Results 1 to 10 of about 1,073,669 (283)

Survey on Multimedia Technologies for Mobile Learning Applications [PDF]

open access: yesInformatică economică, 2009
Mobile technologies are developing very fast. This paper presents a survey on multimedia technologies for mobile learning applications, focusing on multimedia programming techniques for Windows Mobile, Symbian, and Java ME.
Paul POCATILU, Catalin BOJA
doaj   +2 more sources

Stackelberg Model Based Distributed Pricing and Computation Offloading in Mobile Edge Computing [PDF]

open access: yesJisuanji kexue, 2023
As a novel computing paradigm,mobile edge computing(MEC) provides low latency and flexible computing and communication services for mobile devices by offloading computing tasks from mobile devices to the physically proximal network edge.However,because ...
CHEN Xuzhan, LIN Bing, CHEN Xing
doaj   +1 more source

Criminalistica mobilă [PDF]

open access: yesRevista Română de Informatică și Automatică, 2019
The "Informational Revolution" as well as the fantastic development of the "IT world" come and mark the XXI century, as a witness to the emergence and continued evolution of mobile devices.
Deniss Bogdan ONOFREI-RIZA
doaj   +1 more source

Features, barriers, and influencing factors of mobile learning in higher education: A systematic review

open access: yesHeliyon, 2021
Mobile devices are not only a tool for communication, but also a powerful instrument for the economy, mass communication, and learning. Because the use of mobile devices and the Internet is growing rapidly, these tools are increasingly being utilized in ...
Samoekan Sophonhiranrak
doaj   +1 more source

Computation Offloading and User-Clustering Game in Multi-Channel Cellular Networks for Mobile Edge Computing

open access: yesSensors, 2023
Mobile devices may use mobile edge computing to improve energy efficiency and responsiveness by offloading computation tasks to edge servers. However, the transmissions of mobile devices may result in interference that decreases the upload rate and ...
Yan-Yun Huang, Pi-Chung Wang
doaj   +1 more source

Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [PDF]

open access: yesJisuanji kexue, 2022
In hierarchical federated learning,energy constrained mobile devices will consume their own resources for participating in model training.In order to reduce the energy consumption of mobile devices,this paper proposes the problem of minimizing the sum of
DU Hui, LI Zhuo, CHEN Xin
doaj   +1 more source

Facing the mobile revolution: A Romanian insight [PDF]

open access: yesContabilitate şi Informatică de Gestiune, 2019
Research question: Are the accounting graduates prepared to deal with mobile devices’ security issues? Motivation: Nowadays, mobile computing is a part of the younger generation, the entering workforce in coming years, and from this point of view the ...
Victoria Stanciu, Mirela Gheorghe
doaj   +1 more source

Designing a Deep Q-Learning Model with Edge-Level Training for Multi-Level Task Offloading in Edge Computing Networks

open access: yesApplied Sciences, 2022
Even though small portable devices are becoming increasingly more powerful in terms of processing power and power efficiency, there are still workloads that require more computational capacity than these devices offer. Examples of such workloads are real-
Ahmad Zendebudi, Salimur Choudhury
doaj   +1 more source

Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing

open access: yesSensors, 2021
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog ...
Abid Ali   +6 more
doaj   +1 more source

Identifying Failures in Mobile Devices [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2022
Mobile devices are well-known communication tools. People, especially young people, cannot go even one step without them. Technological advancements provide better features, but at the same time, such systems still face security risks.
Esmeralda Kadena, András Keszthelyi
doaj   +1 more source

Home - About - Disclaimer - Privacy