scholarly journals Engineering Wireless Mobile Applications

2009 ◽  
pp. 388-402
Author(s):  
Qusay H. Mahmoud ◽  
Zakaria Maamar

Conventional desktop software applications are usually designed, built, and tested on a platform similar to the one on which they will be deployed and run. Wireless mobile application development, on the other hand, is more challenging because applications are developed on one platform (like UNIX or Windows) and deployed on a totally different platform like a cellular phone. While wireless applications can be much smaller than conventional desktop applications, developers should think in small terms of the devices on which the applications will run and the environment in which they will operate instead of the amount of code to be written. This paper presents a systematic approach to engineering wireless application and offers practical guidelines for testing them. What is unique about this approach is that it takes into account the special features of the new medium (mobile devices and wireless networks), the operational environment, and the multiplicity of user backgrounds; all of which pose new challenges to wireless application development.

Author(s):  
Qusay H. Mahmoud ◽  
Zakaria Maamar

Conventional desktop software applications are usually designed, built, and tested on a platform similar to the one on which they will be deployed and run. Wireless mobile application development, on the other hand, is more challenging because applications are developed on one platform (like UNIX or Windows) and deployed on a totally different platform like a cellular phone. While wireless applications can be much smaller than conventional desktop applications, developers should think in the small in terms of the devices on which the applications will run and the environment in which they will operate instead of the amount of code to be written. This paper presents a systematic approach to engineering wireless application and offers practical guidelines for testing them. What is unique about this approach is that it takes into account the special features of the new medium (mobile devices and wireless networks), the operational environment, and the multiplicity of user backgrounds; all of which pose new challenges to wireless application development.


Author(s):  
Qusay H. Mahmoud ◽  
Zakaria Maamar

Conventional desktop software applications are usually designed, built, and tested on a platform similar to the one on which they will be deployed and run. Wireless mobile application development, on the other hand, is more challenging because applications are developed on one platform (like UNIX or Windows) and deployed on a totally different platform like a cellular phone. While wireless applications can be much smaller than conventional desktop applications, developers should think in small terms of the devices on which the applications will run and the environment in which they will operate instead of the amount of code to be written. This chapter presents a systematic approach to engineering wireless applications and offers practical guidelines for testing them. What is unique about this approach is that it takes into account the special features of the new medium (mobile devices and wireless networks), the operational environment, and the multiplicity of user backgrounds; all of which pose new challenges to wireless application development.


Author(s):  
Lei-da Chen ◽  
Gordon W. Skelton

In the previous chapter, we created an m-business application using ColdFusion. Besides ColdFusion, many other development tools can be used to develop m-business applications. Visual Studio .NET, an integrated development environment by Microsoft, has become an increasingly popular corporate applicationdevelopment tool due to its ease of use and support for a wide range of programming languages. Besides traditional Windows and Web applications, Visual Studio .NET also allows developers to build mobile and wireless applications with relative ease. The focus of this chapter is to discuss the tools and techniques for developing wireless applications using Visual Studio .NET. Wireless applications are developed using the ASP .NET Mobile Web Application template. The template provides developers with WYSIWYG tools for creating user interfaces for various mobile devices. These tools work seamlessly with ASP.NET, which uses a form-based approach to build server-side applications for processing user requests and interacting with databases. In this chapter, we will develop a business-to-consumter wireless application using Visual Studio .NET.


Author(s):  
Lei-da Chen ◽  
Gordon W. Skelton

A wireless application is designed to function when the device is connected to networks (e.g., the Internet) or other devices wirelessly. An example of such an application is a directory service, such as Indigo, found on handsets and PDAs with wireless Web services. These applications allow users to access and even manipulate data on the move. More and more organizations are beginning to develop wireless applications for their employees so they can access critical corporate data whenever and wherever the service is available. The primary advantage of a wireless application over a mobile application is that the user can have access to the most up-to-date information; therefore, if the information in an organization frequently changes, a wireless application is more appropriate in this situation.


