In selective contents broadcasting, i.e., watching contents users selected themselves, the server can deliver several contents to many users. However, when users watch the data continuously, waiting time is occurred by decreasing the available bandwidth and increasing the number of contents. Therefore, many researchers have proposed the scheduling methods to reduce the waiting time. Although the conventional method reduces waiting time by producing the broadcast schedule in fast-forwarding, that for playing contents in normal playback becomes lengthened. In this paper, we propose a scheduling method to enable fast-forwarding for selective contents broadcasting. Our proposed method sets the number of channels based on the configuration of the program and the available bandwidth. In addition, waiting time can be reduced by dividing each content into two types of data for fast-forwarding and normal playback and scheduling them.
{"title":"A Scheduling Method to Enable Fast-forwarding for Selective Contents Broadcasting","authors":"D. Fukui, Y. Gotoh","doi":"10.1145/3007120.3007124","DOIUrl":"https://doi.org/10.1145/3007120.3007124","url":null,"abstract":"In selective contents broadcasting, i.e., watching contents users selected themselves, the server can deliver several contents to many users. However, when users watch the data continuously, waiting time is occurred by decreasing the available bandwidth and increasing the number of contents. Therefore, many researchers have proposed the scheduling methods to reduce the waiting time. Although the conventional method reduces waiting time by producing the broadcast schedule in fast-forwarding, that for playing contents in normal playback becomes lengthened. In this paper, we propose a scheduling method to enable fast-forwarding for selective contents broadcasting. Our proposed method sets the number of channels based on the configuration of the program and the available bandwidth. In addition, waiting time can be reduced by dividing each content into two types of data for fast-forwarding and normal playback and scheduling them.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article, presents a smartphone game app for Android devices where the user must blow into the microphone to control the sprite's movements as opposed to tapping. The game also encompasses a questionnaire and web based data tracking system, that is targeted at adult Cystic Fibrosis patients. App data is stored on an external database and saved under a user's profile. The data is then analysed for the attention of the health care team and depending on specified alert criteria, an alert text message (SMS) is sent to the patient. The complete system was presented to the CF medical multi-disciplinary team for review and feedback. Usability testing on the mobile application and web tool was also conducted with 10 participants who specialise in usability design. It is anticipated, that this framework will have a positive effect to the health care experience of adult CF patients after passing the clinical testing.
{"title":"Using a Mobile Game Application to Monitor Well-Being Data for Patients with Cystic Fibrosis","authors":"Y. Y. Tan, S. Tabirca, B. Plant, T. Vagg","doi":"10.1145/3007120.3007148","DOIUrl":"https://doi.org/10.1145/3007120.3007148","url":null,"abstract":"This article, presents a smartphone game app for Android devices where the user must blow into the microphone to control the sprite's movements as opposed to tapping. The game also encompasses a questionnaire and web based data tracking system, that is targeted at adult Cystic Fibrosis patients. App data is stored on an external database and saved under a user's profile. The data is then analysed for the attention of the health care team and depending on specified alert criteria, an alert text message (SMS) is sent to the patient. The complete system was presented to the CF medical multi-disciplinary team for review and feedback. Usability testing on the mobile application and web tool was also conducted with 10 participants who specialise in usability design. It is anticipated, that this framework will have a positive effect to the health care experience of adult CF patients after passing the clinical testing.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Pazahr, J. Zapater, Francisco García-Sánchez, Parisa Ganjeh, C. Botella
Securing a website is nowadays one of the major concerns for system administrators. Security is also the most important challenge that Web developers have to face when designing a trustworthy platform to provide services for public users. It is well known that multimedia content on the Web is continuously growing and recently this media type is more and more commonly used in social networks. The access to multimedia content in the context of social networks should be both easy and secure. In this paper, a semantically-empowered security model for accessing multimedia content in social networks is presented. The application of this model ensures that (1) unauthorized users cannot access to private multimedia data, and (2) the overall level of trust among social networks users who share their private and sensitive data is enhanced. Two questionnaires were developed to select the most characteristic features to consider in our model to differentiate legitimate users and attackers. By using parametric considerations, both security and users' convenience are reached which makes our proposed model more effective.
