scholarly journals Android Device to Device Messaging using Google Cloud Messaging (GCM)

2015 ◽  
Vol 1 (1) ◽  
Author(s):  
Varsha Dubey

Android is an operating system for smartphones, tablets and now will be used for Personal Computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a smartphone. Basically, Multi-Purpose chat application allows users to send asynchronous messages, and enable sharing image files with other peers on the JXTA world using JXME. Instant messaging has become so ubiquitous, an entire generation of internet users is probably unaware there was ever life without it. The use of instant messaging nowadays is more than the calling function itself. The main objective of this paper is to introduce a methodology to provide instant Messaging Service over the Google Cloud Messaging  which is addressed to android based smartphone and tablet users connected over intranet via Wi-Fi. The proposed method is based on sending/receiving messages in intranet through intranet server via Wi-Fi connection without the need of taking any service from mobile service provider .

Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


2014 ◽  
Vol 5 (1) ◽  
pp. 17-22
Author(s):  
Robby G. Garner

The tools described in film theory are used to invoke feelings in the viewer as a form of entertainment. Some of these tools apply more directly to chatbots than others. Film combines visual images, music, and dialog to accomplish its goals. Conversing with a chatbot is akin to using a telegraph, or instant messaging on a cell phone. However, written communication may still convey emotions and feelings that people interpret on their own as they chat. It is useful to speak of the emotional content of written communications using film theory terminology.


2014 ◽  
Vol 18 (1) ◽  
pp. 10-19
Author(s):  
Stacey O. Irwin ◽  

Perception and reciprocity are key understandings in the lived experience of driving while using a cellular phone. When I talk on a cell phone while driving, I interpret the world through a variety of technologically mediated perceptions. I interpret the bumps in the road and the bug on the windshield. I perceive the information on the dashboard and the conversation with the Other on the other end of the technological “line” of the phone. This reflection uses hermeneutical phenomenology to address the things themselves in life with which we relate and interact with in our everydayness, as we talk on a cell phone while driving.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Author(s):  
Imran Ullah Khan

In this modern era of Internet, E-learning is very popular among Internet users, users utilize Internet to learn from their homes with little or less effort. However the need to upgrade the suite to counter the ever increasing needs of internet was recognized and IPv6 suite was approved in 1994. IPv6 not only overcomes the issue of depletion of network addresses but also provides various other features such as automation, scalability, security, and others such as multicasting etc. Migration to IPv6 is dependent on its performance against the IPv4 implemented system. In this paper evaluation of various performance metrics of e-learning network performance on IPv4 vs IPv6 implemented system were considered. The results show the difference in the performance which must be considered when adopting the newer version and/or its implication on the end-system application. A comparison of performance of IPv6 on the Linux operating system against other popular operating system such as Windows and MacOS was noted. Overall it was shown by results that the Linux implementation of e-learning over IPv6 outperformed the other commodity operating system.


2011 ◽  
Vol 20 (1) ◽  
pp. 34-37 ◽  
Author(s):  
David Chapple

Abstract Over the past 20 years, there have been many advances in the computer industry as well as in augmentative and alternative communication (AAC) devices. Computers are becoming more compact and have multiple purposes, such as the iPhone, which is a cell phone, mp3 player, and an Internet browser. AAC devices also have evolved to become multi-purpose devices; the most sophisticated devices have functionality similar to the iPhone and iPod. Recently, the idea of having the iPhone and iPad as a communication device was initiated with the development of language applications specifically for this format. It might be true that this idea could become the future of AAC devices; however, there are major access issues to overcome before the idea is a reality. This article will chronicle advancements in AAC devices, specifically on access methods, throughout the years, towards the transition to handheld devices. The newest technologies hold much promise with both features and affordability factors being highly attractive. Yet, these technologies must be made to incorporate alternate access if they are to meet their fullest potential as AAC tools.


Energies ◽  
2021 ◽  
Vol 14 (11) ◽  
pp. 3322
Author(s):  
Sara Alonso ◽  
Jesús Lázaro ◽  
Jaime Jiménez ◽  
Unai Bidarte ◽  
Leire Muguira

Smart grid endpoints need to use two environments within a processing system (PS), one with a Linux-type operating system (OS) using the Arm Cortex-A53 cores for management tasks, and the other with a standalone execution or a real-time OS using the Arm Cortex-R5 cores. The Xen hypervisor and the OpenAMP framework allow this, but they may introduce a delay in the system, and some messages in the smart grid need a latency lower than 3 ms. In this paper, the Linux thread latencies are characterized by the Cyclictest tool. It is shown that when Xen hypervisor is used, this scenario is not suitable for the smart grid as it does not meet the 3 ms timing constraint. Then, standalone execution as the real-time part is evaluated, measuring the delay to handle an interrupt created in programmable logic (PL). The standalone application was run in A53 and R5 cores, with Xen hypervisor and OpenAMP framework. These scenarios all met the 3 ms constraint. The main contribution of the present work is the detailed characterization of each real-time execution, in order to facilitate selecting the most suitable one for each application.


Sign in / Sign up

Export Citation Format

Share Document