To see the other types of publications on this topic, follow the link: Mobile User profiles.

Journal articles on the topic 'Mobile User profiles'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile User profiles.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

PANAGIOTAKIS, SPYROS, MARIA KOUTSOPOULOU, and ATHANASSIA ALONISTIOTI. "CONTEXT-AWARENESS AND USER PROFILING IN MOBILE ENVIRONMENTS." International Journal of Semantic Computing 03, no. 03 (2009): 331–63. http://dx.doi.org/10.1142/s1793351x09000811.

Full text
Abstract:
The evolution of mobile communication systems to 3G and beyond introduces requirements for flexible, customized, and ubiquitous multimedia service provision to mobile users. One must be able to know at any given time the network status, the user location, the profiles of the various entities (users, terminals, network equipment, services) involved and the policies that are employed within the system. Namely, the system must be able to cope with a large amount of context information. The present paper focuses on location and context awareness in service provisioning and proposes a flexible and
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Dongjie, Pengyang Wang, Kunpeng Liu, Yuanchun Zhou, Charles E. Hughes, and Yanjie Fu. "Reinforced Imitative Graph Representation Learning for Mobile User Profiling: An Adversarial Training Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 5 (2021): 4410–17. http://dx.doi.org/10.1609/aaai.v35i5.16567.

Full text
Abstract:
In this paper, we study the problem of mobile user profiling, which is a critical component for quantifying users' characteristics in the human mobility modeling pipeline. Human mobility is a sequential decision-making process dependent on the users' dynamic interests. With accurate user profiles, the predictive model can perfectly reproduce users' mobility trajectories. In the reverse direction, once the predictive model can imitate users' mobility patterns, the learned user profiles are also optimal. Such intuition motivates us to propose an imitation-based mobile user profiling framework by
APA, Harvard, Vancouver, ISO, and other styles
3

Patrikakis, Ch Z., I. G. Nikolakopoulos, and A. S. Voulodimos. "Mobile user profiles for Personal Networks: The MAGNET Beyond case." International Journal of Communication Systems 23, no. 9-10 (2010): 1289–309. http://dx.doi.org/10.1002/dac.1130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ukrit, M. Ferni, B. Venkatesh, and Swetabh Suman. "Location Based Services with Location Centric Profiles." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 3001. http://dx.doi.org/10.11591/ijece.v6i6.11111.

Full text
Abstract:
<p>In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. Android operating system supports most applications in today’s technical world. It is an open source operating system which highly satisfies the user’s needs. In this paper, the applications that are location based i.e. the applications that make use of the Global Positioning System (GPS) is discussed. It is a space based satellite navigation system which provides details of
APA, Harvard, Vancouver, ISO, and other styles
5

Ukrit, M. Ferni, B. Venkatesh, and Swetabh Suman. "Location Based Services with Location Centric Profiles." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 3001. http://dx.doi.org/10.11591/ijece.v6i6.pp3001-3005.

Full text
Abstract:
<p>In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. Android operating system supports most applications in today’s technical world. It is an open source operating system which highly satisfies the user’s needs. In this paper, the applications that are location based i.e. the applications that make use of the Global Positioning System (GPS) is discussed. It is a space based satellite navigation system which provides details of
APA, Harvard, Vancouver, ISO, and other styles
6

Felice, Magdalena. "USER PROFILES: Uses and appropriations of mobile phones by the youth in the city of Buenos Aires." Luciérnaga-Comunicación 5, no. 9 (2013): 29–38. http://dx.doi.org/10.33571/revistaluciernaga.v5n9a3.

Full text
Abstract:
The article presents some results of the research about the uses and appropriations of mobile phones by young people between 20 and 29 years old belonging to middle-high sectors in the city of Buenos Aires. This research was carried out between August 2011 and September 2012. In this paper we propose to acknowledge the codes of significance that actors attach to this device and we make a description of the communication field using mobile phones as topography. This way we try to build classifications and categories that will allow us to synthesize and organize information gathered throughout t
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Junpu, and Hong Xie. "An Online Learning Approach to Sequential User-Centric Selection Problems." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 6 (2022): 6231–38. http://dx.doi.org/10.1609/aaai.v36i6.20572.

Full text
Abstract:
This paper proposes a new variant of multi-play MAB model, to capture important factors of the sequential user-centric selection problem arising from mobile edge computing, ridesharing applications, etc. In the proposed model, each arm is associated with discrete units of resources, each play is associate with movement costs and multiple plays can pull the same arm simultaneously. To learn the optimal action profile (an action profile prescribes the arm that each play pulls), there are two challenges: (1) the number of action profiles is large, i.e., M^K, where K and M denote the number of pla
APA, Harvard, Vancouver, ISO, and other styles
8

SONG, WEI, DIAN TJONDRONEGORO, and MICHAEL DOCHERTY. "EXPLORATION AND OPTIMIZATION OF USER EXPERIENCE IN VIEWING VIDEOS ON A MOBILE PHONE." International Journal of Software Engineering and Knowledge Engineering 20, no. 08 (2010): 1045–75. http://dx.doi.org/10.1142/s0218194010005067.

