Mobile Devices
Recently Published Documents





2022 ◽  
Paula Delgado-Santos ◽  
Giuseppe Stragapede ◽  
Ruben Tolosana ◽  
Richard Guest ◽  
Farzin Deravi ◽  

The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing to almost 6.8 billion by 2022, and along with it, the amount of personal and sensitive data captured by them. This survey overviews the state of the art of what personal and sensitive user attributes can be extracted from mobile device sensors, emphasising critical aspects such as demographics, health and body features, activity and behaviour recognition, etc. In addition, we review popular metrics in the literature to quantify the degree of privacy, and discuss powerful privacy methods to protect the sensitive data while preserving data utility for analysis. Finally, open research questions are presented for further advancements in the field.

2022 ◽  
Vol 2022 ◽  
pp. 1-7
Ashwag Albakri ◽  
Huda Fatima ◽  
Maram Mohammed ◽  
Aisha Ahmed ◽  
Aisha Ali ◽  

With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking, those applications have become an easy and attractive target for attackers who want to get access to mobile devices and obtain users’ sensitive information. Developing a secure application is very important; otherwise, attackers can easily exploit vulnerabilities in mobile applications which lead to serious security issues such as information leakage or injecting applications with malicious programs to access user data. In this paper, we survey the literature on application security on mobile devices, specifically mobile devices running on the Android platform, and exhibit security threats in the Android system. In addition, we study many reverse-engineering tools that are utilized to exploit vulnerabilities in applications. We demonstrate several reverse-engineering tools in terms of methodology, security holes that can be exploited, and how to use these tools to help in developing more secure applications.

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Cheng Zhou ◽  
Dacong Ren ◽  
Xiangyan Zhang ◽  
Cungui Yu ◽  
Likai Ju

The devices used for human position detection in mechanical safety mainly include safety light curtain, safety laser scanner, safety pad, and vision system. However, these devices may be bypassed when used, and human or equipment cannot be distinguished. To solve this problem, a depth camera is proposed as a human position detection device in mechanical safety. The process of human position detection based on depth camera image information is given; it mainly includes image information acquisition, human presence detection, and distance measurement. Meanwhile, a human position detection method based on Intel RealSense depth camera and MobileNet-SSD algorithm is proposed and applied to robot safety protection. The result shows that the image information collected by the depth camera can detect the human position in real time, which can replace the existing mechanical safety human position detection device. At the same time, the depth camera can detect only human but not mobile devices and realize the separation and early warning of people and mobile devices.

Matia Fazio ◽  
Christian Lombardo ◽  
Giuseppe Marino ◽  
Anand Marya ◽  
Pietro Messina ◽  

An Android/iOS application for low-cost mobile devices to aid in dental diagnosis through questionnaire and photos is presented in this paper. The main purposes of our app lie in the ease of use even for nonexperienced users, in the limited hardware requirements that allow a wide diffusion, and in the possibility to modify the questionnaire for different pathologies. This tool was developed in about a month at the beginning of the COVID-19 (SARS-CoV-2) pandemic and is still in use in Italy to allow support to patients without going to the hospital, if not strictly necessary.

2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Khutsafalo Kadimo ◽  
Athulang Mutshewa ◽  
Masego B. Kebaetse

Purpose Seeking to leverage on benefits of personal mobile device use, medical schools and healthcare facilities are increasingly embracing the use of personal mobile devices for medical education and healthcare delivery through bring-your-own-device (BYOD) policies. However, empirical research findings that could guide the development of BYOD policies are scarce. Available research is dominated by studies that were guided by technocentric approaches, hence seemingly overlooking the complexities of the interactions of actors in mobile device technologies implementation. The purpose of this study was to use the actor–network theory to explore the potential role of a BYOD policy at the University of Botswana’s Faculty of Medicine. Design/methodology/approach Purposive sampling was used to select the participants and interviews, focus group discussions, observations and document analysis were used to collect data. Data were collected from 27 participants and analysed using grounded theory techniques. Emerging themes were continually compared and contrasted with incoming data to create broad themes and sub-themes and to establish relationships or patterns from the data. Findings The results suggest that the potential roles for BYOD policy include promoting appropriate mobile device use, promoting equitable access to mobile devices and content, and integrating mobile devices into medical education, healthcare delivery and other institutional processes. Research limitations/implications BYOD policy could be conceptualized and researched as a “script” that binds actors/actants into a “network” of constituents (with shared interests) such as medical schools and healthcare facilities, mobile devices, internet/WiFi, computers, software, computer systems, medical students, clinical teachers or doctors, nurses, information technology technicians, patients, curriculum, information sources or content, classrooms, computer labs and infections. Practical implications BYOD is a policy that seeks to represent the interests (presents as a solution to their problems) of the key stakeholders such as medical schools, healthcare facilities and mobile device users. BYOD is introduced in medical schools and healthcare facilities to promote equitable access to mobile devices and content, appropriate mobile device use and ensure distribution of liability between the mobile device users and the institution and address the implication of mobile device use in teaching and learning. Originality/value The BYOD policy is a comprehensive solution that transcends other institutional policies and regulations to fully integrate mobile devices in medical education and healthcare delivery.

First Monday ◽  
2022 ◽  
Rashika Tasnim Keya ◽  
Pietro Murano

In this paper a novel and significant study into the usability of carousel interaction in the context of desktop interaction is presented. Two equivalent prototypes in an e-commerce context were developed. One version had a carousel and the other version did not have a carousel. These were then compared with each other in an empirical experiment with 40 participants. The data collected were statistically analysed and overall results showed that in terms of performance the Web site version without carousel outperformed the version with carousel. Furthermore, the subjective preferences of the participants were strongly in favour of the without carousel version of the site. The results of this study make an important contribution to knowledge suggesting that in many cases implementing a carousel is not the best design decision. The results of this paper are particularly significant in relation to desktop versioned Web sites and goal-driven tasks. Serendipitous-type tasks and mobile versioned web sites used on mobile devices with touch screens were not part of the scope of this work.

2022 ◽  
Bin Xu ◽  
Tao Deng ◽  
Yichuan Liu ◽  
Yunkai Zhao ◽  
Zipeng Xu ◽  

Abstract The combination of idle computing resources in mobile devices and the computing capacity of mobile edge servers enables all available devices in an edge network to complete all computing tasks in coordination to effectively improve the computing capacity of the edge network. This is a research hotspot for 5G technology applications. Previous research has focused on the minimum energy consumption and/or delay to determine the formulation of the computational offloading strategy but neglected the cost required for the computation of collaborative devices (mobile devices, mobile edge servers, etc.); therefore, we proposed a cost-based collaborative computation offloading model. In this model, when a task requests these devices' assistance in computing, it needs to pay the corresponding calculation cost; and on this basis, the task is offloaded and computed. In addition, for the model, we propose an adaptive neighborhood search based on simulated annealing algorithm (ANSSA) to jointly optimize the offloading decision and resource allocation with the goal of minimizing the sum of both the energy consumption and calculation cost. The adaptive mechanism enables different operators to update the probability of selection according to historical experience and environmental perception, which makes the individual evolution have certain autonomy. A large number of experiments conducted on different scales of mobile user instances show that the ANSSA can obtain satisfactory time performance with guaranteed solution quality. The experimental results demonstrate the superiority of the mobile edge computing (MEC) offloading system. It is of great significance to strike a balance between maintaining the life cycle of smart mobile devices and breaking the performance bottleneck of MEC servers.

2022 ◽  
Steve Fossey

This paper revisits a performance titled Falling in Love Again - and Again which was first performed in 2014 as part of a series of works I created questioning relational intimacy and proximity in public space. During Falling in Love Again - and Again participants were invited to explore public space with the intention of anonymously falling in love with strangers. The details of these encounters were shared with me as the leader of the piece via mobile phone text messages, but never with the subjects of the participants' desires.  Understanding the dynamics of intimacy and proximity in 2014 was a very different experience to how I understand them in 2021. The Covid-19 pandemic, social distancing, and two periods of lockdown has drastically influenced how relationality and physically being in the world with others is performed.  This paper is concerned both with the intimate and proximate dynamics of relational bodies during that performance as I understood it then, and, as a consequence, how we might understand relational proximity and intimacy now.Critical points of departure for the paper include art historian Grant Kester's writing on conversational art practices and his framing of dialogic encounters through the use of Jeffrey T. Nealon's Alterity Politics: Ethics and Performative Subjectivity (1998).  Models of 'dialogical' experience and 'responsibility', as situated by Mikhail Bakhtin and Emmanuel Levinas respectively (Nealon, 1998, cited in Kester, 2004, 118) are used in this article to frame a rethinking of the dynamics and ethics of face to face contact and physical proximity, as bodies in space maintain distance from one another, connected only by our digital devices and our imaginations.  The voyeuristic practices of Sophie Calle and Vito Acconci converge with theatre makers Forced Entertainment's 'writing over' of place (Kaye, 2000) to explore imaginary relational connectivity.  The writing of geographer Doreen Massey supports this framing through the use of Massey's thoughts on the fictional poetics of social interactions and 'stories so far' (Massey, 2005).  Ultimately the paper asks what happens when we are required to imagine being with others in physically distant and imaginary ways with only our mobile devices as depositories for our fictional desires. 

Knowledge ◽  
2022 ◽  
Vol 2 (1) ◽  
pp. 41-54
Antonio Sarasa-Cabezuelo

Mobile devices have become the most used tool for a large number of tasks that we regularly perform such as relating them, searching for information, and in particular for making purchases. A situation that is frequently repeated in many areas is discovering an object that belongs to another person but we would be interested in being able to acquire it. However, the problem arises of knowing where to buy it. For example, this happens with the clothes that other people are wearing. Today, technology offers recognition mechanisms that can help solve this problem. This article presents an Android app that can recognize a book based on an image and offer places where it can be purchased. For this, Google technology was used to recognize objects from images and it has been combined with the information provided by Google Books to find stores that sell recognized books. In this way, a system has been created that makes it easier for any user to identify and purchase books that they discover at any given time.

Arun Kumar Jindal ◽  
Vijayan Banahatti ◽  
Sachin Lodha

Sign in / Sign up

Export Citation Format

Share Document