Journal articles on the topic 'Mobile communication systems Computer programs'

To see the other types of publications on this topic, follow the link: Mobile communication systems Computer programs.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile communication systems Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cai, Sheng Yan, Xiao Shuang Tang, Xuan Nie, and Yue Zhang. "A Color Management Solution for Mobile Terminal Based on ICC Mechanism." Applied Mechanics and Materials 731 (January 2015): 37–42. http://dx.doi.org/10.4028/www.scientific.net/amm.731.37.

Full text
Abstract:
To improve color consistency and accuracy of mobile terminal, a color management system for mobile terminal is built based on color management mechanism of International Color Consortium. It comprises a server-side and a client-side. The server-side consists of a computer, a spectrophotometer and relative programs, providing color measurement and profile generation for mobile terminal. Its programs comprise a communication module, a color measurement module and a profile generation module. The client-side is composed of a mobile terminal and relative programs. Its programs comprise a communication module, a screen calibration module, a screen characterization module and a color conversion module. The two communication modules connect all the other modules of two sides. The color management system for mobile terminal is applicable on any operating systems such as Android, iOS and Windows Phone System.
APA, Harvard, Vancouver, ISO, and other styles
2

Attwell, Geertruida Aline, Kwabena Ebo Bennin, and Bedir Tekinerdogan. "A Systematic Review of Online Speech Therapy Systems for Intervention in Childhood Speech Communication Disorders." Sensors 22, no. 24 (December 11, 2022): 9713. http://dx.doi.org/10.3390/s22249713.

Full text
Abstract:
Currently, not all children that need speech therapy have access to a therapist. With the current international shortage of speech–language pathologists (SLPs), there is a demand for online tools to support SLPs with their daily tasks. Several online speech therapy (OST) systems have been designed and proposed in the literature; however, the implementation of these systems is lacking. The technical knowledge that is needed to use these programs is a challenge for SLPs. There has been limited effort to systematically identify, analyze and report the findings of prior studies. We provide the results of an extensive literature review of OST systems for childhood speech communication disorders. We systematically review OST systems that can be used in clinical settings or from home as part of a treatment program for children with speech communication disorders. Our search strategy found 4481 papers, of which 35 were identified as focusing on speech therapy programs for speech communication disorders. The features of these programs were examined, and the main findings are extracted and presented. Our analysis indicates that most systems which are designed mainly to support the SLPs adopt and use supervised machine learning approaches that are either desktop-based or mobile-phone-based applications. Our findings reveal that speech therapy systems can provide important benefits for childhood speech. A collaboration between computer programmers and SLPs can contribute to implementing useful automated programs, leading to more children having access to good speech therapy.
APA, Harvard, Vancouver, ISO, and other styles
3

DING, JUNHUA, and XUDONG HE. "FORMAL SPECIFICATION AND ANALYSIS OF AN AGENT-BASED MEDICAL IMAGE PROCESSING SYSTEM." International Journal of Software Engineering and Knowledge Engineering 20, no. 03 (May 2010): 311–45. http://dx.doi.org/10.1142/s021819401000475x.

Full text
Abstract:
A mobile agent system is a special distributed system with moving programs in networks. Mobile agent systems provide a powerful and flexible paradigm for building high performance distributed systems. Due to dynamic configuration property, assuring quality of a mobile agent system is a challenge work. Formal specification and analysis of a mobile agent system provides one of the best approaches to ensure the correctness of a system design. However, it is difficult to find a formal specification tool for modeling a mobile agent system with an easy to understand and concise model. In addition, it is a challenge but also important work to provide an automatic formal analysis approach for verifying whether a system specification correctly meets certain requirements in a mobile agent system. In this paper, a framework for specification and analysis of mobile agent systems is defined. First, Predicate/Transition nets are extended with dynamic channels for modeling mobile agent systems. The formalism has the expressive power to naturally model the software architecture of a mobile agent system, and easily capture the properties especially the mobility, mobile communication and dynamic configuration of a mobile agent system. Then, model checking is instrumented to the framework for automatically verifying the correctness of the specification of a mobile agent system. In order to illustrate the capability of the formalism and the verification strategy, a medical image processing system using mobile agents is modeled using the extended Predicate/Transition nets and system properties are verified using the SPIN model checker.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Xiaochen, and Ze Li. "Investigation and Analysis of the Status Quo of Sports Dance Based on Mobile Communication." Mobile Information Systems 2022 (May 5, 2022): 1–14. http://dx.doi.org/10.1155/2022/7240810.

Full text
Abstract:
Dance sports is an emerging sport that can not only exercise the body but also please the mind and body. Under the theoretical guidance of “lifelong sports” and “health first,” in recent years, sports dance courses have not only been introduced in ordinary colleges and universities in China, but the overall quality development of students has been greatly improved, and the call for quality education for the whole people has also been answered. In recent years, the rapid development of mobile communication systems around the world has greatly enhanced the communication services of developed and developing countries to various places. This paper studies the current situation of sports dance based on mobile communication and links the century-old sports dance project with modern mobile communication to promote Chinese sports dance education and summarize more practical experience and methods with reference value. This paper introduces the development of mobile communication technology in detail, focusing on improving the user experience and service quality of sports dance, and introducing the mobile communication network into the geographic grid to solve the problem of the association between the data attributes of the base station and the geographic space. In addition, this paper systematically investigates the current situation of sports dance in A district and designs a targeted questionnaire. On the basis of the analysis of the current situation, corresponding countermeasures and measures are put forward, aiming to provide reference for the development of sports dance and make a modest contribution to promoting the widespread development of national fitness movements and promoting social harmony and civilization progress in the region. The results of the survey show that the residents’ sports dance programs have obvious age characteristics, and 77% of the students are 10-20 years old and over 50 years old. In the investigation of the main restrictive factors of sports dance development, sports dance coaches and students both put the restrictive factor of the teaching staff in the first place.
APA, Harvard, Vancouver, ISO, and other styles
5

FALASCHI, MORENO, CARLOS OLARTE, and CATUSCIA PALAMIDESSI. "Abstract interpretation of temporal concurrent constraint programs." Theory and Practice of Logic Programming 15, no. 3 (February 10, 2014): 312–57. http://dx.doi.org/10.1017/s1471068413000641.

Full text
Abstract:
AbstractTimed Concurrent Constraint Programming (tcc) is a declarative model for concurrency offering a logic for specifying reactive systems, i.e., systems that continuously interact with the environment. The universaltccformalism (utcc) is an extension oftccwith the ability to express mobility. Here mobility is understood as communication of private names as typically done for mobile systems and security protocols. In this paper we consider the denotational semantics fortcc, and extend it to a “collecting” semantics forutccbased on closure operators over sequences of constraints. Relying on this semantics, we formalize a general framework for data flow analyses oftccandutccprograms by abstract interpretation techniques. The concrete and abstract semantics that we propose are compositional, thus allowing us to reduce the complexity of data flow analyses. We show that our method is sound and parametric with respect to the abstract domain. Thus, different analyses can be performed by instantiating the framework. We illustrate how it is possible to reuse abstract domains previously defined for logic programming to perform, for instance, a groundness analysis fortccprograms. We show the applicability of this analysis in the context of reactive systems. Furthermore, we also make use of the abstract semantics to exhibit a secrecy flaw in a security protocol. We also show how it is possible to make an analysis which may show thattccprograms are suspension-free. This can be useful for several purposes, such as for optimizing compilation or for debugging.
APA, Harvard, Vancouver, ISO, and other styles
6

APOSTOLESCU, Nicolae, Ion TOMESCU, Dragos Daniel Ion GUTA, and Radu BOGATEANU. "The autonomous control of landing on mobile platforms." INCAS BULLETIN 13, no. 3 (September 4, 2021): 3–12. http://dx.doi.org/10.13111/2066-8201.2021.13.3.1.

