Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.20170101.pre
Volume 8
Editorial Preface
Wen-Chen Hu
Content Forthcoming
Add to Your Personal Library: Article Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017010101
Volume 8
Research Article
Ali K. Jaber, Ikhlas Abdel-Qader
A hybrid framework, that can be used in face recognition applications, to enhance system recognition efficiency and speed by extracting the most efficient features of face images is proposed. The...
Show More
A hybrid framework, that can be used in face recognition applications, to enhance system recognition efficiency and speed by extracting the most efficient features of face images is proposed. The proposed framework is based on features obtained using Histograms of Oriented Gradients (HOG) descriptor and compressive sensing (CS). The HOG feature descriptor has the advantage of extracting face feature vectors even with changes in face appearance and is fully capable of handling variations in illumination. CS is used to reduce the density of the resulting HOG face features which has a significant effect on improving the computational cost and performance of the system. For classification, the k-Nearest Neighbors (k-NN) algorithm and Probabilistic Neural Network (PNN) classifier are used. The results demonstrated that the proposed hybrid method could be implemented in a complete system for recognizing and identifying faces with varying illuminations, facial expressions and poses, and backgrounds in real time.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jaber, Ali K., and Ikhlas Abdel-Qader. "A Hybrid Feature Extraction Framework for Face Recognition: HOG and Compressive Sensing." IJHCR vol.8, no.1 2017: pp.1-13. http://doi.org/10.4018/IJHCR.2017010101
APA
Jaber, A. K. & Abdel-Qader, I. (2017). A Hybrid Feature Extraction Framework for Face Recognition: HOG and Compressive Sensing. International Journal of Handheld Computing Research (IJHCR), 8(1), 1-13. http://doi.org/10.4018/IJHCR.2017010101
Chicago
Jaber, Ali K., and Ikhlas Abdel-Qader. "A Hybrid Feature Extraction Framework for Face Recognition: HOG and Compressive Sensing," International Journal of Handheld Computing Research (IJHCR) 8, no.1: 1-13. http://doi.org/10.4018/IJHCR.2017010101
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017010102
Volume 8
Research Article
Caterina Lazaro, Erdal Oruklu, Mert Sevil, Kamuran Turksoy, Ali Cinar
In this work, an artificial pancreas (AP) system, implemented on a mobile device is described. The proposed AP platform integrates hardware (insulin pump, glucose monitor, various sensors for vital...
Show More
In this work, an artificial pancreas (AP) system, implemented on a mobile device is described. The proposed AP platform integrates hardware (insulin pump, glucose monitor, various sensors for vital signs and physical activities) and software (closed-loop control algorithm, sensor fusion, data storage and remote server access) components via smartphone that is running a dedicated Operating System designed for AP systems. Interfacing with this OS and custom application development steps are presented. Closed loop operation is demonstrated with case studies.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Lazaro, Caterina, et al. "Hardware and Software Implementation of an Artificial Pancreas System on a Mobile Device." IJHCR vol.8, no.1 2017: pp.14-28. http://doi.org/10.4018/IJHCR.2017010102
APA
Lazaro, C., Oruklu, E., Sevil, M., Turksoy, K., & Cinar, A. (2017). Hardware and Software Implementation of an Artificial Pancreas System on a Mobile Device. International Journal of Handheld Computing Research (IJHCR), 8(1), 14-28. http://doi.org/10.4018/IJHCR.2017010102
Chicago
Lazaro, Caterina, et al. "Hardware and Software Implementation of an Artificial Pancreas System on a Mobile Device," International Journal of Handheld Computing Research (IJHCR) 8, no.1: 14-28. http://doi.org/10.4018/IJHCR.2017010102
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017010103
Volume 8
Research Article
Osamah Ali Abdullah, Ikhlas Abdel-Qader, Bradley Bazuin
In the last two decades, the indoor positioning systems (IPS) have attracted many researchers because of the great importance in many pervasive applications. Different techniques have been developed...
