The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unit testing is based on the idea that units under test behave in a reproducible and deterministic way. If the unit's code is dependent on external context factors like time or location, these factors have to be controlled in order to produce meaningful results. Spaced repetition mobile learning games in which users are reminded to play at time intervals are based on previous user interaction with...
In this article, we investigate energy efficient power control for the uplink of an OFDMA single-cell communication system. The user equipments decide freely their power level on the available subcarriers of the system in order to maximize their EE (Energy Efficiency) while respecting minimum normalized rate requirements. We use the non-cooperative Game theory to demonstrate that users will end by...
Drawing guessing game is the game where the users are required to guess the item that is progressively drawn on the screen. In this project, an elderly oriented mobile drawing guessing game named Guess It was developed. This application allows the drawings to be added into the cloud database from time to time and get downloaded to the user's mobile devices without the need to update the application...
We investigate the technology acceptance factors of the AR smart-phone game Pokémon Go with a PLS-SEM approach based on the UTAUT2 model by Venkatesh et al. [1]. Therefore, we conducted an online study in Germany with 683 users of the game. Many other studies rely on the users' imagination of the application's functionality or laboratory environments. In contrast, we asked a relatively large user...
Delay-tolerant networks (DTN) are sparse mobile ad hoc networks where contemporaneous end-to-end path is typically not available. Therefore, nodes act as relays for each other to enable data delivery. The cooperation among mobile nodes however can be hindered by selfish users. Incentive schemes are inevitably introduced to regulate the behavior of DTN users. The motivation of this paper is to seek...
This paper presents results of an exploratory study that examined the effects of different types of correctness feedback on children's actual and perceived performance with a math app. In the study, forty-flve grade-2 students solved easy, moderate, and hard drill questions with a math app augmented with textual, icon, and emoticon correctness feedback. Results suggested that, for the most part, neither...
This paper mainly focuses on developing a joint cloud and wireless resource allocation algorithm based on evolutionary game (JRA-EG) considering mobile terminals' energy consumption and time delay as well as monetary cost in mobile edge computing environment. The mobile terminals (MTs) in different service areas form different populations. In addition, the competition among populations of MTs in different...
Interference alignment (IA) is an efficient interference management technique that can result in sum-rates that scale linearly with the number of users at high signal-to-noise power ratio (SNR). But it is difficult to directly apply IA to large networks because of heavy signaling overhead and feasibility constraint. Clustered IA divides cells into disjoint clusters where IA is applied in each cluster...
As the number of elderly people is increasing in Thailand, but there is only a few studies about graphic user interface (GUI) design on mobile devices. The problem of elderly vision and motor response should be one of design factors in GUI. This paper is about a usability study to design the most suitable GUI for Thai elderly people. This study has been done by using a game designed for testing the...
Smartphone-based augmented reality (AR) applications like the Pokémon Go game are increasingly popular. These applications make extensive use of the smartphone's camera, which may pose a privacy problem as the camera may capture sensitive images or audio information. In this paper, we present PrivacyManager, a framework that allows application developers and domain administrators to control potentially...
Musculoskeletal disorders, including lower back pain, denote health problems of the locomotor apparatus and are the leading cause of disability, causing an increasing health care expenditure. To reduce the risk of suffering lower back pain, physical activity remains the best treatment. However, exercising requires awareness, understanding, and commitment to achieve the intended results. Current practices...
Ubiquitous mobile technology makes m-learning a popular method of education. Our goal was to use education and entertainment (edutainment) for teaching physics on mobile devices, as the technology is available for most of the students. A game was designed, as an interactive and storytelling educational physics app based on user experience and edutainment guidelines. The testers in usability tests...
The purpose of this paper is to investigate the effect of the sense of presence on one aspect of learning, information recall, in a mobile immersive virtual reality (VR) disability simulation (DS). Previous research has found that the use of VR technology in education may facilitate improved learning outcomes. However, it is still an active research topic as the learning outcomes can vary widely and...
Advancements in game design, mobile technologies and game play have made researching into Massively Multiplayer Online Games a completely different genre altogether demanding interdisciplinary methodology and integration of different perspectives. The current study uses definitions borrowed from the MDA framework and combines it with active user perspectives and components of formal analysis to explore...
We examine a two-player, zero-sum, differential turret defense game, which consists of two players, a mobile Attacker and a stationary Defender. The Attacker is modeled as a mobile agent moving with a constant speed about a infinite, two-dimensional plane, and it is capable of making instantaneous changes in direction. The Defender is modeled as a stationary target located at the origin, and it is...
With the tremendous popularity of smartphones and other portable devices, crowdsensing applications have become a center of attention in recent years. Different mechanisms have been designed to incentivize mobile users to participate in crowdsensing. However, there are still many open issues needed to be investigated for these incentive mechanisms. In this paper, we systematically study the collusion...
As a new method of the Internet of Things (IoT), the mobile crowdsensing provides a novel way to realize the ubiquitous social perception. From the point of the game theory, this paper addresses the reputation incentive mechanism and discusses the prisoner's dilemma in the mobile crowdsensing. Firstly, we give a formal definition of the sensing user's contribution based on the accuracy in data analysis,...
In view of the problems of the current teaching content being out of touch with social needs and students' poor practical abilities and other issues, this paper analyzes the new international software engineering training model. Based on the iterative optimization method of updating the teaching idea, optimizing the curriculum system, strengthening the schoolenterprise cooperation and improving teachers'...
In this paper, we propose a method for optimizing the game live service. Especially, we focus on improving user retention. Firstly, we define player churn in the game and extract features that contain the properties of the player churn from the game logs. And then we evaluate the importance of features using random forest in classification. Finally, we build association matrix between features and...
In Location Based Services (LBSs), service providers can obtain mobile users' locations or traces while receiving their service requests. K-anonymity, which is the most commonly used location privacy protection method, needs the cooperation among mobile users to form a k-anonymous group. Though several incentive mechanisms have been proposed to motivate mobile users to participate in the k-anonymous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.