Full text
Abstract:
In this paper, we propose a simulation application that allows an aerial vehicle to land autonomously on a moving platform in the presence of uncertainties and disturbances. We have tested our method with various speeds and positions for the landing platform. In the context of this article, the autonomous control of landing on mobile platforms consists in synchronizing the movement of an aerial vehicle with the movement of the mobile platform. As a first step, the Spacelab INCAS laboratory group has developed an offline simulation application that allows an ABB robot to receive information on the movement of a Stewart-type mobile platform in order to conduct a landing process. The application can initiate a landing process on the mobile platform and guide the vehicle for perfect docking on the platform. Offline simulation allows the study of several scenarios of a robot working cell - the mobile platform before setting up the production cell. The offline application has a distributed client-server structure. The client communicates with the server through specific communication protocols. The client and server can reside on the same computer. The client application is developed in the Matlab environment and has as object the simulation and programming of the PS-6TL-1500 platform; the server one simulates and programs an ABB 7600-500/2.55 robot that moves on the track, in the RAPID language under RobotStudio ABB simulator.
APA, Harvard, Vancouver, ISO, and other styles
7

Tyger, Lyubov Mikhailovna, Mikhail Vctorovich Afonin, Vladimir Dmitrievich Sekerin, Svetlana Ivanovna Artemyeva, Anatoly Nikolaevish Andreev, and Tatyana Ivanovna Avdeeva. "Cloud and Mobile Systems as a Means of Forming Professional Competencies in Economics and Engineering Students." Webology 18, Special Issue 04 (September 30, 2021): 665–86. http://dx.doi.org/10.14704/web/v18si04/web18157.

Full text
Abstract:
The study is relevant since there is a contradiction between growing requirements for the informational and communicative competence of different students, including the use of cloud-based computer modeling systems, and the insufficient use of cloud technologies in teaching bachelors of economics and technology. The study aims at determining cloud-based systems that are advisable to use as a means of forming the professional competencies of future specialists in economics and technology and developing guidelines for their use. Based on the analysis of various programs, the authors have proved that the most appropriate is the use of specific software in the professional training of future specialists. Scattered software and cloud services need integration based on unified access that a Google account can provide. They also developed a method of using cloud technologies as a means of forming the informational and communicative competence of bachelors of economics and technology. The use of cloud-based information and communication technologies ensures an increase in the level of professional competence of future specialists.
APA, Harvard, Vancouver, ISO, and other styles
8

Joshi, Shubham, Shalini Stalin, Prashant Kumar Shukla, Piyush Kumar Shukla, Ruby Bhatt, Rajan Singh Bhadoria, and Basant Tiwari. "Unified Authentication and Access Control for Future Mobile Communication-Based Lightweight IoT Systems Using Blockchain." Wireless Communications and Mobile Computing 2021 (December 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/8621230.

Full text
Abstract:
The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memory, and communication capability, safeguarding accessibility to them is a difficult task. In the blockchain concept, the majority, or even all network nodes, check the validity and accuracy of exchanged data before accepting and recording it, whether this data is related to financial transactions, measurements of a sensor, or an authentication message. In evaluating the validity of exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices’ information with a distributed attitude, a new authentication protocol based on blockchain has been proposed, and it is claimed that this protocol satisfies user privacy while preserving security. Today’s identification and authentication techniques have substantial shortcomings due to rapidly growing prevalence and implementation. As a result, the protection of such gadgets is critical to guarantee the program’s efficacy and safety. A decentralized authentication and access control method for lightweight IoT systems are proposed in this work and a blockchain-based system that enables identification and secures messaging with IoT nodes. The technique is built on fog information systems and the idea of a blockchain system; when contrasted to something like a blockchain-based verification system, the testing findings show that the suggested mechanism outperforms it. The authentication and verification system undergoes using the blockchain technique. Our method takes advantage of blockchain’s inherent advantages while also associated with development authentication systems. Our suggested blockchain-based approach, structure, and layout, in particular, provide for transparency, consistency, and provenance while also providing tamper-proof records. The article describes the general systems architectural style and the analysis and execution of a real scenario as just a prototype system. The authentication included give as protected prototype that can transmit data with secured protocol and achieves minimum error rate.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Swarn Avinash, Iván García-Magariño, Moustafa M. Nasralla, and Shah Nazir. "Agent-Based Simulators for Empowering Patients in Self-Care Programs Using Mobile Agents with Machine Learning." Mobile Information Systems 2021 (November 9, 2021): 1–10. http://dx.doi.org/10.1155/2021/5909281.

Full text
Abstract:
E-health sustainable systems can be optimized by empowering patients in self-care programs through artificial intelligence ecosystems in which both doctors and patients interact in an agile way. This work proposes agent-based simulators as a mechanism for predicting the repercussions of certain self-care programs in certain patients for finding the most appropriate ones. In order to make this easy for both doctors and patients, mobile agents are used to configure an app for each patient, and this app provides the resources to each self-care program. Mobile agents include a machine-learning module for learning which programs are the most appropriate for each patient. This approach is illustrated with two agent-based simulators for respectively reducing negative emotions such as depression and controlling heart rate variability extreme values related to stress. The resulting app was evaluated with a group of users with the Usefulness, Satisfaction and Ease of use (USE) scale and obtained 73% in usefulness, 77% in satisfaction, and 68% in ease of use. This trial is registered with According to the recommendations of the International Committee of Medical Journal Editors (ICMJE), this manuscript states that all experiments have been approved with the ethical committee CEICA from Community of Aragon (Spain) with registration number C.I.PI18/099.
APA, Harvard, Vancouver, ISO, and other styles
10

Samchynska, Yaroslava, Michael Sherman, and Mariya Sikelinda. "IMPLEMENTATION OF THE TOPIC ON CHAT-BOT DEVELOPMENT INTO "OFFICE COMPUTER TECHNOLOGIES" UNIVERSITY COURSE." OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no. 9 (2020): 121–33. http://dx.doi.org/10.28925/2414-0325.2020.9.10.

Full text
Abstract:
The advisability of modifying the content of “Office Computer Technologies” discipline is reflected in this article by introducing “Development of chatbots with the help of free online development frameworks” topic implementation. The choice of this educational topic is due to the fact that a chatbot is one of the most promising information and communication tools to improve the efficiency of companies. The use of chatbots is one of the most relevant modern ways of communicating with users of mobile devices, which allows companies to reduce marketing costs and the cost of promoting their products and services. The implementation of chatbots can significantly speed up the process of interaction with customers; knowledge and skills in this technology are currently a popular competence for IT professionals in the business environment. The result of studying this topic while studying “Office Computer Technologies” discipline by students is the development of a bot-consultant to work in the Telegram platform, which provides brief information and answers to the company's activities. The implementation of “Development of chatbots with the help of free online development frameworks” topic to the content of “Office Computer Technologies” discipline corresponds to the main focus of educational programs of “Software Engineering”, “Computer Science” and “Information systems and technologies” of the first (bachelor) level of education. The experience of working with students of Kherson State University to study “Development of chatbots with free online resources” topic and the results of the pedagogical experiment showed that it can be successfully implemented into “Office Computer Technology” training course for bachelors - 121 “Software Engineering”, 122 “Computer Science”, 126 “Information Systems and Technologies”, as well as students of related specialties in order to motivate them to solve professional problems and to form research competences.
APA, Harvard, Vancouver, ISO, and other styles
11

Muc, Adam, Agata Bielecka, and Jan Iwaszkiewicz. "The Use of Wireless Networks and Mobile Applications in the Control of Electric Machines." Applied Sciences 13, no. 1 (December 30, 2022): 532. http://dx.doi.org/10.3390/app13010532.

Full text
Abstract:
The paper presents the implementation possibilities of remote control by use of wireless communication and mobile application dedicated to controlling systems of power electronics converters. The article focuses on Bluetooth and Wi-Fi technologies as they are currently the most commonly used in modern mobile devices. The authors wanted to check the usefulness of those methods in the application of a classic drive set with a DC motor. The MIT App Inventor programming environment, which allows quick prototyping of the mobile graphical interface, was used to develop the mobile application. The developed prototype of the mobile application is the second thread of the article, the aim of which is to propose a mobile application interface that enables safe control of the electric drive in an open loop. By repeated testing of the graphical structure of the application and the controls used, the authors obtained the final form of the interface, which, in their opinion, is absolutely required when developing such programs. The evaluated control strategy has been also used to control the rotational speed of a permanent magnet DC motor supplied by a three-phase thyristor rectifier. This paper’s research results have shown the proposed solutions’ advantages and disadvantages.
APA, Harvard, Vancouver, ISO, and other styles
12

Aldiabat, Khaled, Anwar Al-Gasaymeh, Mohannad M. Alebbini, Aktham A. Alsarayreh, Ali A. Alzoubi, and Eng Abdulrahman A. Alhowas. "The COVID-19 pandemic and its impact on consumer's interaction on mobile banking application: Evidence from Jordan." International Journal of Data and Network Science 6, no. 3 (2022): 953–60. http://dx.doi.org/10.5267/j.ijdns.2022.2.001.

