A foremost debated area in the IT world is Mobile Cloud Computing (MCC) which merges cloud computing and mobile computing; MCC is a prospective technology of mobile services that have been inaugurated together with the fast development in mobile applications and cloud computing technology. MCC is in the early phase of development, so it is essential to have in-depth knowledge of the technology to identify future research. Cloud computing has seen exceptional advancement in the past couple of years regarding its turn of application and development. Thus, development and research in cloud computing are scaling in a positive direction because of the increasing demand for cloud computing. On the other hand, no one is concerned about its effect on mental health. People are more concerned about the privacy, access, and security of their data over the cloud. Users are not aware of the data stored in cloud technology. Therefore, end users are always worried about the security and privacy of personal data. When cloud base services are used, users have mental stress because of the unknown place of the data storage. Consistent use of cloud-based services creates a sense of anxiety among users that are more particular about data privacy. The present article gives a transitory explanation of cloud computing and mobile computing. Applications such as M-healthcare, M-commerce, and M-gaming have been discussed to debate potential applications for mobile cloud computing.
The compilers are manufactured in such a way that they ignore most comments in software systems' source code. In addition to being a key source of system documentation, code comments are essential for both establishment and improvement. System comments or just quantitative assertions regarding the quality of the program are presently the only known techniques for evaluating software quality. In software development, comments are being used as a regular practice to enhance the clarity of code and to transmit the enthusiasm of programmers in a more conveyed manner. Whereas programmers seldom bother to keep their comments current. Comments are an important source of information about how the framework works. Various disciplines have concentrated on the content of the online client comments in different contexts, utilizing manual quantitative/subjective or (semi-)automatic methods. The wide variety and disciplinary partitions make it hard to get a handle on an outline of those views which have proactively been inspected. The huge number of daily comments inundating the newsroom can be amazing, particularly when a huge chunk is unfriendly or "contaminated" in content and tone. When dealing with complex documents such as source code, it can be hard to link the dots between the practical linguistic information contained within the code as well as the corresponding textual explanation found within the code, making it unsuitable for use in program analysis and mining assignments. Analysis of code comments on software improvement is examined in this research. Studies on code comments have been summarized in this paper, which covers four main areas: relevance of code comments, quality of code comment sources, code comment analysis, as well as a research approach for code comments and dificulties. It provides more comprehensive information for future research by analyzing effective methods for this study issue.
In the IoT environment, one of the biggest issues is the devices' anonymity and mobility, i.e., continuously joining and leaving networks. This research aims to explore certain strategies that will enable users to overcome these issues. Fog computing is reclined of central cloud services on multiple points near edge devices. Fog computing creates a decentralized computing architecture that acts as an intermediary between the cloud and the devices producing the data. This decentralized approach enables the users to locate resources in such locations that are closer to the devices. Cloud services are more effective when they are provided with low latency, storage issues are reduced, bandwidth is saved, and QoS is enhanced. Distributed fog nodes can cope with the mobility of edge nodes. Although both edge and fog computing can bring computing processes to such locations where data is created by eliminating the need for central storage, this approach gives rise to unprecedented issues that do not exist in centralized architecture like cloud computing. Anonymity can be addressed by identifying vulnerable devices and evaluating their trust level. This research work proposes a trust management scheme to develop a reliable IoT infrastructure in terms of trust. In the proposed model, trust is evaluated and managed on multiple levels to at the tain quality of services and give customers the conidence to share their conidential data online. This goal will help the users connect to the internet without losing control of their data integrity and conidentiality.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.