Academic literature on the topic 'Photos download'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Photos download.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Photos download"

1

Tyowati, Sulis, and Rio Irawan. "Implementasi Framework Codeignter Untuk Pengembangan Website Pada Dinas Perkebunan Provinsi Kalimantan Tengah." Jurnal SAINTEKOM 7, no. 1 (April 13, 2017): 67. http://dx.doi.org/10.33020/saintekom.v7i1.22.

Full text
Abstract:
Implementation Framwork CodeIgniter at Plantation Office of Central Kalimantan Province aims to deliver profile information, commodity prices, business partners, announcements, official agenda, gallery activities as well as downloaded files. Method used in this study includes data collection methods (literature review, interviews) and methods of analysis, namely data analysis and systems analysis. The analysis system used is PIECES analysis. With this website visitor facilities in seeking information about the price of commodities, the announcement and the agenda of the services, download files plantations and can see photos and video activities Plantation Office of Central Kalimantan Province and features that allow visitors to be more efficient in finding the necessary information and features more than the previous blogspot media.
APA, Harvard, Vancouver, ISO, and other styles
2

Chassin, T., and J. Ingensand. "ARE CITY FEATURES INFLUENCING THE BEHAVIOR OF PHOTOGRAPHERS? AN ANALYSIS OF GEO-REFERENCED PHOTOS SHOOTING ORIENTATION." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B4-2021 (June 30, 2021): 353–59. http://dx.doi.org/10.5194/isprs-archives-xliii-b4-2021-353-2021.

Full text
Abstract:
Abstract. Every day millions of social media users upload information as texts, pictures or likes. These online posts are nowadays mainly uploaded via a smartphone, that adds automatically complementary pieces of information such as the device’s location and orientation. This additional material is valuable for public services, and can be used to reinforce knowledge provided by typical methods. This study aims to inquire this additional material to observe the influence of city features on public behavior. A semi-automated workflow is introduced to combine two large datasets: the flickR geo-referenced photos (associated with their shooting orientation) and the OpenStreetMap streets’ network. The study is conducted in the city of Lausanne, Switzerland. This workflow promotes a novel approach to download, filter, compute and visualize large cluttered datasets. The investigations showed a significant difference between South/North photos’ orientation with a South dominance. Furthermore, the photographs’ orientation appears to be related to the street network, or city elements (such as remarkable buildings, fountains) only at a local scale; no connection was established at a larger scale. These results can be useful in urban planning for the diagnosis of a public place practice by its users (i.e., residents, tourists, etc.). An improved diagnosis promotes a better knowledge of a public space’s remarkable elements (by their attractiveness or unsightliness), easing the decision on conservation or transformation of these elements. Other applications are also outlined, notably in the touristic sector or the landscape preservation.
APA, Harvard, Vancouver, ISO, and other styles
3

Subirats, Laia, Natalia Reguera, Antonio Bañón, Beni Gómez-Zúñiga, Julià Minguillón, and Manuel Armayones. "Mining Facebook Data of People with Rare Diseases: A Content-Based and Temporal Analysis." International Journal of Environmental Research and Public Health 15, no. 9 (August 30, 2018): 1877. http://dx.doi.org/10.3390/ijerph15091877.

Full text
Abstract:
This research characterized how Facebook deals with rare diseases. This characterization included a content-based and temporal analysis, and its purpose was to help users interested in rare diseases to maximize the engagement of their posts and to help rare diseases organizations to align their priorities with the interests expressed in social networks. This research used Netvizz to download Facebook data, word clouds in R for text mining, a log-likelihood measure in R to compare texts and TextBlob Python library for sentiment analysis. The Facebook analysis shows that posts with photos and positive comments have the highest engagement. We also observed that words related to diseases, attention, disability and services have a lot of presence in the decalogue of priorities (which serves for all associations to work on the same objectives and provides the lines of action to be followed by political decision makers) and little on Facebook, and words of gratitude are more present on Facebook than in the decalogue. Finally, the temporal analysis shows that there is a high variation between the polarity average and the hour of the day.
APA, Harvard, Vancouver, ISO, and other styles
4

Mullainathan, Sendhil, and Jann Spiess. "Machine Learning: An Applied Econometric Approach." Journal of Economic Perspectives 31, no. 2 (May 1, 2017): 87–106. http://dx.doi.org/10.1257/jep.31.2.87.