Full text
Abstract:
Since COVID-19 became a pandemic, the global economy has been dramatically affected. Not just that, the consumer behavior in the retail market has also changed. This paper aims to examine the effect of the coronavirus crisis on consumer behavior in retail services. The paper will focus on retail banking services, especially the Jordanian banking sector. The goal of the study was achieved by conducting a survey among Jordanian consumers in the retail banking sector, which was done using questionnaires, a sample of 240 retail customers from 14 valid participants. The paper brings new insight into how the pandemic affected retail banking services and proves the acceptance of online and banking in the conceptual model. The results show that the variables around attitudes toward the internet and mobile banking were directly and positively affected by the variables related to the perception of the pandemic's impact on the consumer's lifestyle. Other variables such as the safety of using online and mobile banking services and phones also contributed to this rise in a positive attitude. The Trust in Mobile and internet banking has several administrative and social implications, which were also discussed. Because new consumption behavior models are being developed, mobile and internet services could prevail even after the later stages of the epidemic. Initiatives to provide online educational programs, especially financial courses, should be intensified by the banks in Jordan to enable their customers to be familiar with the use of the banks' online banking services. They should enhance their communication with their customers and offer new products and services while also showing flexibility while negotiating to refinance and loaning terms.
APA, Harvard, Vancouver, ISO, and other styles
13

Son, Yoonseock, Wonseok Oh, Sang Pil Han, and Sungho Park. "When Loyalty Goes Mobile: Effects of Mobile Loyalty Apps on Purchase, Redemption, and Competition." Information Systems Research 31, no. 3 (September 2020): 835–47. http://dx.doi.org/10.1287/isre.2019.0918.

Full text
Abstract:
This research investigates how a shift from traditional loyalty cards to mobile-driven loyalty apps affects consumers’ reward redemption patterns, purchase behaviors, and store-level competition. The findings indicate that loyalty app adoption is associated with increased expenditure and purchase frequency as well as more active point redemption. In a multivendor loyalty program (MVLP) context, the use of loyalty apps is associated with spillover effects in which case customers visit more stores that they had not previously considered and exhibit diminished allegiance to their focal shop after they adopt a loyalty app. Finally, the adoption of loyalty apps is related to deal-prone behaviors because informed consumers tend to selectively purchase highly discounted products. Our findings provide several valuable implications for managers and platform owners who are considering launching mobile loyalty programs (LPs) and participating in an MVLP market. Although the merits of loyalty app adoption are apparent, we caution against potential downsides at individual store levels. Many customers are likely to succumb to deals, selectively purchasing highly discounted products with low margins through loyalty apps. The thrust of LPs should be directed toward fostering a strong connection with a brand, going beyond the promise of deals and promotions.
APA, Harvard, Vancouver, ISO, and other styles
14

Maslov, Oleh V., and Volodymyr V. Osadchyy. "SOFTWARE AT MOBILE SPECTROMETER WITH CZT-DETECTOR." Applied Aspects of Information Technology 4, no. 1 (April 10, 2021): 100–110. http://dx.doi.org/10.15276/aait.01.2021.9.

Full text
Abstract:
The technology is based on a semiconductor CdZnTe-portable (almost the size of a mobile phone) gamma-ray spectrometer with high resolution, which provides high efficiency of rapid identification of radionuclides and assessment of radiation dose from low to moderately high levels. The CdZnTe gamma-ray spectrometer is a highly efficient device based on the use of CdZnTe (CZT) semiconductor detectors operating at room temperature with very low power consumption, a digital multichannel analyzer, and a microcomputer. CdZnTe-portable spectrometer is a self-contained device and consists of three modules - a detector module, a multichannel analyzer, and a microcomputer. The detector module contains a high-quality CdZnTe detector, a preamplifier, and a high voltage power supply for the detector. There are detector modules with different volumes of the CZT detector from 5 mm3 to 1600 mm3. It is possible to use a multi-detector system. The analyzer module contains an amplifier, a digital signal processor, a low voltage power supply, and a computer interface. The microcomputer software interacts with the multichannel analyzer, analyzes gamma spectra, and provides the accumulation of time profiles of the dose of gamma radiation, communication with other information systems. Spectrometric measurements in real-time make it possible to use "electronic collimation" technologies to build a map of the radiation field and localize sources of ionizing radiation, with the subsequent certification of identified sources, creation of an effective radiation monitoring system with the functions of certification of ionizing sources radiation. The corresponding software allows you to solve the following tasks – building a three-dimensional map of the fields of ionizing radiation of various degrees of spatial detailing, taking into account the radiation energy, localization, and certification of gamma radiation sources. The special laboratory kit is based on μSPEC microspectrometers. A LattePanda single board computer is used to control the operation of spectrometers, collect and analyze data. LattePanda – A Windows 10 Computer with integrated Arduino. This explains the choice of LattePanda. Windows 10 application allows you to use the WinSPEC software to control the multichannel analyzer operation supplied with the spectrometer. The built-in Arduino allows you to remote control the movement of the radiation source during laboratory experiment. Both the traditional problems of calibrating spectrometers (energy calibration and efficiency curves), including those for various source geometries, processing the measured spectra using standard programs, calculating the activity of sources, and the problem of creating a spectra processing program and a spectrometer control program are considered. The values of the minimum detectable activity are given.
APA, Harvard, Vancouver, ISO, and other styles
15

Uzhelovskyi, A., K. Brovchenko, and A. Muzyka. "INNOVATIVE PEDAGOGICAL METHODS AND COMPUTER TELECOMMUNICATIONS IN DISTANCE EDUCATION." Physical and Mathematical Education 27, no. 1 (April 26, 2021): 23–29. http://dx.doi.org/10.31110/2413-1571-2021-027-1-004.

Full text
Abstract:
Formulation of the problem. The problems of pedagogical system, innovative methods of education and training of specialists, use of new teaching methods based on computer information technologies and distance learning platforms, use of innovative methods and distance learning platforms in the implementation of online education are considered. According to statistical research, the effectiveness of the traditional pedagogical system is no more than sixty percent. Innovative methods of training specialists in education are the use of new methods that qualitatively increase the effectiveness of ways and means of presenting information compared to the traditional system, learning to find the necessary information independently, checking its adequacy and learnability. Such innovations and novelties can be the use of computer technology and the Internet, and, especially now, of distance learning and communication technology. Materials and methods. The methods include content analysis, synthesis, comparison, description of the obtained research results, generalization. Results. The existing solutions for remote learning (distance learning platforms), using computer telecommunications, were analyzed: Meet, iSpring, WebTutor, GetCourse, Google Classroom, Microsoft Teams, Moodle, Blackboard Learning System, LMS «Prometheus», The Virtual Laboratory, VirtuLab and ZILLION, video communication and conference programs: Zoom, YouTube, Viber, Skype and others. All these platforms have their own characteristics and features, and their use lies in the possibilities of application in educational institutions and personal preferences of teachers and students. All distance learning platforms are web-based and therefore the requirements for client computers are minimal. The analysis of the remote learning technologies used allows us to determine the basic necessary and sufficient set of software tools that need to be applied for the full operation of the platform in the application of distance learning technologies. Microsoft Teams is suggested as a possible platform for distance learning. Conclusion. Application of remote technologies and software in creation of hardware-distance scientific-educational systems will lead to low cost of software product both for developers and customers (reduction of expenses on additional software) and will provide attraction of a wide range of users due to low system requirements and possibility of use in mobile devices. And usage of Microsoft Teams distance learning platform allows implementing a wide range of capabilities, which this platform has: video communication, different types of communication, provision of all kinds of materials, demonstration of any participant's screen during broadcast for the whole group, list of participants and attendance control, polling, possibility to record events and their further viewing, administration of all processes from the learning side, etc.
APA, Harvard, Vancouver, ISO, and other styles
16

Annisa, Riski, and Arvin Hidayat Waluya. "RANCANG BANGUNAPLIKASIPENJUALAN SAYUR BERBASIS WEB UNTUK MENDUKUNG KESEJAHTERAAN PEDAGANG." Jurnal Teknik Informasi dan Komputer (Tekinkom) 4, no. 1 (2021): 49–53. http://dx.doi.org/10.37600/tekinkom.v4i1.230.

