The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents results of a survey that explored the challenges low-income mobile users of Dhaka, Bangladesh (N = 131) face in mobile text entry. Results revealed that all users use the Bengali language at some capacity to compose text, yet many (are forced to) write with the Roman alphabet. Both feature phone and smartphone users feel that the existing text entry techniques are difficult to...
Human behaviors may change over time, but people always tend to preserve their preference. People typically like similar types of contents, for example, movies that they watch in regular intervals with the same amount of interests. On the other hand, the Internet is moving towards a content-oriented structure from the host-oriented structure. Content-Centric Networking (CCN), a content-oriented paradigm,...
The main aim of this article is to analyse the collected opinions on the use of electronic banking tools by individual clients in Poland, at the end of 2016. The research has been carried out using a CAWI method. The survey questionnaire, which was verified by finance experts, was made available to respondents on the servers of the Faculty of Management at the University of Warsaw. The following article...
The main objective of this research project was to identify factors promoting the adoption of m-health and determine usability challenges in the existing m-health applications in Kenya. Specifically the study aimed at i) establishing the factors promoting adoption of M-health and, ii) determining the usability challenges in m-health applications in Kenya. Consequently an M-health prototype application...
Web-based E-Learning uses Internet technologies and digital media to deliver education content to learners. Many universities in recent years apply their capacity in producing Massive Open Online Courses (MOOCs). They have been offering MOOCs with an expectation of rendering a comprehensive online apprenticeship. Typically, an online content delivery process requires an Internet connection. However,...
This paper presents an IoT (Internet of Things) system designed to allow the monitoring and control of parameters of the users' vehicles, anytime and anywhere in the world, through the Internet. The system prototype was developed and tested using an electric vehicle (EV) and the respective sensor systems. The main components of the proposed IoT system are: a Bluetooth Low Energy (BLE) intra-vehicular...
In recent years, wireless networks have become extremely necessary in modern communications. Especially in mobile phones, we are using wireless networks to connect to networks around the world using both cellulars and WLANs. In order to connect to the Internet, mobile phones can connect to the Internet using these wireless network technologies, but, mobile phones cannot select a suitable wireless...
The role of advanced technologies is being discussed in public, academic and government environments. The paper deals with the current issue of computer literacy in the elderly people with focus on benefits connected with their use. The paper brings an insight into the technical literature review. It strives to summarize key beneficial outcomes which elderly people face when they use information and...
While the mobile users enjoy the anytime anywhere Internet access by connecting their mobile devices through Wi-Fi services, the increasing deployment of access points (APs) have raised a number of privacy concerns. This paper explores the potential of smartphone privacy leakage caused by surrounding APs. In particular, we study to what extent the users' personal information such as social relationships...
We present the results of a biopsychosocial therapeutic intervention with a group of women victims of gender violence and long-term unemployed in Spain. Our research is a usability and pre-feasibility study of a remote psychosocial therapy system using mobile phones and text messages. For this we send automatic text messages to mobile phones with content based on cognitive-behavioral therapy (CBT)...
Nowadays, with the help of various on-line social networking applications, one can freely interact with any person in their friends list. However, in most conditions, people in your friends list are those you know a priori, either via face-to-face talking or introducing by a common friend. This way of establishing ones friends list can miss many potential friends nearby. These ‘potential real life...
With the worldwide appearance of Big Data and its prospective to citizens in all its endeavours, there has been a developing requirements for research on the business drivers influencing the adoption of Big Data services. This paper therefore focuses on Small to Midsized Enterprises-SMEs in Jordan; hoping to have a better delivery of Big Data services with increased transparency and availability of...
The widespread diffusion of mobile phones and the convergence of more and more services to the mobile devices allow the service providers to collect a huge corpus of information about the behaviour of the users (e.g., location and activity), “transforming” the cellular network into a highly distributed and pervasive sensor network. In this paper, we aim at demonstrating how, by using simple statistical...
With the development of globalization intensified, China's social and economic level continues to improve, cultural exchanges are also showing more and more prosperous scene. In this context, China's digital media industry is also the rapid development, especially in recent years, mobile phone technology constantly updated, the emergence of new media, have greatly promoted the mobile media industry...
This paper is based on two main theses. The first one, according to a research of Gustav Fechner, people have sustainable preferences to forms with proportions, close to Golden ratio. The second these is that human perception and aesthetical criteria can be developed and trained. Having mind the fact, that in this moment the lifestyle and especially dynamic presentation and perception of the information...
Nowadays, more and more companies intend to combine public transport system with the mature Wi-Fi technology to bring more passengers value-added services during their travel. It is critical to mobile service market and city management by identify the user's behavior patterns. In this paper, the author firstly analyzes the time regularity of bus Wi-Fi network behavior. Then from the perspective of...
Advertising is a form of delivering commercial messages. It contributes people to get more acknowledge of a product and persuades the potential consumers to take some action, such as buying, sharing, and registering as a member. With the popularity of Internet technology growing up, there are more and more advertising methods using the Internets to deliver promotional messages. Since the benefits...
High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity,...
is paper introduces contextual callbacks, which allow environments to authenticate themselves to nearby devices and advertise local services in response to the reception of radio-broadcast announcements that are emied by mobile devices.
During a disaster incident, existing network infrastructures might either be damaged or overloaded. However, disaster operations require real-time and low latency data communication, especially live video and audio streaming, as well as in integration with social networks. Thus, deployed tactical networks face several challenges to connect intervening teams. To date, there is still a lack of routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.