Personal Information
About
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Tags
ubiquitous computing
research
mobile computing
distributed computing
cloud computing
networking
iot-big data
phd
internet of things
internet
communication
software infrastructures
architectural structure
ubiquitous systems
computer networks
pervasive and ubiquitous computing
big data
conference
nlp techniques
iot
network protocols
#ubiquitous
#communications
network protocols & wireless communication
virtualization
grid computing
#networksecurity
#researchscholar
wireless video networking
data mining
ubiquitous healthcare
machine learning
free online ocr
online ocr
ocr convert
wireless communication
wireless networking
ubiquitous systems and trust
dsdv
dsr
dymo
olsr
aodv
intelligent devices
#machinelearning
performance comparaison
#cloudsecurity
free ocr
i2ocr
internet computing and applications
convert image to text.net
ubicomp human-computer interaction for devices
zigbee
gsm
biomedical informatics
wireless sensor networks
deep learning
autonomic management of ubiquitous systems
adhoc networks
wireless grids
scheduling
fog computing
wireless sensor network
mobile edge computing
anonymization
mobile networks
wimax
wearable computers and technologies
cconstrained service provider
optical computing
correlation
software systems and technologies
big data management
information technology
mutual authentication
cloud applications
interoperability
optical character recognition
network lifetime
ubiquitous learning
ubiquitous student model
rollback recovery
checkpointing
responsive design
cryptography
large displays
distance
mobile web service
virtual machine
renewable energy
usability testing
#bigdata
#cloudtechnology
computer science
#opticalnetworks
#computing
affective computing
q sensor
wearable technology
#nlp
design decisions and philosophies
context and location awareness
#artificialintelligence
context based and implicit computing
log files
hadoop
mapreduce
parallel processing
wireless body area networks
android smart phone
web application server
privacy preserving
google docs.
free ocr to word convert
engineering
paper
social network
multi-channel
aal2r
multi radio
packet aggregation
gsr
submit
professor
energy consumption
#network
opportunistic networks
complex networks
slp
salutation
cloud business
service discovery
jini
comparison
upnp
personalized & special field applications
wireless networking and mobile
information security
machine learning applications
optical character recognition (ocr)
big data mining
hadoop distributed file system.
rfid
interoperability and large scale deployment
middleware services and agent technologies
networks
simulation
rfid data
issues in data cleaning
deferred approach
pervasive computing
dementia
fuzzy systems
data integrity
blockchain
homecare
routing algorithm
history logs
data dissemination
graphs
gateway
stability
alive nodes
half dead nodes
deec
visual cryptography scheme and mms
power saving
mobile ad hoc networks (manets)
ubiquitous computing.
preventive
detective
energy efficiency
user profile
wireless
llightweight
system support infrastructures and services
coap
service discovery mechanisms and protocols
small-world networks
recognition.
tracking
virtual environment
wireless/mobile service management and delivery
virtual objects
hand gesture
xbox kinect
displacements
inter-event time
power-law distribution
cdrs
modelling
cyber security
public-key encryption
smart sensor
context-aware
wi-fi
packet forwarding.
missing sensor data
human activity recognition
wireless mesh network
wearable computers
#iot
multiple viewers
#datascience
ontology
#computerscience
ambient intelligence
network
ubicomp human-computer interac
journalism
nlp
télécommunications
control systems
internet computing
security issues and applicatio
papers
digital device
social networking
security issues
networks of devices
technology
gan
data augmentation
triple modular redundancy
dependency tracking
data
mad-cow disease (mcd)
• mobile computing
physiological monitoring
network marketing
wireless network
database
mobile network
speech
linguistic resources
digital wallet
cfp
mac layer
emergency response
journals
e- payment system
cybernetics
wireless mesh networks
peer to peer communication & security
secure-time
synchronization
access control
smoke detection
intrusion detection
gui
cloudcomputing
e
kryptography
digital signatures
rsa
miller-rabi
n
multiple viewers.
(large
probably)
prime numbers
• distributed computing
middleware services
data communications
cloud
reminder systems
sensor networks
distributed system
#robotics
security
#digitalart
#technology
#innovation
#wireless
#protocols
#itservices
#blockchain
bluetooth sdp.
#conference
#5g
#6g
f electronics
languages
#2025conferencealerts
ontologies.
