Application of a fuzzy MCDM method to the evaluation of operating systems of smart phones

2011 ◽  
Vol 32 (5) ◽  
pp. 1065-1080
Author(s):  
Ta-Chung Chu ◽  
Chun-Chi Chen
Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.


JOURNAL ASRO ◽  
2018 ◽  
Vol 9 (2) ◽  
pp. 75
Author(s):  
Donni Kartiko ◽  
Suparno Suparno ◽  
Okol S Suharyo ◽  
Ahmadi Ahmadi ◽  
Arica Dwi Susanto

The Indonesian Navy as a defense and security force of the sea has combat tools and supporting facilities projected in the Integrated Fleet Weapon System (Sistem Senjata Armada Terpadu/SSAT) with several components including Indonesian navy ships, marines, aircraft and bases. Depo level maintenance is comprehensive maintenance that can only be carried out by personnel who are experts in their field and supported by complete and sophisticated equipment and facilities. Maintenance at this level includes complete overhaul repairment, repowering MLM (mid life modernization), calibration of all equipment, and repairs to all parts thoroughly. Depo Level Maintenance is the nature of maintaining technical conditions based on rotary hours. If the repair schedule specified in the SPT (System for Planned Maintenance), the schedule must be carried out. This research aimed to present a priority setting solution in Depo level maintenance wherein the highest Indonesian Navy Ship ranking is determined from the level of the decision makers. Fuzzy MCDM is a method developed for decision making on several alternative decisions to get an accurate and optimal decision. In Indonesian Navy Ship Hardepo priority ranking process taken from the level of data processing decision makers using the Fuzzy MCDM method, the 5 highest priority values in implementation were obtained. Hardepo with the highest scores were KRP-812 0.111, BDU-841 0.108, LAM-374 0.107, KRS-624 0.097 and TJA-541 0.073


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Sign in / Sign up

Export Citation Format

Share Document