Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more a...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more attention. Researchers have discovered various types of energy defects in Android applications, which could quickly drain the battery power of mobile devices. Such defects not only cause inconvenience to users, but also frustrate Android developers as diagnosing the energy inefficiency of a software product is a non-trivial task. In this work, we perform a literature review to understand the state of the art of energy inefficiency diagnosis for Android applications. We identified 55 research papers published in recent years and classified existing studies from four different perspectives, including power estimation method, hardware component, types of energy defects, and program analysis approach. We also did a cross-perspective analysis to summarize and compare our studied techniques. We hope that our review can help structure and unify the literature and shed light on future research, as well as drawing developers' attention to build energy-efficient Android applications.
The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ...
详细信息
To improve the effectiveness of online learning, the learning materials recommendation is required to be personalised to the learner material recommendations must be personalized to learners. The existing approaches a...
详细信息
Since its discovery, computer technology has played a key role in changing the lifestyles of people and continues to provide countless benefits. Nevertheless, computer technology systems that facilitate smooth integra...
详细信息
Antenatal (prenatal) care stipulates periodic monitoring of the foetus in alleviating risk factors and improving pregnancy outcomes. Foetal images generated from the ultrasound during prenatal care can be classified i...
详细信息
Wildfires pose a great threat to human safety and property arising from both natural and human causes. According to a technical assessment by the Forest Survey of India more than 95% of fires are of anthropogenic orig...
详细信息
Machine learning has profoundly transformed various industries, notably revolutionizing the retail sector through diverse applications that significantly enhance operational efficiency and performance. This comprehens...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** ...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital *** study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be *** then investigates current developments in the field of video security by exploring two critical research ***,it examine the techniques used by adversaries to compromise video data and evaluate their *** these attack methodologies is crucial for developing effective defense ***,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and *** compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease ***,it identifies potential research opportunities to enhance video data protection in response to the evolving threat *** this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
In recent years, the edge computing paradigm enables the movement of processing units and storage nearer to the data available locations. The mechanism completes the computation in a short span of time in minimum band...
详细信息
Achieving semantic interoperability in healthcare is one of the significant challenges in the rapidly expanding healthcare sector. On the other hand, IoT in healthcare can provide patient-centric treatment mechanisms ...
详细信息
暂无评论