Full text
Abstract:
Compared with viewing videos on PCs or TVs, mobile users have different experiences in viewing videos on a mobile phone due to different device features such as screen size and distinct usage contexts. To understand how mobile user's viewing experience is impacted, we conducted a field user study with 42 participants in two typical usage contexts using a custom-designed iPhone application. With user's acceptance of mobile video quality as the index, the study addresses four influence aspects of user experiences, including context, content type, encoding parameters and user profiles. Accompanyi
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Jia, Jin Xin Xiang, Xiang Chen, Fang Bin Liu, and Jing Jie Yu. "ODMBP: Behavior Forwarding for Multiple Property Destinations in Mobile Social Networks." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/7908328.

Full text
Abstract:
The smartphones are widely available in recent years. Wireless networks and personalized mobile devices are deeply integrated and embedded in our lives. The behavior based forwarding has become a new transmission paradigm for supporting many novel applications. However, the commodities, services, and individuals usually have multiple properties of their interests and behaviors. In this paper, we profile these multiple properties and propose an Opportunistic Dissemination Protocol based on Multiple Behavior Profile, ODMBP, in mobile social networks. We first map the interest space to the behavi
APA, Harvard, Vancouver, ISO, and other styles
10

Dee, Timothy, Ian Richardson, and Akhilesh Tyagi. "Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication." Cryptography 6, no. 2 (2022): 14. http://dx.doi.org/10.3390/cryptography6020014.

Full text
Abstract:
Mobile banking, shopping, and in-app purchases utilize persistent authentication states for access to sensitive data. One-shot authentication permits access for a fixed time period. For instance, a username/password-based authentication allows a user access to all the shopping and payments data in the Amazon shopping app. Traditional user passwords and lock screens are easily compromised. Snooping attacks—observing an unsuspecting user entering passwords—and smudge attacks—examining touchscreen finger oil residue—enable compromised user authentication. Mobile device interactions provide robust
APA, Harvard, Vancouver, ISO, and other styles
11

Morais, Leonardo P. de, Roger Immich, Nádia Félix Silva, Thierson Couto Rosa, and Vinicius da Cunha Martins Borges. "Characterization of the Mobile User Profile Based on Sentiments and Network Usage Attributes." Journal of Internet Services and Applications 13, no. 1 (2022): 82–97. http://dx.doi.org/10.5753/jisa.2022.2520.

Full text
Abstract:
Providing resources to meet user needs in futuristic mobile networks is still challenging since the network resources like spectrum and base stations do not increase in the same proportion as the accelerated growth of network traffic. Because of this, human/user behavior attributes can assist resource management in dealing with these challenges, which pick up aspects of how the user impacts the usage of mobile networks, such as network usage, the content of interest, urban mobility routines, social networks, and sentiment. A user profile is a combination of user/human behavior attributes. Such
APA, Harvard, Vancouver, ISO, and other styles
12

Lakshmanarao, A., and M. Shashi. "Android Malware Detection with Deep Learning using RNN from Opcode Sequences." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 01 (2022): 145–57. http://dx.doi.org/10.3991/ijim.v16i01.26433.

Full text
Abstract:
Android is the most widely used operating system in smartphones. Mobile users can download and access apps easily from the play store. Due to lack of security awareness and risk associated with mobile apps, malware apps would be downloaded by normal users in general. The consequences after installing a malware app are unpredictable. Malware apps can gather user personal data, browsing history, user profiles, user sensitive data like passwords. Hence, android malware detection is essential for providing security to mobile users. Android malware detection using machine learning is done either by
APA, Harvard, Vancouver, ISO, and other styles
13

Abdullah, Nor Aniza, Rasheed Abubakar Rasheed, Mohd Hairul Nizam Md Nasir, and Md Mujibur Rahman. "Eliciting Auxiliary Information for Cold Start User Recommendation: A Survey." Applied Sciences 11, no. 20 (2021): 9608. http://dx.doi.org/10.3390/app11209608.

Full text
Abstract:
Recommender systems suggest items of interest to users based on their preferences. These preferences are typically generated from user ratings of the items. If there are no ratings for a certain user or item, it is said that there is a cold start problem, which leads to unreliable recommendations. Existing studies that reviewed and examined cold start in recommender systems have not explained the process of deriving and obtaining the auxiliary information needed for cold start recommendation. This study surveys the existing literature in order to explain the various approaches and techniques e
APA, Harvard, Vancouver, ISO, and other styles
14

Fitzpatrick, Colin, and Jeremy Birnholtz. "“I Shut the Door”: Interactions, tensions, and negotiations from a location-based social app." New Media & Society 20, no. 7 (2017): 2469–88. http://dx.doi.org/10.1177/1461444817725064.