Full text
Abstract:
Along with the development of the times, the development of technology has also developed rapidly. The development in the field of information and communication technology at this time has brought very important benefits for the advancement of human life. Various business programs can be developed into a system whose performance uses a computer or mobile device, and one of these programs is that it can publish information on an item that is sold via the internet or using a web-based system. Many housewives find it difficult or lazy to shop for vegetables because of the full queues to shop at the local vegetable shop, busy with office matters or taking care of children and other activities. Therefore an application was made that can help save time and can also help small vegetable and fruit entrepreneurs to sell their products in applications that have been made. In the application that has been made, a buyer can buy a variety of fresh vegetables andfruit of guaranteed quality and for the admin section. Admins can change web page settings by simply going to the admin page section to manage the display of all displays that are on the main web section.Keywords: systems, applications, vegetables
APA, Harvard, Vancouver, ISO, and other styles
17

Park, Jungwoo, Soontae Kim, and Jong-Uk Hou. "An L2 Cache Architecture Supporting Bypassing for Low Energy and High Performance." Electronics 10, no. 11 (June 1, 2021): 1328. http://dx.doi.org/10.3390/electronics10111328.

Full text
Abstract:
Conventional 2-level cache architecture is not efficient in mobile systems when small programs that do not require the large L2 cache run. Bypassing the L2 cache for those small programs has two benefits. When only a single program runs, bypassing the L2 cache allows to power it down removing its leakage energy consumption. When multiple programs run simultaneously on multiple cores, small programs bypass the L2 cache while large programs use it. This decreases conflicts in the L2 cache among those programs increasing overall performance. From our experiments using cycle-accurate performance and energy simulators, our proposed L2 cache architecture supporting bypassing is shown to be effective in reducing L2 cache energy consumption and increasing overall performance of programs.
APA, Harvard, Vancouver, ISO, and other styles
18

Osadcha, Kateryna, and Angelica Babich. "Use of Mobile Technologies in the Process of Information Technologies Training in the Secondary School." Ukrainian Journal of Educational Studies and Information Technology 5, no. 4 (December 29, 2017): 1–13. http://dx.doi.org/10.32919/uesit.2017.04.01.

Full text
Abstract:
The article actualizes the problem of improving the process of teaching informatics in a secondary comprehensive school. It was noted that the technology of using mobile learning tools was covered by scientists J. Attewell, K. L. Buhaichuk, I. O. Zolotareva, V. V. Osadchyi, D. L. Revenaugh, A. M. Trush and others. V. O. Kuklev, Ye. D. Patrakin, A. A. Fedosieiev, B. Banister and others highlighted prospects and possibilities of mobile learning in their works. M. Yu. Novikov raised the question of possibility to use mobile technologies in the school curriculum of informatics in senior classes. However, the use of mobile technologies by secondary school students while studying informatics has been hardly covered in home researches. Having analyzed scientific methodological literature and the Internet resources there was generalized the experience of introducing mobile technologies into the process of teaching informatics in a secondary school. There were given the definitions of notions “mobile technologies”, “mobile learning technologies”, “mobile informational and communicative technologies”. The authors understand mobile technologies as learning technologies based on the use of mobile devices (Mobile phones, smart phones, communicators, pocket computers, tablet computers), mobile attachments (programs for mobile devices), services (receiving, storage, processing, search, transfer of data and others with the help of a mobile device), and mobile communication facilities (GSM, WAP, GPRS, Bluetooth, WiFi, IMax) in the process of learning. There was analyzed the existing program software for operational systems Windows 10 Mobile, Android, iOS intended for education. On the basis of this there were singled out mobile attachments to be used at informatics lessons from the 5th to the 9th grades according to curriculum topics. In particular, while learning the topic “Algorithms and their performers” to study basic algorithmic structures (sequence, repetition, branching, conditions, functions, cycles, repairing) it’s offered to use such mobile attachments as Coddy, Lightbot, Robozzle. In the 8th grade in order to make acquaintance with the programming environment and to study the ways of creating a software project, the topic “Basis of event-driven and object-oriented programming” should be learnt with the help of such programs as AIDE-IDE for Android Java C++, Java Editor, Pocket Code, Scratch, iBlocks Blocky, CB1 Blockly, MIT AI2 Companion. The authors draw to the conclusion that every topic in informatics in a secondary school can be learnt with the help of mobile attachments. Given examples of using mobile attachments (Robozzle Droid, «Kahoot!») at informatics lessons in the 6th and the 8th grade demonstrate various possibilities of mobile software in studying informatics. Survey results of effectiveness of mobile technologies while learning informatics in a secondary school which were provided prove the reasons of using mobile technologies at informatics lessons and while doing home tasks.
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Pu, Marta C. González, Ronaldo Menezes, and Albert-László Barabási. "Understanding the spread of malicious mobile-phone programs and their damage potential." International Journal of Information Security 12, no. 5 (June 20, 2013): 383–92. http://dx.doi.org/10.1007/s10207-013-0203-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Dahri, Nisar Ahmed, Muhammad Saleem Vighio, Omar A. Alismaiel, and Waleed Mugahed Al-Rahmi. "Assessing the Impact of Mobile-Based Training on Teachers’ Achievement and Usage Attitude." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 09 (May 10, 2022): 107–29. http://dx.doi.org/10.3991/ijim.v16i09.30519.

Full text
Abstract:
Teachers' professional development plays a key role in imparting quality education. However, the design and delivery of quality professional development programs is a challenging problem due to numerous issues such as inadequate policies, lack of skilled personnel and training, politically influenced appointments, and dependency on the traditional modes of training. The COVID-19 pandemic has further escalated the situation and severely affected trainers’ and trainees' interest, motivation, and engagement. Due to its ubiquitous, flexible, and cost-effective nature, technology has played a key role in carrying out educational activities even in the pandemic situation. However, little emphasis has been provided on the use of technology for the professional development of teachers. This study investigates the effects of mobile-based training app on teachers learning outcomes and attitudes towards its usage. The training app is based on our enhanced CPD model for teachers' professional development. For the study, 308 in-service elementary school teachers of division shaheed Benazirabad are selected for the training and assessment purposes. To perform the experiments, teachers were divided into two groups: experimental and control. The experimental group contained 158 teachers which were provided training through the mobile app. The remaining 150 teachers of the control group were provided training using the traditional physical appearance. Pre and post-test were designed to examine the effects of mobile-based training on the teachers’ learning outcomes before and after the training intervention. Besides assessing the learning outcomes, the attitude towards the use of the training app was also assessed using the attitude scale. The analysis of results determined that the training through a mobile app has a significant effect on teachers learning outcomes in terms of knowledge, skills, and dispositions. Furthermore, teachers showed a positive attitude towards the use of training app. The experimental group had significantly high attitude scores in post-test toward mobile-based training systems. Teachers’ experience using the mobile app has been perceived as an approach that has significantly increased teaching proficiency. Experimental results suggest that mobile-based professional development modes positively impact teachers' professional and academic achievement and performance to produce a rising number of certified teachers irrespective of time, space, and financial constraints.
APA, Harvard, Vancouver, ISO, and other styles
21

Cunha, Bruna Carolina Rodrigues, Kamila Rios Da Hora Rodrigues, Isabela Zaine, Elias Adriano Nogueira da Silva, Caio César Viel, and Maria Da Graça Campos Pimentel. "Experience Sampling and Programmed Intervention Method and System for Planning, Authoring, and Deploying Mobile Health Interventions: Design and Case Reports." Journal of Medical Internet Research 23, no. 7 (July 12, 2021): e24278. http://dx.doi.org/10.2196/24278.

