scholarly journals MR*-Tree: Novel Indexing and Retrieving Mechanism for Spatial Objects in Mobile PowerPoint Pages

2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Jianming Xiang ◽  
ZhangBing Zhou ◽  
Lei Shu ◽  
Cong Liu ◽  
Qun Wang

Different from the traditional office software, due to the limited storage and computational capability of mobile devices, how to support the page editing in a fast and energy-efficient manner is fundamental. To address this challenge, we propose an MR*-tree based indexing mechanism for supporting the fast and energy-efficient retrieval of spatial objects in mobile PowerPoint pages. Based on this, techniques are developed to support the operations when editing mobile PowerPoint pages. Prototype has been implemented for facilitating the operations of spatial objects when editing mobile PowerPoint pages. Experimental evaluations on computers, pads, and smart phones show the effectiveness and efficiency of this technique.

2016 ◽  
Vol 2016 (7) ◽  
pp. 1-6
Author(s):  
Sergey Makov ◽  
Vladimir Frantc ◽  
Viacheslav Voronin ◽  
Igor Shrayfel ◽  
Vadim Dubovskov ◽  
...  

2017 ◽  
Vol 2 (2) ◽  
pp. 31-35
Author(s):  
Akshada Abnave ◽  
Charulata Banait ◽  
Mrunalini Chopade ◽  
Supriya Godalkar ◽  
Soudamini Pawar ◽  
...  

M-learning or mobile learning is defined as learning through mobile apps, social interactions and online educational hubs via Internet or network using personal mobile devices such as tablets and smart phones. However, in such open environment examination security is most challenging task as students can exchange mobile devices or also can exchange information through network during examination. This paper aims to design secure examination management system for m- learning and provide appropriate mechanism for anti- impersonation to ensure examination security. The users are authenticated through OTP. To prevent students from exchanging mobile devices during examination, system re-authenticates students automatically through face recognition at random time without interrupting the test. The system also provides external click management i.e. prevent students from accessing online sites and already downloaded files during examination.


Author(s):  
Yang Li ◽  
Allan J. Brimicombe

This chapter introduces the concept of Mobile Geographical Information Systems (Mobile GIS) as an evolution of conventional GIS to being available on wireless mobile devices such as smart phones. The evolution of the technology and its applications are charted in this chapter. The main elements of Mobile GIS are then discussed. This focuses on: GIS servers; wireless mobile telecommunication networks; wireless mobile devices; location-awareness technology; and gateway services. This is followed by a discussion of the main features in terms of the services and usage of Mobile GIS: mobility; real-time connectivity; location-awareness; broadened usage. Mobile Geographical Information Systems are an important facilitating technology for Location-Based Services (LBS). A range of applications of Mobile GIS for smart phones are described. The chapter closes with a discussion of the prospects and challenges for Mobile GIS. Challenges derive from four broad areas: limitations that derive from the technologies being used; areas of GIScience that still need to be adequately researched; users; and business models for a sustainable presence.


2020 ◽  
Author(s):  
Indushree Banerjee ◽  
Martijn Warnier ◽  
Frances M. T Brazier

Abstract When physical communication network infrastructures fail, infrastructure-less communication networks such as mobile ad-hoc networks (MANET), can provide an alternative. This, however, requires MANETs to be adaptable to dynamic contexts characterized by the changing density and mobility of devices and availability of energy sources. To address this challenge, this paper proposes a decentralized context-adaptive topology control protocol. The protocol consists of three algorithms and uses preferential attachment based on the energy availability of devices to form a loop-free scale-free adaptive topology for an ad-hoc communication network. The proposed protocol has a number of advantages. First, it is adaptive to the environment, hence applicable in scenarios where the number of participating mobile devices and their availability of energy resources is always changing. Second, it is energy-efficient through changes in the topology. This means it can be flexibly be combined with different routing protocols. Third, the protocol requires no changes on the hardware level. This means it can be implemented on all current phones, without any recalls or investments in hardware changes. The evaluation of the protocol in a simulated environment confirms the feasibility of creating and maintaining a self-adaptive ad-hoc communication network, consisting of multitudes of mobile devices for reliable communication in a dynamic context.


Author(s):  
Jean-Eric Pelet ◽  
Jashim Khan ◽  
Panagiota Papadopoulou ◽  
Emmanuelle Bernardin

From the perspective of improving e-learning, the free access and user friendliness of User Generated Content (UGC) tools, such as social media, embedded onto mobile devices, such as smartphones and tablets, make them attractive to be adopted by students and professors in many institutions around the world. This chapter presents the results of an exploratory study on the use of smart phones and social media, identifying differences among countries, focusing on the MENA region (Middle East and North Africa). The objective is to facilitate the understanding of the rapidly evolving and expanding technology of smart phones and social media and explore its potential for m-learning purposes. Results show that social media and mobile devices can be effectively combined in a promising way to enable m-learning.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Nuno André Osório Liberato ◽  
João Eduardo Quintela Alves de Sous Varajão ◽  
Emanuel Soares Peres Correia ◽  
Maximino Esteves Correia Bessa

Location-based mobile services (LBMS) are at present an ever growing trend, as found in the latest and most popular mobile applications launched. They are, indeed, supported by the hasty evolution of mobile devices capabilities, namely smart phones, which are becoming truer mobile pocket-computers; by users demand, always searching for new ways to benefit from technology, besides getting more contextualized and user-centred services; and, lastly, by market drive, which sees mobile devices as a dedicated way to reach customers, providing profile-based publicity, products, discounts and events. With e-commerce, products and services started arriving to potential customers through desktop computers, where they can be bought and fast delivered to a given address. However, expressions such as “being mobile”, “always connected”, “anytime anywhere” that already characterize life in the present will certainly continue to do so in the near future. Meanwhile, mobile devices centred commerce services seem to be the next step. Therefore, this paper presents a system architecture designed for location-based e-commerce systems. These systems, where location plays the most important role, enable a remote products/services search, based in user parameters: after a product search, shops with that products are returned in the search results and are displayed in a map, around the user present location; and services like obtaining more information, reserving and purchasing are made available as well. This concept represents a mix between traditional client-oriented commerce and faceless mass-oriented e-commerce, enabling a proximity-based user-contextualized system, being well capable of conveying significant advantages and facilities to both service-providers/retailers and users.


Sign in / Sign up

Export Citation Format

Share Document