Full text
Abstract:
Location-based social apps leverage mobile phones to provide face-to-face (FtF) social opportunities for physically proximate individuals, such as finding nearby people to socialize, date, or hook up. Prior work on dating and hookup apps has focused mostly on profiles and user goals, but this leaves open important questions of how, after constructing a profile, people use these apps to connect and realize their goals, and what these experiences are like. We report on 22 interviews with users of Grindr, a location-based social app for men who have sex with men. We examine interaction processes
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Fudong, Nathan Clarke, Maria Papadaki, and Paul Dowland. "Misuse Detection for Mobile Devices Using Behaviour Profiling." International Journal of Cyber Warfare and Terrorism 1, no. 1 (2011): 41–53. http://dx.doi.org/10.4018/ijcwt.2011010105.

Full text
Abstract:
Mobile devices have become essential to modern society; however, as their popularity has grown, so has the requirement to ensure devices remain secure. This paper proposes a behaviour-based profiling technique using a mobile user’s application usage to detect abnormal activities. Through operating transparently to the user, the approach offers significant advantages over traditional point-of-entry authentication and can provide continuous protection. The experiment employed the MIT Reality dataset and a total of 45,529 log entries. Four experiments were devised based on an application-level da
APA, Harvard, Vancouver, ISO, and other styles
16

Saighi, Asma, Zakaria Laboudi, Philippe Roose, Sébastien Laborie, and Nassira Ghoualmi-Zine. "On Using Multiple Disabilities Profiles to Adapt Multimedia Documents." International Journal of Information Technology and Web Engineering 15, no. 3 (2020): 34–60. http://dx.doi.org/10.4018/ijitwe.2020070103.

Full text
Abstract:
Currently, advanced technological hardware can offer mobile devices which fits in the hand with a capacity to consult documents at anytime and anywhere. Multiple user context constraints as well as mobile device capabilities may involve the adaptation of multimedia content. In this article, the authors propose a new graph-based method for adapting multimedia documents in complex situations. Each contextual situation could correspond to a physical handicap and therefore triggers an adaptation action using ontological reasoning. Consequently, when several contextual situations are identified, th
APA, Harvard, Vancouver, ISO, and other styles
17

P George, Jossy, and Vinay M. "Mobile in learning: Enhancement of information and communication technologies." International Journal of Engineering & Technology 7, no. 2.6 (2018): 98. http://dx.doi.org/10.14419/ijet.v7i2.6.10075.

Full text
Abstract:
The technological advancement in the world has changed the people’s life. The people view point towards the usage of technologies in different fields like business, tourism, communication, education etc. has changed. Mobile learning can give flexible learning environment for the user. It can also increase the participant number in the online teaching learning process. This paper discusses about the effectiveness of the current technologies used in higher education system. It profiles the advantages of using mobile in accessing the university central system for teaching and learning. It also di
APA, Harvard, Vancouver, ISO, and other styles
18

Wagata, Kensuke, and Andrew Beng Jin Teoh. "Few-Shot Continuous Authentication for Mobile-Based Biometrics." Applied Sciences 12, no. 20 (2022): 10365. http://dx.doi.org/10.3390/app122010365.

Full text
Abstract:
The rapid growth of smartphone financial services raises the need for secure mobile authentication. Continuous authentication is a user-friendly way to strengthen the security of smartphones by implicitly monitoring a user’s identity through sessions. Mobile continuous authentication can be viewed as an anomaly detection problem in which models discriminate between one genuine user and the rest of the impostors (anomalies). In practice, complete impostor profiles are hardly available due to the time and monetary cost, while leveraging genuine data alone yields poorly generalized models due to
APA, Harvard, Vancouver, ISO, and other styles
19

Gatziolis, Kleanthis G., Nikolaos D. Tselikas, and Ioannis D. Moscholios. "Adaptive User Profiling in E-Commerce and Administration of Public Services." Future Internet 14, no. 5 (2022): 144. http://dx.doi.org/10.3390/fi14050144.

Full text
Abstract:
The World Wide Web is evolving rapidly, and the Internet is now accessible to millions of users, providing them with the means to access a wealth of information, entertainment and e-commerce opportunities. Web browsing is largely impersonal and anonymous, and because of the large population that uses it, it is difficult to separate and categorize users according to their preferences. One solution to this problem is to create a web-platform that acts as a middleware between end users and the web, in order to analyze the data that is available to them. The method by which user information is col
APA, Harvard, Vancouver, ISO, and other styles
20

Perreault, Mathieu, and Derek Ruths. "The Effect of Mobile Platforms on Twitter Content Generation." Proceedings of the International AAAI Conference on Web and Social Media 5, no. 1 (2021): 289–96. http://dx.doi.org/10.1609/icwsm.v5i1.14112.