Full text
Abstract:
Background Health professionals initiating mobile health (mHealth) interventions may choose to adapt apps designed for other activities (eg, peer-to-peer communication) or to employ purpose-built apps specialized in the required intervention, or to exploit apps based on methods such as the experience sampling method (ESM). An alternative approach for professionals would be to create their own apps. While ESM-based methods offer important guidance, current systems do not expose their design at a level that promotes replicating, specializing, or extending their contributions. Thus, a twofold solution is required: a method that directs specialists in planning intervention programs themselves, and a model that guides specialists in adopting existing solutions and advises software developers on building new ones. Objective The main objectives of this study are to design the Experience Sampling and Programmed Intervention Method (ESPIM), formulated toward supporting specialists in deploying mHealth interventions, and the ESPIM model, which guides health specialists in adopting existing solutions and advises software developers on how to build new ones. Another goal is to conceive and implement a software platform allowing specialists to be users who actually plan, create, and deploy interventions (ESPIM system). Methods We conducted the design and evaluation of the ESPIM method and model alongside a software system comprising integrated web and mobile apps. A participatory design approach with stakeholders included early software prototype, predesign interviews with 12 health specialists, iterative design sustained by the software as an instance of the method’s conceptual model, support to 8 real case studies, and postdesign interviews. Results The ESPIM comprises (1) a list of requirements for mHealth experience sampling and intervention-based methods and systems, (2) a 4-dimension planning framework, (3) a 7-step-based process, and (4) an ontology-based conceptual model. The ESPIM system encompasses web and mobile apps. Eight long-term case studies, involving professionals in psychology, gerontology, computer science, speech therapy, and occupational therapy, show that the method allowed specialists to be actual users who plan, create, and deploy interventions via the associated system. Specialists’ target users were parents of children diagnosed with autism spectrum disorder, older persons, graduate and undergraduate students, children (age 8-12), and caregivers of older persons. The specialists reported being able to create and conduct their own studies without modifying their original design. A qualitative evaluation of the ontology-based conceptual model showed its compliance to the functional requirements elicited. Conclusions The ESPIM method succeeds in supporting specialists in planning, authoring, and deploying mobile-based intervention programs when employed via a software system designed and implemented according to its conceptual model. The ESPIM ontology–based conceptual model exposes the design of systems involving active or passive sampling interventions. Such exposure supports the evaluation, implementation, adaptation, or extension of new or existing systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Peng, Nan, Yingying Wei, Lu Liu, and Junzhong Zou. "Software Simulation in English Translation Platform Based on Gaussian Hybrid Model." Mobile Information Systems 2022 (August 21, 2022): 1–11. http://dx.doi.org/10.1155/2022/9999056.

Full text
Abstract:
In this article, we will first try to create a general development platform for embedded systems. The goal of this step is to establish an experimental platform that can support various peripheral modules and can be reused. The connection between the modules can be reconfigured to meet the different needs of embedded research and learning. On this basis, the system uses the audio frequency spectrum program as an input function to represent the dispersion pattern of signal energy, which can be tested with characteristic nodes simulated by convolutional neural network software. In addition, the auxiliary neural network software simulation core can continuously learn the detailed characteristics of the audio frequency spectrum, making it easy to recognize environmental sounds. In addition, the sound signal and the neural cycle are related in time. The neural network can study the relationship between different frames in the time domain to compensate for the defects caused by the complex neural network in modeling time series. Finally, this article focuses on the process of building an English translation platform based on the mobile cloud data model. The client is targeted at the Android platform, while the server is based on the laaS system. According to the model of mobile cloud data processing, the calculation of mobile phones in computer-intensive programs is studied. Through the hardware design and distribution of the system, we are able to use mobile cloud technology as a desktop-intensive program to solve the problem of effectiveness in the solution. The article promotes the development of an English translation platform by applying the research results of environmental sound recognition based on embedded system software simulation to the design of the English translation platform.
APA, Harvard, Vancouver, ISO, and other styles
23

Popov, Evgeny, Ivan Kokh, and Konstantin Semyachkov. "Digitalization of Social Infrastructure in the Smart City Development Strategy." Sociologicheskaja nauka i social'naja praktika 10, no. 3 (September 30, 2022): 96–114. http://dx.doi.org/10.19181/snsp.2022.10.3.9199.

Full text
Abstract:
Digitalization of the social infrastructure of cities is becoming increasingly important in the strategy of city development and improving the efficiency of municipal management. The purpose of this study is to assess the level of digitalization of social infrastructure as part of the implementation of the smart city development strategy on the example of Yekaterinburg. It is determined that digital technologies have become an integral attribute of the lifestyle of the population. The population actively uses the Internet and mobile communication capabilities. The Internet is especially actively used to search for information, as well as communication, personal and business contacts. The Internet is actively replacing television and radio as sources of information. The reasons that reduce the digitalization of the urban environment are highlighted. A considerable number of respondents indicated the low level of communication between the local population and municipal authorities during the mass survey. The reasons for the weak formation of a digital society are also noted: low level of digital competencies, insufficient provision of computer equipment, lack of automated research systems, lack of affordable high-speed Internet. The directions of improving the social practice of smart city development are determined. In the field of improving the Internet, it is necessary to increase the speed of data transmission, ensure stability of operation, and improve information sites. In the field of education, it is proposed to provide educational institutions with the necessary equipment and appropriate programs, to replace outdated computers in educational institutions. In the field of healthcare, the achievements have been highly appreciated, but a wish has been expressed to simplify online registration in hospitals. Internet services, online payments, e-mail, delivery, and other services were highly appreciated. In general, transport services were also positively evaluated, but wishes were expressed to improve the organization of public transport, observe the traffic schedule, and use digital technologies at bus stations. Residents propose to upgrade bus shelters throughout the city, install more “smart stops”, introduce taxi drones.
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Hao, and Wenli Li. "Mobile device users’ privacy security assurance behavior." Information & Computer Security 25, no. 3 (July 10, 2017): 330–44. http://dx.doi.org/10.1108/ics-04-2016-0027.

Full text
Abstract:
Purpose Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software. Design/methodology/approach A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model. Findings Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool. Practical implications This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior. Originality/value This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
APA, Harvard, Vancouver, ISO, and other styles
25

Nguyen, Duc-Man, Quyet-Thang Huynh, Nhu-Hang Ha, and Thanh-Hung Nguyen. "Automated Test Input Generation via Model Inference Based on User Story and Acceptance Criteria for Mobile Application Development." International Journal of Software Engineering and Knowledge Engineering 30, no. 03 (March 2020): 399–425. http://dx.doi.org/10.1142/s0218194020500163.

Full text
Abstract:
There has been observed explosive growth in the development of mobile applications (apps) for Android and iOS operating systems, which has led to the direct impact towards mobile app development. In order to design and propose quality-oriented apps, it is the primary responsibility of developers to devote time and sufficient efforts towards testing to make the apps bug-free and operational in the hands of end-users without any hiccup. Manual testing procedures take a prolonged amount of time in writing test cases, and in some cases, the full testing requirements are not met. Besides, the insufficient knowledge of tester also impacts the overall quality and bug-free apps. To overcome the obstacles of testing, we propose a new testing methodology cum tool called “AgileUATM” which works primarily towards white-box and black-box testing. To evaluate the validity of the proposed tool, we put the tool in a real-time operational environment concerning mobile test apps. By using this tool, all the acceptance criteria are determined via user stories. The testers/developers specify requirements with formal specifications based on programs properties, predicates, invariants, and constraints. The results show that the proposed tool generated effective and accurate test cases, test input. Meanwhile, expected output was also generated in a unified fashion from the user stories to meet acceptance criteria. The proposed solution also reduced the development time to identify test data as compared to manual Behavior-Driven Development (BDD) methodologies. This tool can support the developers to get a better idea about the required tests and able to translate the customer’s natural languages to computer languages as well. This paper fulfills an approach to suitably test mobile application development.
APA, Harvard, Vancouver, ISO, and other styles
26

Song, Sanggeun, Bongjoon Kim, and Sangjun Lee. "The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2946735.

Full text
Abstract:
Due to recent indiscriminate attacks of ransomware, damage cases including encryption of users’ important files are constantly increasing. The existing vaccine systems are vulnerable to attacks of new pattern ransomware because they can only detect the ransomware of existing patterns. More effective technique is required to prevent modified ransomware. In this paper, an effective method is proposed to prevent the attacks of modified ransomware on Android platform. The proposed technique specifies and intensively monitors processes and specific file directories using statistical methods based on Processor usage, Memory usage, and I/O rates so that the process with abnormal behaviors can be detected. If the process running a suspicious ransomware is detected, the proposed system will stop the process and take steps to confirm the deletion of programs associated with the process from users. The information of suspected and exceptional processes confirmed by users is stored in a database. The proposed technique can detect ransomware even if you do not save its patterns. Its speed of detection is very fast because it can be implemented in Android source code instead of mobile application. In addition, it can effectively determine modified patterns of ransomware and provide protection with minimum damage.
APA, Harvard, Vancouver, ISO, and other styles
27

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
28

Kynge, Lucy. "Finding the Best Way to Deliver Online Educational Content in Low-Resource Settings: Qualitative Survey Study." JMIR Medical Education 6, no. 1 (May 26, 2020): e16946. http://dx.doi.org/10.2196/16946.