Full text
Abstract:
Machines are increasingly doing “intelligent” things. Face recognition algorithms use a large dataset of photos labeled as having a face or not to estimate a function that predicts the presence y of a face from pixels x. This similarity to econometrics raises questions: How do these new empirical tools fit with what we know? As empirical economists, how can we use them? We present a way of thinking about machine learning that gives it its own place in the econometric toolbox. Machine learning not only provides new tools, it solves a different problem. Specifically, machine learning revolves around the problem of prediction, while many economic applications revolve around parameter estimation. So applying machine learning to economics requires finding relevant tasks. Machine learning algorithms are now technically easy to use: you can download convenient packages in R or Python. This also raises the risk that the algorithms are applied naively or their output is misinterpreted. We hope to make them conceptually easier to use by providing a crisper understanding of how these algorithms work, where they excel, and where they can stumble—and thus where they can be most usefully applied.
APA, Harvard, Vancouver, ISO, and other styles
5

Aminah, Ratih Siti, and Muslim . "Parents and Adolescents Pattern of Interpersonal Communication in The Restriction of Smartphone Usage." JHSS (JOURNAL OF HUMANITIES AND SOCIAL STUDIES) 1, no. 1 (September 1, 2017): 50–55. http://dx.doi.org/10.33751/jhss.v1i1.374.

Full text
Abstract:
Communication can be the media of proximity of parents and children. Parents will feel comfortable because they feel the child needs and love him. Conversely, the child will feel happy to get the attention of his parents. The development of communication technology led to a new style of communication style. Parent and child communication is no longer done face-to-face at the dinner table or in the living room. The role of interpersonal communication of parents and children began to shift since the presence of a smart tool that was created able to perform many activities.Communication patterns between adolescent boys and girls tend to be different Young men and women have different tendencies in smartphone use. Female teenagers are more dominant using social media to upload good photographs with friends or photos themselves. Young men use smartphones to play games, download songs, movies or video clips. Teenagers in Indonesia (40-50 percent) is a community of hp (smartphone) users. Teenagers use social media that includes instant messengers like LINE, Instagram, Twitter and other apps like Facebook, Youtube, Vlog and more. There are three patterns of communication that parents do in limiting the use of smartphones in adolescents. The patterns are Authoritarian communication patterns, Democratic communication patterns and Permissive Communication Patterns.Keywords: Communication Patterns, smartphones, restrictions
APA, Harvard, Vancouver, ISO, and other styles
6

Jakob, Lena, Theresa Steeb, Zeno Fiocco, Teodora Pumnea, Sophia Nomi Jakob, Anja Wessely, Christoph Clemens Rothenberger, et al. "Patient Perception of Mobile Phone Apps for the Care and Prevention of Sexually Transmitted Diseases: Cross-Sectional Study." JMIR mHealth and uHealth 8, no. 11 (November 10, 2020): e16517. http://dx.doi.org/10.2196/16517.

