Personal Information
Website
About
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Tags
mobile computing
distributed computing
iot-big data
ubiquitous computing
internet of things
cloud computing
architectural structure
software infrastructures
pervasive and ubiquitous computing
wireless video networking
big data
data mining
virtualization
network protocols & wireless communication
ubiquitous systems
networking
network protocols
wireless networking
aodv
olsr
dymo
dsr
dsdv
ocr convert
online ocr
free online ocr
ubiquitous healthcare
zigbee
intelligent devices
autonomic management of ubiquitous systems
machine learning
convert image to text.net
gsm
wireless communication
wireless sensor networks
internet computing and applications
computer networks
i2ocr
free ocr
performance comparaison
anonymization
scheduling
correlation
mobile networks
wimax
biomedical informatics
deep learning
big data management
mutual authentication
privacy preserving
google docs.
interoperability
iot
ubiquitous systems and trust
cconstrained service provider
optical character recognition
mobile web service
wireless sensor network
ubiquitous learning
ubiquitous student model
network lifetime
adhoc networks
software systems and technologies
wireless grids
fog computing
mobile edge computing
web application server
android smart phone
wireless body area networks
parallel processing
mapreduce
hadoop
log files
context based and implicit computing
context and location awareness
design decisions and philosophies
wearable technology
q sensor
affective computing
usability testing
renewable energy
optical computing
virtual machine
multi-channel
aal2r
multi radio
packet aggregation
energy consumption
free ocr to word convert
gsr
issues in data cleaning
context-aware
wi-fi
deferred approach
gateway
stability
alive nodes
half dead nodes
pervasive computing
dementia
deec
homecare
ubicomp human-computer interaction for devices
routing algorithm
data dissemination
graphs
recognition.
tracking
virtual environment
virtual objects
hand gesture
xbox kinect
optical character recognition (ocr)
displacements
inter-event time
power-law distribution
cdrs
modelling
public-key encryption
simulation
smart sensor
rfid data
hadoop distributed file system.
wireless/mobile service management and delivery
packet forwarding.
power saving
preventive
detective
wireless networking and mobile
personalized & special field applications
middleware services and agent technologies
interoperability and large scale deployment
user profile
grid computing
responsive design
large displays
distance
visual cryptography scheme and mms
coap
mobile ad hoc networks (manets)
ubiquitous computing.
wearable computers and technologies
small-world networks
energy efficiency
opportunistic networks
complex networks
wireless
information technology
slp
system support infrastructures and services
salutation
service discovery
service discovery mechanisms and protocols
jini
comparison
upnp
llightweight
cloud business
cloud applications
ubicomp human-computer interac
security issues
ambient intelligence
history logs
cryptography
digital device
checkpointing
security issues and applicatio
dependency tracking
internet computing
machine learning applications
rollback recovery
triple modular redundancy
blockchain
big data mining
wireless mesh network
wearable computers
data integrity
fuzzy systems
neural networks
robotics
environments
personalized & special field a
mobile ad hoc network s (manet s )
public - key encryption
computer vision
ontology
and pervasive computing environment
evolutionary computing
smart sensor
wi - fi
context - aware
biometric security
; coap
llight weight
autistic child
behaviours monitoring
dtw
knn
one dollar recognition
design decisions and philosoph
ubicomp human-computer
system support infrastructures
nodemcu 8266
radiofrequency
y identification
permit verification
wireless mesh networks
attacks
cloud services
filtering power.
g
bluetooth sdp.
independent living
emergency response
physiological monitoring
reminder systems
access control
smoke detection
intrusion detection
gui
cloudcomputing
e
ontologies.
kryptography
digital signatures
rsa
miller-rabi
n
(large
probably)
prime numbers
middleware services
data communications
history logs.
windfarm
orkney
perform ance comparaison
google docs
r
word conver
xbox kinect.
mobile ad hoc networks (manets
pervasive computing environmen
visual cryptography scheme
mms
networks of device
ontologies
networks of devices
bluetooth sdp
hadoop distributed file system
smart homes
elderly care
home automation
activity monitoring
lab view
user interfaces and interaction models
ï‚· internet of things
ï‚· cloud business
induction heating
induction coil parameter
fem
electromagnetic
block chain
cloud security
lifetime
text mining
nlp techniques
internet of things (iot)
natural language
bindings
ponder2
virtual stub cache manager
contextual reconfiguration
filtering powe
untraceability
intelligent manufacturing technology and services
events detection
web sphere monitoring
web monitoring
ssl-ma
low-cost rfid tag
online crawling
rfid
focused crawling
big data search and mining
5g and networks for big data
big data security
privacy and trust
machine learning and iot
algorithms and applications
autonomic management
or devices
cyber security
bioinformatics
algorithms
information security
sensor
mac layer
synchronization
secure-time
peer to peer communication & security
e- payment system
digital wallet
mobile network
wireless network
• mobile computing
• distributed computing
multiple viewers.
adhoc
packet forwarding
mobile ad hoc networks
authentication
health
piecewise linear approximation
distributed computin
multiple viewers
ï‚· authentication
and pervasive computing environment
computational mathematics
computational science and applications
software security
blockchain consensus algorithms
cryptographic protocols
public vehicle tracking
ubiquitous computin
networks
databases
mobile
networking and architectures
public key encryption
elliptic curves
discrete logarithm
encryption
decryption
pervasive and ubiquitous compu
datamining
bigdata
technology
See more
- Presentations
- Documents
- Infographics