scholarly journals Digital forensics in mobile computing system and ubiquitous wireless networks

2014 ◽  
Vol 7 (12) ◽  
pp. 2492-2494 ◽  
Author(s):  
Pierre Kirisci ◽  
Ernesto Morales Kluge ◽  
Emanuel Angelescu ◽  
Klaus-Dieter Thoben

During the last two decades a lot of methodology research has been conducted for the design of software user interfaces (Kirisci, Thoben 2009). Despite the numerous contributions in this area, comparatively few efforts have been dedicated to the advancement of methods for the design of context-aware mobile platforms, such as wearable computing systems. This chapter investigates the role of context, particularly in future industrial environments, and elaborates how context can be incorporated in a design method in order to support the design process of wearable computing systems. The chapter is initiated by an overview of basic research in the area of context-aware mobile computing. The aim is to identify the main context elements which have an impact upon the technical properties of a wearable computing system. Therefore, we describe a systematic and quantitative study of the advantages of context recognition, specifically task tracking, for a wearable maintenance assistance system. Based upon the experiences from this study, a context reference model is proposed, which can be considered supportive for the design of wearable computing systems in industrial settings, thus goes beyond existing context models, e.g. for context-aware mobile computing. The final part of this chapter discusses the benefits of applying model-based approaches during the early design stages of wearable computing systems. Existing design methods in the area of wearable computing are critically examined and their shortcomings highlighted. Based upon the context reference model, a design approach is proposed through the realization of a model-driven software tool which supports the design process of a wearable computing system while taking advantage of concise experience manifested in a well-defined context model.


2016 ◽  
Author(s):  
Koushik Sinha ◽  
Sasthi C. Ghosh ◽  
Bhabani P. Sinha

2019 ◽  
Vol 118 (7) ◽  
pp. 27-33
Author(s):  
P.Prasanya Devi ◽  
R.S. Kannan ◽  
M. Ravindran

In this paper, we describe Wireless networks have seen unprecedented rise in their size and number of users in recent years. This unprecedented rise is attributed to the rise in the number of mobile computing devices. Moreover the amount of data that is handled by these wireless networks has increased in recent years. One such wireless network that is widely used but is still prone to attacks is WiFi. Wi-Fi protocol (IEEE 802.11), over the years has been upgraded many times, but these upgrades have mainly resulted in increase in the overall data rate of the communication. Little has been done to improve the security of the protocol. This research focuses on inherent flaws in Wired Equivalent Privacy protocol (WEP) used by the 802.11 standard, Temporal Key Integrity Protocol (TKIP) which is considered an interim solution to legacy 802.11 equipment. The demand for ubiquitous personal communications is driving the development of wireless networks that can accommodate mobile voice and data users who move throughout buildings, cities, or countries. The objective of this chapter is to provide the fundamentals of wireless networks so that the general readers can be able to easily grasp some of the ideas in this area.


Author(s):  
Ismail Khalil Ibrahim ◽  
Ashraf Ahmad ◽  
David Taniar

Mobile multimedia, referring to multimedia information exchange over wireless networks or wireless Internet, is made possible due to the popularity and evolution of mobile computing devices, coupled with fast and affordable mobile networks. This chapter discusses various state-of-the-art communication technologies to support mobile multimedia. The range of complexity of applications and services provided to end-users also play an important part in the success of mobile multimedia.


Sign in / Sign up

Export Citation Format

Share Document