Full text
Abstract:
Background In the emerging era of digitalization and electronic health, various health-related apps have been launched, including apps for sexually transmitted diseases. Until now, little has been known about how patients perceive the value of such apps. Objective To investigate patient’s attitudes and awareness toward sexually transmitted disease–related apps in an outpatient sexually transmitted disease clinic setting. Methods A cross-sectional study was conducted at a dermatovenereological outpatient unit between April and July 2019. Patients completed a self-administered questionnaire on their perceptions of the popularity and usefulness of sexually transmitted disease–related apps. Descriptive analysis was performed with expression of categorical variables as frequencies and percentages. For continuous variables, the median, range, and interquartile range were indicated. Contingency tables and chi-square tests were used to investigate associations between sociodemographic data and items of the questionnaire. Results A total of 226 patients were surveyed (heterosexual: 137/193, 71.0%; homosexual: 44/193, 22.8%; bisexual: 12/193, 6.2%); 11.9% (27/225) had previously used health-related apps. Nearly half of the patients (97/214, 45.3%) specifically considered sexually transmitted disease–related apps useful, 47.8% (100/209) voted that they could supplement or support the consultation of a physician. Interestingly, only 35.1% (74/211) preferred a printed patient brochure on sexually transmitted diseases over downloading and using an app, but 64.0% (134/209) would download a sexually transmitted disease–related app recommended by their physician. General information regarding sexually transmitted diseases (93/167, 55.7%), evaluation of skin diseases based on photos or videos (78/167, 53.3%), information on the prevention of sexually transmitted diseases (76/167, 45.5%), mediation of nearby contact points or test sites (74/167, 44.3%), anonymous medical advice (69/167, 41.3%), and calculation of the risk of having a sexually transmitted disease (63/167, 37.3%) were rated as the most important features. Men were more likely than women to find sexually transmitted disease–related apps useful in general (P=.04; χ2=6.28) and to pay for such apps (P=.01; χ2=9.19). Patients aged <40 years would rather download an app recommended by their physician (P=.03; χ2=7.23), whereas patients aged >40 years preferred reading a patient brochure on sexually transmitted diseases (P=.02; χ2=8.14). Conclusions This study demonstrated high general interest in the use of sexually transmitted disease–related apps in this sample of dermatovenereological outpatients. In particular, young age and male sex were significantly associated with a positive perception, underlining the high potential of apps in the prevention and early recognition of sexually transmitted diseases in this group. Future studies are warranted to validate these findings in other populations.
APA, Harvard, Vancouver, ISO, and other styles
7

Ristanti, Fika. "Padlet-Based in German Learning as a Trigger for Learning Motivation During a Pandemic." Ideguru: Jurnal Karya Ilmiah Guru 6, no. 2 (May 1, 2021): 144–52. http://dx.doi.org/10.51169/ideguru.v6i2.240.

Full text
Abstract:
The purpose of writing this best practice is to impelement the use of padlets and find out the results and impact of using padlets on student’s motivation learning in German during the Covid-19 pandemic. The strategy used is using padlets. Padlet is a free online whiteboard app that has many advantages. By using padlets, teachers and students can upload and download various documents in the form of videos, photos, voice recordings, texts or other documents and can be updated at any time. Padlet is an atrractive medium and very easy to use. The method used in this best practice research is qualitative descriptive. Padlet is implemented to deliver “Familie, Wohnung, Essen und Trinken”material for class XI MIPA 1 and “Freizeit, Reisen, Tagesablauf der Lieblingsfiguren” material for class XII IPS 1, XII IPS 2 in the odd semester of the 2020/2021 school year (August-November) at SMAN 2 Wates. The steps in this implementation consist of the preparation, implementation and evaluation. The end of this best practice activity is that author gives a questionnaire to students regarding the evaluation of using padlets, which are then analyzed and used as basis for making conclusions. From the questionnaire, it was found more than 80% of students felt happy and interested in participating in distance learning when using padlet. More than 80% of students do assigments on time and more than 75% students no longer feel reluctant to ask questions or discuss with teachers or other students. The four indicators than used as author to make conclusion that padlet can increase students’ motivation learning to learn German during the Covid-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Chao-Hung, Jyun-Yuan Chen, Shun-Siang Hsu, and Yun-Huan Chung. "Automatic tourist attraction and representative icon determination for tourist map generation." Information Visualization 13, no. 1 (January 27, 2013): 18–28. http://dx.doi.org/10.1177/1473871612472177.

