The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an App Quick Sieve/Verify Scheme (AQSVS) to improve the App safety/quality verification issue in the third-party or enterprise app market place. The concerns related to app store safety are of paramount interest as and an increasing number of malware and defective apps caused by Android fragmentation. The AQSVS based on the use of App package information and TF/IDF inverted...
The mobile experimental complex was created by the authors for research of the electromagnetic (EM) fields generated by the electrical equipment and the elements of electric power systems in a wide frequency range. The description of the architecture and composition of the equipment is given, and its functionalities are considered. The complex is used to monitor the EM environment of objects for the...
Hotel photo gallery provides an opportunity for travelers to see interior room and facilities provided in the hotel. However, photo quality uploaded by hotel guests may not meet the professional photo quality, which in turn could impact user experience of potential travelers. Thus, this study investigates how Malaysian travelers perceive the importance of photo gallery and their emotional responses...
Wirid is a recitation or practice that has been taken from certain verses in Al-Quran and it was arranged to the readers, especially Muslims, read and understand easily. Wirid is a good practice for Muslims as it can bring them closer to their Creator that is Allah SWT and in forming them to become good leaders or caliphs in the future. Therefore, the main intention of this project is to investigate...
A novel, tablet-based application (app) has been developed to act as a screening tool for visual impairment in stroke survivors; The Stroke Vision app. The app includes assessments for visual acuity, visual fields and visuospatial neglect, as well as novel tools for the education of patients, carers and staff. The app has been devised by experts in the field to address two important deficiencies;...
The intelligent device and mobile applications has been the growth rapidly. The mobile device and related applications has widely used increasingly. The security and compatibility concern for mobile application is mounting as well. This paper analyzed attributes of security and compatibility corresponding to mobile software testing. The software quality features for security and compatibility is given...
The use of mobile applications for business tasks calls for effective quality assurance during development to prevent potential failures of the mobile application and the consequential costs depending on the business process. Failures of mobile applications are different from failures of desktop applications (e.g., Due to context dependencies) and no sufficient knowledge exists regarding typical failure...
After several decades of circuit switched technology, mobile telephony is moving towards all-IP network architecture. The convergence to IP, on a one hand, brings many advantages, but makes mobile networks easier to be attacked. In this paper, a security framework is discussed addressing two security challenges: DIAMETER-related threats and subscriber malicious activities. The former is taken into...
With the advancement in technology and availability of internet access and smart mobile systems, there has been an increasing interest in eHealth related research activities due to the attractive and important benefits that eHealth systems can offer to many. However, the security of the eHealth systems has been a great concern. In this paper, we discuss the pilot design experience and results of a...
This paper discusses the testing of TumpAAC, an AAC word suggestion tool for mobile devices, targeted primarily at Filipino patients. The main objectives of the test is to gauge the application's usability and potential as an AAC tool. The testing procedure is outlined, and results are discussed in full. Ten speech pathologists were tapped for testing, as they are the domain experts when it comes...
The purpose of this recommended practice is to provide an ad hoc test method to estimate the electromagnetic immunity of medical devices and help identify interference issues that might exist with critical medical devices as a result of emissions from RF transmitters increasingly used in health-care facilities, particularly by doctors, staff, patients, and visitors. RF transmitters include two-way...
Real-time tele-monitoring technology is very useful for remotely monitoring patients' vital parameters and for ensuring mobility of both patient and doctor. In this paper a multi-purpose and multi-parametric tele-monitoring system is described. This system is based on the offline automatic extraction of knowledge from databases expressed as a set of IF…THEN rules that are used by a rule-based mobile...
M-Commerce is expected to play an even larger role, with over half a billion customers following the trend to shop via mobile devices by 2016. According to the Malaysian Ministry of Tourism and Culture, tourism has been identified as one of the twelve National Key Economic Area to drive the country's growth. This gave rise to this research objective which is to determine the attention ranking of Malaysians...
The energy consumption in form of electricity in households is highly dependent on the behavior of the inhabitants. Timely feedback on the user's household energy consumption and energy saving advisory is the key to energy saving. In this paper, the concept of a mobile application which displays real-time energy consumption information in a household is presented. The goal is to increase energy awareness...
A base station is a very complex equipment, containing several hardware and software parts that can be built by different providers, e.g. software code for service protocol layers, operating systems, network processors, digital signal processors, hardware accelerators, memory parts etc. The challenge is to have each party being able to test its own solution, without interaction from other sources...
Mobile devices such as smartphones and tablets are widely used for personal and business uses. Compared to personal mobile subscribers, enterprises have more concerns about mobile device security. The challenges an enterprise may face include unlimited access to corporate resources, lack of encryption on corporate data, unwillingness to backup data, etc. Many of these issues have been resolved by...
In contemporary world, people become dependent on electronic devices. Technologies help to clarification and structure life in many ways to meet the need of the children oriented requirements. The children suffering from disabilities (e.g. autism) have desperate needs for elucidation and structure their life. MumIES is research based system to facilitate, support and manage their living. This paper...
The adoption of mobile technology in crime prevention has substantially grown across the world. However, this is not the case in Kenya, because the public still have to go from one police station to another to report crimes and to receive general services from the police. The crime records are usually recorded manually in police Occurrence Book (OB) and therefore determining the accurate crime trends...
Increasingly, attention is being paid to security vulnerabilities of mobile apps, and with good reason. Such vulnerabilities, if exploited, could be used to wreak havoc on users by stealing their information or controlling their mobile device. Given the billions of mobile apps in use today, security breaches threaten to occur on a very large scale. Fortunately, efforts have been made to address these...
• This research was done as part of Tejas Vithani's Master's dissertation at BITS Pilani, Dubai Campus • This research was inspired by a project sponsored by Igenus, Chicago, IL. • Deep gratitude to Mr Ariful Huq, Juniper for kindly presenting our work given our inability to personally present at the conference.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.