Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
990
result(s) for
"Mobile and Ubiquitous Computing"
Sort by:
A review on cultivating effective learning: synthesizing educational theories and virtual reality for enhanced educational experiences
by
Faisal Abbas Shah, Syed
,
Ghadi, Yazeed Yasin
,
Mallek, Fatma
in
Augmented reality
,
Computer Education
,
Data Mining and Machine Learning
2024
Immersive technology, especially virtual reality (VR), transforms education. It offers immersive and interactive learning experiences. This study presents a systematic review focusing on VR’s integration with educational theories in higher education. The review evaluates the literature on VR applications combined with pedagogical frameworks. It aims to identify effective strategies for enhancing educational experiences through VR. The process involved analyzing studies about VR and educational theories, focusing on methodologies, outcomes, and effectiveness. Findings show that VR improves learning outcomes when aligned with theories such as constructivism, experiential learning, and collaborative learning. These integrations offer personalized, immersive, and interactive learning experiences. The study highlights the importance of incorporating educational principles into VR application development. It suggests a promising direction for future research and implementation in education. This approach aims to maximize VR’s pedagogical value, enhancing learning outcomes across educational settings.
Journal Article
BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm
by
Jalil, Zunera
,
Batool, Iqra
,
Gadekallu, Thippa Reddy
in
Accuracy
,
Algorithms
,
Artificial intelligence
2021
Breast cancer is one of the leading causes of death in the current age. It often results in subpar living conditions for a patient as they have to go through expensive and painful treatments to fight this cancer. One in eight women all over the world is affected by this disease. Almost half a million women annually do not survive this fight and die from this disease. Machine learning algorithms have proven to outperform all existing solutions for the prediction of breast cancer using models built on the previously available data. In this paper, a novel approach named BCD-WERT is proposed that utilizes the Extremely Randomized Tree and Whale Optimization Algorithm (WOA) for efficient feature selection and classification. WOA reduces the dimensionality of the dataset and extracts the relevant features for accurate classification. Experimental results on state-of-the-art comprehensive dataset demonstrated improved performance in comparison with eight other machine learning algorithms: Support Vector Machine (SVM), Random Forest, Kernel Support Vector Machine, Decision Tree, Logistic Regression, Stochastic Gradient Descent, Gaussian Naive Bayes and k-Nearest Neighbor. BCD-WERT outperformed all with the highest accuracy rate of 99.30% followed by SVM achieving 98.60% accuracy. Experimental results also reveal the effectiveness of feature selection techniques in improving prediction accuracy.
Journal Article
Researching COVID-19 tracing app acceptance: incorporating theory from the technological acceptance model
by
Cabrera-Sanchez, Juan-Pedro
,
Velicia-Martin, Felix
,
Gil-Cordero, Eloy
in
Analysis
,
Applications programs
,
Contact potentials
2021
The expansion of the coronavirus pandemic and the extraordinary confinement measures imposed by governments have caused an unprecedented intense and rapid contraction of the global economy. In order to revive the economy, people must be able to move safely, which means that governments must be able to quickly detect positive cases and track their potential contacts. Different alternatives have been suggested for carrying out this tracking process, one of which uses a mobile APP which has already been shown to be an effective method in some countries.
Use an extended Technology Acceptance Model (TAM) model to investigate whether citizens would be willing to accept and adopt a mobile application that indicates if they have been in contact with people infected with COVID-19. Research Methodology: A survey method was used and the information from 482 of these questionnaires was analyzed using Partial Least Squares-Structural Equation Modelling.
The results show that the Intention to Use this app would be determined by the Perceived Utility of the app and that any user apprehension about possible loss of privacy would not be a significant handicap. When having to choose between health and privacy, users choose health.
This study shows that the extended TAM model which was used has a high explanatory power. Users believe that the APP is useful (especially users who studied in higher education), that it is easy to use, and that it is not a cause of concern for privacy. The highest acceptance of the app is found in over 35 years old's, which is the group that is most aware of the possibility of being affected by COVID-19. The information is unbelievably valuable for developers and governments as users would be willing to use the APP.