Full text
Abstract:
Tourist maps are designed to direct tourists to tourist attractions in unfamiliar areas. A well-designed tourist map can provide tourists with sufficient and intuitive information about places of interest. Thus, providing up-to-date information on places of interest and selecting their representative icons are fundamental and important in automatic generation of tourist maps. In this article, approaches for determining places of interest and for determining their representative icons are introduced. In contrast to general digital tourist maps that use text, simple shapes, or three-dimensional models, we use photos that offer abundant visual features of places of interest as icons in tourist maps. The photos are automatically extracted from a repository of photos downloaded from photo-sharing communities. Tourist attractions and their corresponding image icons are determined by means of photo voting and photo quality assessment. Qualitative analyses, including a user study and experiments in several areas with numerous tourist attractions, indicated that the proposed method can generate visually pleasant and elaborate tourist maps. In addition, the analyses indicated that the map produced by our method is better than maps generated by related methods and is comparable to hand-designed tourist maps.
APA, Harvard, Vancouver, ISO, and other styles
9

Rosati, Dora P., Matthew H. Woolhouse, Benjamin M. Bolker, and David J. D. Earn. "Modelling song popularity as a contagious process." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2253 (September 2021): 20210457. http://dx.doi.org/10.1098/rspa.2021.0457.

Full text
Abstract:
Popular songs are often said to be ‘contagious’, ‘infectious’ or ‘viral’. We find that download count time series for many popular songs resemble infectious disease epidemic curves. This paper suggests infectious disease transmission models could help clarify mechanisms that contribute to the ‘spread’ of song preferences and how these mechanisms underlie song popularity. We analysed data from MixRadio, comprising song downloads through Nokia cell phones in Great Britain from 2007 to 2014. We compared the ability of the standard susceptible–infectious–recovered (SIR) epidemic model and a phenomenological (spline) model to fit download time series of popular songs. We fitted these same models to simulated epidemic time series generated by the SIR model. Song downloads are captured better by the SIR model, to the same extent that actual SIR simulations are fitted better by the SIR model than by splines. This suggests that the social processes underlying song popularity are similar to those that drive infectious disease transmission. We draw conclusions about song popularity within specific genres based on estimated SIR parameters. In particular, we argue that faster spread of preferences for Electronica songs may reflect stronger connectivity of the ‘susceptible community’, compared with the larger and broader community that listens to more common genres.
APA, Harvard, Vancouver, ISO, and other styles
10

Counts, Derek B. "The Cesnola Collection of Cypriot Art: Stone Sculpture. 1st rev. ed. By Antoine Hermary and Joan R. Mertens. New York: Metropolitan Museum of Art, 2015. 435 pp., color photos and maps. Available as PDF download." Bulletin of the American Schools of Oriental Research 378 (November 2017): 242–44. http://dx.doi.org/10.5615/bullamerschoorie.378.0242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Photos download"

1

Heer, Stephan. "Novel photon upconversion materials and phenomena : synthesis, characterization and spectroscopy /." [S.l.] : [s.n.], 2005. http://www.zb.unibe.ch/download/eldiss/05heer_s.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hopkins, Ashley R. "Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grimm, Judith. "New light emitting materials : synthesis, optical spectroscopy, photon upconversion and photoionization in Ni²+, Ce³+ and Tm²+ doped halides /." [S.l.] : [s.n.], 2006. http://www.zb.unibe.ch/download/eldiss/06grimm_j.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Photos download"

1

The Adobe Photoshop Lightroom 3 book for digital photographers. [Berkeley]: New Riders, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Total texting. Kansas City: Andrews McMeel Publishing, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tenhunen, Sirpa. Smartphones, Caste, and Intersectionalities. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190630270.003.0007.

Full text
Abstract:
This chapter 7 examines differences in phone use, especially in the way people use smartphones and access the internet. The availability of internet-ready phones in Janta has not turned all people into direct internet users. College-educated men and women are able to browse the textual content of the internet with the help of their smartphones, whereas the majority of people find smartphones useful for listening to music and watching films. They buy downloaded content on phone memory chips instead of browsing the internet independently. When the benefits of phones are assessed on the basis of their educational impact, they do not appear particularly transforming. However, accessing entertainment using phones can also be transformative because sharing of entertainment content contributes to social interaction and the capacity to aspire.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Photos download"

1

Ko, Chia-Yin, Fang-Yie Leu, and I.-Tsen Lin. "Using a Smartphone as a Track and Fall Detector." In E-Health and Telemedicine, 922–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8756-1.ch047.