{"title":"A two-layer security model for accessing multimedia content in social networks","authors":"Ali Pazahr, J. Zapater, Francisco García-Sánchez, Parisa Ganjeh, C. Botella","doi":"10.1145/3007120.3011490","DOIUrl":"https://doi.org/10.1145/3007120.3011490","url":null,"abstract":"Securing a website is nowadays one of the major concerns for system administrators. Security is also the most important challenge that Web developers have to face when designing a trustworthy platform to provide services for public users. It is well known that multimedia content on the Web is continuously growing and recently this media type is more and more commonly used in social networks. The access to multimedia content in the context of social networks should be both easy and secure. In this paper, a semantically-empowered security model for accessing multimedia content in social networks is presented. The application of this model ensures that (1) unauthorized users cannot access to private multimedia data, and (2) the overall level of trust among social networks users who share their private and sensitive data is enhanced. Two questionnaires were developed to select the most characteristic features to consider in our model to differentiate legitimate users and attackers. By using parametric considerations, both security and users' convenience are reached which makes our proposed model more effective.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dynamic hand gestures have become increasingly popular as an input modality for interactive systems. There exists a variety of arm-worn devices for the recognition of hand gestures, which differ not only in their capabilities, but also in the arm positions where they are worn. The aim of this paper is to investigate the effect of placement of such devices on the accuracy for recognizing dynamic hand gestures (e.g. waving the hand). This is relevant as different devices require different positions and thus differ in the achievable recognition accuracy. We have chosen two positions on the forearm: on the wrist and right below the elbow. These positions are interesing as smartwatches are usually worn on the wrist and devices using EMG sensors for the detection of static hand gestures (e.g. spreading the fingers) have to be worn right below the elbow. We used an LG G Watch worn on the wrist and a Myo armband from Thalmic Labs worn below the elbow. Both are equipped with three-axis accelerometers, which we used for gesture recognition. Our hypothesis was that the wrist-worn device would have a better recognition accuracy, as dynamic hand gestures have a bigger action radius on the wrist and therefore lead to bigger acceleration values. We conducted a comparative study with nine participants that performed eight simple, dynamic gestures on both devices. We tested the 4320 gesture samples with different classifiers and feature sets. Although the recognition results for the wrist-worn device were higher, the difference was not significant due to the substantial variation across participants.
{"title":"Comparing the Placement of Two Arm-Worn Devices for Recognizing Dynamic Hand Gestures","authors":"K. Kefer, Clemens Holzmann, R. Findling","doi":"10.1145/3007120.3007146","DOIUrl":"https://doi.org/10.1145/3007120.3007146","url":null,"abstract":"Dynamic hand gestures have become increasingly popular as an input modality for interactive systems. There exists a variety of arm-worn devices for the recognition of hand gestures, which differ not only in their capabilities, but also in the arm positions where they are worn. The aim of this paper is to investigate the effect of placement of such devices on the accuracy for recognizing dynamic hand gestures (e.g. waving the hand). This is relevant as different devices require different positions and thus differ in the achievable recognition accuracy. We have chosen two positions on the forearm: on the wrist and right below the elbow. These positions are interesing as smartwatches are usually worn on the wrist and devices using EMG sensors for the detection of static hand gestures (e.g. spreading the fingers) have to be worn right below the elbow. We used an LG G Watch worn on the wrist and a Myo armband from Thalmic Labs worn below the elbow. Both are equipped with three-axis accelerometers, which we used for gesture recognition. Our hypothesis was that the wrist-worn device would have a better recognition accuracy, as dynamic hand gestures have a bigger action radius on the wrist and therefore lead to bigger acceleration values. We conducted a comparative study with nine participants that performed eight simple, dynamic gestures on both devices. We tested the 4320 gesture samples with different classifiers and feature sets. Although the recognition results for the wrist-worn device were higher, the difference was not significant due to the substantial variation across participants.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on the use of spherical cameras for autonomous quadrone navigation tasks. Previous works of literature for navigation mainly lie in two categories: scene-oriented simultaneous localization and mapping and robot-oriented heading fields lane detection and trajectory tracking. Those methods face the challenges of either high computation cost or heavy labelling and calibration requirements. In this paper, we propose to formulate the spherical image navigation as an image classification problem, which significantly simplifies the orientation estimation and path prediction procedure and accelerates the navigation process. More specifically, we train an end-to-end convolutional network on our spherical image dataset with novel orientation categories labels. This trained network can give precise predictions on potential path directions with single spherical images. Experimental results on our Spherical-Navi dataset demonstrate that the proposed approach outperforms the comparing methods in realistic applications.