Journal Article
Mobile-assisted and gamification-based language learning: a systematic literature review
by
Mat Zin, Nor Azan
,
Rosdi, Fadhilah
,
Ishaq, Kashif
in
Analysis
,
Applications programs
,
Cellular telephones
2021
Learning a new language is a challenging task. In many countries, students are encouraged to learn an international language at school level. In particular, English is the most widely used international language and is being taught at the school level in many countries. The ubiquity and accessibility of smartphones combined with the recent developments in mobile application and gamification in teaching and training have paved the way for experimenting with language learning using mobile phones. This article presents a systematic literature review of the published research work in mobile-assisted language learning. To this end, more than 60 relevant primary studies which have been published in well-reputed venues have been selected for further analysis. The detailed analysis reveals that researchers developed many different simple and gamified mobile applications for learning languages based on various theories, frameworks, and advanced tools. Furthermore, the study also analyses how different applications have been evaluated and tested at different educational levels using different experimental settings while incorporating a variety of evaluation measures. Lastly, a taxonomy has been proposed for the research work in mobile-assisted language learning, which is followed by promising future research challenges in this domain.
Journal Article
The rise of obfuscated Android malware and impacts on detection methods
by
Elsersy, Wael F.
,
Feizollah, Ali
,
Anuar, Nor Badrul
in
Accuracy
,
Android malware
,
Android security
2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious code. Therefore, Android applications developers tend to use state-of-the-art obfuscation techniques to mitigate the risk of application plagiarism. The malware authors adopt the obfuscation and transformation techniques to defeat the anti-malware detections, which this paper refers to as evasions. Malware authors use obfuscation techniques to generate new malware variants from the same malicious code. The concern of encountering difficulties in malware reverse engineering motivates researchers to secure the source code of benign Android applications using evasion techniques. This study reviews the state-of-the-art evasion tools and techniques. The study criticizes the existing research gap of detection in the latest Android malware detection frameworks and challenges the classification performance against various evasion techniques. The study concludes the research gaps in evaluating the current Android malware detection framework robustness against state-of-the-art evasion techniques. The study concludes the recent Android malware detection-related issues and lessons learned which require researchers’ attention in the future.
Journal Article
Efficient UAV-based mobile edge computing using differential evolution and ant colony optimization
by
Mousa, Mohamed H.
,
Hussein, Mohamed K.
in
Adaptive and Self-Organizing Systems
,
Algorithms
,
Analysis
2022
Internet of Things (IoT) tasks are offloaded to servers located at the edge network for improving the power consumption of IoT devices and the execution times of tasks. However, deploying edge servers could be difficult or even impossible in hostile terrain or emergency areas where the network is down. Therefore, edge servers are mounted on unmanned aerial vehicles (UAVs) to support task offloading in such scenarios. However, the challenge is that the UAV has limited energy, and IoT tasks are delay-sensitive. In this paper, a UAV-based offloading strategy is proposed where first, the IoT devices are dynamically clustered considering the limited energy of UAVs, and task delays, and second, the UAV hovers over each cluster head to process the offloaded tasks. The optimization problem of dynamically determining the optimal number of clusters, specifying the member tasks of each cluster, is modeled as a mixed-integer, nonlinear constraint optimization. A discrete differential evolution (DDE) algorithm with new mutation and crossover operators is proposed for the formulated optimization problem, and compared with the particle swarm optimization (PSO) and genetic algorithm (GA) meta-heuristics. Further, the ant colony optimization (ACO) algorithm is employed to identify the shortest path over the cluster heads for the UAV to traverse. The simulation results validate the effectiveness of the proposed offloading strategy in terms of tasks delays and UAV energy consumption.
Journal Article
Deep reinforcement learning based offloading decision algorithm for vehicular edge computing
2022
Task offloading decision is one of the core technologies of vehicular edge computing. Efficient offloading decision can not only meet the requirements of complex vehicle tasks in terms of time, energy consumption and computing performance, but also reduce the competition and consumption of network resources. Traditional distributed task offloading decision is made by vehicles based on local states and can’t maximize the resource utilization of Mobile Edge Computing (MEC) server. Moreover, the mobility of vehicles is rarely taken into consideration for simplification. This article proposes a deep reinforcement learning based task offloading decision algorithm, namely Deep Reinforcement learning based offloading decision (DROD) for Vehicular Edge Computing (VEC). In this work, the mobility of vehicles and the signal blocking commonly in VEC circumstance are considered in our optimal problem of minimizing the system overhead. For resolving the optimal problem, the DROD employs Markov decision process to model the interactions between vehicles and MEC server, and an improved deep deterministic policy gradient algorithm called NLDDPG to train the model iteratively to obtain the optimal decision. The NLDDPG takes the normalized state space as input and introduces LSTM structure into the actor-critic network for improving the efficiency of learning. Finally, two series of experiments are conducted to explore DROD. Firstly, the influences of core hyper-parameters on the performances of DROD are discussed, and the optimal values are determined. Secondly, the DROD is compared with some other baseline algorithms, and the results show that DROD is 25% better than DQN, 10% better than NLDQN and 130% better than DDDPG.