Full text
Abstract:
This chapter proposes a smartphone-based system for both indoor and outdoor monitoring of people with dementia. The whole system comprises wandering detection, safety-zone monitoring, fall detection, communication services, alert notifications, and emergency medical services. To effectively track the elderly, the proposed system uses a smartphone camera to take real-time pictures along the user's path as he or she moves about. Those photos, accompanied with time and GPS signals, are delivered to and stored on the Cloud system. When necessary, family caregivers can download those data to quickly find a way to help the elderly individual. Additionally, this study uses tri-axial accelerometers to examine falls. To assure individuals' data is safeguarded appropriately, an RSA method has been adopted by the system to encrypt stored data. This reliable and minimally intrusive system provides people with dementia with an opportunity to maintain their social networks and to improve their quality of lives.
APA, Harvard, Vancouver, ISO, and other styles
2

Ko, Chia-Yin, Fang-Yie Leu, and I.-Tsen Lin. "Using a Smartphone as a Track and Fall Detector." In Advanced Technological Solutions for E-Health and Dementia Patient Monitoring, 272–95. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7481-3.ch011.

Full text
Abstract:
This chapter proposes a smartphone-based system for both indoor and outdoor monitoring of people with dementia. The whole system comprises wandering detection, safety-zone monitoring, fall detection, communication services, alert notifications, and emergency medical services. To effectively track the elderly, the proposed system uses a smartphone camera to take real-time pictures along the user's path as he or she moves about. Those photos, accompanied with time and GPS signals, are delivered to and stored on the Cloud system. When necessary, family caregivers can download those data to quickly find a way to help the elderly individual. Additionally, this study uses tri-axial accelerometers to examine falls. To assure individuals' data is safeguarded appropriately, an RSA method has been adopted by the system to encrypt stored data. This reliable and minimally intrusive system provides people with dementia with an opportunity to maintain their social networks and to improve their quality of lives.
APA, Harvard, Vancouver, ISO, and other styles
3

Usharani, Bhimavarapu, and Raju Anitha. "A Novel Ripple and Cyber Bullies Data Disclose (RACYBDD) Framework to Protect Images on Social Media." In Digital Transformation and Challenges to Data Security and Privacy, 332–44. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4201-9.ch019.

Full text
Abstract:
Due to the advancement in internet technology, everyone can connect to anyone living anywhere in this world who is far away from us by using social media. Social media became a public place to share everyone's personal photos and videos. These photos or videos are viewed, shared, and even downloaded by their respective friends, someone from their friends' profiles, and even unrelated persons also without their permission. One of the risks from the social media is the cyber bullying or online harassment. Cyber bullies perpetrate either through denigration or doxing. The cyber bullies are anonymous, and it is very difficult for us to catch and punish them. The main aim of this chapter is to provide the privacy and security to the photos that are sharing on social media. This chapter proposes a novel algorithm to keep the photos safe that are uploading on social media and the extension of the novel algorithm to reveal the details of the cyber bullies those who performed morphing on the photos that were downloaded from social media.
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Wen-Chen, Yanjun Zuo, Lei Chen, and Chyuan-Huei Thomas Yang. "Adaptive Mobile Web Browsing Using Web Mining Technologies." In Business Web Strategy, 198–207. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-024-0.ch010.

Full text
Abstract:
Using mobile handheld devices such as smart cellular phones and personal digital assistants (PDAs) to browse the mobile Internet is a trend of Web browsing. However, the small screens of handheld devices and slow mobile data transmission make the mobile Web browsing awkward. This research applies Web usage mining technologies to adaptive Web viewing for handheld devices. Web usage mining is the application of data mining techniques to the usage logs of large Web data repositories in order to produce results that can be applied to many practical subjects, such as improving Web sites/pages. A Web usage mining system must be able to perform five major functions: (i) usage data gathering, (ii) data preparation, (iii) navigation pattern discovery, (iv) pattern analysis and visualization, and (v) pattern applications. This approach improves the readability and download speed of mobile Web pages.
APA, Harvard, Vancouver, ISO, and other styles
5

Baytiyeh, Hoda. "Students' Use of Mobile Technologies." In Mobile Devices in Education, 460–73. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1757-4.ch027.