Show More
In the last two decades, the indoor positioning systems (IPS) have attracted many researchers because of the great importance in many pervasive applications. Different techniques have been developed for IPS, a method that fingerprints the Received Signal Strength (RSS) of WLAN at specific places that can obtain high accuracy of about one meter at the exact location. A large range of indoor navigation needs can be provided by using IPS, especially in unusual conditions such as being in large complex buildings or emergency healthcare needs. IPS can play a great role in other applications that needs tracking and observing such as for the elderly people or for security purpose. In this paper, a framework that incorporates the probabilistic neural network (PNN) with Jensen-Bregman Divergence (JBD) is proposed. To validate our algorithm, the results were compared with PNN and kNN nearest neighbor. Where implemented inside an academic building. The experiment results show that PNN-JBD achieves competitive performance comparing with traditional approaches.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Abdullah, Osamah Ali, et al. "Convex Optimization Via Jensen-Bregman Divergence for WLAN Indoor Positioning System." IJHCR vol.8, no.1 2017: pp.29-41. http://doi.org/10.4018/IJHCR.2017010103
APA
Abdullah, O. A., Abdel-Qader, I., & Bazuin, B. (2017). Convex Optimization Via Jensen-Bregman Divergence for WLAN Indoor Positioning System. International Journal of Handheld Computing Research (IJHCR), 8(1), 29-41. http://doi.org/10.4018/IJHCR.2017010103
Chicago
Abdullah, Osamah Ali, Ikhlas Abdel-Qader, and Bradley Bazuin. "Convex Optimization Via Jensen-Bregman Divergence for WLAN Indoor Positioning System," International Journal of Handheld Computing Research (IJHCR) 8, no.1: 29-41. http://doi.org/10.4018/IJHCR.2017010103
Export Reference
Published: Jan 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017010104
Volume 8
Research Article
Greg Gogolin, Erin Gogolin
The proliferation of mobile devices such as smart phones and other handheld appliances has stimulated the development of a broad range of functionality, including medical, retail, gaming, and...
Show More
The proliferation of mobile devices such as smart phones and other handheld appliances has stimulated the development of a broad range of functionality, including medical, retail, gaming, and personal applications. Technology that has been leveraged to enable many of these uses includes embedded mobile, radio frequency identification, location based services, and augmented reality. Embedded mobile refers to preprogrammed tasks that are performed on a mobile device. Personal care and monitoring is one of the most common uses of embedded mobile. RFID involves communication between a tag and a reader. Mobile RFID extends the technology by tagging the mobile device with an RFID tag to perform tasks on the device. Near field communication is frequently utilized in mobile payment systems. Advertisers find this of significant use in focusing advertisements based on the location of an individual. Augmented reality involves the use of computer generated or enhanced sensory input such as audio and visual components to enhance the perception of reality.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gogolin, Greg, and Erin Gogolin. "The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications." IJHCR vol.8, no.1 2017: pp.42-52. http://doi.org/10.4018/IJHCR.2017010104
APA
Gogolin, G. & Gogolin, E. (2017). The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications. International Journal of Handheld Computing Research (IJHCR), 8(1), 42-52. http://doi.org/10.4018/IJHCR.2017010104
Chicago
Gogolin, Greg, and Erin Gogolin. "The Use of Embedded Mobile, RFID, Location Based Services, and Augmented Reality in Mobile Applications," International Journal of Handheld Computing Research (IJHCR) 8, no.1: 42-52. http://doi.org/10.4018/IJHCR.2017010104
Export Reference
Published: Apr 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.20170401.pre
Volume 8
Editorial Preface
Wen-Chen Hu
Content Forthcoming
Add to Your Personal Library: Article Published: Apr 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017040101
Volume 8
Research Article
Hongyu Guo, Amjad Nusayr, Wen-Chen Hu
Toggle buttons are intuitive gadgets widely used in software GUI design and mobile app interfaces with increasing popularity on mobile devices. However, the current practice of toggle button design...
