Inexperienced and Global Software Teams

Author(s):  
Kim Man Lui ◽  
Keith C.C. Chan

We dream of a way in which software can be quickly or even automatically produced. In the past, we achieved some success in some areas; however, we continue to face an excess of software demand over supply in general. The reason is obvious: Software is needed by not only home and commercial computers, but by almost every kind of electronic device, such as mobile phones, digital diaries, digital cameras, TVs, cars, and so on (Rischpater, 2001; Sapaty, 1999).

Author(s):  
E. Ramkumar ◽  
T. Guna ◽  
S.M. Dharshan ◽  
V.S. Ashok Ramanan

Facial recognition has become one of the recent trends in attracting abundant attention within the society of social media network. The face is flat and therefore needs plenty of mathematical computations. Facial knowledge has become one in every of the foremost necessary biometric, we tend to witness it from the day-to-day gadgets like mobile phones. Every transportable electronic device currently being discharged includes a camera embedded in it. Network access management via face recognition not solely makes hackers just about not possible to steal one's "password", however conjointly will increase the user-friendliness in human-computer interaction. For the applications of videophone and conference, the help of face recognition conjointly provides an additional economical secret writing theme. Face detection technologies are employed in an oversized kind of applications like advertising, diversion, video secret writing, digital cameras, CCTV police investigation, and even in military use. Totally different algorithms are used for biometric authentication. The Kanade-Lucas-Tomasi rule makes use of abstraction common intensity transformation to direct the deep explore for the position that shows the simplest match. Another common face detection rule is that the Viola-Jones rule that's the foremost wide used face detection rule. It's employed in most digital cameras and mobile phones to notice faces. It uses cascades to notice edges just like the nose, the ears, etc. Hence, during this paper, we've got planned the Viola-Jones rule because the best one supported our application. The rule is employed within the biometric authentication of individuals and also the pictures are kept during processing. The kept information is employed for recognizing the faces and if the information matches, an impression signal is given to the controller. The MATLAB software is employed to relinquish control signals to the motor, which is employed for gap and shutting the door. The input image is fed by a digital camera and also the image is processed within MATLAB. The output is given to the external controller interfaced with MATLAB. The image process field has several sub-fields, biometric authentication is one in each of them because it gains additional quality for security functions these days. The planned system can be employed in residential buildings, malls, and industrial sectors. Thus, this technique is helpful for homemakers to be safer in their homes.


2013 ◽  
Vol 4 (1) ◽  
pp. 1-4
Author(s):  
Redhwan Ahmed Al-Naggar ◽  
Yuri V Bobryshev

The worldwide use of cell phones has rapidly increased over the past decades. With the increasing use of mobile phones, concern has been raised about the possible carcinogenic effects as a result of exposure to radiofrequency electromagnetic fields. The objective of this study was to explore the perceptions and opinions towards brain cancer related to cell phone use among university students in Malaysia. The study revealed that the majority of the study participants believe that there is no relationship between brain cancer and hand phone use.DOI: http://dx.doi.org/10.3126/ajms.v4i1.7808 Asian Journal of Medical Sciences 4(2013) 1-4


Author(s):  
Ho Sew Tiep ◽  
Goh Mei Ling ◽  
Radziah Shaikh Abdullah ◽  
Teo Kim Mui

As the world becomes increasingly interconnected, mobile phones has become the utmost preference device for most Malaysian to stay connected. Over the past decades, mobile phone users in this country has been increasing steadily. Percentage of individuals in Malaysia using mobile phones increased from 94.2% in 2013 to 97.5% in 2015 (DOS, 2016). According to the hand phone users survey carried out by MCMC (2017) , there were 42.3 million mobile phone subscriptions with a penetration rate of 131.2% to a population of 32.3 million at the end of 2017. In a study on university students of Malaysia, Ho et al. (2018) revealed that a substantial amount of them (18.83%) actually do not know what to do with the waste mobile phones. This reflects the low awareness amongst university students and the lack of formal management system in Malaysia. Moreover, the findings show the rate of replacements of even functioning phones is high and a significant high stockpile of the waste mobile phones, which in turn increase the generation of e-waste eventually. Tremendous amount of waste mobile phones are expected to be generated in Malaysia. Malaysia is now facing a challenge on how to deal with the ever growing generation of waste mobile phones from users. An insight into their e-waste management practices and key predictors in relation to waste mobile phones recycling intention are therefore essential. This would help to lay the foundation for developing a suitable, workable, effective and efficient system of collecting e-wastes. This study aims to probe into university students' behavioural intentions to recycle waste mobile phones. In the meanwhile, it is expected to derive the policy implications for the future expansion and enhancement of mobile phones recycling response rate. Keywords: Determinants, Mobile Phones, Recycling, Intention, University Students