Full text
Abstract:
The increased popularity of feature-rich mobile devices in recent years has enabled widespread consumption and production of social media content via mobile devices. Because mobile devices and mobile applications change context within which an individual generates and consumes microblog content, we might expect microblogging behavior to differ depending on whether the user is using a mobile device. To our knowledge, little has been established about what, if any, effects such mobile interfaces have on microblogging. In this paper, we investigate this question within the context of Twitter, amo
APA, Harvard, Vancouver, ISO, and other styles
21

Oliveira, David, Luís Pedro, and Carlos Santos. "The Use of Mobile Applications in Higher Education Classrooms: An Exploratory Measuring Approach in the University of Aveiro." Education Sciences 11, no. 9 (2021): 484. http://dx.doi.org/10.3390/educsci11090484.

Full text
Abstract:
The proliferation of mobile devices and mobile applications has changed the way people communicate, work, and study, namely in higher education contexts. However, users have very different application usage habits from each other, and the data collecting instruments that typically support the studies usually rely on the perception that users report on their use. Hence, the reported user perception may not match the actual usage. Based on an exploratory approach, this article aims to analyze the use of mobile applications by students at the University of Aveiro. The study has a mixed approach t
APA, Harvard, Vancouver, ISO, and other styles
22

Shin, M., and KW Lee. "Similarity attraction-based mobile advertising: designing and testing." MATEC Web of Conferences 277 (2019): 01006. http://dx.doi.org/10.1051/matecconf/201927701006.

Full text
Abstract:
This study explores the possibility of applying the sociopsychological phenomenon known as similarity attraction to the creation of more customized and persuasive mobile advertising without privacy concerns, and for this purpose, we develop two applications, SensPlus and PerAds. While the SensPlus app accumulates the smartphone usage profiles of participants and constructs a regression model to predict their personality, the PerAds app presents user-created content according to the user's personality. The participants' response to a smartphone ad is measured in terms of invitation acceptance o
APA, Harvard, Vancouver, ISO, and other styles
23

Kotsopoulos, Dimosthenis, Cleopatra Bardaki, Stavros Lounis, and Katerina Pramatari. "Employee Profiles and Preferences towards IoT-enabled Gamification for Energy Conservation." International Journal of Serious Games 5, no. 2 (2018): 65–85. http://dx.doi.org/10.17083/ijsg.v5i2.225.

Full text
Abstract:
Gamification can be used to effect positive behavioral change in various fields, including energy conservation. This paper reports on a survey we conducted to formulate a holistic view of users’ profiles and preferences in an Internet of Things (IoT)-enabled gamified mobile application that provides personalized energy-saving recommendation tips to employees, towards conserving energy and adopting a more green behavior at the workplace. The collected insight dictates that a gamified app promoting energy saving at the workplace may become a daily habit for its users if it at least includes thre
APA, Harvard, Vancouver, ISO, and other styles
24

Konstantakis, Markos, Yannis Christodoulou, John Aliprantis, and George Caridakis. "ACUX Recommender: A Mobile Recommendation System for Multi-Profile Cultural Visitors Based on Visiting Preferences Classification." Big Data and Cognitive Computing 6, no. 4 (2022): 144. http://dx.doi.org/10.3390/bdcc6040144.

Full text
Abstract:
In recent years, Recommendation Systems (RSs) have gained popularity in different scientific fields through the creation of (mostly mobile) applications that deliver personalized services. A mobile recommendation system (MRS) that classifies in situ visitors according to different visiting profiles could act as a mediator between their visiting preferences and cultural content. Drawing on the above, in this paper, we propose ACUX Recommender (ACUX-R), an MRS, for recommending personalized cultural POIs to visitors based on their visiting preferences. ACUX-R experimentally employs the ACUX typo
APA, Harvard, Vancouver, ISO, and other styles
25

Manogna, T. "Mobile Application for Food Donation." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1195–97. http://dx.doi.org/10.22214/ijraset.2021.35171.

Full text
Abstract:
This application is designed for any random user who’s willing to donate and have no proper chance or time to donate the food to orphanages, old-age homes, foodless and even stray animals. This application includes the history, status of donation and profiles of the donor, receiver and volunteer. This android application uses the information given by the donors, like-food type, mobile no., etc. to locate and collect the food. Then our NGO’s or volunteers distribute the food for the needed. This application mainly has 3 types of users: donor, receiver, volunteer. Donors log-in to their account
APA, Harvard, Vancouver, ISO, and other styles
26

Jabbar, Muhammad, Qaisar Javaid, Muhammad Arif, Asim Munir, and Ali Javed. "An Efficient and Intelligent Recommender System for Mobile Platform." October 2018 37, no. 4 (2018): 463–80. http://dx.doi.org/10.22581/muet1982.1804.02.