Show More
Toggle buttons are intuitive gadgets widely used in software GUI design and mobile app interfaces with increasing popularity on mobile devices. However, the current practice of toggle button design is prone to semantic ambiguity, which causes confusions to the users. This paper presents an analysis of the various paradigms of toggle button design in the current practice and provides a resolution of the sematic ambiguities by proposing a set of design standards regarding toggle buttons. State semantics and action semantics are distinguished and it is advocated that state semantics should be used in lieu of action semantics.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Guo, Hongyu, et al. "Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps." IJHCR vol.8, no.2 2017: pp.1-18. http://doi.org/10.4018/IJHCR.2017040101
APA
Guo, H., Nusayr, A., & Hu, W. (2017). Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps. International Journal of Handheld Computing Research (IJHCR), 8(2), 1-18. http://doi.org/10.4018/IJHCR.2017040101
Chicago
Guo, Hongyu, Amjad Nusayr, and Wen-Chen Hu. "Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps," International Journal of Handheld Computing Research (IJHCR) 8, no.2: 1-18. http://doi.org/10.4018/IJHCR.2017040101
Export Reference
Published: Apr 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017040102
Volume 8
Research Article
Gregory A Bock, Ryan T Hendrickson, Jared Allen Lamkin, Brittany Dhall, Jing Wang, In Soo Ahn
In this paper, we present the experimental testing results of distributed cooperative control algorithms for multiple mobile robots with limited sensing/communication capacity and kinematic...
Show More
In this paper, we present the experimental testing results of distributed cooperative control algorithms for multiple mobile robots with limited sensing/communication capacity and kinematic constraints. Rendezvous and formation control problems are considered, respectively. To deal with the inherent kinematic constraints with robot model, the input/output linearization via feedback is used to convert the nonlinear robot model into a linear one, and then the distributed cooperative control algorithms are designed via local information exchange among robots. Extensive experiments using Quanser's QBot2 mobile robot platforms are conducted to validate the effectiveness of the proposed distributed cooperative control algorithms. Specifically, the robot's onboard Kinect vision sensor is applied to solve the localization problem, and the information exchange is done through an ad-hoc peer-to-peer wireless TCP/IP connection among neighboring robots. Collision avoidance problem is also addressed based on the utilization of fuzzy logic rules.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bock, Gregory A., et al. "Experimental Validation of Distributed Cooperative Control of Multiple Mobile Robots via Local Information Exchange." IJHCR vol.8, no.2 2017: pp.19-40. http://doi.org/10.4018/IJHCR.2017040102
APA
Bock, G. A., Hendrickson, R. T., Lamkin, J. A., Dhall, B., Wang, J., & Ahn, I. S. (2017). Experimental Validation of Distributed Cooperative Control of Multiple Mobile Robots via Local Information Exchange. International Journal of Handheld Computing Research (IJHCR), 8(2), 19-40. http://doi.org/10.4018/IJHCR.2017040102
Chicago
Bock, Gregory A., et al. "Experimental Validation of Distributed Cooperative Control of Multiple Mobile Robots via Local Information Exchange," International Journal of Handheld Computing Research (IJHCR) 8, no.2: 19-40. http://doi.org/10.4018/IJHCR.2017040102
Export Reference
Published: Apr 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017040103
Volume 8
Research Article
Ziad Hunaiti
Embedding Information and Communication Technology (ICT) within education is continually evolving research topic, because of the fast changes in information technology, software applications, and...
Show More
Embedding Information and Communication Technology (ICT) within education is continually evolving research topic, because of the fast changes in information technology, software applications, and speed of internet. Therefore, many researchers around the globe are working in new projects of Digital Learning Technologies (DLTs). The success of new DLT is linked with the methods used during the evaluation process, which sometimes misunderstood. Hence, this article emphasises the importance of following the correct approach when selecting evaluation methods for DLT research and propose an approach, which can be followed by researchers, developers, students, educators, teaching & teaching specialists and other stakeholders to evaluate the effectiveness of new DLT.
Content Forthcoming
Add to Your Personal Library: Article Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.20170701.pre
Volume 8
Guest Editorial Preface
S. Hossein Mousavinezhad, Wen-Chen Hu
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mousavinezhad, S. Hossein, and Wen-Chen Hu. "Special Issue on 2017 IEEE International Conference on Electro/Information Technology (EIT 2017): Part I." IJHCR vol.8, no.3 2017: pp.6-8. http://doi.org/10.4018/IJHCR.20170701.pre
APA
Mousavinezhad, S. H. & Hu, W. (2017). Special Issue on 2017 IEEE International Conference on Electro/Information Technology (EIT 2017): Part I. International Journal of Handheld Computing Research (IJHCR), 8(3), 6-8. http://doi.org/10.4018/IJHCR.20170701.pre
Chicago
Mousavinezhad, S. Hossein, and Wen-Chen Hu. "Special Issue on 2017 IEEE International Conference on Electro/Information Technology (EIT 2017): Part I," International Journal of Handheld Computing Research (IJHCR) 8, no.3: 6-8. http://doi.org/10.4018/IJHCR.20170701.pre
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017070101
Volume 8
Research Article
Dongfeng Fang, Feng Ye, Yi Qian, Hamid Sharif
Due to proliferation of smart cities and other smart services, extensive data collection needs to be accomplished by mobile sensor networks (MSNs). However, sensing and data collection are voluntary...