2021 ◽  

Distracted driving is defined in the Oxford English Dictionary as “the practice of driving a motor vehicle while engaged in another activity, typically one that involves the use of a mobile phone or other electronic device.” However, other distractions not involving the use of a cell phone or texting are important as well, contributing to this burgeoning public health problem in the United States. Examples include talking to other passengers, adjusting the radio or other controls in the car, and daydreaming. Distracted driving has been linked to increased risk of motor vehicle crashes (MVCs) in the United States, representing one of the most preventable leading causes of death for youth ages 16 to 24 years. Undoubtedly, the proliferation of cell phone, global positioning system (GPS), and other in-vehicle and personal electronic device use while driving has led to this rise in distracted driving prevalence. This behavior has impacted society—including individual and commercial drivers, passengers, pedestrians—in countless numbers of ways, ranging from increased MVCs and deaths to the enactment of new driving laws. In 2016, for example, 20 percent of all US pediatric deaths (nearly 4,000 children and adolescents) were due to fatal MVCs. It has been estimated that at any given time, more than 650,000 drivers are using cell phones or manipulating electronic devices while driving. In the United States, efforts are underway to reduce this driving behavior. In the past two decades, state and federal laws have specifically targeted cell phone use and texting while driving as priority areas for legal intervention. Distracted driving laws have become “strategies of choice” for tackling this public health problem, though their enforcement has emerged as a major challenge and varies by jurisdiction and location. Multimodal interventions using models such as the “three Es” framework—Enactment of a law, Education of the public about the law and safety practices, and Enforcement of the law—have become accepted practice or viewed as necessary steps to successfully change this behavior caused by distractions while driving. This Oxford Bibliographies review introduces these and other aspects (including psychological influences and road conditions) of distracted driving through a presentation of annotated resources from peer- and non-peer-reviewed literature. This selective review aims to provide policymakers, program implementers, and researchers with a reliable source of information on the past and current state of American laws, policies, and priorities for distracted driving.


10.12788/3305 ◽  
2019 ◽  
Vol 15 (6) ◽  
pp. 378-380
Author(s):  
Philip A Hagedorn ◽  
Amit Singh ◽  
Brooke Luo ◽  
Christopher Bonafide ◽  
Jeffrey M Simmons

Over the past two decades, physicians and nurses practicing in hospital settings have faced an onslaught of challenges in communication, an area frequently cited as critical to providing safe and effective care to patients.1-3 Communication needs have increased significantly as hospitalized patients have become more acute, complex, and technology-dependent, requiring larger healthcare teams comprising subspecialists across multiple disciplines spread across increasingly larger inpatient facilities.4 During this same period, the evolution of mobile phones has led to dramatic shifts in personal communication patterns, with asynchronous text messaging replacing verbal communication.5-7


Author(s):  
Mohamad Syafiq Mohamad Adenan ◽  
Athirah Nabihah Mas Erwan ◽  
Mohamad Norul Hafiz Muzaffar Alfian

In the past few decades many studies and researches have taken place in order to improve security systems and to increase their level of protection in different fields. One of the major problems that security must deal with is the fire outbreak that can happen in everywhere including houses, schools, factories and many other places, and to avoid that or to minimize the damage caused by fire outbreak an IoT technology is used to control such a kind of risk. IoT is a modern system that consist of sensors and switches connected. In this project we will use temperature sensor known as (Flame sensor) with Arduino device to detect fire outbreak and to measure the amount of heat intensity generated by a fire outbreak or in a specific location in our house, offices and other places. It sometimes takes too much time for the fire station to reach to the fire outbreak location and works on extinguish the fire and so these sensors will work as an early alarm system which will send a notification to our mobile phones if any fire outbreak occurred to let us know the situation clearly and before it’s too late, we act to avoid significant damage in case the fire outbreak was observed after a long time from its outbreak.


Author(s):  
Morteza Mellati ◽  
Marzieh Khademi

The expansion of technological applications such as computers and mobile phones in the past three decades has impacted our lives from different perspectives. Educational contexts are no exceptions, and like other environments, they have also been influenced by new teaching sources and software. More recently, there has been a passionate debate about the usefulness of the smart-phones for educational purposes and their possible uses in educational instruction; therefore, in this chapter, a review of the current published literature focusing on the use of technology-based instruction by instructors or students was conducted. The results of the study demonstrated that technology-based instruction has significant effects on learners' achievements; however, there are some challenges such as social and technical barriers in blending technology and education in different educational contexts.


Author(s):  
Mubarak S. Almutairi

In developing countries like the Saudi Arabia, due to high mobile phone penetration rates, any electronic government initiatives that don’t take mobile technology into account will eventually fail. While the number of landline phones and internet subscribers are growing steadily over the past few years, the number of mobile phone users and its penetration rates are skyrocketing. In the near future and with the many mobile phone features, mobile phones will remain the main media of communication and a main source for providing information to citizens and customers.


Author(s):  
N. Srikhutkhao

In the past few years, the mobile phone’s performance has increased rapidly. According to IDC’s Worldwide Mobile Phone 2004-2008 Forecast and Analysis, sales of 2.5G mobile phones will drive market growth for the next several years, with sales of 3G mobile phones finally surpassing the 100 million annual unit mark in 2007. Future mobile phones can support more than 20,000 colors. With the advancements in functionality and performance of mobile phones, users will use them for all sorts of activities, and that will increase mobile content service requests. Currently, the pricing of mobile content service is up to each provider; typically they implement a fixed price called a market price because the providers do not have a formula to estimate the price according to the actual cost of their services. This article proposes a dynamic pricing model based on net cost for mobile content services.


Author(s):  
Daniel C. Doolan ◽  
Sabin Tabirca ◽  
Laurence T. Yang

Ever since the discovery of the Mandelbrot set, the use of computers to visualise fractal images have been an essential component. We are looking at the dawn of a new age, the age of ubiquitous computing. With many countries having near 100% mobile phone usage, there is clearly a potentially huge computation resource becoming available. In the past years there have been a few applications developed to generate fractal images on mobile phones. This chapter discusses three possible methodologies whereby such images can be visualised on mobile devices. These methods include: the generation of an image on a phone, the use of a server to generate the image and finally the use of a network of phones to distribute the processing task.


Sign in / Sign up

Export Citation Format

Share Document