Full text
Abstract:
Recommender Systems are valuable tools to deal with the problem of overloaded information faced by most of the users in case of making purchase decision to buy any item. Recommender systems are used to provide recommendations in many domains such as movies, books, digital equipment’s, etc. The massive collection of available books online presents a great challenge for users to select the relevant books that meet their preferences. Users usually read few pages or contents to decide whether to buy a certain book or not. Recommender systems provide different value addition factors such as similar
APA, Harvard, Vancouver, ISO, and other styles
27

Cassitas Hino, Marcia, and Maria Alexandra Cunha. "Female lens in urban mobility: technology-use behavior and individual differences." Information Technology & People 34, no. 4 (2021): 1370–97. http://dx.doi.org/10.1108/itp-05-2020-0342.

Full text
Abstract:
PurposeThe purpose of this study is to investigate how women's individual differences influence urban mobility service technology-use behavior. The reduction in urban mobility is a major problem in countries with emerging economies, thus affecting both the economy and quality of life.Design/methodology/approachThe theoretical approach follows the individual differences theory of gender and information technology (IDTGIT). This research combines structured interviews to understand how the use of urban mobility service technology in daily routines is perceived, questionnaires to map individual d
APA, Harvard, Vancouver, ISO, and other styles
28

Khalid Khoshnaw, Karwan Hoshyar, Zardasht Abdulaziz Abdulkarim Shwany, Twana Mustafa, and Shayda Khudhur Ismail. "Mobile recommender system based on smart city graph." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 3 (2022): 1771. http://dx.doi.org/10.11591/ijeecs.v25.i3.pp1771-1776.

Full text
Abstract:
<span>Mobile recommender systems have changed the way people find items, purposes of intrigue, administrations, or even new companions. The innovation behind mobile recommender systems has developed to give client inclinations and social impacts. This paper introduces a first way to build a mobile recommendation system based on smart city graphs that appear topic features, user profiles, and impacts acquired from social connections. It exploits graph centrality measures to expand customized recommendations from the semantic information represented in the graph. The graph shows and choose
APA, Harvard, Vancouver, ISO, and other styles
29

Roman, Cristian, Ruizhi Liao, Peter Ball, and Shumao Ou. "Mobility and Network Selection in Heterogeneous Wireless Networks: User Approach and Implementation." Network Protocols and Algorithms 8, no. 2 (2016): 107. http://dx.doi.org/10.5296/npa.v8i2.9327.

Full text
Abstract:
The Intelligent Transport Systems (ITS) wireless infrastructure needs to support various safety and non-safety services for both autonomous and non-autonomous vehicles.The existing wireless infrastructures can already be used for communicating with different mobile entities at various monetary costs.A packet scheduler, included in a shim layer between the network layer and the medium access (MAC) layer, which is able to schedule packets between uncoordinated Radio Access Technologies (RATs) without modification of the wireless standards, has been devised and its performance evaluated.In this p
APA, Harvard, Vancouver, ISO, and other styles
30

Kursun, Bertan, Chemay Shola, and Yi Shen. "Initial validations of an iterative hearing-aid self-fitting procedure with Monte-Carlo simulations." Journal of the Acoustical Society of America 151, no. 4 (2022): A125. http://dx.doi.org/10.1121/10.0010858.

Full text
Abstract:
Self-directed gain adjustments may present a satisfactory solution for fitting a hearing aid (HA) without the requirement of supervision from a clinician. The current study develops a self-fitting procedure and provides initial evaluations of the procedure using Monte-Carlo simulations. In the procedure, the user interacts with the HA using a mobile device with a touch screen, while a continuous speech as a stimulus and a babble background noise is played in the room. The user explores the locations on the touch screen while hearing its effects on the hearing-aid processed audio in real time,
APA, Harvard, Vancouver, ISO, and other styles
31

Marepalli, Sai Manoj, Razia Sultana, and Andreas Christ. "Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud." International Journal of E-Entrepreneurship and Innovation 4, no. 3 (2013): 38–52. http://dx.doi.org/10.4018/ijeei.2013070103.

Full text
Abstract:
Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only bene
APA, Harvard, Vancouver, ISO, and other styles
32

Bai, Jing. "College Student Social Dynamic Analysis and Educational Mechanism Using Big Data Technology." Applied Bionics and Biomechanics 2022 (July 5, 2022): 1–6. http://dx.doi.org/10.1155/2022/7132817.

Full text
Abstract:
With the advancement of the “big data” technology, college students inadvertently purchase personal advice while taking advantage of the exciting Internet to access information quickly and easily. In order to objectively achieve the real office of college students’ material enlightenment penetration in the mobile-friendly network, we choose the popular mobile social network, and we apply the natural clustering algorithm rules to segment the college students. Further, we identify college students, based on which we construct information leakage and apply the risk assessment design. The comprehe
APA, Harvard, Vancouver, ISO, and other styles
33

Njoku, Howard O., Chibuoke T. Eneh, Mtamabari Simeon Torbira, and Chibeoso Wodi. "Infrared Detection of Elevations in Mobile Phone Temperatures Induced by Casings." Proceedings 42, no. 1 (2020): 23. http://dx.doi.org/10.3390/ecsa-6-06570.