{"title":"Autonomous Near Ground Quadrone Navigation with Uncalibrated Spherical Images Using Convolutional Neural Networks","authors":"Lingyan Ran, Yanning Zhang, Tao Yang, Ting Chen","doi":"10.1145/3007120.3011073","DOIUrl":"https://doi.org/10.1145/3007120.3011073","url":null,"abstract":"This paper focuses on the use of spherical cameras for autonomous quadrone navigation tasks. Previous works of literature for navigation mainly lie in two categories: scene-oriented simultaneous localization and mapping and robot-oriented heading fields lane detection and trajectory tracking. Those methods face the challenges of either high computation cost or heavy labelling and calibration requirements. In this paper, we propose to formulate the spherical image navigation as an image classification problem, which significantly simplifies the orientation estimation and path prediction procedure and accelerates the navigation process. More specifically, we train an end-to-end convolutional network on our spherical image dataset with novel orientation categories labels. This trained network can give precise predictions on potential path directions with single spherical images. Experimental results on our Spherical-Navi dataset demonstrate that the proposed approach outperforms the comparing methods in realistic applications.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile developers tend to use source code obfuscation to protect their code against reverse engineering. Unfortunately, some developers rely on the idea that obfuscated applications also provide additional security. But that is not the case since mistakes in design are still present and can be used for arbitrary attacks. However, manually analyzing such obfuscated applications is time consuming for researchers due to the complexity of the generated code. Our debugging and manipulation tool (DAMN) offers a new way of investigating Android applications, including obfuscated ones. It combines static source code reversing with dynamic manipulation techniques to get rid of obfuscation penalties and supports the investigator during the analyzing process. DAMN can display the reversed source code, pause any application at any given time and allows to manipulate its state. All those features make DAMN a powerful reversing and analyzing tool for manual investigations of obfuscated Android applications.
{"title":"DAMN: A Debugging and Manipulation Tool for Android Applications","authors":"Gerald Schoiber, R. Mayrhofer, M. Hölzl","doi":"10.1145/3007120.3007161","DOIUrl":"https://doi.org/10.1145/3007120.3007161","url":null,"abstract":"Mobile developers tend to use source code obfuscation to protect their code against reverse engineering. Unfortunately, some developers rely on the idea that obfuscated applications also provide additional security. But that is not the case since mistakes in design are still present and can be used for arbitrary attacks. However, manually analyzing such obfuscated applications is time consuming for researchers due to the complexity of the generated code. Our debugging and manipulation tool (DAMN) offers a new way of investigating Android applications, including obfuscated ones. It combines static source code reversing with dynamic manipulation techniques to get rid of obfuscation penalties and supports the investigator during the analyzing process. DAMN can display the reversed source code, pause any application at any given time and allows to manipulate its state. All those features make DAMN a powerful reversing and analyzing tool for manual investigations of obfuscated Android applications.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Eshaftri, A. Al-Dubai, I. Romdhani, Alsnousi Essa
Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques are the effective solution to improve the energy efficiency and prolong the network lifetime. However, in the data transmission task, the Cluster Heads (CHs) consume more energy than the ordinary Cluster Members (CMs). Moreover, more energy and time are wasted through the cluster selection in every round. In an attempt to fill in this gap, we propose a new protocol called Weight Driven Cluster Head Rotation for Wireless Sensor Network (WDCR). The WDCR introduces a new weight-driven rotation method to balance the energy consumption among nodes within a cluster, along with unequal clustering algorithm to balance the energy consumption among clusters. The Simulation experiments show that WDCR reduces the energy dissipation of sensor node, and improves the network lifetime compared to the existing cluster protocols.
{"title":"Weight Driven Cluster Head Rotation for Wireless Sensor Networks","authors":"Mohamed Eshaftri, A. Al-Dubai, I. Romdhani, Alsnousi Essa","doi":"10.1145/3007120.3007170","DOIUrl":"https://doi.org/10.1145/3007120.3007170","url":null,"abstract":"Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques are the effective solution to improve the energy efficiency and prolong the network lifetime. However, in the data transmission task, the Cluster Heads (CHs) consume more energy than the ordinary Cluster Members (CMs). Moreover, more energy and time are wasted through the cluster selection in every round. In an attempt to fill in this gap, we propose a new protocol called Weight Driven Cluster Head Rotation for Wireless Sensor Network (WDCR). The WDCR introduces a new weight-driven rotation method to balance the energy consumption among nodes within a cluster, along with unequal clustering algorithm to balance the energy consumption among clusters. The Simulation experiments show that WDCR reduces the energy dissipation of sensor node, and improves the network lifetime compared to the existing cluster protocols.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Komal, D. Albrecht, Nandita Bhattacharjee, B. Srinivasan
Fingerprint is one of the most researched biometrics and applied to many applications like boarder security, access security, security of electronic devices to name a few. However, alignment and matching of partial fingerprints convincingly is still a challenging problem. This paper proposes a region based partial fingerprint matching approach that matches the fingerprints without aligning them. The approach focuses on extracting the matching regions in unaligned fingerprints. As extraction of regions happens without alignment, a new similarity metric is proposed that can compute similarity value between unaligned fingerprints. The results demonstrate that the proposed approach can eliminate the need for aligning the fingerprints without affecting the accuracy. The popular Fingerprint Verification Competition (FVC) 2002 dataset is used for conducting experiments. Moreover, the results of fingerprint recognition are compared with the best alignment based fingerprint matching techniques.
