Showing 21 - 37 results of 37 for search '"mobile computing"', query time: 0.07s Refine Results
  1. 21

    Adoption of Convolutional Neural Network Algorithm Combined with Augmented Reality in Building Data Visualization and Intelligent Detection by Minghui Wei, Jingjing Tang, Haotian Tang, Rui Zhao, Xiaohui Gai, Renying Lin

    Published 2021-01-01
    “…The model can make full use of mobile computing resources, avoid network delay and dependence, and guarantee the real-time requirement of data processing. …”
    Get full text
    Article
  2. 22
  3. 23

    Cognitive Wireless Networks Based Spectrum Sensing Strategies: A Comparative Analysis by Anandakumar Haldorai, Jeevanandham Sivaraj, Munivenkatappa Nagabushanam, Michaelraj Kingston Roberts

    Published 2022-01-01
    “…Because of numerous dormant application fields, wireless sensor networks (WSNs) have emerged as an important and novel area in radio and mobile computing research. These applications range from enclosed system configurations in the home and office to alfresco enlistment in an opponent’s landmass in a strategic flashpoint. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26

    A Nanotechnology Enhancement to Moore's Law by Jerry Wu, Yin-Lin Shen, Kitt Reinhardt, Harold Szu, Boqun Dong

    Published 2013-01-01
    “…Intel Moore observed an exponential doubling in the number of transistors in every 18 months through the size reduction of transistor components since 1965. In viewing of mobile computing with insatiate appetite, we explored the necessary enhancement by an increasingly maturing nanotechnology and facing the inevitable quantum-mechanical atomic and nuclei limits. …”
    Get full text
    Article
  7. 27

    Ecological momentary interventions for mental health: A scoping review. by Andreas Balaskas, Stephen M Schueller, Anna L Cox, Gavin Doherty

    Published 2021-01-01
    “…<h4>Background</h4>The development of mobile computing technology has enabled the delivery of psychological interventions while people go about their everyday lives. …”
    Get full text
    Article
  8. 28
  9. 29

    Pavement Management Utilizing Mobile Crowd Sensing by Boquan Tian, Yongbo Yuan, Hengyu Zhou, Zhen Yang

    Published 2020-01-01
    “…Benefiting from the development of mobile communication, mobile computing, and mobile sensing techniques, the intelligence of mobile crowd sensing (MCS), which mainly relies on ubiquitous mobile smart devices in people’s daily lives, has overcome the above drawbacks to a large extent as one new effective and simple measure for pavement management. …”
    Get full text
    Article
  10. 30

    Leveraging Mobile Augmented Reality Devices for Enabling Specific Human Behaviors in Design and Constructability Review by Suleiman Alsafouri, Steven K. Ayer

    Published 2019-01-01
    “…Many different types of mobile computing devices can present the same technical AR environment, but it remains unclear how the different properties of the devices impact user behaviors in an architecture, engineering, and construction (AEC) context. …”
    Get full text
    Article
  11. 31

    UVtrack: Multi-Modal Indoor Seamless Localization Using Ultra-Wideband Communication and Vision Sensors by Yi Xu, Zhigang Chen, Ming Zhao, Fengxiao Tang, Yangfan Li, Jiaqi Liu, Nei Kato

    Published 2025-01-01
    “…High precision and robust indoor positioning system has a broad range of applications in the area of mobile computing. Due to the advancement of image processing algorithms, the prevalence of surveillance ambient cameras shows promise for offering sub-meter accuracy localization services. …”
    Get full text
    Article
  12. 32
  13. 33
  14. 34

    Threshold ring signature for wireless sensor networks by Jun-fang XIAO, Jian LIAO, Gui-hua ZENG

    Published 2012-03-01
    “…Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem,the secure proof was shown in the model of random oracles using the reduction to the contravention.Proposed scheme also had other characteristics,such as robustness,multi-signature and parallel computation.…”
    Get full text
    Article
  15. 35

    Computational communication for three-dimensional dense coverage in 5G systems:architecture,approach and gain by Jinkun CHENG, Wei CHEN, Yuanming SHI

    Published 2017-06-01
    “…An integrated mobile computational communication architecture for three-dimensional dense coverage in indoor environment was proposed,and the proposed network architecture thus unified the computational electromagnetics,computational information theory and large-scale optimization into computational communication theory.Moreover,the implementation of the architecture was introduced.Specifically,the dense heterogeneous distributed radio access network was served as the wireless radio access network for the proposed computational communication architecture.Furthermore,computational electromagnetics based on channel propagation computing was implemented in parallel using the distributed computation resources.Given the exact channel propagation coefficients,the computational information theory based on channel capacity computation,as well as large-scale optimization based on multiuser network resource allocation were also achieved by the powerful computation resources.The proposed computational communication theory can thus compute the channel capacity and design power allocation scheme directly from propagation environment.…”
    Get full text
    Article
  16. 36

    Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks by Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG

    Published 2022-06-01
    “…Facing the increasing demands for computing ability and network access, the space-air-ground integrated networks in 6G systems is expected to surmount the limits on a single point of computing ability and traditional network transmission through the advantages of network cluster, where the novel space-air-ground integrated networks that deeply integrate cloud, edge, terminal, network, data, and computation is subsequently formed by taking computing ability as the core and network infrastructure as the foundation.Initially, the current situation and development in existing computing force networks and space-air-ground integrated networks (SAGIN) was introduced.Along with the demands for 6G computing-empowered space-air-ground integrated networks, the concept of satellite computing networks was defined and the co-existed system of computing capability and communication networks was further discussed.Then, the space networks, air networks, and ground networks of the layered satellite computing network architecture were discussed.Based on that, its logical network architecture that includes computing resource layer, computing abstract layer, and computing orchestration layer was further introduced.After that, the key technology enablers with respct to computing and storage issue, trusted transmission issue, satellite computing force addressing issue, and high-mobility computing force routing issue was discussed.Finally, the typical applicaiton scenarios of satellite computing networks and envision its future was presented.…”
    Get full text
    Article
  17. 37

    Features of online sociological studies of risks of financial behavior of the population in the information and communication network Internet by M. Kibakin

    Published 2019-05-01
    “…Separately, the characteristic of the obtained primary sociological data has been given by the method of technological access – analysis of blogs, the use of search engines for keywords, the inclusion of intelligent monitoring systems and analysis of social media, which are implemented either on stationary or mobile computer devices. The types of primary data on the format of communications have been adduced: advertising, network, vertically structured, horizontal, as well as the degree of reliability: “a sufficient level of reliability”, “doubtful information”, “unreliable information”. …”
    Get full text
    Article