#informationtechnology
#engineeringconference
events
signal
image processing
pca
deepsense
wearable sensors
imputation
resolutions
#routing
communications
it
#journal
and pervasive computing environment
#chatgpt
smart sensor
context - aware
wi - fi
#phd
public - key encryption
mobile ad hoc network s (manet s )
fault tolerance
synchronized clock
clock synchronization message
#computerscienceengineering
perform ance comparaison
#semantics
#grid
#mobile
xbox kinect.
#engineering'
#deeplearning
computing
#ai
callforpapers
piecewise linear approximation
cloud business
internet of things
distributed computin
user interfaces and interaction models
authentication
or devices
autonomic management
algorithms and applications
biometric security
machine learning and iot
; coap
llight weight
privacy and trust
big data security
autistic child
5g and networks for big data
big data search and mining
focused crawling
online crawling
events detection
web sphere monitoring
web monitoring
ssl-ma
low-cost rfid tag
behaviours monitoring
dtw
mobile
public key encryption
elliptic curves
discrete logarithm
databases
encryption
decryption
ubiquitous computin
public vehicle tracking
pervasive and ubiquitous compu
cryptographic protocols
blockchain consensus algorithms
software security
datamining
untraceability
bigdata
sensor
adhoc
natural language
internet of things (iot)
text mining
packet forwarding
mobile ad hoc networks
authentication
health
cloud security
block chain
knn
bindings
ponder2
virtual stub cache manager
contextual reconfiguration
windfarm
filtering powe
orkney
google docs
r
intelligent manufacturing technology and services
computational mathematics
computational science and applications
word conver
mobile ad hoc networks (manets
pervasive computing environmen
visual cryptography scheme
mms
networks of device
ontologies
networking and architectures
bluetooth sdp
hadoop distributed file system
smart homes
elderly care
home automation
activity monitoring
lab view
one dollar recognition
design decisions and philosoph
ubicomp human-computer
system support infrastructures
nodemcu 8266
radiofrequency
y identification
permit verification
bioinformatics
algorithms
attacks
and pervasive computing environment
cloud services
filtering power.
g
induction heating
induction coil parameter
fem
electromagnetic
environments
personalized & special field a
lifetime
computer vision
evolutionary computing
robotics
neural networks
history logs.
independent living
See more
Presentations
(9)Documents
(195)Personal Information
About
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Tags
ubiquitous computing
research
mobile computing
distributed computing
cloud computing
networking
iot-big data
phd
internet of things
internet
communication
software infrastructures
architectural structure
ubiquitous systems
computer networks
pervasive and ubiquitous computing
big data
conference
nlp techniques
iot
network protocols
#ubiquitous
#communications
network protocols & wireless communication
virtualization
grid computing
#networksecurity
#researchscholar
wireless video networking
data mining
ubiquitous healthcare
machine learning
free online ocr
online ocr
ocr convert
wireless communication
wireless networking
ubiquitous systems and trust
dsdv
dsr
dymo
olsr
aodv
intelligent devices
#machinelearning
performance comparaison
#cloudsecurity
free ocr
i2ocr
internet computing and applications
convert image to text.net
ubicomp human-computer interaction for devices
zigbee
gsm
biomedical informatics
wireless sensor networks
deep learning
autonomic management of ubiquitous systems
adhoc networks
wireless grids
scheduling
fog computing
wireless sensor network
mobile edge computing
anonymization
mobile networks
wimax
wearable computers and technologies
cconstrained service provider
optical computing
correlation
software systems and technologies
big data management
information technology
mutual authentication
cloud applications
interoperability
optical character recognition
network lifetime
ubiquitous learning
ubiquitous student model
rollback recovery
checkpointing
responsive design
cryptography
large displays
distance
mobile web service
virtual machine
renewable energy
usability testing
#bigdata
#cloudtechnology
computer science
#opticalnetworks
#computing
affective computing
q sensor
wearable technology
#nlp
design decisions and philosophies
context and location awareness
#artificialintelligence
context based and implicit computing
log files
hadoop
mapreduce
parallel processing
wireless body area networks
android smart phone
web application server
privacy preserving
google docs.
free ocr to word convert
engineering
paper
social network
multi-channel
aal2r
multi radio
packet aggregation
gsr
submit
professor
energy consumption
#network
opportunistic networks
complex networks
slp
salutation
cloud business
service discovery
jini
comparison
upnp
personalized & special field applications
wireless networking and mobile
information security
machine learning applications
optical character recognition (ocr)
big data mining
hadoop distributed file system.
