Implementation of a wireless multimedia DSP chip for mobile applications

Author(s):  
K.L. Heo ◽  
M.H. Sunwoo ◽  
S.K. Oh
Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


2019 ◽  
Vol 16 (2) ◽  
pp. 281-285 ◽  
Author(s):  
Amanda Edwards-Stewart ◽  
Cynthia Alexander ◽  
Christina M. Armstrong ◽  
Tim Hoyt ◽  
William O'Donohue

2018 ◽  
Vol 46 ◽  
pp. 101-106
Author(s):  
Chiara Bianchizza ◽  
Simone Frigerio ◽  
Luca Schenato ◽  
Daniele Del Bianco

Author(s):  
M. A. H. Mohd Adib ◽  
N. H. M. Hasni

Driving with brady-tachy syndrome is one of the main causes of car accidents. In order to prevent drivers from brady-tachy driving, there is a strong demand for driver monitoring systems. Other than problems in driving attitudes and skills, road accidents are also caused by uncontrollable factors such as medical conditions and drowsiness. These factors can be avoided by having early detection. Therefore, the brady-tachy heart automotive so-called BT-Heartomotive device is developed. This BT-Heartomotive device can detect early signs of drowsiness and health problems by measuring the heart rate of the drivers during driving. The device also could use the data to send an alert to the passengers that they’re in precaution. The device shows a good accuracy in the detection of the heart rate level. The device comprised three main components; wristband, monitor and integrated mobile applications. Heart rate measurement can reveal a lot about the physical conditions of an individual. The BT-Heartomotive device is simple, easy to use and automated.


Author(s):  
Karandeep Singh Singh ◽  
Kaitlin Drouin Drouin ◽  
Lisa P. Newmark Newmark ◽  
Ronen Rozenblum Rozenblum

Sign in / Sign up

Export Citation Format

Share Document