{"title":"A Region-based Alignment-free Partial Fingerprint Matching","authors":"K. Komal, D. Albrecht, Nandita Bhattacharjee, B. Srinivasan","doi":"10.1145/3007120.3007130","DOIUrl":"https://doi.org/10.1145/3007120.3007130","url":null,"abstract":"Fingerprint is one of the most researched biometrics and applied to many applications like boarder security, access security, security of electronic devices to name a few. However, alignment and matching of partial fingerprints convincingly is still a challenging problem. This paper proposes a region based partial fingerprint matching approach that matches the fingerprints without aligning them. The approach focuses on extracting the matching regions in unaligned fingerprints. As extraction of regions happens without alignment, a new similarity metric is proposed that can compute similarity value between unaligned fingerprints. The results demonstrate that the proposed approach can eliminate the need for aligning the fingerprints without affecting the accuracy. The popular Fingerprint Verification Competition (FVC) 2002 dataset is used for conducting experiments. Moreover, the results of fingerprint recognition are compared with the best alignment based fingerprint matching techniques.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"142 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of smartphones technologies and apps in health has become increasing popular in recent years and as such has led to the development of the mobile health (mHealth) sector. However, mobile health applications (apps) are often rejected in app stores or not utilised by the intended audience. This has led to much discussion about the review processes, certification, and considerations required to develop a mHealth app for successful deployment. In this paper, we describe a general design pipeline to be used for the creation of mHealth apps. The pipeline considers and makes recommendations for the design of the following in a mHealth app: Preparation, Back-End Development, Front-End Development and Deployment.
{"title":"A General mHealth Design Pipeline","authors":"T. Vagg, B. Plant, S. Tabirca","doi":"10.1145/3007120.3007147","DOIUrl":"https://doi.org/10.1145/3007120.3007147","url":null,"abstract":"The use of smartphones technologies and apps in health has become increasing popular in recent years and as such has led to the development of the mobile health (mHealth) sector. However, mobile health applications (apps) are often rejected in app stores or not utilised by the intended audience. This has led to much discussion about the review processes, certification, and considerations required to develop a mHealth app for successful deployment. In this paper, we describe a general design pipeline to be used for the creation of mHealth apps. The pipeline considers and makes recommendations for the design of the following in a mHealth app: Preparation, Back-End Development, Front-End Development and Deployment.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile healthcare is a fast growing area of research that capitalizes on mobile technologies and wearables to provide realtime and continuous monitoring and analysis of vital signs of users. Yet, most of the current applications are developed for general population without taking into consideration the context and needs of different user groups. Designing and developing mobile health applications and diaries according to the user context can significantly improve the quality of user interaction and encourage the application use. In this paper, we propose a user context model and a set of usability attributes for developing mobile applications in healthcare. The proposed model and the selected attributes are integrated into a mobile application development framework to provide user-centered and context-aware guidelines. To validate our framework, a mobile diary was implemented for patients undergoing Peritoneal Dialysis (PD) and tested with real users.
{"title":"A Context-Aware Usability Model for Mobile Health Applications","authors":"Ekjyot Kaur, P. D. Haghighi","doi":"10.1145/3007120.3007135","DOIUrl":"https://doi.org/10.1145/3007120.3007135","url":null,"abstract":"Mobile healthcare is a fast growing area of research that capitalizes on mobile technologies and wearables to provide realtime and continuous monitoring and analysis of vital signs of users. Yet, most of the current applications are developed for general population without taking into consideration the context and needs of different user groups. Designing and developing mobile health applications and diaries according to the user context can significantly improve the quality of user interaction and encourage the application use. In this paper, we propose a user context model and a set of usability attributes for developing mobile applications in healthcare. The proposed model and the selected attributes are integrated into a mobile application development framework to provide user-centered and context-aware guidelines. To validate our framework, a mobile diary was implemented for patients undergoing Peritoneal Dialysis (PD) and tested with real users.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}