Full text
Abstract:
The design and utility of mobile handheld devices have developed tremendously, from being initially intended for audio calls only to the recent incorporation of augmented reality in smartphones. Recent smartphone functions are power-intensive, and cause excessive heating in phone parts, primarily batteries and processors. Left unmanaged, phone temperatures would exceed the threshold temperature of discomfort, negatively affecting user experience. The use of phone casings has simultaneously become common in recent years. They form an additional barrier to heat dissipation from mobile devices, w
APA, Harvard, Vancouver, ISO, and other styles
34

Jiang, Jehn-Ruey, and Hanas Subakti. "An Indoor Location-Based Augmented Reality Framework." Sensors 23, no. 3 (2023): 1370. http://dx.doi.org/10.3390/s23031370.

Full text
Abstract:
This paper proposes an indoor location-based augmented reality framework (ILARF) for the development of indoor augmented-reality (AR) systems. ILARF integrates an indoor localization unit (ILU), a secure context-aware message exchange unit (SCAMEU), and an AR visualization and interaction unit (ARVIU). The ILU runs on a mobile device such as a smartphone and utilizes visible markers (e.g., images and text), invisible markers (e.g., Wi-Fi, Bluetooth Low Energy, and NFC signals), and device sensors (e.g., accelerometers, gyroscopes, and magnetometers) to determine the device location and directi
APA, Harvard, Vancouver, ISO, and other styles
35

Alrfaay, M., A. K. Ali, S. Chaoui, H. Lenando, and S. Alanazi. "R-SOR: Ranked Social-based Routing Protocol in Opportunistic Mobile Social Networks." Engineering, Technology & Applied Science Research 12, no. 1 (2022): 7998–8006. http://dx.doi.org/10.48084/etasr.4612.

Full text
Abstract:
Exploiting social information to improve routing performance is an increasing trend in Opportunistic Mobile Social Networks (OMSNs). Selecting the next message’s relay node based on the user’s social behavior is a critical factor in attaining a high delivery rate. So, to ascertain the most efficient selection of the next relay, the correlation between daily social activities and the social characteristics in the user profiles can be exploited. In this paper, we consider the impact of the social characteristics on mobile user activities during certain periods of the day and then rank these char
APA, Harvard, Vancouver, ISO, and other styles
36

Torres-Ruiz, Miguel, Rolando Quintero, Giovanni Guzman, and Kwok Tai Chui. "Healthcare Recommender System Based on Medical Specialties, Patient Profiles, and Geospatial Information." Sustainability 15, no. 1 (2022): 499. http://dx.doi.org/10.3390/su15010499.

Full text
Abstract:
The global outburst of COVID-19 introduced severe issues concerning the capacity and adoption of healthcare systems and how vulnerable citizen classes might be affected. The pandemic generated the most remarkable transformation of health services, appropriating the increase in new information and communication technologies to bring sustainability to health services. This paper proposes a novel, methodological, and collaborative approach based on patient-centered technology, which consists of a recommender system architecture to assist the health service level according to medical specialties.
APA, Harvard, Vancouver, ISO, and other styles
37

Silva, Luis Augusto, Valderi Reis Quietinho Leithardt, Carlos O. Rolim, Gabriel Villarrubia González, Cláudio F. R. Geyer, and Jorge Sá Silva. "PRISER: Managing Notification in Multiples Devices with Data Privacy Support." Sensors 19, no. 14 (2019): 3098. http://dx.doi.org/10.3390/s19143098.

Full text
Abstract:
With the growing number of mobile devices receiving daily notifications, it is necessary to manage the variety of information produced. New smart devices are developed every day with the ability to generate, send, and display messages about their status, data, and information about other devices. Consequently, the number of notifications received by a user is increasing and their tolerance may decrease in a short time. With this, it is necessary to develop a management system and notification controls. In this context, this work proposes a notification and alert management system called PRISER
APA, Harvard, Vancouver, ISO, and other styles
38

Wu, Hongchen, Huaxiang Zhang, Lizhen Cui, and Xinjun Wang. "CEPTM: A Cross-Edge Model for Diverse Personalization Service and Topic Migration in MEC." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–12. http://dx.doi.org/10.1155/2018/8056195.