Show More
Due to proliferation of smart cities and other smart services, extensive data collection needs to be accomplished by mobile sensor networks (MSNs). However, sensing and data collection are voluntary tasks for many MSN users. For example, drivers are not required to report traffic condition although their vehicles with advanced sensors have easy access to critical information. Therefore, incentive mechanisms are needed to recruit sensing users (SUs). Incentive mechanisms proposed for traditional MSNs cannot be applied directly due to limited information of SU used for recruitment. In this article, the authors propose a novel cloud-based MSN model that consists of three parties, including data request party, cloud-based platform and SUs. To better utilize information of SUs, a data quality model is proposed to measure the credit level of SUs. The proposed SU recruitment strategy takes into consideration social connections of users. According to the strategy, SUs are divided into two separate levels. Moreover, the authors propose an incentive mechanism using a Stackelberg game theoretical approach to achieve the maximum utility of each recruited SU. The simulation results demonstrate that the proposed incentive mechanism can recruit SUs more efficiently while providing data quality guarantee.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Fang, Dongfeng, et al. "A Cloud-Based Incentive Mechanism for Sensing in Mobile Sensor Networks." IJHCR vol.8, no.3 2017: pp.1-14. http://doi.org/10.4018/IJHCR.2017070101
APA
Fang, D., Ye, F., Qian, Y., & Sharif, H. (2017). A Cloud-Based Incentive Mechanism for Sensing in Mobile Sensor Networks. International Journal of Handheld Computing Research (IJHCR), 8(3), 1-14. http://doi.org/10.4018/IJHCR.2017070101
Chicago
Fang, Dongfeng, et al. "A Cloud-Based Incentive Mechanism for Sensing in Mobile Sensor Networks," International Journal of Handheld Computing Research (IJHCR) 8, no.3: 1-14. http://doi.org/10.4018/IJHCR.2017070101
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017070102
Volume 8
Research Article
Jing Wang, In Soo Ahn, Yufeng Lu, Tianyu Yang, Gennady Staskevich
In this article, the authors propose a new distributed least-squares algorithm to address the sensor fusion problem in using wireless sensor networks (WSN) to monitor the behaviors of large-scale...
Show More
In this article, the authors propose a new distributed least-squares algorithm to address the sensor fusion problem in using wireless sensor networks (WSN) to monitor the behaviors of large-scale multiagent systems. Under a mild assumption on network observability, that is, each sensor can take the measurements of a limited number of agents but the complete multiagent systems are covered under the union of all sensors in the network, the proposed algorithm achieves the estimation consensus if local information exchange can be performed among sensors. The proposed distributed least-squares algorithm can handle the directed communication network by explicitly estimating the left eigenvector corresponding to the largest eigenvalue of the sensing/communication matrix. The convergence of the proposed algorithm is analyzed, and simulation results are provided to further illustrate its effectiveness.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Wang, Jing, et al. "A Distributed Least-Squares Algorithm in Wireless Sensor Networks With Unknown and Limited Communications." IJHCR vol.8, no.3 2017: pp.15-36. http://doi.org/10.4018/IJHCR.2017070102
APA
Wang, J., Ahn, I. S., Lu, Y., Yang, T., & Staskevich, G. (2017). A Distributed Least-Squares Algorithm in Wireless Sensor Networks With Unknown and Limited Communications. International Journal of Handheld Computing Research (IJHCR), 8(3), 15-36. http://doi.org/10.4018/IJHCR.2017070102
Chicago
Wang, Jing, et al. "A Distributed Least-Squares Algorithm in Wireless Sensor Networks With Unknown and Limited Communications," International Journal of Handheld Computing Research (IJHCR) 8, no.3: 15-36. http://doi.org/10.4018/IJHCR.2017070102
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017070103
Volume 8
Research Article
Sara Nouh, Nada Elgaml, Ahmed Khattab, Samy S. Soliman, Ramez M. Daoud, Hassanein H. Amer
Wireless Sensor Networks (WSNs) are widely used in numerous critical applications, and require the network to have a prolonged lifetime and high tolerance to failures. However, the battery-operated...