Full text
Abstract:
Background The reach of internet and mobile phone coverage has grown rapidly in low- and middle-income countries (LMICs). The potential for sharing knowledge with health care workers in low-resource settings to improve working practice is real, but barriers exist that limit access to online information. Burns affect more than 11 million people each year, but health care workers in low-resource settings receive little or no training in treating burn patients. Interburns' training programs are tailor-made to improve the quality of burn care in Asia, Africa, and the Middle East; the challenge is to understand the best way of delivering these resources digitally toward improved treatment and care of burn patients. Objective The aim of the study, funded by the National Institute for Health Research (NIHR), was to understand issues and barriers that affect health care worker access to online learning in low-resource settings in order to broaden access to Interburns' training materials and improve burn-patient care. Methods A total of 546 participants of Interburns' Essential Burn Care (EBC) course held in Bangladesh, Nepal, Ethiopia, and the West Bank, the occupied Palestinian Territories, between January 2016 and June 2018 were sent an online survey. EBC participants represent the wide range of health care professionals involved with the burn-injured patient. A literature review was carried out as well as research into online platforms. Results A total of 207 of 546 (37.9%) participants of the EBC course did not provide an email address. Of the 339 email addresses provided, 81 (23.9%) “bounced” back. Surgeons and doctors were more likely to provide an email address than nurses, intern doctors, or auxiliary health care workers. A total of 258 participants received the survey and 70 responded, giving a response rate of 27.1%. Poor internet connection, lack of time, and limited access to computers were the main reasons for not engaging with online learning, along with lack of relevant materials. Computers were seen as more useful for holding information, while mobile phones were better for communicating and sharing knowledge. Health care workers in LMICs use mobile phones professionally on a daily basis. A total of 80% (56/70) felt that educational content on burns should be available through mobile apps. Conclusions Health care workers in low-resource settings face a variety of barriers to accessing educational content online. The reliance on email for sign-up to learning management systems is a significant barrier. Materials need to be relevant, localized, and easy to consume offline if necessary, to avoid costs of mobile phone data. Smartphones are increasingly used professionally every day for communication and searching for information, pointing toward the need for tailored educational content to be more available through mobile- and web-based apps.
APA, Harvard, Vancouver, ISO, and other styles
29

Dmitriev, V. Ya, T. A. Ignat'eva, and V. P. Pilyavskiy. "Development of Artificial Intelligence and Prospects for Its Application." Economics and Management 27, no. 2 (May 1, 2021): 132–38. http://dx.doi.org/10.35854/1998-1627-2021-2-132-138.

Full text
Abstract:
Aim. To analyze the concept of “artificial intelligence”, to justify the effectiveness of using artificial intelligence technologies.Tasks. To study the conceptual apparatus; to propose and justify the author’s definition of the “artificial intelligence” concept; to describe the technology of speech recognition using artificial intelligence.Methodology. The authors used such general scientific methods of cognition as comparison, deduction and induction, analysis, generalization and systematization.Results. Based on a comparative analysis of the existing conceptual apparatus, it is concluded that there is no single concept of “artificial intelligence”. Each author puts his own vision into it. In this regard, the author’s definition of the “artificial intelligence” concept is formulated. It is determined that an important area of applying artificial intelligence technologies in various fields of activity is speech recognition technology. It is shown that the first commercially successful speech recognition prototypes appeared already by the 1990s, and since the beginning of the 21st century. The great interest in “end-to-end” automatic speech recognition has become obvious. While traditional phonetic approaches have requested pronunciation, acoustic, and language model data, end-to-end models simultaneously consider all components of speech recognition, thereby facilitating the stages of self-learning and development. It is established that a significant increase in the” mental “ capabilities of computer technology and the development of new algorithms have led to new achievements in this direction. These advances are driven by the growing demand for speech recognition.Conclusions. According to the authors, artificial intelligence is a complex of computer programs that duplicate the functions of the human brain, opening up the possibility of informal learning based on big data processing, allowing to solve the problems of pattern recognition (text, image, speech) and the formation of management decisions. Currently, the active development of information and communication technologies and artificial intelligence concepts has led to a wide practical application of intelligent technologies, especially in control systems. The impact of these systems can be found in the work of mobile phones and expert systems, in forecasting and other areas. Among the obstacles to the development of this technology is the lack of accuracy in speech and voice recognition systems in the conditions of sound interference, which is always present in the external environment. However, the recent advances overcome this disadvantage.
APA, Harvard, Vancouver, ISO, and other styles
30

Butler, Rika. "A systematic literature review of the factors affecting smartphone user threat avoidance behaviour." Information & Computer Security 28, no. 4 (June 3, 2020): 555–74. http://dx.doi.org/10.1108/ics-01-2020-0016.

Full text
Abstract:
Purpose There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats. This study aims to identify the human factors that affect smartphone users’ threat avoidance behaviour. Design/methodology/approach A structured literature review (SLR) was applied to answer the research question. A total of 27 sources were analysed, from which 16 codes emerged. After synthesis, six themes transpired. Findings Six factors were identified as drivers and/or challenges of smartphone users’ threat avoidance behaviour, namely, knowledge and awareness, misconceptions and trust, cost and benefit considerations, carelessness, perceived measure effectiveness and the user’s perceived skills and efficacy. Research limitations/implications The results can encourage and provide a starting point for further research on human behaviour to improve smartphone user behaviour. Practical implications The mobile industry should focus on eradicating common misconceptions and undue trust in mobile security that is prevalent among smartphone users and make cost effective and usable interventions available. Training and awareness programs should be updated to include the factors that were identified in this study to affect smartphone users’ threat avoidance behaviour. In addition to improving users’ declarative knowledge concerning available smartphone measures and tools, procedural knowledge should also be improved to ensure proper use of available protective measures. Users should realise the importance of staying updated with evolving smartphone technology and associated threats. Originality/value This study acknowledges and supports the notion that addressing human behaviour is crucial in the fight against mobile threats. It addresses the need for behavioural research to analyse the factors that drive smartphone user behaviour. Furthermore, it uses and documents the use of a SLR, a research technique often unfamiliar among information security researchers.
APA, Harvard, Vancouver, ISO, and other styles
31

Alahyari, Arman, David Pozo, and Meisam Farrokhifar. "Online Learning Algorithms for the Real-Time Set-Point Tracking Problem." Applied Sciences 11, no. 14 (July 19, 2021): 6620. http://dx.doi.org/10.3390/app11146620.

Full text
Abstract:
With the recent advent of technology within the smart grid, many conventional concepts of power systems have undergone drastic changes. Owing to technological developments, even small customers can monitor their energy consumption and schedule household applications with the utilization of smart meters and mobile devices. In this paper, we address the power set-point tracking problem for an aggregator that participates in a real-time ancillary program. Fast communication of data and control signal is possible, and the end-user side can exploit the provided signals through demand response programs benefiting both customers and the power grid. However, the existing optimization approaches rely on heavy computation and future parameter predictions, making them ineffective regarding real-time decision-making. As an alternative to the fixed control rules and offline optimization models, we propose the use of an online optimization decision-making framework for the power set-point tracking problem. For the introduced decision-making framework, two types of online algorithms are investigated with and without projections. The former is based on the standard online gradient descent (OGD) algorithm, while the latter is based on the Online Frank–Wolfe (OFW) algorithm. The results demonstrated that both algorithms could achieve sub-linear regret where the OGD approach reached approximately 2.4-times lower average losses. However, the OFW-based demand response algorithm performed up to twenty-nine percent faster when the number of loads increased for each round of optimization.
APA, Harvard, Vancouver, ISO, and other styles
32

Velichko, M. A., Yu P. Gladkikh, and O. N. Satler. "CALIBRATION OF ULTRASONIC FLOWMETER FOR WI-FI NETWORK WITH THE HELP OF WEB BROWSER." Herald of Dagestan State Technical University. Technical Sciences 45, no. 3 (May 12, 2019): 94–102. http://dx.doi.org/10.21822/2073-6185-2018-45-3-94-102.