Journal Article
Fuzzy inference rule based task offloading model (FI-RBTOM) for edge computing
by
Ullah Khan, Inam
,
Kaushik, Keshav
,
Abouhawwash, Mohamed
in
Artificial Intelligence
,
Cloud computing
,
Distributed and Parallel Computing
2025
The key objective of edge computing is to reduce delays and provide consumers with high-quality services. However, there are certain challenges, such as high user mobility and the dynamic environments created by IoT devices. Additionally, the limitations of constrained device resources impede effective task completion. The challenge of task offloading plays a crucial role as one of the key challenges for edge computing, which is addressed in this research. An efficient rule-based task-offloading model (FI-RBTOM) is proposed in this context. The key decision of the proposed model is to choose either the task to be offloaded over an edge server or the cloud server or it can be processed over a local node. The four important input parameters are bandwidth, CPU utilization, task length, and task size. The proposed (FI-RBTOM), simulation is carried out using MATLAB (fuzzy logic) tool with 75% training and 25% testing with an overall error rate of 0.39875 is achieved.
Journal Article
A three-stage heuristic task scheduling for optimizing the service level agreement satisfaction in device-edge-cloud cooperative computing
by
Cheng, Junqiang
,
Chen, Ming
,
Wang, Bo
in
Cloud computing
,
Computer Architecture
,
Computer Networks and Communications
2022
Device-edge-cloud cooperative computing is increasingly popular as it can effectively address the problem of the resource scarcity of user devices. It is one of the most challenging issues to improve the resource efficiency by task scheduling in such computing environments. Existing works used limited resources of devices and edge servers in preference, which can lead to not full use of the abundance of cloud resources. This article studies the task scheduling problem to optimize the service level agreement satisfaction in terms of the number of tasks whose hard-deadlines are met for device-edge-cloud cooperative computing. This article first formulates the problem into a binary nonlinear programming, and then proposes a heuristic scheduling method with three stages to solve the problem in polynomial time. The first stage is trying to fully exploit the abundant cloud resources, by pre-scheduling user tasks in the resource priority order of clouds, edge servers, and local devices. In the second stage, the proposed heuristic method reschedules some tasks from edges to devices, to provide more available shared edge resources for other tasks cannot be completed locally, and schedules these tasks to edge servers. At the last stage, our method reschedules as many tasks as possible from clouds to edges or devices, to improve the resource cost. Experiment results show that our method has up to 59% better performance in service level agreement satisfaction without decreasing the resource efficiency, compared with eight of classical methods and state-of-the-art methods.
Journal Article
A systematic literature review on the usability of mobile applications for visually impaired users
by
Alshehri, Abeer
,
AlKhamiss, Raghad
,
Alnefaie, Bashayr
in
Accessibility
,
Applications programs
,
Blindness
2021
Interacting with mobile applications can often be challenging for people with visual impairments due to the poor usability of some mobile applications. The goal of this paper is to provide an overview of the developments on usability of mobile applications for people with visual impairments based on recent advances in research and application development. This overview is important to guide decision-making for researchers and provide a synthesis of available evidence and indicate in which direction it is worthwhile to prompt further research. We performed a systematic literature review on the usability of mobile applications for people with visual impairments. A deep analysis following the Preferred Reporting Items for SLRs and Meta-Analyses (PRISMA) guidelines was performed to produce a set of relevant papers in the field. We first identified 932 papers published within the last six years. After screening the papers and employing a snowballing technique, we identified 60 studies that were then classified into seven themes: accessibility, daily activities, assistive devices, navigation, screen division layout, and audio guidance. The studies were then analyzed to answer the proposed research questions in order to illustrate the different trends, themes, and evaluation results of various mobile applications developed in the last six years. Using this overview as a foundation, future directions for research in the field of usability for the visually impaired (UVI) are highlighted.
Journal Article