rfid
interoperability and large scale deployment
middleware services and agent technologies
networks
simulation
rfid data
issues in data cleaning
deferred approach
pervasive computing
dementia
fuzzy systems
data integrity
blockchain
homecare
routing algorithm
history logs
data dissemination
graphs
gateway
stability
alive nodes
half dead nodes
deec
visual cryptography scheme and mms
power saving
mobile ad hoc networks (manets)
ubiquitous computing.
preventive
detective
energy efficiency
user profile
wireless
llightweight
system support infrastructures and services
coap
service discovery mechanisms and protocols
small-world networks
recognition.
tracking
virtual environment
wireless/mobile service management and delivery
virtual objects
hand gesture
xbox kinect
displacements
inter-event time
power-law distribution
cdrs
modelling
cyber security
public-key encryption
smart sensor
context-aware
wi-fi
packet forwarding.
missing sensor data
human activity recognition
wireless mesh network
wearable computers
#iot
multiple viewers
#datascience
ontology
#computerscience
ambient intelligence
network
ubicomp human-computer interac
journalism
nlp
télécommunications
control systems
internet computing
security issues and applicatio
papers
digital device
social networking
security issues
networks of devices
technology
gan
data augmentation
triple modular redundancy
dependency tracking
data
mad-cow disease (mcd)
• mobile computing
physiological monitoring
network marketing
wireless network
database
mobile network
speech
linguistic resources
digital wallet
cfp
mac layer
emergency response
journals
e- payment system
cybernetics
wireless mesh networks
peer to peer communication & security
secure-time
synchronization
access control
smoke detection
intrusion detection
gui
cloudcomputing
e
kryptography
digital signatures
rsa
miller-rabi
n
multiple viewers.
(large
probably)
prime numbers
• distributed computing
middleware services
data communications
cloud
reminder systems
sensor networks
distributed system
#robotics
security
#digitalart
#technology
#innovation
#wireless
#protocols
#itservices
#blockchain
bluetooth sdp.
#conference
#5g
#6g
f electronics
languages
#2025conferencealerts
ontologies.
#informationtechnology
#engineeringconference
events
signal
image processing
pca
deepsense
wearable sensors
imputation
resolutions
#routing
communications
it
#journal
and pervasive computing environment
#chatgpt
smart sensor
context - aware
wi - fi
#phd
public - key encryption
mobile ad hoc network s (manet s )
fault tolerance
synchronized clock
clock synchronization message
#computerscienceengineering
perform ance comparaison
#semantics
#grid
#mobile
xbox kinect.
#engineering'
#deeplearning
computing
#ai
callforpapers
piecewise linear approximation
cloud business
internet of things
distributed computin
user interfaces and interaction models
authentication
or devices
autonomic management
algorithms and applications
biometric security
machine learning and iot
; coap
llight weight
privacy and trust
big data security
autistic child
5g and networks for big data
big data search and mining
focused crawling
online crawling
events detection
web sphere monitoring
web monitoring
ssl-ma
low-cost rfid tag
behaviours monitoring
dtw
mobile
public key encryption
elliptic curves
discrete logarithm
databases
encryption
decryption
ubiquitous computin
public vehicle tracking
pervasive and ubiquitous compu
cryptographic protocols
blockchain consensus algorithms
software security
datamining
untraceability
bigdata
sensor
adhoc
natural language
internet of things (iot)
text mining
packet forwarding
mobile ad hoc networks
authentication
health
cloud security
block chain
knn
bindings
ponder2
virtual stub cache manager
contextual reconfiguration
windfarm
filtering powe
orkney
google docs
r
intelligent manufacturing technology and services
computational mathematics
computational science and applications
word conver
mobile ad hoc networks (manets
pervasive computing environmen
visual cryptography scheme
mms
networks of device
ontologies
networking and architectures
bluetooth sdp
hadoop distributed file system
smart homes
elderly care
home automation
activity monitoring
lab view
one dollar recognition
design decisions and philosoph
ubicomp human-computer
system support infrastructures
nodemcu 8266
radiofrequency
y identification
permit verification
bioinformatics
algorithms
attacks
and pervasive computing environment
cloud services
filtering power.
g
induction heating
induction coil parameter
fem
electromagnetic
environments
personalized & special field a
lifetime
computer vision
evolutionary computing
robotics
neural networks
history logs.
independent living
See more