Full text
Abstract:
For several reasons, the cloud computing paradigm, e.g., mobile edge computing (MEC), is suffering from the problem of privacy issues. MEC servers provide personalization services to mobile users for better QoE qualities, but the ongoing migrated data from the source edge server to the destination edge server cause users to have privacy concerns and unwillingness of self-disclosure, which further leads to a sparsity problem. As a result, personalization services ignore valuable user profiles across edges where users have accounts in and tend to predict users’ potential purchases with insuffici
APA, Harvard, Vancouver, ISO, and other styles
39

Poliak, O. "MODERN INFORMATION MOBILE TOOLS OF TRAINING IN HIGHER EDUCATION INSTITUTIONS." Visnyk Taras Shevchenko National University of Kyiv. Pedagogy, no. 2 (10) (2019): 48–51. http://dx.doi.org/10.17721/2415-3699.2019.10.13.

Full text
Abstract:
The article is devoted to modern information tools of training as a way to optimize the process of training future specialists. Emphasis is placed on the importance of technological innovation and the theory of learning in the application of a variety of technologies to teaching and teaching. It is determined that the patterns of behavior of modern students are changing with respect to their rapidly expanding digital environment. Modern digital students think and process information differently from their predecessors – thinking in parallel and linear models and reading visual images that coul
APA, Harvard, Vancouver, ISO, and other styles
40

Thompson, Santi, and Michele Reilly. "Embedded Metadata Patterns Across Web Sharing Environments." International Journal of Digital Curation 13, no. 1 (2018): 223–34. http://dx.doi.org/10.2218/ijdc.v13i1.607.

Full text
Abstract:
This research project tried to determine how or if embedded metadata followed the digital object as it was shared on social media platforms by using EXIFTool, a variety of social media platforms and user profiles, the embedded metadata extracted from selected New York Public Library (NYPL) and Europeana images, PDFs from open access science journals, and captured mobile phone images. The goal of the project was to clarify which embedded metadata fields, if any, migrated with the object as it was shared across social media.
APA, Harvard, Vancouver, ISO, and other styles
41

Ali, Ismail A., Martin Fleury, and Mohammed Ghanbari. "Distortion-Based Slice Level Prioritization for Real-Time Video over QoS-Enabled Wireless Networks." Advances in Multimedia 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/319785.

Full text
Abstract:
This paper presents a prioritization scheme based on an analysis of the impact on objective video quality when dropping individual slices from coded video streams. It is shown that giving higher-priority classified packets preference in accessing the wireless media results in considerable quality gain (up to 3 dB in tests) over the case when no prioritization is applied. The proposed scheme is demonstrated for an IEEE 802.11e quality-of-service- (QoS-) enabled wireless LAN. Though more complex prioritization systems are possible, the proposed scheme is crafted for mobile interactive or user-to
APA, Harvard, Vancouver, ISO, and other styles
42

Thatcher, Jim. "You are where you go, the commodification of daily life through ‘location’." Environment and Planning A: Economy and Space 49, no. 12 (2017): 2702–17. http://dx.doi.org/10.1177/0308518x17730580.

Full text
Abstract:
Recent years have seen an explosion in the investment into and valuation of mobile spatial applications. With multiple applications currently valued at well over one billion U.S. dollars, mobile spatial applications and the data they generate have come to play an increasingly significant role in the function of late capitalism. Empirically based upon a series of interviews conducted with mobile application designers and developers, this article details the creation of a digital commodity termed ‘location.’ ‘Location’ is developed through three discursive poles: Its storing of space and time as
APA, Harvard, Vancouver, ISO, and other styles
43

Revier, Kevin. "“Now you’re connected”: Carceral visuality and police power on MobilePatrol." Theoretical Criminology 24, no. 2 (2018): 314–34. http://dx.doi.org/10.1177/1362480618779401.

Full text
Abstract:
Police increasingly rely on new media software for public communication and policing operations. One such software is MobilePatrol: Public Safety App, a free to use mobile phone application marketed by data and analytics company Appriss Safety. It compiles information including mug shot photos, sex offender lists, and most wanted profiles for public access. To capture carceral visuality on the application, I conduct an ethnographic content analysis of police use in upstate New York. I penned a daily user log, took in-app “screenshots”, and analyzed user product reviews. I find that MobilePatro
APA, Harvard, Vancouver, ISO, and other styles
44

Cho, Hyunsung, Akhil Mathur, and Fahim Kawsar. "FLAME." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 3 (2022): 1–29. http://dx.doi.org/10.1145/3550289.

Full text
Abstract:
Federated Learning (FL) enables distributed training of machine learning models while keeping personal data on user devices private. While we witness increasing applications of FL in the area of mobile sensing, such as human activity recognition (HAR), FL has not been studied in the context of a multi-device environment (MDE), wherein each user owns multiple data-producing devices. With the proliferation of mobile and wearable devices, MDEs are increasingly becoming popular in ubicomp settings, therefore necessitating the study of FL in them. FL in MDEs is characterized by being not independen
APA, Harvard, Vancouver, ISO, and other styles
45

Sârbu, Annamaria, Simona Miclăuș, Angela Digulescu, and Paul Bechet. "Comparative Analysis of User Exposure to the Electromagnetic Radiation Emitted by the Fourth and Fifth Generations of Wi-Fi Communication Devices." International Journal of Environmental Research and Public Health 17, no. 23 (2020): 8837. http://dx.doi.org/10.3390/ijerph17238837.

