mobile user
Recently Published Documents


TOTAL DOCUMENTS

844
(FIVE YEARS 215)

H-INDEX

26
(FIVE YEARS 5)

2021 ◽  
Vol 16 (4) ◽  
pp. 2-9
Author(s):  
Mária Oleárová ◽  
Radovan Bačík ◽  
Richard Fedorko

The ever-increasing global interest in mobile commerce signals the urgent need to deepen knowledge on consumer behavior and preferences. A better understanding of the interests and values of the mobile user is crucial for the successful management and development of mobile shopping channels. Using the secondary data collected from reports of research companies and statistical portals, the paper aims at describe the state of mobile commerce and its development trends around the world. Following the analysis of secondary data, the paper we deal with the possibilities of optimizing business strategies in the field of m-commerce.


2021 ◽  
Vol 5 (4) ◽  
pp. 388
Author(s):  
Mary Ann E. Ignaco

In the Philippines, reporting an incident always depends on self-reporting to the nearest law enforcer's office or calling a channel using a mobile phone. 911 is the National Emergency hotline to get assistance when an emergency occurs. However, the emergency hotline operated by the Emergency Network Philippines (ENP), cannot retrieve the reporter's location details immediately. Only when the reporters describe the exact location clearly. Yet, many circumstances that the reporters do not know when they are, or sometimes they have imprecise position information. Then, the law enforcers team may not be able to come to the right place efficiently on time.  The incident reporting application incorporates the three types of incidents, classified as public disturbance, ordinance violation, and crime incident. To report an incident the application will automatically get the latitude and longitude of the mobile user or an option to manually pinned the location on the google map include also the incident type, description, and photos will be sent to the nearest barangay responder officer. The barangay responder officer able to request a backup officer, the rescue emergency unit such as a hospital ambulance or firefighters, or transfer a report to the nearest police station. The system also manages web admin for responder locations and generates statistical reports including charts and graphs.  The positive feedback of the participants during the evaluation stage signifies that the application was accepted as tested and verified by the evaluation results.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Rabia Hasan ◽  
Waseem Shehzad ◽  
Ejaz Ahmed ◽  
Hasan Ali Khattak ◽  
Ahmed S. AlGhamdi ◽  
...  

With the advent of wireless sensor networks and their deep integration with the world have enabled users worldwide to achieve benefits from location-based services through mobile applications, the problems such as low bandwidth, high network traffic, and disconnections issues are normally extracted from mobile services. An efficient database system is required to manage mentioned problems. Our research work finds the probability of user’s next locations. A mobile user (query issuer) changes its position when performing a specific mobile search, where these queries change and repeat the search with the issuer position. Moreover, the query issuer can be static and may perform searches with varying conditions of queries. Data is exchanged with mobile devices and questions that are formulated during searching for query issuer locations. An aim of the research work is achieved through effectively processing of queries in terms of location-dependent, originated by mobile users. Significant studies have been performed in this field in the last two decades. In this paper, our novel approach comprise of usage of semantic caches with the Bayesian networks using a prediction algorithm. Our approach is unique and distinct from the traditional query processing system especially in mobile domain for the prediction of future locations of users. Consequently, a better search is analyzed using the response time of data fetch from the cache.


Author(s):  
Oleksandr Romanov ◽  
Gleb Miklaiv

Background. Wi-Fi has many disadvantages, such as how the maximum bandwidth is limited by the frequency of the range. The work uses Li-Fi technology, which uses visible light for data transmission. The frequency range of Li-Fi is 1000 times greater than the entire radio range. Feedback is used to increase the throughput. But the feedback decreases the bandwidth of the downstream signal. Objective. The purpose of the paper is to analyse what parameters are advisable to change to increase the throughput of the Li-Fi system. Methods. Study of the simulated dependence of the optimal interval change for using the feedback, and using this interval plot the dependence of the throughput on the change in the parameters of the Li-Fi system with a mobile user. Results. With an increase in the area of the photodiode and its refractive index, the throughput increases. As the receiver speed increases, the throughput decreases slightly <0.1%. Reducing the angle of the photodiode field of view and the half-angle of radiation significantly increases the throughput (by 50%) only when decreasing to small angles (<10 °). Conclusions. It is advisable to make photodiode from a material with a high refractive index, with a big area. Since mobile devices are often used in the office Li-Fi network, it is not advisable to reduce the receiver's viewing angle, as well as to reduce the half-angle of radiation. It may also be beneficial to give mobile users more download throughput than upload throughput.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Muna Al-Razgan ◽  
Taha Alfakih ◽  
Mohammad Mehedi Hassan

The emerging technology of mobile cloud is introduced to overcome the constraints of mobile devices. We can achieve that by offloading resource intensive applications to remote cloud-based data centers. For the remote computing solution, mobile devices (MDs) experience higher response time and delay of the network, which negatively affects the real-time mobile user applications. In this study, we proposed a model to evaluate the efficiency of the close-end network computation offloading in MEC. This model helps in choosing the adjacent edge server from the surrounding edge servers. This helps to minimize the latency and increase the response time. To do so, we use a decision rule based Heuristic Virtual Value (HVV). The HVV is a mapping function based on the features of the edge server like the workload and performance. Furthermore, we propose availability of a virtual machine resource algorithm (AVM) based on the availability of VM in edge cloud servers for efficient resource allocation and task scheduling. The results of experiment simulation show that the proposed model can meet the response time requirements of different real-time services, improve the performance, and minimize the consumption of MD energy and the resource utilization.


