The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many learning analytics techniques to capture the learner's real-time responses are computationally intensive for running on mobile devices. In this paper, we propose a personalized learning platform named the PETAL facilitated by an efficient learning analytics application to detect learners' level of attentiveness and the proximity of their eyes to mobile devices and then alert learners to be more...
As a result of the war situation in Syria, several private universities had to completely close their campuses and move into safer places inside the capital city Damascus. This huge step made it possible to keep the educational process going on at these universities. However, in the new places even small tasks like commuting and distributing the course materials were still challenging. To address...
For admissions in various graduate schools and colleges. There are some mobile applications available for GRE preparation. Those applications consists of only words with their corresponding synonym which are not very effective as they to lack to provide tricks for easy remembrance of the GRE words and there is no specialized categorization of the words and they neither provide any interesting verbal...
One of the main constraints on mobile devices is the battery lifetime. In recent years the problem has been detected as an energy gap between mobile applications and battery of mobile devices. There have been several studies to detect which are the main causes of energy consumption while mobile applications are running. Furthermore, several strategies are designed to reduce energy consumption. Also...
Initially, MetaXA (Metadata-processing XMPP-based Architecture) was targeted towards notification distribution and device theft detection. However, since MetaXA is extensible, it can be adapted to many other usage scenarios in the mobile computing domain. For example, in this paper, we demonstrate how to use MetaXA for mobile application management (MAM), without exhausting the battery power of mobile...
The usage of mobile devices and increasinglyrealistic graphics is emerging, but the graphics performance is still a critical factor in games. There's more hardware restriction on mobile devices than on a computer. Thus, this paper proposes an experimental approximation of the asymptotic computational complexity of miscellaneous vertex and fragment shaders for Android and iOS platforms. The asymptotic...
Mobile video streaming has gained growing popularity with the rapid adoption of mobile devices (e.g., smart-phones, tablets, pads). In the market of mobile devices, a large portion were installed with Google's Android as the default operating system. A clear understanding of the Android media framework is of great importance for the performance optimization of mobile video streaming. In this paper,...
Mobile computing devices such as smartphones and tablets have become tightly integrated with many people's life, both at work and at home. Users spend large amounts of time interacting with their mobile device and demand an excellent user experience in terms of responsiveness, whilst simultaneously expecting a long battery life between charging cycles. Frequency governors, responsible for increasing...
Nowadays smartphone is widely used in every part of the world. Trend that is happening now is mobile phone penetration tends to decrease while the smartphone tend to increase. More and more newly launched smartphone offers support for Near Field Communication (NFC). NFC technology enables simple and safe two-way interactions between electronic devices. This research has developed a smartphone-based...
A real-time pedestrian detection system is presented that runs at 24 fps on standard VGA resolution input images (640×480px) using only CPU processing. The detection algorithm uses a variable sized sliding window and intelligent simplifications such as a sparse scale space and fast candidate selection to obtain the desired speed. Details are provided about the initial version of the system ported...
Cognitive Behavioural Therapy (CBT) is psychotherapy recommended for mental disorders such as Social Anxiety Disorder (SAD) and depression. Wide base of evidence across different studies and clinical practices shows the effectiveness and safety of CBT as compared to other types of treatment. After a face-to-face session with therapists, patients would typically carry out Homework, a central concept...
This paper introduces the application of off-the-shelf Android tablet computers as real-time capable control devices. We present an IDE to create and execute PLC programs written in Structured Text on a tablet running RTAndroid. This derivative of Android with support for real-time applications ensures the predictable execution of PLC programs. A USB-driven field device adapter enables interaction...
The focus on this paper is to build an Android platform based mobile application for the healthcare domain, which uses the idea of Internet of Things (IoT) and cloud computing. We have built an application called 'ECG Android App' which provides the end user with visualization of their Electro Cardiogram (ECG) waves and data logging functionality in the background. The logged data can be uploaded...
Nowadays, many mobile devices are equipped with built-in inertial sensors. This spurred the research on new forms of communication between man and machines based on the movements or “gestures” performed by the user when holding the device. Here we discuss a gesture recognition system for controlling mobile devices with a wide range of possible practical applications. The system was designed to run...
Bluetooth Low Energy (BLE) is a newly emerged technology targeting low-power, low-cost wireless communications within medium or short range. BLE has extended the already wide acceptance of Bluetooth and is an ideal choice for a variety of sensor-based products, as well as ubiquitous mobile devices. Recently, it has been proposed that indoor positioning can be achieved when scattering BLE sensor devices,...
C is a popular programming language because of high portability and simple syntax. As a result, it is the first course for most of university students who major in computer, electronics, and electrical engineering and so on. To obtain a good learning achievement, students usually need to put their effort and time on programming as much as possible. Therefore, a ubiquitous integrated development environment...
The number and variety of applications for mobile devices continue to grow. However, the resources on mobile devices including computation and storage do not keep pace with the growth. Incorporating the computation capacity on cloud servers into mobile computing has been desired. However, there are numbers of challenging issues to realize it. In this work, we design and implement an elastic computation...
Mobile devices take an important part in everyday life. They are now cheaper and widespread, but still a lot of time is spent by the users to configure them: users adapt to their own device, not vice versa. Can our smart phones do something smarter? In this work, we propose a framework to support the development of context aware applications for Android devices: the goal of such applications is to...
The growing spread of malware on Android OS requires new approaches for the detection and recognition of malicious applications on mobile devices. An emerging idea is characterizing malicious behaviors in terms of energy consumption, to support the definition of Energy-aware Intrusion Detection Systems that are able to recognize malicious behaviors in terms of their energy footprint. To this aim,...
Applications to support the visualization of medical images have been developed and used in practice by students and professionals, providing a tool to support teaching and handling of medical images through a computer system. Among them, we highlight E-Mages that can be used to view and evaluate images, along with their meta-data and tools, through mobile devices. This paper aims to plan and execute...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.