You are previewing International Journal of Mobile Computing and Multimedia Communications (IJMCMC) Volume 6, Issue 4.
O'Reilly logo
International Journal of Mobile Computing and Multimedia Communications (IJMCMC) Volume 6, Issue 4

Book Description

The International Journal of Mobile Computing and Multimedia Communications (IJMCMC) publishes original research papers, state of the art reviews, technical notes, case studies, innovative projects, and book reviews on topics leveraging all aspects of mobile and multimedia computing: from underlying technologies to applications, theory to practice, and servers to networks to devices.The coverage of this journal ranges from innovative topics to research findings to trends analysis on mobile multimedia and related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives.

This issue contains the following articles:

  • Jammer Location-Oriented Noise Node Elimination Method for MHWN
  • A Strategy on Selecting Performance Metrics for Classifier Evaluation
  • What is New about the Internet Delay Space?
  • Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders
  • Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services
  • Framework for Infrastructure Attack Modeling in Hybrid Networks

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Emerging Security Threats and Defense Technologies in Mobile Computing and Networking
  5. Jammer Location-Oriented Noise Node Elimination Method for MHWN
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. LOCALIZATION ALGORITHM AND NOISE NODE’S INFLUENCE
    5. NOISE NODE ELIMINATION METHOD BASED ON MSD
    6. EXPERIMENT VALIDATION AND ANALYSIS OF RESULTS
    7. CONCLUSION AND FUTURE WORK
    8. ACKNOWLEDGMENT
    9. REFERENCES
  6. A Strategy on Selecting Performance Metrics for Classifier Evaluation
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. CLASSIFIER PERFORMANCE METRICS
    5. 4. METHODOLOGY
    6. 5. RESULTS
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. ENDNOTES
  7. What is New about the Internet Delay Space?
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORKS
    4. 3. METHODOLOGY
    5. 4. DELAY AND GEODISTANCE
    6. 5. TIV IN THE DELAY SPACE
    7. 6. THE DIMENSIONALITY OF THE INTERNET DELAY SPACE
    8. 7. CONCLUSION AND FUTURE WORK
    9. ACKNOWLEDGMENT
    10. REFERENCES
  8. Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. RESEARCH DESIGN
    5. 4. BUILDING THE DETECTION MODEL
    6. 5. MODEL BUILDING
    7. 6. TEST AND APPLICATION OF MODEL
    8. 7. CONCLUSION
    9. 8. FUTURE WORKS
    10. ACKNOWLEDGMENT
    11. REFERENCES
  9. Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services
    1. ABSTRACT
    2. INTRODUCTION
    3. SUBJECT AREA AND RELATED WORK
    4. VISUAL ANALYTICS MODELS AND TECHNIQUES
    5. USAGE SCENARIOS
    6. USABILITY EVALUATION AND DISCUSSION
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  10. Framework for Infrastructure Attack Modeling in Hybrid Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. THE FORMAL DESCRIPTION OF THE MODELING SYSTEM COMPONENTS
    5. THE COMMON FRAMEWORK ARCHITECTURE AND IMPLEMENTATION
    6. THE FRAMEWORK VERIFICATION
    7. EXPERIMENTS
    8. CONCLUSION
    9. REFERENCES
  11. Call For Articles