Full text
Abstract:
A suitable metric to describe human exposure to microwaves emitted by wireless communication devices is still incomplete. By using both theoretical analysis and experimental validation (in controlled and real deployed networks), we analyze and compare the specificity of exposure due to data transmissions in different configurations of fourth and fifth generation wireless fidelity (Wi-Fi) standards in the proximity of a mobile device. Measurements made use of the capability of the amplitude probability density incorporated in a real-time spectrum analyzer, proving its agility of highlighting di
APA, Harvard, Vancouver, ISO, and other styles
46

Mapp, G., F. Katsriku, M. Aiash, et al. "Exploiting Location and Contextual Information to Develop a Comprehensive Framework for Proactive Handover in Heterogeneous Environments." Journal of Computer Networks and Communications 2012 (2012): 1–17. http://dx.doi.org/10.1155/2012/748163.

Full text
Abstract:
The development and deployment of several wireless and cellular networks mean that users will demand to be always connected as they move around. Mobile nodes will therefore have several interfaces and connections will be seamlessly switched among available networks using vertical handover techniques. Proactive handover mechanisms can be combined with the deployment of a number of location-based systems that provide location information to a very high degree of accuracy in different contexts. Furthermore, this new environment will also allow contextual information such as user profiles as well
APA, Harvard, Vancouver, ISO, and other styles
47

Muthumani, M., and K. Chinnasamy. "Enhancing Role and Impact of Librarians in Research Output through Internet Tools: A Case Study Based on Google Scholar Profiles of Engineering Colleges in and around Madurai." Asian Journal of Information Science and Technology 9, S1 (2019): 72–74. http://dx.doi.org/10.51983/ajist-2019.9.s1.218.

Full text
Abstract:
A librarian in an academic institution plays a potentially very crucial role in the research output of the institution. Digital literacy of the librarian will be of immense help for the researchers and the institution with the ever increasing availability of internet and mobile tools. The wealth of information contained in the publicly accessible Google Scholar profiles is one such useful tool. A case study is carried out by analysing the profiles of research faculty in 12 (twelve) engineering colleges located in Madurai district. The user profiles having verified email IDs with the domain nam
APA, Harvard, Vancouver, ISO, and other styles
48

Mahou, Xosé, Bran Barral, Ángela Fernández, Ramón Bouzas-Lorenzo, and Andrés Cernadas. "eHealth and mHealth Development in Spain: Promise or Reality?" International Journal of Environmental Research and Public Health 18, no. 24 (2021): 13055. http://dx.doi.org/10.3390/ijerph182413055.

Full text
Abstract:
In the last decades, the use of Information and Communication Technologies (ICTs) has progressively spread to society and public administration. Health is one of the areas in which the use of ICTs has more intensively developed through what is now known as eHealth. That area has recently included mHealth. Spanish health system has stood out as one of the benchmarks of this technological revolution. The development of ICTs applied to health, especially since the outbreak of the pandemic caused by SARS Cov-2, has increased the range of health services delivered through smartphones and the develo
APA, Harvard, Vancouver, ISO, and other styles
49

Kounas, Dimitrios, Orfefs Voutyras, Georgios Palaiokrassas, Antonios Litke, and Theodora Varvarigou. "QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities." Applied System Innovation 3, no. 2 (2020): 19. http://dx.doi.org/10.3390/asi3020019.

Full text
Abstract:
Location-based services are becoming extremely popular due to the widespread use of smartphones and other mobile and portable devices. These services mainly rely on the sincerity of users, who can spoof the location they report to them. For applications with higher security requirements, the user should be unable to report a location different than the real one. Proof of Location protocols provide a solution to secure localization by validating the device’s location with the help of nearby nodes. We propose QuietPlace, a novel protocol that is based on ultrasound and provides strong identities
APA, Harvard, Vancouver, ISO, and other styles
50

Awoyemi, B. S., B. T. Maharaj, and A. S. Alfa. "Resource Allocation in Heterogeneous Buffered Cognitive Radio Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7385627.

Full text
Abstract:
Resources available for operation in cognitive radio networks (CRN) are generally limited, making it imperative for efficient resource allocation (RA) models to be designed for them. However, in most RA designs, a significant limiting factor to the RA’s productivity has hitherto been mostly ignored, the fact that different users or user categories do have different delay tolerance profiles. To address this, in this paper, an appropriate RA model for heterogeneous CRN with delay considerations is developed and analysed. In the model, the demands of users are first categorised and then, based on
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!