Results 21 to 30 of about 740,059 (292)
Unlicensed cellular networks are being deployed worldwide by cellular operators to meet the rising data demands. However, the unlicensed band has existing incumbents such as Wi-Fi and radar systems.
Srikant Manas Kala +4 more
doaj +1 more source
Contextual barriers to mobile health technology in African countries: a perspective piece [PDF]
On a global scale, healthcare practitioners are now beginning to move from traditional desktop-based computer technologies towards mobile computing environments[1].
O’ Connor, Y, O’ Donoghue, J
core +2 more sources
Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj +1 more source
Smooth Complete Coverage Trajectory Planning Algorithm for a Nonholonomic Robot
The complete coverage path planning is a process of finding a path which ensures that a mobile robot completely covers the entire environment while following the planned path.
Ana Šelek +3 more
doaj +1 more source
Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users.
Asokan, N. +8 more
openaire +2 more sources
Sybil Defense Techniques in Online Social Networks: A Survey
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi +5 more
doaj +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Greening emerging IT technologies: techniques and practices
The tremendous increase in global industrial activity has resulted in high utilization of natural energy resources and increase in global warming over the last few decades. Meanwhile, computing has become a popular utility of modern human lifestyle. With
Junaid Shuja +7 more
doaj +1 more source
Mobile Phone-Based Audio Announcement Detection and Recognition for People with Hearing Impairment
Automatic audio announcement systems are widely used in public places such as transportation vehicles and facilities, hospitals, and banks. However, these systems cannot be used by people with hearing impairment.
Yong Ruan, Yueliang Qian, Xiangdong Wang
doaj +1 more source
With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile cellular networks (5G).
Yiqing Zhou +8 more
doaj +1 more source

