The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This document provides detail on the implementation of a location awareness system which gives the user's current location, sends this location using SMS (Short Message Service) plus sharing location with friends and family and view them on Google maps. Users can also take benefit of this application in emergency situations by using emergency feature of this application. To get the location coordinates,...
The widespread usage of SMS messaging system reflects its importance for the users of mobile phones. However, it is becoming extremely laborious for users to manually write, read and reply every single SMS message due to an increasing high volume of SMS messages received. This paper presents SAMS a semi-automated message annotation system, which facilitates mobile communication with annotated messages...
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia...
Identity authentication is the first line of defense in the security application system to access the mobile network resources. However, as the means of attacking become variety, new requirements have been brought forward for the technology of identity authentication. To improve performance of mobile authentication, this paper presents a novel mobile authentication scheme, which transmits message...
With the rapid development of mobile technology and userspsila wide adoption of mobile phones, mobile services have been a huge success in China. Even though the literature on the adoption of mobile services is quite extensive, few studies focus on customer satisfaction and loyalty in China. This study investigated the impact of perceived customer value, perceived service quality, and trust on customer...
The high penetration of mobile phones among university students provides an unprecedented opportunity for the use of SMS as a classroom interaction system. This paper presents a longitudinal analysis of the impact that a SMS-based classroom interaction system (TXT-2-LRN [1]) can have on students' learning experience. The findings indicate that instructors and students perceive a number of benefits...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
This work consists of two main components: (a) a longitudinal ethnographic study in Kyrgyzstan that demonstrates the importance of transportation resources in the developing world and how to plan for an appropriate ICT solution, and (b) the results of a proof-of-concept system engineered to create a bottom-up, transportation information infrastructure using only GPS and SMS. Transportation is a very...
The digital divide is a term often used to describe differences between rich and poor communities. This term however is more encompassing than that, as it relates to the divide between those who have access to information and communication technologies (ICTs) and those who don't. Due to the small screen size, and resulting small font size and low contrast supported by most mobile phones, the visually...
This paper deals with an SMS encryption for mobile communication. The transmission of an SMS in GSM network is not secure, therefore it is desirable to secure SMS by additional encryption. In the following text, there are compared differences in the use of symmetric and asymmetric cryptography for SMS transfer securing. In the next part, there is the description of design and implementation of the...
Though Sri Lanka has a relatively low penetration of fixed (landline) phones, mobile phones have made a significant penetration during last six years. The number of mobile subscribers within the island by the end of 2007 was almost 70 times of the customers reported a decade back. A large number of supplementary services have been introduced with the booming increase in the mobile customer base. Short...
The emergence of mobile payment, a new direction of electronic payment, releases paying from all fetters in space. However, the security issue of mobile payment has been created. A program of mobile payment based-on J2ME is designed in this paper, and the process of payment take use of digital signature technology to ensure information to be secure. Calculation, storing and communicating are transferred...
Short message service communication, i.e., the number of short text messages is continually growing. The reason for that lies in the fact that more and more people have access to modern digital communication technology that is becoming more user-friendly and budget-priced. There are various uses of modern mobile communication technology and available infrastructure in solving practical problems. By...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.