Identifying Technical Requirements for a Mobile Business Analytics Application

2021 ◽  
Vol 8 (4) ◽  
pp. 91-103
Author(s):  
Tuncay Bayrak

This study identifies various technical requirements for business analytics applications designed and optimized for mobile devices. Such applications would enable the mobile workforce to gain business insights regardless of their physical locations. In order for the mobile workforce to be efficient and effective, they need to be able to use the browsers and applications designed specifically for the mobile devices to access data, similar to desktop computers. Based on the research, such factors as online and off-line data analysis capabilities, data visualization capabilities, and security issues appear to be important factors to be addressed carefully by developers.

Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Proceedings ◽  
2020 ◽  
Vol 62 (1) ◽  
pp. 9
Author(s):  
Oriol Vallcorba ◽  
Jordi Rius

The d1Dplot and d2Dplot computer programs have been developed as user-friendly tools for the inspection and processing of 1D and 2D X-ray diffraction (XRD) data, respectively. d1Dplot provides general tools for data processing and includes the ability to generate comprehensive 2D plots of multiple patterns to easily follow transformation processes. d2Dplot is a full package for 2D XRD data. Besides general processing tools, it includes specific data analysis routines for the application of the through-the-substrate methodology [Rius et al. IUCrJ 2015, 2, 452–463]. Both programs allow the creation of a user compound database for the identification of crystalline phases. The software can be downloaded from the ALBA Synchrotron Light Source website and can be used free of charge for non-commercial and academic purposes.


2011 ◽  
Vol 403-408 ◽  
pp. 1491-1494
Author(s):  
Wei Yu

Questionnaire Survey is one of the most popular methods in Social Science study, the process of which consists of three phases: data collection, analysis and representation. At present, the practical operations of the three phases are still backward, and the methods used in data analysis and statistic are still simple. This paper designed a Survey Analysis System based on data visualization, which can not only realize survey on the internet, but also brought data visualization into the phases of data analysis and representation, so as to help users to obtain and operate data visually and handily.


Fast track article for IS&T International Symposium on Electronic Imaging 2021: Visualization and Data Analysis proceedings.


2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


Author(s):  
Yixing Fan ◽  
Jiafeng Guo ◽  
Yanyan Lan ◽  
Jun Xu ◽  
Xueqi Cheng
Keyword(s):  

2021 ◽  
Vol 236 ◽  
pp. 05078
Author(s):  
Yi Sui ◽  
Honghai Zhang

In the context of the era of intelligence, the capacity and function of data is expanding, and is playing an irreplaceable role in the field of sports news. This paper studies the data expression mode of sports news. From the point of user needs and the characteristics of visual data, this paper discusses the methods and suggestions of data visualization design in CBA league news, in an attempt to form an intuitive, efficient and convenient visual form of sports news, which can promote the multi-dimensional development of visual symbols in sports news, and promote the progress of data analysis and prediction. The data visualization has become the core competitiveness of sports news.


2016 ◽  
Vol 24 (e1) ◽  
pp. e69-e78 ◽  
Author(s):  
Aude Motulsky ◽  
Jenna Wong ◽  
Jean-Pierre Cordeau ◽  
Jorge Pomalaza ◽  
Jeffrey Barkun ◽  
...  

Objective: To describe the usage of a novel application (The FLOW) that allows mobile devices to be used for rounding and handoffs. Materials and Methods: The FLOW provides a view of patient data and the capacity to enter short notes via personal mobile devices. It was deployed using a “bring-your-own-device” model in 4 pilot units. Social network analysis (SNA) was applied to audit trails in order to visualize usage patterns. A questionnaire was used to describe user experience. Results: Overall, 253 health professionals used The FLOW with their personal mobile devices from October 2013 to March 2015. In pediatric and neonatal intensive care units (ICUs), a median of 26–26.5 notes were entered per user per day. Visual network representation of app entries showed that usage patterns were different between the ICUs. In 127 questionnaires (50%), respondents reported using The FLOW most often to enter notes and for handoffs. The FLOW was perceived as having improved patient care by 57% of respondents, compared to usual care. Most respondents (86%) wished to continue using The FLOW. Discussion: This study shows how a handoff and rounding tool was quickly adopted in pediatric and neonatal ICUs in a hospital setting where patient charts were still paper-based. Originally developed as a tool to support informal documentation using smartphones, it was adapted to local practices and expanded to print sign-out documents and import notes within the medicolegal record with desktop computers. Interestingly, even if not supported by the nursing administrative authorities, the level of use for data entry among nurses and doctors was similar in all units, indicating close collaboration in documentation practices in these ICUs.


Sign in / Sign up

Export Citation Format

Share Document