Show More
Wireless Sensor Networks (WSNs) are widely used in numerous critical applications, and require the network to have a prolonged lifetime and high tolerance to failures. However, the battery-operated sensor nodes used in WSNs cause the network to be resource-constrained. On the one hand, there is a continuous urge to efficiently exploit the WSN energy, and hence, prolong the network lifetime. On the other hand, WSN node failures are not only attributed to battery drain. Node failures can be caused by hardware or software malfunctioning. In this article, the authors assess the impact of the death criterion on the network lifetime and reliability. It is related how the data from the different sensors are aggregated to the death criterion. Additionally, the impact of the number of sensing cycles per network master on the network lifetime and energy efficiency for the different considered death criteria. The effect of the network master selection process on the energy efficiency is also examined. Finally, the impact of the death criterion on the reliability of the WSN is evaluated.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Nouh, Sara, et al. "WSN Lifetime and Reliability Analysis From the Death Criterion Perspective." IJHCR vol.8, no.3 2017: pp.37-51. http://doi.org/10.4018/IJHCR.2017070103
APA
Nouh, S., Elgaml, N., Khattab, A., Soliman, S. S., Daoud, R. M., & Amer, H. H. (2017). WSN Lifetime and Reliability Analysis From the Death Criterion Perspective. International Journal of Handheld Computing Research (IJHCR), 8(3), 37-51. http://doi.org/10.4018/IJHCR.2017070103
Chicago
Nouh, Sara, et al. "WSN Lifetime and Reliability Analysis From the Death Criterion Perspective," International Journal of Handheld Computing Research (IJHCR) 8, no.3: 37-51. http://doi.org/10.4018/IJHCR.2017070103
Export Reference
Published: Jul 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017070104
Volume 8
Research Article
Ashraf Mostafa, Manohar Das
This article presents results of a comparative study of recursive techniques for robust identification of time-varying electrical equivalent circuit models of li-ion batteries. Two such methods are...
Show More
This article presents results of a comparative study of recursive techniques for robust identification of time-varying electrical equivalent circuit models of li-ion batteries. Two such methods are studied, a direct continuous time system identification method and an indirect discrete time technique. The results of this study indicate that although both methods work equally well for identification of time-invariant circuit models from clean voltage-current data, the direct continuous time method outperforms indirect discrete time technique for identification of time-varying circuit models. Similar conclusions can also be drawn for identification of equivalent circuit models in the presence of noise and/or unmodeled dynamics.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mostafa, Ashraf, and Manohar Das. "A Study of Recursive Techniques for Robust Identification of Time-Varying Electrical Equivalent Circuit Models of Li-Ion Batteries." IJHCR vol.8, no.3 2017: pp.52-74. http://doi.org/10.4018/IJHCR.2017070104
APA
Mostafa, A. & Das, M. (2017). A Study of Recursive Techniques for Robust Identification of Time-Varying Electrical Equivalent Circuit Models of Li-Ion Batteries. International Journal of Handheld Computing Research (IJHCR), 8(3), 52-74. http://doi.org/10.4018/IJHCR.2017070104
Chicago
Mostafa, Ashraf, and Manohar Das. "A Study of Recursive Techniques for Robust Identification of Time-Varying Electrical Equivalent Circuit Models of Li-Ion Batteries," International Journal of Handheld Computing Research (IJHCR) 8, no.3: 52-74. http://doi.org/10.4018/IJHCR.2017070104
Export Reference
Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.20171001.pre
Volume 8
Guest Editorial Preface
Chandramohan D.
Content Forthcoming
Add to Your Personal Library: Article Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100101
Volume 8
Research Article
Shailesh Pancham Khapre, Vishakha Chauhan, Vinam Tomar, R P Mahapatra, Nidhi Bansal
Users typically register to use multiple web applications; there are many duplicate user identities in the Internet. The identification and integration of duplicate user identities are of great...
Show More
Users typically register to use multiple web applications; there are many duplicate user identities in the Internet. The identification and integration of duplicate user identities are of great importance in the commercial field and network security field. As a result of privacy considerations, the personal information provided on the internet is usually incomplete or partially false. Considering that the username can reflect the user's personality or habit, is easy to obtain and does not involve the privacy problem, this article proposes a method to determine the identity of the user only by the username. First, the problem of user identity is described formally, and then the username features are divided into two categories: intuitive feature and contrastive feature, and the username probability distribution is analysed quantitatively. This article proposes a method of identity whether a given username belongs to the same user. Finally, a method is proposed to retrieve other usernames that may belong to the user in the username candidate set when a single user name is given.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Khapre, Shailesh Pancham, et al. "A Method of Identifying User Identity Based on Username Features." IJHCR vol.8, no.4 2017: pp.1-22. http://doi.org/10.4018/IJHCR.2017100101
APA
Khapre, S. P., Chauhan, V., Tomar, V., Mahapatra, R. P., & Bansal, N. (2017). A Method of Identifying User Identity Based on Username Features. International Journal of Handheld Computing Research (IJHCR), 8(4), 1-22. http://doi.org/10.4018/IJHCR.2017100101
Chicago
Khapre, Shailesh Pancham, et al. "A Method of Identifying User Identity Based on Username Features," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 1-22. http://doi.org/10.4018/IJHCR.2017100101
Export Reference
Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100102
Volume 8
Research Article
Rajaguru D., Puviyarasi T., Vengattaraman T.
The Internet of Things(IoT) such as the use of robots, sensors, actuators, electronic signalization and a variety of other internet-enabled physical devices may provide for new advanced smart...
Show More
The Internet of Things(IoT) such as the use of robots, sensors, actuators, electronic signalization and a variety of other internet-enabled physical devices may provide for new advanced smart applications to be used in construction in the very near future. Such applications require real-time responses and are therefore time-critical. Therefore, in order to support collaboration, control, monitoring, supply management, safety and other construction processes, they have to meet dependability requirements, including requirements for high Quality of Service (QoS). Dependability and high QoS can be achieved by using adequate number and quality of computing resources, such as processing, memory and networking elements, geographically close to the smart environments for handheld device computing (HDC).
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Rajaguru D., et al. "A Review on Edge Connectivity Framework for Handheld Computing." IJHCR vol.8, no.4 2017: pp.23-29. http://doi.org/10.4018/IJHCR.2017100102
APA
Rajaguru D., Puviyarasi T., & Vengattaraman T. (2017). A Review on Edge Connectivity Framework for Handheld Computing. International Journal of Handheld Computing Research (IJHCR), 8(4), 23-29. http://doi.org/10.4018/IJHCR.2017100102
Chicago
Rajaguru D., Puviyarasi T., and Vengattaraman T. "A Review on Edge Connectivity Framework for Handheld Computing," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 23-29. http://doi.org/10.4018/IJHCR.2017100102
Export Reference
Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100103
Volume 8
Research Article
Rajaguru D., Puviyarasi T., Vengattaraman T.
This article lights the need for the identification of resource elasticity in handheld edge computing systems and its related issues. Under a few developing application situations, for example, in...
Show More
This article lights the need for the identification of resource elasticity in handheld edge computing systems and its related issues. Under a few developing application situations, for example, in urban areas, operational checking of huge foundations, wearable help, and the Internet of Things, nonstop information streams must be prepared under short postponements. A few arrangements, including various programming motors, have been created for handling unbounded information streams in an adaptive and productive way. As of late, designs have been proposed to utilize edge processing for information stream handling. This article reviews the cutting-edge stream preparing motors and systems for misusing asset versatility which highlights distributed computing in stream preparation. Asset flexibility takes into consideration an application or administration to scale out/in as per fluctuating requests. Flexibility turns out to be much more difficult in conveyed conditions involving edge and distributed computing assets. Device security is one of the real difficulties for fruitful execution of the Internet of Things and fog figuring conditions in the current IT space. Specialists and information technology (IT) associations have investigated numerous answers for shield frameworks from unauthenticated device assaults. Fog registering utilizes organize devices (e.g. switch, switch and center) for dormancy mindful handling of gathered information utilizing IoT. This article concludes with the various process for improvising the resource elasticity of handheld devices for leading the communication to the next stage of computing.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Rajaguru D., et al. "Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System." IJHCR vol.8, no.4 2017: pp.30-39. http://doi.org/10.4018/IJHCR.2017100103
APA
Rajaguru D., Puviyarasi T., & Vengattaraman T. (2017). Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System. International Journal of Handheld Computing Research (IJHCR), 8(4), 30-39. http://doi.org/10.4018/IJHCR.2017100103
Chicago
Rajaguru D., Puviyarasi T., and Vengattaraman T. "Malicious Data Stream Identification to Improve the Resource Elasticity of Handheld Edge Computing System," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 30-39. http://doi.org/10.4018/IJHCR.2017100103
Export Reference
Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100104
Volume 8
Research Article
Manimaran Aridoss
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and...