Full text
Abstract:
Objectives. The purpose of the work was to change the method of signal transmission containing metrological information from industrial time-pulse ultrasonic gas flow meter to a compu-ting device (CD). It was planned to expand the range of devices serving as gas flow calculators. A hardware-software complex (HSC) for automatic calibration / verification of ultrasonic flowmeters was to be developed. This HSC should work equally well on different operating systems. The information exchange between the CD and the flowmeter was to be carried out wirelessly.Method. The Wi-Fi Pro-tocol was used as a wireless Protocol. The energy-efficient ESP8266 controller was chosen as micro-controller to provide the functionality of Wi-Fi. The ESP8266 board acted as a Wi-Fi access point on the network to which CD was connected for data exchange. The ESP8266 microcontroller also served as a HTTP server. Exchange of metrological and other information was carried out by GET-requests. Given the need for continuous flow measurements and simultaneous communication between the user and the flow meter, requests to the server were transmitted using AJAX technology. The software part of the APK consisted of 3 programs: a program that measured the flow and transmitted the information further to the ESP8266 microcontroller, a server program recorded in ESP8266, providing a response to the requests of CD users, and the client program installed on the CD. The article discusses the key points of the HSC.Result. As a result of this work, the HSC was processed for calibration/verification of ultrasonic gas flow meters. For the first time this process for industrial flow meters was implemented using the ESP8266Wi-Fi controller as an access point. As a WU, it became possible to use any desktop or laptop computer or mobile device with a modern browser.Conclusion. The method proposed in the paper significantly simplified the data exchange between the VU and the flowmeter, reduced the cost of software development due to the common approach for different operating systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Rudenko, M. "Theoretical approaches of digital management in agricultural enterprises." Ekonomìka ta upravlìnnâ APK, no. 2(151) (December 16, 2019): 76–88. http://dx.doi.org/10.33245/2310-9262-2019-151-2-76-88.

Full text
Abstract:
The theoretical approaches to digitalization of management in agricultural enterprises has been researched in the article. It has been found that the majority of economists-agrarians consider management as a process that ordered to implement certain range of interrelated actions in order to achieve the intended result. The typology of the concept of "management" as a process has been presented and it has been proved that the study of the digitalization of management as a process allows more comprehensively to cover practically all aspects of the use of the given concept. There are six main management functions that are specific to agricultural enterprises, which consistently transform one another into a holistic, highly effective management cycle. The group of modern technologies, inherent in the process of digitalization of management, has been grouped into five ones: internet technologies, information and communication technologies, sensors and sensors, space technologies and artificial intelligence, which allowed to comprehensively identify the influence of digitalization on the performance of managerial functions in agricultural enterprises and outline predictive effects of their use. The influence of modern technologies inherent in the process of digitalization on each separate management function has been analyzed in depth. It has been emphasized that with the development of digital technologies, the process of digitization of management in agricultural enterprises will only expand, grow and cover an increasing number of constituent elements. The challenges and threats of the process of digitalization of management has been highlighted, the main ones are the lack of IT specialists adapted to work on demand and needs of agribusinesses, the lack of agricultural specialists capable of working with computer programs, high-tech sensors, mobile applications and GPS systems, low qualifications of people , which should be serviced by digital equipment. Key words: digitalization of management, agricultural enterprise, management functions, digital technologies, process, influence, planning, changes.
APA, Harvard, Vancouver, ISO, and other styles
34

Kalinina, Alina Vladyslavivna, and Sabriie Seitzheliivna Shramko. "Criminal law and criminological threats in the Internet during a pandemic." Herald of the Association of Criminal Law of Ukraine 1, no. 15 (August 6, 2021): 226–41. http://dx.doi.org/10.21564/2311-9640.2021.15.237253.

Full text
Abstract:
A general description of criminal law and criminological threats on the Internet, which have become particularly common or arose during the pandemic in Ukraine and the world have been analyzed in the scientific paper. It is noted that during this pandemic people began to rely more than ever on computer systems, mobile devices and the Internet for remote working, education, communication, shopping, sharing and receiving information, minimization the influence of the social distancing, etc. Increasing of the number of Internet users and the time spent them online, combined with the feelings of confusion, anxiety and fear has become an enabling environment for criminal activity in the cyber space. The risks associated with the digitalization of health care in Ukraine and abroad have been identified. It is noted, that Interpol has identified three the most common types of cyberattacks at the international level, which affected individuals and legal entities during the pandemic: 1) the functioning of malicious domains; 2) distribution of malicious software; 3) download extortion programs. Phishing and other types of cyber fraud, related to COVID-19, were analyzed. It is emphasized, that the perception of fake information (depending on its content) can lead to the panic spreading among the population, the formation of aggression against certain groups of people and so on. It was determined, that during the COVID-19 pandemic, the increasing of the amount of "screen time" among both adults and children contributed to the intensification of actions aimed at sexual abuse of children on the Internet, cyberbullying, incitement to risky online behavior, distribution of potentially dangerous content. It is stated, that according to experts opinion, the implementation of criminal law and criminological threats on the Internet in 2020 caused losses of more than 1% of world GDP.
APA, Harvard, Vancouver, ISO, and other styles
35

Kraemer, Rolf. "Challenges and Ideas to Achieve Wireless 100 Gb/s Transmission: An Overview of Challenges and Solutions within the German Research Foundation (DFG) Special Priority Program SPP1655." Frequenz 71, no. 9-10 (September 26, 2017): 363–77. http://dx.doi.org/10.1515/freq-2017-0178.

Full text
Abstract:
Abstract Wireless communications is one of the fastest growing technology fields, driving numerous other innovations in electronics. One challenging research area within the wireless field is to achieve much higher transmission rates. First products with up to 3 Gb/s are in the market. In the coming years we predict this speed growing quickly up to and beyond 100 Gb/s. Today it is an open question how we can realize a wireless system at this speed. If we intend to use such systems in a mobile environment, we can only afford to spend approximately 1–10 pW/b for the end-to-end communication. This includes RF-transmission and all processing and protocol steps. The SPP1655 of the DFG was set up to investigate new paradigms for achieving the 100 Gb/s wireless transmission goal. Within 11 coordinated projects researchers from all over Germany are addressing several relevant issues ranging from the antennas and RF-Frontend, baseband-processing and error correction to protocol processing. A number of limitations of current approaches have to be investigated and new algorithms must be found in order to achieve the intended goal. One of the big challenges is finding the correct balance between analog and digital signal processing to achieve an extremely high performance at very low energy consumption. Another challenge is to find a good balance between bandwidth and bandwidth efficiency to achieve the 100 Gbps goal. Finally, protocol processing will need new approaches to decouple the central processor of a computer from the high-end input/output operations. Within this editorial we will address the main challenges and briefly outline the approaches of the running projects. The rest of this special issue will be devoted to more detailed descriptions and achievements of the individual projects of SPP1655.
APA, Harvard, Vancouver, ISO, and other styles
36

Hei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.

Full text
Abstract:
Android system has been one of the main targets of hacker attacks for a long time. At present, it is faced with security risks such as privilege escalation attacks, image tampering, and malicious programs. In view of the above risks, the current detection of the application layer can no longer guarantee the security of the Android system. The security of mobile terminals needs to be fully protected from the bottom to the top, and the consistency test of the hardware system is realized from the hardware layer of the terminal. However, there is not a complete set of security measures to ensure the reliability and integrity of the Android system at present. Therefore, from the perspective of trusted computing, this paper proposes and implements a trusted static measurement method of the Android system based on TrustZone to protect the integrity of the system layer and provide a trusted underlying environment for the detection of the Android application layer. This paper analyzes from two aspects of security and efficiency. The experimental results show that this method can detect the Android system layer privilege escalation attack and discover the rootkit that breaks the integrity of the Android kernel in time during the startup process, and the performance loss of this method is within the acceptable range.
APA, Harvard, Vancouver, ISO, and other styles
37

Haambiya, L., H. Mussa, and M. Mulumpwa. "A review on the use of Information Communication Technology (ICT) in fisheries management: A case of Mbenji island small-scale fishery in Malawi." African Journal of Food, Agriculture, Nutrition and Development 20, no. 07 (December 18, 2020): 17113–24. http://dx.doi.org/10.18697/ajfand.95.18195.