Full text
Abstract:
Mobile technologies are all-pervasive in the current digital generation, and college students rely on their mobile phones to communicate on a daily basis. In the midst of the myriad of applications available to download on the mobile, some tools have become more well-known and more often adopted than others. An example of such a tool is WhatsApp, which gains an increasing, widespread number of users on a daily basis, particularly in the Middle East region. The present study investigated college students' use of WhatsApp as a communication tool, and used Lebanon as a case study. A qualitative research design was implemented to understand the perceptions of college students vis-à-vis WhatsApp, and to investigate the motivational factors behind the popularity of this communication tool. The results revealed four themes: simplicity for discussion and coordination, cost-effectiveness, immediacy and sense of belonging.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Sonya, and Saree Costa. "Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation." In Research Anthology on Securing Mobile Technologies and Applications, 465–83. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch026.

Full text
Abstract:
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.
APA, Harvard, Vancouver, ISO, and other styles
7

K., Chandrakala, Jaya Kumari J., and Sreeja T. K. "Digital Terrestrial Television Broadcasting in 5G." In Handbook of Research on 5G Networks and Advancements in Computing, Electronics, and Electrical Engineering, 192–235. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6992-4.ch008.

Full text
Abstract:
Digital multimedia broadcasting is a technology for transmitting multimedia signals to devices like mobile phones, PC, laptops, etc. This allows everyone to watch TV on mobile devices. With the fifth-generation network, one can download a movie in a few seconds. Mobile TV offers round-the-clock participation in communication and broadcasting around the globe. This has become possible by watching a live TV program on handheld devices, as it facilitates real-time updates. Digital terrestrial television broadcasting aimed at transmitting two types of information: global and local content. The global content aims at broadcasting over the entire network, and the local content is location specific. Broadcasting the local content using multiple transmitters at different frequencies in multifrequency network requires additional spectrum. Global content can be transmitted through single frequency network. Therefore, if both global and local information are transmitted in a single frequency network (SFN), the system will become highly spectrally efficient and cost-effective.
APA, Harvard, Vancouver, ISO, and other styles
8

Chakrabarty, Sudipta, Samarjit Roy, and Debashis De. "Time-Slot Based Intelligent Music Recommender in Indian Music." In Intelligent Analysis of Multimedia Information, 319–51. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0498-6.ch012.

Full text
Abstract:
Music listening is one of the most common thing of human behaviors. Normally mobile music is downloaded to mobile phones and played by mobile phones. Today millennial people use mobile music in about all the age groups. Music recommendation system enhances personalized music classifications that create a profile with the service and build up a music library based on the choice preferences using mobile cloud services. Music recommendation through cloud is therefore an emerging field, and this can be done using various parameters like song genre similarity, human behavior, human mood, song rhythmic patterns, seasons etc. In this article an intelligent music recommender system that identifies the raga name of one particular song music and then mapping with the raga time database and classify the songs according to their playing time and create time slot based personalized music libraries.
APA, Harvard, Vancouver, ISO, and other styles
9

M., Thangavel, Divyaprabha M., and Abinaya C. "Threats and Vulnerabilities of Mobile Applications." In Encyclopedia of Information Science and Technology, Fifth Edition, 473–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3479-3.ch034.

Full text
Abstract:
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
10

M., Thangavel, Divyaprabha M., and Abinaya C. "Threats and Vulnerabilities of Mobile Applications." In Research Anthology on Securing Mobile Technologies and Applications, 560–80. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8545-0.ch031.

Full text
Abstract:
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Photos download"

1

Kelenyi, Imre, Akos Ludanyi, and Jukka K. Nurminen. "Energy-efficient BitTorrent downloads to mobile phones through memory-limited proxies." In 2011 IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2011. http://dx.doi.org/10.1109/ccnc.2011.5766584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography