mobile data
Recently Published Documents


TOTAL DOCUMENTS

1566
(FIVE YEARS 307)

H-INDEX

49
(FIVE YEARS 9)

2022 ◽  
Vol 89 ◽  
pp. 104453
Author(s):  
Symi Nyns ◽  
Serge Schmitz
Keyword(s):  

2022 ◽  
Vol 10 (2) ◽  
pp. 239
Author(s):  
Muhammad Firyanul Rizky ◽  
Ida Bagus Made Mahendra ◽  
I Gusti Agung Gede Arya Kadyanan ◽  
Luh Arida Ayu Rahning Putri ◽  
I Wayan Santiyasa ◽  
...  

COVID-19 membawa dampak buruk bagi sektor pendapatan masyarakat Ubud khususnya para penjual souvenir karena menurunnya kedatangan wisatawan. Pemulihan perekonomian masyarakat Ubud khususnya pemasaran souvenir harus memperbaiki beberapa aspek agar mampu menentukan strategi penjualan optimal, sehingga solusi pada penelitian ini adalah pengembangan sistem aplikasi berbasis mobile menyesuaikan kebutuhan penjual souvenir untuk mengembangkan strategi pemasaran pasca COVID-19, aplikasi ini menggunakan implementasi Algoritma Apriori sebagai keluaran rekomendasi berupa pola asosiasi dari transaksi sehingga mendapatkan suatu rules/aturan. Aplikasi dikembangkan secara Hybrid Multiplatform, front-end menggunakan Kotlin Multiplatform Mobile dan Webview, sedangkan back-end menggunakan PHP dan Database MySql. Berdasarkan Evaluasi Aturan Asosiasi dengan tools WEKA menggunakan 25 transaksi dan set minimum support sebesar 0,1 atau 10%, aturan asosiasi sistem sama dengan aturan/rules yang dihasilkan aplikasi WEKA dengan total 42 jumlah aturan asosiasi dengan parameter tertinggi confidence 0,75 dan lift ratio 2,34. Dari hasil pengujian black box, semua fungsional yang ada aplikasi rekomendasi ini telah berhasil berjalan sebagaimana seharusnya dengan persentase keberhasilan 98% di 8 (delapan) platform Android 4 sampai android 11, dan hasil analisis kepuasan pengguna dengan skala likert sebanyak 30 responden rata-rata 86,4% pengguna sangat puas dengan keseluruhan proses sistem. Kata Kunci: Aplikasi Mobile, Data Mining, Algoritma Apriori, Souvenir Pasar Seni Ubud, Android, IOS, Kotlin Multiplatform Mobile, WebView, PHP, MySql.


2022 ◽  
Vol 7 (1) ◽  
pp. 12-23
Author(s):  
Anju Nofarof Hasudungan ◽  
Ofianto ◽  
Tri Zahra Ningsih

This study aims to describe the real threat of learning loss for underprivileged students and remote areas, due to school closures and distance learning in Riau Province, Indonesia. On the other hand, keeping students safe from the dangers of the COVID-19 virus is the main factor. Distance learning is a solution to this dilemma, but it is very difficult for underprivileged students and remote regions to implement, because: 1) Students have never used various educational technology platforms in distance learning 2) Do not have a smartphone and mobile data plans 3) Internet signal in remote areas is not good for distance learning. The results of this study describe, when distance learning was first implemented, as many as 75 % of 206 underprivileged students and ten schools experienced difficulties when using educational technology platforms for distance learning. However, after two years, there has been an increase in the participation of underprivileged students in distance learning. In addition, it has become a habit, subsidized mobile data plans from the government, adaptive curricula and variations in learning methods when distance learning, have become important factor in increasing the participation of underprivileged students and remote regions.


2022 ◽  
Author(s):  
Yuting Wang ◽  
Ling Xue ◽  
Hefu Liu ◽  
Zhao Cai
Keyword(s):  

2021 ◽  
Vol 7 (3) ◽  
pp. 243
Author(s):  
Christopher Wijeyakulasuriya ◽  
W. M. C. B. Wanninayake ◽  
D. A. T. Kumari

YMER Digital ◽  
2021 ◽  
Vol 20 (12) ◽  
pp. 589-598
Author(s):  
Mr. Bhushan M Manjre ◽  
◽  
Dr. Krishan Kumar Goyal ◽  

Mobile Forensics is now days, increasingly becoming more challenging as it is the field of science that is continuously evolving with respect to the rapidly developing technologies and techniques for the extraction of the mobile data and its decoding. Majority of the crimes are getting committed digitally and especially the criminals are preferring mobile handsets than a laptop or desktop machines, leaving the footprints behind which could be evidence against them. The mobile handsets along with their software applications are getting more advanced and sophisticated mainly due to advances in Cloud computing where clouds are used to store data, Anti-forensics where efforts are made to defeat forensic procedures and Encryption which is used to secure the data during transit. But when compared with the pace of development in mobile hardware and software, the forensic tools and techniques are growing very slowly. Hence the contemporary forensic tools and methodologies are becoming increasingly obsolete and hence urges for the advanced forensic tools, methods which could comply with the need of today’s mobile forensics. Hence, this work presents a detailed survey of the contemporary challenges faced by the forensic experts with the current forensic tools and its methodologies and also the need, scope and opportunities associated with the novel and secure software framework that can address the majority of issues occurring while extraction and decoding of mobile artifacts.


Author(s):  
Ruaa Alsabah ◽  
Mustafa Aljshamee ◽  
Ammar M. Abduljabbar ◽  
Ali Al-Sabbagh

The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.


Sign in / Sign up

Export Citation Format

Share Document