Mobile computing: operational models, programming modes and software tools

Author(s):  
V.K. Murthy
Author(s):  
V. K. Murthy

This chapter describes the Operational Models, Programming Paradigms and Software Tools needed for building a Web- integrated network computing environment. We describe the various interactive distributed computing models (client server-CS, code on demand, remote evaluation, mobile agents, three and N-tier system), different logical modes of programming (imperative, declarative, subjunctive, and abductive), transaction and workflow models (that relax atomicity, consistency, isolation, durability and serializability properties), new protocols, and software tools (PJava/JDBC) that are needed. Some important application areas of these models are for telediagnosis and cooperative problem solving.


Author(s):  
Jose-Maria Carazo ◽  
I. Benavides ◽  
S. Marco ◽  
J.L. Carrascosa ◽  
E.L. Zapata

Obtaining the three-dimensional (3D) structure of negatively stained biological specimens at a resolution of, typically, 2 - 4 nm is becoming a relatively common practice in an increasing number of laboratories. A combination of new conceptual approaches, new software tools, and faster computers have made this situation possible. However, all these 3D reconstruction processes are quite computer intensive, and the middle term future is full of suggestions entailing an even greater need of computing power. Up to now all published 3D reconstructions in this field have been performed on conventional (sequential) computers, but it is a fact that new parallel computer architectures represent the potential of order-of-magnitude increases in computing power and should, therefore, be considered for their possible application in the most computing intensive tasks.We have studied both shared-memory-based computer architectures, like the BBN Butterfly, and local-memory-based architectures, mainly hypercubes implemented on transputers, where we have used the algorithmic mapping method proposed by Zapata el at. In this work we have developed the basic software tools needed to obtain a 3D reconstruction from non-crystalline specimens (“single particles”) using the so-called Random Conical Tilt Series Method. We start from a pair of images presenting the same field, first tilted (by ≃55°) and then untilted. It is then assumed that we can supply the system with the image of the particle we are looking for (ideally, a 2D average from a previous study) and with a matrix describing the geometrical relationships between the tilted and untilted fields (this step is now accomplished by interactively marking a few pairs of corresponding features in the two fields). From here on the 3D reconstruction process may be run automatically.


2016 ◽  
Vol 21 (10) ◽  
pp. 48-49
Author(s):  
Guntram Doelfs
Keyword(s):  

Bei Asklepios wissen Manager und Chefärzte dank eines Software-Tools immer genau, wie es aktuell um die Qualität in allen Kliniken des Konzerns bestellt ist. Im Interview schildert Projektmanager Stefan Kruse die Vorteile der IT-Lösung.


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


Controlling ◽  
2002 ◽  
Vol 14 (1) ◽  
pp. 25-30 ◽  
Author(s):  
Yvette Hahne ◽  
Hans Schmitz ◽  
Andreas Vetter
Keyword(s):  

Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Sign in / Sign up

Export Citation Format

Share Document