Wyniki wyszukiwania dla: MOBILE TECHNOLOGIES
-
Evaluating the Internal and External Usability of Mobile Technologies in Facilitating Knowledge Transfer
PublikacjaA worker’s performance and productivity depend on a variety of factors including knowledge, to be essential for self-effectiveness and self-efficacy. In the literature, knowledge transfer is argued to enhance the quality of work, and therefore, its value. When addressing this issue, the latest studies have considered and evaluated the use of mobile technologies, which are evidenced to improve a worker’s capacity and skills. However,...
-
A Study of the Impact of Internal and External Usability on Knowledge Transfer by the Means of Mobile Technologies: Preliminary Results
Publikacja -
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Czasopisma -
International Journal of Interactive Mobile Technologies
Czasopisma -
International Conference on 3G Mobile Communication Technologies
Konferencje -
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublikacjaDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Heterogeneous Ensemble with Combined Dimensionality Reduction for Social Spam Detection
Publikacja -
International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
Konferencje -
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Mobile Networks' Analysis in Terms of QoS Performance Assessment
PublikacjaQuality of service (QoS) assessment is one of the basic processes carried out by mobile network operators (MNOs) and regulators of the telecommunications market. Usually, professional companies carry out measurements for various country areas and use cases (scenarios). In this paper, we show exemplary measurement results carried out in drive tests in the vicinity of the Polish capital by a professional company. The measurement...
-
Network effects—do they matter for digital technologies diffusion?
PublikacjaPurpose The main research target of this paper is to capture the network effects using the case of mobile cellular telephony, identified in European telecommunication markets, and its determinants enhancing the process of digital technologies diffusion. Design/methodology/approach This research relies on panel and dynamic panel regression analysis. The empirical sample covers 30 European countries, and the period for the analysis...
-
Technological substitution in Asia
PublikacjaThis book provides extensive evidence on information and communication technologies development diffusion patterns, unveils specific ‘network effects’ that enhance rapid spread of ICT, and detect major macroeconomic determinants of this process, across 36 Asian economies over the period 1980-2015. Moreover, this research traces country-specific patterns of the unique process. We consider two types of technological substitution,...
-
Mobile Cloud computing architecture for massively parallelizablegeometric computation
PublikacjaCloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...
-
Activity assay of O-Acetyl-L-homoserine sulfhydrylase (CaMet15p).
Dane BadawczeThe study aimed to obtain conditions optimal for the activity of O-acetyl-L-homoserine sulfhydrylase (CaMet15p) and a method suitable for its measurement. The selection of appropriate reaction conditions included the identification of the reaction buffer and its pH, substrate and enzyme concentrations. The activity of CaMet15p was measured by the detection...
-
Greencoin: prototype of a mobile application facilitating and evidencing pro-environmental behavior of citizens
PublikacjaAmong many global challenges, climate change is one of the biggest challenges of our times. While it is one of the most devastating problems humanity has ever faced, one question naturally arises: can individuals make a difference? We believe that everyone can contribute and make a difference to the community and lives of others. However, there is still a lack of effective strategies to promote and facilitate pro-environmental...
-
DOP and Pseudorange Error Estimation in Urban Environments for Mobile Android GNSS Applications
PublikacjaJust a couple of years ago, GNSS (Global Navigation Satellite Systems) were available only for a narrow group of users. Currently, with the outbreak of mobile devices, they are accessible to anyone and everywhere. Urban navigation or searching for POIs (Points of Interest) had become an everyday activity. With the availability of consumer electronics and wireless technologies, each user can obtain information considering his or...
-
Digital Gaps and Economic Inequalities in MENA Countries: An Empirical Investigation
PublikacjaThis research contributes to the present state of the art by examining changes in cross-country inequalities in digital technologies deployment and economic performance. Our empirical target builds on the hypothesis that rapid global diffusion of digital technologies unequivocally leads to gradual eradication of cross-country digital gaps and cross-country inequalities in terms of deployment of ICT; the technology convergence occurs....
-
Ubiquity of client access in heterogeneous access environment
PublikacjaWith popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...