Cryptography ◽  
2021 ◽  
Vol 5 (4) ◽  
pp. 35
Author(s):  
Suvidha K. S. ◽  
Jothi Rangasamy ◽  
Shyam S. Kamath ◽  
Cheng-Chi Lee

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack, man-in-the-middle attack, password-guessing attack and stolen-smart-card attack. In addition to these attacks, the scheme should achieve user anonymity, unlinkability and perfect forward secrecy. In the roaming scenario, as mobile users are connected to the foreign network, mobile users must provide authentication details to the foreign network to which they are connected. The foreign network forwards the authentication messages received from the mobile users to their home network. The home network validates the authenticity of the mobile user. In the roaming scenario, all communication between the three entities is carried over an insecure channel. It is assumed that the adversary has the capabilities to intercept the messages transmitted over an insecure channel. Hence, the authentication scheme designed must be able to resist the above-mentioned security attacks and achieve the security goals. Our proposed scheme ES-HAS (elliptic curve-based secure handover authentication scheme) is a two-factor authentication scheme in which the mobile user possesses the password, and the smart card resists the above-mentioned security attacks. It also achieves the above-mentioned security goals. We also extended our two-factor authentication to a multi-factor authentication scheme using the fingerprint biometric technique. The formal security analysis using BAN logic and the formal security verification of the proposed scheme using the widely accepted AVISPA (automated validation of internet security protocols and applications) tool is presented in this article. In comparison with the related schemes, the proposed scheme is more efficient and robust. This makes the proposed scheme suitable for practical implementation.


2021 ◽  
Vol 11 (24) ◽  
pp. 11756
Author(s):  
Dominik Reichinger ◽  
Erik Sonnleitner ◽  
Marc Kurz

Current state of the art authentication systems for mobile devices primarily rely on single point of entry authentication which imposes several flaws. For example, an attacker obtaining an unlocked device can potentially use and exploit it until the screen gets locked again. With continuous mobile user authentication, a system is embedded into the mobile devices, which continuously monitors biometric features of the person using the device, to validate if those monitored inputs match and therefore were made by the previously authenticated user. We start by giving an introduction towards the state of the art of currently used authentication systems and address related problems. For our main contribution we then propose, implement and discuss a continuous user authentication system for the Android ecosystem, which continuously monitors and records touch, accelerometer and timestamp data, and run experiments to gather data from multiple subjects. After feature extraction and normalization, a Hidden Markov Model is employed using an unsupervised learning approach as classifier and integrated into the Android application for further system evaluation and experimentation. The final model achieves an Area Under Curve of up to 100% while maintaining an Equal Error Rate of 1.34%. This is done by combining position and accelerometer data using gestures with at least 50 data points and averaging the prediction result of 25 consecutive gestures.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3064
Author(s):  
Abdulah Jeza Aljohani ◽  
Muhammad Moinuddin

Power-domain non-orthogonal multiple access (NOMA) assigns different power levels for near and far users in order to discriminate their signals by employing successive interference cancellation (SIC) at the near user. In this context, multiple-input-single-output NOMA (MISO-NOMA), where the base station (BS) is equipped with multiple antennas while each mobile user has a single antenna receiver, is shown to have a better overall performance by using the knowledge of instantaneous channel state information (CSI). However, this requires prior estimation of CSI using pilot transmission, which increases the transmission overhead. Moreover, its performance is severely degraded in the presence of CSI estimation errors. In this work, we provide statistical beamforming solutions for downlink power-domain NOMA that utilize only knowledge of statistical CSI, thus reducing the transmission overhead significantly. First, we derive the outage probabilities for both near and far users in the multi-user NOMA system without imposing strong assumptions, such as Gaussian or Chi-square distribution. This is done by employing the exact characterization of the ratio of indefinite quadratic form (IQF). Second, this work proposes two techniques to obtain the optimal solution for beam vectors which rely on the derived outage probabilities. Specifically, these two methods are based on (1) minimization of total beam power while constraining the outage probabilities to the QoS threshold, and (2) minimization of outage probabilities while constraining the total beam power. These proposed methods are non-convex function of beam vectors and, hence, are solved using numerical optimization via sequential quadratic programming (SQP). Since the proposed methods do not require pilot transmission for channel estimation, they inherit better spectral efficiency. Our results validate the theoretical findings and prove the supremacy of the proposed method.


2021 ◽  
Vol 1 (2) ◽  
pp. 55-64
Author(s):  
Diva Thea Theodora Ismail ◽  
Rosiana Nurwa Indah ◽  
Rifqi Zaeni Achmad Syam

The Bandung Regency Archives and Libraries Service is one of the regional public libraries of Bandung Regency which has service innovations during the COVID-19 pandemic. The Bandung Regency Archives and Library Service provides a mobile user interface service named i-Sabilulungan. The purpose of this study was to determine the usefulness of the i-Sabilulungan application as a service innovation during the COVID-19 pandemic at the Bandung Regency Archives and Library Service. The research method used in this research is descriptive qualitative research method with data collection techniques through observation and interviews. In this study, the informants were librarians managing the i-Sabilulungan mobile application. The results of this study reveal that i-Sabilulungan as a library service innovation for the Bandung Regency Archives and Libraries Service has fulfilled an important element in the application of the mobile user interface application. The i-Sabilulungan application has fulfilled 10 elements of the application of the mobile user interface application which consists of several elements including connectivity, simplicity, directional, informative, interactivity, user friendliness, comprehensiveness (completeness), continuity (sustainable), personalization (personalization) and internal elements (internal).


Sign in / Sign up

Export Citation Format

Share Document