Full text
Abstract:
Fisheries management has evolved in Malawi from a traditional system to a centralized regime and lately to co-management fisheries systems, although, success stories about sustainability of the fishery resources are few. Open access nature of fisheries resources has posed a challenge to management regimes. Resource over exploitation has continued in a majority of fisheries worsened by large stretches of the shoreline manned by a single fisheries field staff, and limited capacity by DoF to monitor and manage the fishery. However, isolated localities have upheld management styles that have facilitated sustainable exploitation. Mbenji Island fishery ‘managers’ have ensured high compliance to fisheries rules and regulations among fishers through strict enforcement and maintained abundant fish stocks amid visibly declining levels of fish in vast localities of Lake Malawi and other water bodies in Malawi. There is,therefore, need to take the Mbenji Island success story to other fishing communities to learn from their fisheries management strategies. Information Communication Technology (ICT) as a powerful means in mobilizing communities to take charge of their own development should support ‘best practices’ and offer fishing communities access to the same type of services and advantages. If appropriately applied,ICT can provide for real-time monitoring of fisheries resources as fishers alarm law enforcers to move in at appropriate times. Fishers also strike deals on mobile phones for the day's catch even before landing at shore. This reduces post-harvest waste from delayed handling of fish. Computers have been used for data management, storage and analysis as well as accessing internet services. Studies have shown commonalities in fisher communities in terms of socio-economic and cultural characteristics. On the basis of such an advantage, more could be shared among such communities. Management success can be adopted by other communities of fishers through use of ICT such as radio programs (supplemented by phone-in sessions) undertaken by local-level resource users. These programs provide locally available information and knowledge on best practices aimed at sustainability with means within communities. This encourages community members in other localities to come together to seek the way forward on the basis of lessons from successful communities aired on local radio stations (both community or national radio stations). It is easier to adopt practices that have worked in near vicinities. After all,what is currently called co-management is seemingly based on indigenous knowledge of fishers and other resource users. Mbenji Island is one of the custodians of ICT option in small-scale fisheries management of Lake Malawi. Information Communication Technology provides opportunity for both the Malawi Department of Fisheries (DoF) and fishers with information about fisher community activities including catch and market regardless of distance.
APA, Harvard, Vancouver, ISO, and other styles
38

Hron, Jonathan D., Chase R. Parsons, Lee Ann Williams, Marvin B. Harper, and Fabienne C. Bourgeois. "Rapid Implementation of an Inpatient Telehealth Program during the COVID-19 Pandemic." Applied Clinical Informatics 11, no. 03 (May 2020): 452–59. http://dx.doi.org/10.1055/s-0040-1713635.

Full text
Abstract:
Abstract Background Relaxation of laws and regulations around privacy and billing during the COVID-19 pandemic provide expanded opportunities to use telehealth to provide patient care at a distance. Many health systems have transitioned to providing outpatient care via telehealth; however, there is an opportunity to utilize telehealth for inpatients to promote physical distancing. Objective This article evaluates the use of a rapidly implemented, secure inpatient telehealth program. Methods We assembled a multidisciplinary team to rapidly design, implement, and iteratively improve an inpatient telehealth quality improvement initiative using an existing videoconferencing system at our academic medical center. We assigned each hospital bed space a unique meeting link and updated the meeting password for each new patient. Patients and families were encouraged to use their own mobile devices to join meetings when possible. Results Within 7 weeks of go-live, we hosted 1,820 inpatient telehealth sessions (13.3 sessions per 100 bedded days). We logged 104,647 minutes of inpatient telehealth time with a median session duration of 22 minutes (range 1–1,961). There were 5,288 participant devices used with a mean of 3 devices per telehealth session (range 2–22). Clinicians found they were able to build rapport and perform a reasonable physical exam. Conclusion We successfully implemented and scaled a secure inpatient telehealth program using an existing videoconferencing system in less than 1 week. Our implementation provided an intuitive naming convention for providers and capitalized on the broad availability of smartphones and tablets. Initial comments from clinicians suggest the system was useful; however, further work is needed to streamline initial setup for patients and families as well as care coordination to support clinician communication and workflows. Numerous use cases identified suggest a role for inpatient telehealth will remain after the COVID-19 crisis underscoring the importance of lasting regulatory reform.
APA, Harvard, Vancouver, ISO, and other styles
39

Ramsdale, P. A. "Mobile Communication Systems." Electronics & Communications Engineering Journal 2, no. 2 (1990): 43. http://dx.doi.org/10.1049/ecej:19900012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Puzmanova, Rita. "W-CDMA Mobile Communication Systems." Computer Communications 26, no. 12 (July 2003): 1427. http://dx.doi.org/10.1016/s0140-3664(03)00040-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ludwin, W., and A. Jajszczyk. "Mobile Communication Systems [Book Review]." IEEE Communications Magazine 40, no. 5 (May 2002): 34. http://dx.doi.org/10.1109/mcom.2002.1000211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Norbury, J. R. "Satellite land mobile communication systems." Electronics & Communications Engineering Journal 1, no. 6 (1989): 245. http://dx.doi.org/10.1049/ecej:19890051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lim, Yujin, Hideyuki Takahashi, Fan Wu, and Rossana M. de Castro Andrade. "Challenges for the Future Mobile Communication Systems." Mobile Information Systems 2017 (2017): 1. http://dx.doi.org/10.1155/2017/1298659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Schwarz Dasilva, J., D. Ikonomou, and H. Erben. "European R&D programs on third-generation mobile communication systems." IEEE Personal Communications 4, no. 1 (1997): 46–52. http://dx.doi.org/10.1109/98.575991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Barnard, M., and S. McLaughlin. "Reconfigurable terminals for mobile communication systems." Electronics & Communication Engineering Journal 12, no. 6 (December 1, 2000): 281–92. http://dx.doi.org/10.1049/ecej:20000607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zahariadis, T., and D. Kazakos. "(R)evolution toward 4G mobile communication systems." IEEE Wireless Communications 10, no. 4 (August 2003): 6–7. http://dx.doi.org/10.1109/mwc.2003.1224973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yasya, Wichitra, Titis Nurwulan Suciati, Gallen Ray Canillo, Rojean Patumbon, and Chuking Pandia. "Mobile communication experience of students in exchange programs between Indonesia and the Philippines." Jurnal Kajian Komunikasi 10, no. 2 (December 29, 2022): 159. http://dx.doi.org/10.24198/jkk.v10i2.41460.

Full text
Abstract:
The use of technology and mobile communication became prevalent with the advent of the COVID-19 pandemic, where activities such as student exchange between two universities can be conducted virtually. Mobile communication, in this case, is related to communication using cellular devices based on computer technology, but also the characteristics of mobile communication itself, which is mobility or its ability to be used anywhere and at any time. The study aims to examine the lived experiences of mobile communication on undergoing student exchange programs between Indonesia and the Philippines. The study was conducted using the qualitative method with in-depth interviews as data collection. The research's informants are students from universities in Indonesia and the Philippines. Data were interpreted through a thematic analysis. The research found that mobile communication positively affected the students' learning and experience, mainly how it helps them continue their education despite being disrupted by the pandemic. However, poor connection, English skills, and language barriers affect their academic performance. Recommendations are put forward for further studies to focus on how the language barrier affected students' learning and behaviors on mobile communication. Another further study that can be done is to explore mobile communication through theories in virtual exchange. They are polymedia and affordance theories. Academic institutions should help and monitor students’ understandings that would help and allow the students to understand and learn more.
APA, Harvard, Vancouver, ISO, and other styles
48

CHEN, Chien-Sheng, Szu-Lin SU, and Yih-Fang HUANG. "Mobile Location Estimation in Wireless Communication Systems." IEICE Transactions on Communications E94-B, no. 3 (2011): 690–93. http://dx.doi.org/10.1587/transcom.e94.b.690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Okumura, Yukihiko. "4. Error Control for Mobile Communication Systems." Journal of The Institute of Image Information and Television Engineers 70, no. 9 (2016): 754–63. http://dx.doi.org/10.3169/itej.70.754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

KO, Y. C. "Doppler Spread Estimation in Mobile Communication Systems." IEICE Transactions on Communications E88-B, no. 2 (February 1, 2005): 724–28. http://dx.doi.org/10.1093/ietcom/e88-b.2.724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography