; therefore, in this approach, an RGB image of a field is used as a working environment. These images undergone different image processing operations and then discretized into two-dimensional grid matrices. The individual grid or cell of these grid matrices represents the occupancy of the space, whether it is free or occupied. The grid matrix represents the robot workspace for motion and path planning. After the grid matrix is described, a probabilistic roadmap (PRM) path algorithm is used to create the obstacle-free path over these occupancy grids. The path created by this method was successfully verified in the test area. Furthermore, this approach is used in the navigation of the orchard robot. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=orchard%20robots" title="orchard robots">orchard robots</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20path%20planning" title=" automatic path planning"> automatic path planning</a>, <a href="https://publications.waset.org/abstracts/search?q=occupancy%20grid" title=" occupancy grid"> occupancy grid</a>, <a href="https://publications.waset.org/abstracts/search?q=probabilistic%20roadmap" title=" probabilistic roadmap"> probabilistic roadmap</a> </p> <a href="https://publications.waset.org/abstracts/110023/path-planning-for-orchard-robot-using-occupancy-grid-map-in-2d-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110023.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3479</span> Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jeana%20Cadby">Jeana Cadby</a>, <a href="https://publications.waset.org/abstracts/search?q=Kae%20Miyazawa"> Kae Miyazawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20benefits" title=" environmental benefits"> environmental benefits</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title=" mobile technology"> mobile technology</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a> </p> <a href="https://publications.waset.org/abstracts/84887/indirect-environmental-benefits-from-cloud-computing-information-and-communications-technology-integration-in-rural-agricultural-communities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3478</span> Integration of Internet-Accessible Resources in the Field of Mobile Robots</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Madhevan">B. Madhevan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sakkaravarthi"> R. Sakkaravarthi</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Diya"> R. Diya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number and variety of mobile robot applications are increasing day by day, both in an industry and in our daily lives. First developed as a tool, nowadays mobile robots can be integrated as an entity in Internet-accessible resources. The present work is organized around four potential resources such as cloud computing, Internet of things, Big data analysis and Co-simulation. Further, the focus relies on integrating, analyzing and discussing the need for integrating Internet-accessible resources and the challenges deriving from such integration, and how these issues have been tackled. Hence, the research work investigates the concepts of the Internet-accessible resources from the aspect of the autonomous mobile robots with an overview of the performances of the currently available database systems. IaR is a world-wide network of interconnected objects, can be considered an evolutionary process in mobile robots. IaR constitutes an integral part of future Internet with data analysis, consisting of both physical and virtual things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet-accessible%20resources" title="internet-accessible resources">internet-accessible resources</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data%20analysis" title=" big data analysis"> big data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20robot" title=" mobile robot"> mobile robot</a> </p> <a href="https://publications.waset.org/abstracts/50385/integration-of-internet-accessible-resources-in-the-field-of-mobile-robots" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50385.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3477</span> Cloud Computing: Major Issues and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Adhirai%20Subramaniyam">S. Adhirai Subramaniyam</a>, <a href="https://publications.waset.org/abstracts/search?q=Paramjit%20Singh"> Paramjit Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20cloud" title=" private cloud"> private cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20cloud" title=" public cloud"> public cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20cloud" title=" hybrid cloud"> hybrid cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=SAAS" title=" SAAS"> SAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=PAAS" title=" PAAS"> PAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=IAAS" title=" IAAS"> IAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title=" cloud security"> cloud security</a> </p> <a href="https://publications.waset.org/abstracts/67736/cloud-computing-major-issues-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3476</span> Managers’ Mobile Information Behavior in an Openness Paradigm Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman">Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuraidah%20Arif"> Zuraidah Arif</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faizal%20Iylia"> Muhammad Faizal Iylia</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Ghazali"> Mohd Ghazali</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20information%20behavior" title="mobile information behavior">mobile information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20behavior" title=" information behavior"> information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20information" title=" mobile information"> mobile information</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/45724/managers-mobile-information-behavior-in-an-openness-paradigm-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3475</span> Key Concepts of 5th Generation Mobile Technology </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magri%20Hicham">Magri Hicham</a>, <a href="https://publications.waset.org/abstracts/search?q=Noreddine%20Abghour"> Noreddine Abghour</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Ouzzif"> Mohamed Ouzzif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WWWW" title="WWWW">WWWW</a>, <a href="https://publications.waset.org/abstracts/search?q=BDMA" title=" BDMA"> BDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=DAWN" title=" DAWN"> DAWN</a>, <a href="https://publications.waset.org/abstracts/search?q=5G" title=" 5G"> 5G</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20Computing" title=" Cloud Computing "> Cloud Computing </a> </p> <a href="https://publications.waset.org/abstracts/27718/key-concepts-of-5th-generation-mobile-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">514</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3474</span> A Study of Key Technologies for the Realization of Smart Grid and Its Research Situation in Pakistan and Abroad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arjmand%20Khaliq">Arjmand Khaliq</a>, <a href="https://publications.waset.org/abstracts/search?q=Pemra%20Sohaib"> Pemra Sohaib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper smart grid technologies which converts conventional grid into smart grid has been discussed. Integration of advanced technologies including two way communication, advanced control system, sensors, smart metering system and other provide opportunity to make conventional grid a intelligent and automatic system which is named as smart grid. This paper gives the concept of smart grid and functional characteristics of smart grid technology, summed up the research progress in Pakistan and abroad and the significance of developing smart grid. Based on the analysis of the smart grid, smart grid technologies will result a reliable and energy efficient power system in the future. On the other hand smart grid technologies have been reviewed in this paper highlighting the key technologies of smart grid, and points out the problems and challenges in the realization of smart grid. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy" title="energy">energy</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20reliability" title=" power system reliability"> power system reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20monitoring%20and%20control" title=" power system monitoring and control"> power system monitoring and control</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=two-way%20communication" title=" two-way communication "> two-way communication </a> </p> <a href="https://publications.waset.org/abstracts/40935/a-study-of-key-technologies-for-the-realization-of-smart-grid-and-its-research-situation-in-pakistan-and-abroad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3473</span> A Novel Approach to Design and Implement Context Aware Mobile Phone</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20S.%20Thyagaraju">G. S. Thyagaraju</a>, <a href="https://publications.waset.org/abstracts/search?q=U.%20P.%20Kulkarni"> U. P. Kulkarni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context%20aware%20mobile" title="context aware mobile">context aware mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20table" title=" decision table"> decision table</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20probability" title=" Bayesian probability"> Bayesian probability</a> </p> <a href="https://publications.waset.org/abstracts/3671/a-novel-approach-to-design-and-implement-context-aware-mobile-phone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3671.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3472</span> Factors Affecting U-Computing Use</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shui%20Lien%20Chen">Shui Lien Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Chen-Yin%20Kuo"> Chen-Yin Kuo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20orientation" title="entrepreneurial orientation">entrepreneurial orientation</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20orientation" title=" market orientation"> market orientation</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20resources" title=" business resources"> business resources</a>, <a href="https://publications.waset.org/abstracts/search?q=u-computing%20use" title=" u-computing use"> u-computing use</a>, <a href="https://publications.waset.org/abstracts/search?q=LBS" title=" LBS"> LBS</a> </p> <a href="https://publications.waset.org/abstracts/2017/factors-affecting-u-computing-use" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">592</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3471</span> Grid Architecture Model for Smart Grid</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nick%20Farid">Nick Farid</a>, <a href="https://publications.waset.org/abstracts/search?q=Roghoyeh%20Salmeh"> Roghoyeh Salmeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The planning and operation of the power grid is becoming much more complex because of the introduction of renewable energy resources, the digitalization of the electricity industry, as well as the coupling of efficiency and greener energy trends. These changes, along with new trends, make interactions between grid users and the other stakeholders more complex. This paper focuses on the main “physical” and “logical” interactions between grid users and the grid stakeholders, both from power system equipment and information management standpoints, and proposes a new interoperability model for Smart Grids. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=user%20interface" title="user interface">user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability%20layers" title=" interoperability layers"> interoperability layers</a>, <a href="https://publications.waset.org/abstracts/search?q=grid%20architecture%20%20framework" title=" grid architecture framework"> grid architecture framework</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a> </p> <a href="https://publications.waset.org/abstracts/141588/grid-architecture-model-for-smart-grid" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141588.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=116">116</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=117">117</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10