The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to create “less cash society”, since 2014 Bank Indonesia has launched Non-Cash National Movement (Gerakan Nasional Non-Tunai) to increase people's awareness in using non-cash payment instruments. Currently, only around one-third Indonesian own bank account which was relatively low compared to cellular phone penetration that reached 123.1% in 2014. Based on this fact, Telkomsel launched its...
Recently many topic models such as Latent Dirich-let Allocation (LDA) have made important progress towards generating high-level knowledge from a large corpus. They assume that a text consists of a mixture of topics, which is usually the case for regular articles but may not hold for a short text that usually contains only one topic. In practice, a corpus may include both short texts and long texts,...
The lack of professionals is considered a major risk to the Industrial Pole installed in Manaus, Brazil. Specially, STEM education is intricately difficult and if the student is not well involved, supported and motivated, the chances of success are very low, which can be verified by the 25% to 30% dropout rate per semester in our institution. Given this scenario, a qualification program denominated...
Customer churn management becomes increasingly critical for telecommunication companies in the competitive mobile market. For retaining customers before they switch to competitors, an accurate customer churn analysis model is important to predict the potential lost customers in two or three months. Two month window is practical for telecommunication companies to design strategies to retain potential...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
Field of software development is a very important part of ICT. Large number of new software is developing every day and also a lot of SW development companies exist. SW development could be done in several ways based on standardized methodologies and mobile applications are not exceptions. Selection of the right methodology is a key part which could affect time and quality of development. This paper...
Influence on health behavior from peers is wellknown and it has been shown that participants in an onlinephysical activity promotion program are generally more successfulwhen they share their achievements through an onlinecommunity. However, more detailed insights are needed intothe mechanisms that explain the influence of a community onphysical activity level (PAL). This paper discusses a detailed...
In the field of culture performance, there are communication difficulties between the two sides of industrial chain. On one hand, the audience is difficult to get in line with their ticket price expectations and interests, moreover, the market lacks of a platform for ticket business aggregation. On the other hand, performance producers are difficult to obtain audience's demand. Performances were produced...
Push notification is a mechanism that allows individuals to receive updated information quickly. Push notification delivery needs to be effectived and has to be paid attention to time zone differences between countries in order to generate time-appropriate notifications. This push notification system was developed using distributed event-based system approach. The research methodology consists of...
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems...
A wide image mosaic and measure algorithm ofmobile mapping system (MMS) has been proposed in this paper. Through constructing the cylinderical panorama projectionrelationship of triple original digital measurable images (DMIs), the wide image has been mosaiced directly. The correspondingrelationship between wide image and object space coordinate hasbeen constructed by utilizing back projection relationshipbetween...
Recent research has reported numerous studies bringing into question the gender inclusiveness of many kinds of software. Inclusiveness of software (gender or otherwise) matters because supporting diversity matters — it is well-known that the more diverse a group of problem-solvers, the higher the quality of the solution. To help software creators identify features within their software that are not...
Tactical Networks is typical Ad Hoc Network. Its structure leads to relative fixation for hierarchy and clustering. In order to maintain the cluster stabilization and network function in particular cases, Group leader election can be reached by address list message and connectedness message.
Along with the wide spread of mobile devices to access the Internet from anywhere at any time, the smartphone application market has been growing with amazing speed. The study of usages of smartphone applications by individual users, however, has been rather limited in the literature, relying upon real data collected from either a limited number of volunteers or the network level information at the...
Evolutionary Algorithms (EAs), or Evolutionary Computation, are powerful algorithms that have been used in a range of challenging real-world problems. In this paper, we are interested in their applicability on a dynamic and complex problem borrowed from Demand-Side Management (DSM) systems, which is a highly popular research area within smart grids. DSM systems aim to help both end-use consumer and...
People are used to getting served by using mobileapplications. Applications for taxi calling such as Uber andDidi are in a dominant position. Along with employing thesesoftwares, personal information may leak while being transferredor preserved on the internet. Consider that a user's information preserved on the internet is obtained by an malicious adversary then he may further speculate user's privacy...
Information technology is evolving constantly while trade competition is increasing. Strategic managers are looking for improved methods to make sure their organization improves their business process in order to hold on to competitive advantage. In several cases, change management affects the profit of the organization positively and one of the ways of achieving this change is Business Process Management...
We use mobile phone records for the analysis of mobility patterns and the detection of possible risk zones of Chagas disease in two Latin American countries. We show that geolocalized call records are rich in social and individual information, which can be used to infer whether an individual has lived in an endemic area. We present two case studies, in Argentina and in Mexico, using data provided...
Adopting UX integrally as part of the product development lifecycle is supported by Malaysian local government agency to ensure the local software and mobile companies deliver satisfactory products and services to the end users. This will help to increase sales and promote local branding to the global marketplace in the long run. We were commissioned to advocate a series of UX practices such as UX...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.