This book highlights the latest research findings, methods and techniques, as well as challenges and solutions related to Ubiquitous and Pervasive Computing (UPC). In this regard, it employs both theoretical and practical perspectives, and places special emphasis on innovative, mobile and internet services.
With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can remain online even while underway, thus enjoying nearly permanent access to their preferred services. Though it has a great potential to revolutionize our lives, UPC also poses a number of new research challenges.
Содержание
Modified Algorithm for Enhancing the Performance of Grid Systems in Task Scheduling.- An Innovative Model Based on FCRBM for Load Forecasting in the Smart Grid.- Effects of Sharing Information for Available Routes by Ad-Hoc Communication on a Disaster Stricken Area.- Image Recognition Based Adaptive Array Antenna Controls for Winter Road
Surveillance System in Local Mountain Area.- Blockchain-Based Public Auditing Scheme for Shared Data.- Key Technologies of Anomaly Detection Using PCA-LSTM.- State-based Fuzzing for S1AP.- Examination and Comparison of Countermeasures Against Web Tracking Technologies.- Development of a Cyber Incident Information Crawler.- A Lo Ra WAN Based Energy Efficient Data Encryption Method.- MIH and CRRM Handover in Trusted or Untrusted Environments.- Using CBR Approach to Enhance Collaborative Design Ability.- Object Detection and Tracking Based on Deep Learning.- Malicious Adware Detection on Android Platform Using Dynamic Random Forest.- Emotion Recognition Scheme via EEG Signal Analysis.- Controlled Quantum Dialogue Based on Logical Qubits.- A Deterministic Multi-item Inventory Model with Limited Warehouse Capacity.- A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities.- Unintended Certificate Installation into Remote Io T Nodes.- A Study: Fiber Bragg Gratings and its Recent Applications.- Interpretation of Photonic Crystals with Hexagonal Symmetry.