Show More
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.
Content Forthcoming
Add to Your Personal Library: Article Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100105
Volume 8
Research Article
Balakrishnan Natarajan, Shantharajah Periyasamy, Shrinivas S.G.
In the current scenario, handheld devices play a major role in the human life. Handheld devices become an essential kit, not only acting as a conduit for social media, but also in medicine. Several...
Show More
In the current scenario, handheld devices play a major role in the human life. Handheld devices become an essential kit, not only acting as a conduit for social media, but also in medicine. Several new opportunities for the different applications of mobile image processing exist, such as to improve the visual quality, and image recognition. Captured images do not provide an effective visualization due to the poor specifications of the device camera, low light, poor sensing features, etc. In this article, an adaptive histogram equalization for contrast enhancement using a linear mapping function scheme is proposed to improve the images. The image from the mobile device is fed into a contrast improvement phase. The intensity value of each pixel is processed to improve the image visuals. The pixel density value is measured and according to it, the low-density value is changed. Hence, the image is tuned finely to yield better results.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Natarajan, Balakrishnan, et al. "Image Visual Improvement on Handheld Devices Using Linear Mapping Function." IJHCR vol.8, no.4 2017: pp.52-57. http://doi.org/10.4018/IJHCR.2017100105
APA
Natarajan, B., Periyasamy, S., & Shrinivas S.G. (2017). Image Visual Improvement on Handheld Devices Using Linear Mapping Function. International Journal of Handheld Computing Research (IJHCR), 8(4), 52-57. http://doi.org/10.4018/IJHCR.2017100105
Chicago
Natarajan, Balakrishnan, Shantharajah Periyasamy, and Shrinivas S.G. "Image Visual Improvement on Handheld Devices Using Linear Mapping Function," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 52-57. http://doi.org/10.4018/IJHCR.2017100105
Export Reference
Published: Oct 1, 2017
Converted to Gold OA:
DOI: 10.4018/IJHCR.2017100106
Volume 8
Research Article
P. Victer Paul, D. Veeraiah
In this article, a novel security model for the Hadoop environment has been developed to enhance security credentials of handheld systems. The proposed system deals with enabling Hadoop security in...
Show More
In this article, a novel security model for the Hadoop environment has been developed to enhance security credentials of handheld systems. The proposed system deals with enabling Hadoop security in terms of a dataset and a user which is willing to access the content inside the Hadoop system. It deals with security in terms of three different features: encryption, confidentiality and authentication. The significance of the proposed model is it provides protection against malicious intent which allows only valid content into the Big data system; it enables authenticated users and people to enter into the system and make the dataset more secure; and if authentication is enhanced, then authorization can be easily gained in the Hadoop system which provides access control and access rights to resource which the user is willing to perform its function or operation. This model is implemented, and the performance has been validated using existing security variants.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Paul, P. Victer, and D. Veeraiah. "Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop." IJHCR vol.8, no.4 2017: pp.58-71. http://doi.org/10.4018/IJHCR.2017100106
APA
Paul, P. V. & Veeraiah, D. (2017). Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop. International Journal of Handheld Computing Research (IJHCR), 8(4), 58-71. http://doi.org/10.4018/IJHCR.2017100106
Chicago
Paul, P. Victer, and D. Veeraiah. "Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 58-71. http://doi.org/10.4018/IJHCR.2017100106
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100