The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile technology provides an opportunity for a fundamental change in education away from occasional use of computers in a specialized classroom towards more embedded use in the standard classroom and beyond. The distinctive features of mobile devices that cannot be found on classical wired computers (portability, touchscreen, and various input sensors) add a new dimension to learning activities that...
User interface design is an important component of human-computer interface. User interface continues to evolve and the emphasis is on imparting more control to end-user and at the same time to facilitate ease of use. This paper proposes a framework for design of an adaptive user interface. The adaptive user interface allows automatic generation of elements of the interface such as buttons, text fields,...
More and more people express their personal views and opinions to an event through micro-blog at the same time they also convey their emotions. The micro-blog can reflect the relationship between the event and people's interests, the degree of influence. The emotional complexity of a text is to measure the variety of people's emotional response in a text. In this paper the text is the whole micro-blog,...
The watch is here? touts apple?s wearable computer online marketing slogan, implying that the one and only timepiece that really matters has arrived on the scene [1]. So much for the Rolex Cosmograph and Seiko World Timer when you can buy a stylish digital Apple Watch Sport or even an Apple Watch Edition crafted with 18-karat gold (Figure 1).
In the current electronic industry, embedded systems have become essential components in most electronic devices. The fast growth mobile devices have been used in every sector and brought wide applications in many aspects of our society. These devices involve in internet connections, wireless communications and even cloud computing, which increases the necessity of both hardware and software securities...
A report published in 2014 by the World Economic Forum ranked the quality of South Africa's mathematics and science education in the last place out of 148 countries. Educational experts believe that learners can benefit from educational mathematical applications. Senior post-graduate students at the Central University of Technology in South Africa, therefore, embarked on a socio-constructivist project...
With the world becoming a more mobile place for everyone through the use of smartphones, tablets and laptop computers, the need to help people to get mobile programming skills has never been greater. If anyone wants to become a mobile applications developer, the best approach might just be to learn how to develop and start doing it, and it's "to learn how to develop", the really important...
Open Source Hardware is widely used as enterprise standard device because it has high performance for its price. Traditional enterprise Wireless Local Area Network has the limitation of functionality and scalability by the deployed network equipment. To solve this problem, we propose ‘Web of Place Access Point’ using raspberry pi that enable to manage the scale of the network and to provide enterprise...
The Internet is a notoriously two-way street. If multiple computers can communicate sensitive data across the Internet, malicious entities can access the network and collect this data also. The range and number of connected devices is increasing dramatically and with this expansion so is the security risk. Collection of ever rising quantities of data, especially sensitive and personal data, raises...
This paper looks at the potential of information visualization for multi-device co-located synchronous collaboration. That is, the capability of interactive graphical user interfaces to support face-to-face collaboration with networked devices such as large displays with motion recognition and mobile touchscreen devices. This is done by first considering how information visualization can be developed...
The Holy Quran forms one of the basis of the Islam religion. Prophet Mohammed "peace be upon him" asked Moslems to pay attention to The Holy Quran by learning the Quran texts and understanding the Quran meaning. The Holy Quran consists of 114 chapters which is called a sura (plural: suwar). Each sura is divided into verses. Currently, there are many applications released in the market to...
This paper explores the students' perception on Mendeley Reference Management Software (MRMS) focusing particularly with academic honesty as the fundamental aspect in the form of encouraging the academic integrity and avoiding academic dishonesty. It reports a survey research using a survey monkey involving 100 respondents to obtain data on the students' responses on the use of MRMS (the default features...
Big data has been an important issue in many research domains. The amount of data generated is not only growing in the developed world, also the developing countries is experiencing rapid growth in data generation. However, a large part of the data generated in the developing countries has a different origin than in the rest of the world: the developing world is progressing rapidly to the mobile era...
This issue is the second part of the Special Issue on Networking for Big Data. The first part, with eight article, was published in the July/August 2014 issue of IEEE Network. Since then, we have witnessed fast development in various aspects of big data, such as theories, applications, and platforms.
After a user logs into web server using a public personal computer or a mobile device such as mobile phone, the leakage of his personal information may occur because he often forgets to log out from web server. To prevent the leakage of the personal information instantaneously, we propose a new login status control method based on the connectivity of web servers and a single mobile application. The...
In India cellular communication scenario, the term MNP or Mobile Number Portability is becoming more popular. The mobile operators are forced to adapt the Herbert Spencers theory on Survival of the fittest. MNP allows the customer to transfer their existing number from one mobile network provider to another. Thus, if a customer is dissatisfied by the services provided by a mobile operator the customer...
This paper discusses causes of the sluggish growth rates of mobile learning in a developing country (Botswana), despite the mobile phone revolution and proposes future directions in application of mobile technology to enhance education in emerging economies.
This paper simply introduces the meaning and equipment of radio monitoring, and mainly discusses how to design a platform which can storage, manage, retrieve and analysis radio coverage data based on B/S model by using database and Baidu map JavaScript API technology and combining with the characteristics of radio monitoring equipment. Radio coverage data from radio monitoring equipment will go into...
With the rapid growth in mobile and wireless computing technology, location management techniques become a paramount issue to enable the terminals to continuously receive services when moving from one location to another. Future Personal Communication Systems (PCS) will support a huge user's population and a network spanning over a large geographical area. In such systems, the signalling traffic and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.