Author(s):  
Satoshi Okajima ◽  
Satoshi Izumi ◽  
Shinsuke Sakai

To rationalize the inspection interval for the wall-thinning piping element, the linear-Bayes method was proposed in the previous paper. To derive the simple formula, the linear-Bayes method ignores the corrosion rate change against time. However, this change may be caused by the one of the operational environment. Therefore, without the sufficient monitoring of the environment, the linear-Bayes method may underestimate the failure probability. In this paper, the linear-Bayes method is extended for the wall-thinning model with the corrosion rate fluctuation, which imitates the unexpected change of the corrosion rate. The extension is carried out through following two approaches: the “correction-term” and the “error-term” approaches. The correction-term approach can evaluate the change of corrosion rate, however, it requires sufficient number of inspections. The error-term approach evaluates the failure probability conservatively.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Jose Maria Garcia-Garcia ◽  
Víctor M. R. Penichet ◽  
María Dolores Lozano ◽  
Juan Enrique Garrido ◽  
Effie Lai-Chong Law

Affective computing is becoming more and more important as it enables to extend the possibilities of computing technologies by incorporating emotions. In fact, the detection of users’ emotions has become one of the most important aspects regarding Affective Computing. In this paper, we present an educational software application that incorporates affective computing by detecting the users’ emotional states to adapt its behaviour to the emotions sensed. This way, we aim at increasing users’ engagement to keep them motivated for longer periods of time, thus improving their learning progress. To prove this, the application has been assessed with real users. The performance of a set of users using the proposed system has been compared with a control group that used the same system without implementing emotion detection. The outcomes of this evaluation have shown that our proposed system, incorporating affective computing, produced better results than the one used by the control group.


2022 ◽  
Vol 27 (1) ◽  
pp. 59-70
Author(s):  
Hamdi Putra Ahmad

The gadget’s software applications nowadays appear to be highly popular and its use has been elevating among gadget users. This kind of technological advance also touched the Qur’anic learning process in Indonesia. On the one hand, not only does the emergence of Qur’anic learning software stimulate children’s interest, but it also provides a lot of features that will make children quickly understand and practice the Qur’anic reciting. On the other hand, this kind of learning method can threat the value of Qur’anic orthodoxy which had been applied among traditional Muslim societies since the emergence of Islam in Indonesia. Some resources have noted that there were some sacred values and courtesies perpetuated by traditional Muslims while teaching Qur’anic reciting. This article will track the historical journey of Qur’anic learnings in Indonesia and discuss how the emergence of Qur’anic Learning software (as the logical consequence of technological improvement) can threat the existence of some ancient orthodoxies toward the Qur’an. 


2018 ◽  
pp. 1431-1447
Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


2009 ◽  
pp. 526-533 ◽  
Author(s):  
Susy S. Chan ◽  
Xiaowen Fang

Effective interface design for mobile handheld devices facilitates user adoption of mobile commerce (m-commerce). Current wireless technology poses many constraints for effective interface design. These constraints include limited connectivity and bandwidth, diverse yet simplistic devices, the dominance of proprietary tools and languages, and the absence of common standards for application development. The convergence of mobile Internet and wireless communications has not yet resulted in major growth in mobile commerce. Consumer adoption of m-commerce has been slow even in countries such as Finland, which have broadly adopted wireless technology (Anckar & D’Incau, 2002). An international study of mobile handheld devices and services suggests that mobile commerce is at a crossroads (Jarvenpaa, Lang, Takeda & Tuunainen, 2003). The enterprise and business use of wireless technology holds greater promise, but it demands the transformation of business processes and infrastructure. Poor usability of mobile Internet sites and wireless applications for commerce activities stands out as a major obstacle for the adoption of mobile solutions. For example, even with the latest 3G phones in Japan, consumers still find the small screen display and small buttons on these devices difficult to use (Belson, 2002).


Sign in / Sign up

Export Citation Format

Share Document