دانلود و نمایش مقالات مرتبط با Mobile phones::صفحه 1
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - Mobile phones

تعداد مقالات یافته شده: 28
ردیف عنوان نوع
1 A 2020 perspective on “How to derive causal insights for digital commerce in China? A research commentary on computational social science methods”
دیدگاه 2020 با عنوان "چگونه می توان بینش علّی در مورد تجارت دیجیتال در چین به دست آورد؟ تفسیر پژوهشی در مورد روشهای علوم اجتماعی محاسباتی "-2020
Cyber-physical data from wearable and other data-sensing devices have been rapidly changing the landscape of opportunity for the conduct of computational social science (CSS) studies. We now have the opportunity to include in our research wearable healthcare data sensors, global positioning system (GPS) data, as well as a range of other digital data via mobile phones and other kinds of easily deployed sensors. The result is a dramatic new set of measurement opportunities for management scientists, marketing research staff, and policy analysts, who can now apply a range of approaches to such data capture and analysis, including machine learning of patterns, and causal inference methods for relevant policy analytics conclusions.
Keywords: Causal inference | Computational social science (CSS) | Cyber-physical sensing | Data analytics | Machine learning | Wearable devices
مقاله انگلیسی
2 Big Data Model Simulation on a Graph Database for Surveillance in Wireless Multimedia Sensor Networks
شبیه سازی مدل داده های بزرگ بر روی یک پایگاه داده گراف برای نظارت بر شبکه های حسگر چندرسانه ای بیسیم-2018
Sensors are present in various forms all around the world such as mobile phones, surveillance cameras, smart televisions, intelligent refrigerators and blood pressure monitors. Usually, most of the sensors are a part of some other system with similar sensors that compose a network. One of such networks is composed of millions of sensors connected to the Internet which is called Internet of Things (IoT). With the advances in wireless communication technologies, multimedia sensors and their networks are expected to be major components in IoT. Many studies have already been done on wireless multimedia sensor networks in diverse domains like fire detection, city surveillance, early warning systems, etc. All those applications position sensor nodes and collect their data for a long time period with real-time data flow, which is considered as big data. Big data may be structured or unstructured and needs to be stored for further processing and analyzing. Analyzing multimedia big data is a challenging task requiring a high-level modeling to efficiently extract valuable information/knowledge from data. In this study, we propose a big database model based on graph database model for handling data generated by wireless multimedia sensor networks. We introduce a simulator to generate synthetic data and store and query big data using graph model as a big database. For this purpose, we evaluate the well-known graph-based NoSQL databases, Neo4j and OrientDB, and a relational database, MySQL. We have run a number of query experiments on our implemented simulator to show that which database system(s) for surveillance in wireless multimedia sensor networks is efficient and scalable.
Keywords: Internet of things (IoT) ، Big graph databases ، NoSQL databases ، Wireless multimedia sensor networks ، Simulator
مقاله انگلیسی
3 مروری بر پروتکل های پیام رسانی برای سیستم های اینترنت اشیاء
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 15
اینترنت اشیاء روز به روز محبوبیت بیشتری کسب می کند؛ تمامی اشیاء پیرامون ما با هم تعامل دارند. این اشیاء می توانند تلفن همراه، پنکه سقفی، زنگ در یا هر چیزی که تصور می کنید باشند. شبکه ای از همه چیز مملو از ادوات و اشیاء ناهمگون به سرعت رشد می کند. اما دغدغه ی اصلی نحوه ی ارتباط آنها با یکدیگر است. چه پروتکل هایی استفاده می شوند؟ همانگونه که می دانید این ادوات به لحاظ توان و پتانسیل پردازش و برقراری ارتباط، بسیار محدود هستند، و نمی توانیم پروتکل های ارتباطی استاندارد را که در اینترنت استفاده می شوند به کار ببریم. ما به مجموعه ی متفاوتی از پروتکل هایی نیاز داریم که بتوانند با تمرکز بر کاهش مصرف برق و داشتن ظرفیت باربری اندک با سناریوی اینترنت اشیاء همخوانی داشته باشند. از آنجاکه سیستم های مختلف اینترنت اشیاء ماهیتی متفاوت و الزامات مختلف پیام رسانی دارند، انتخاب پروتکل پیام رسانی مناسب، بسیار دشوار است. یک سری پروتکل اینترنت اشیاء پدید آمده اند و هر کدام مزایا و معایب خاص خود را دارند، اما صنعت اینترنت اشیاء با مسأله ی پیچیده ی انتخاب مواجه است، زیرا این پروتکل ها برای تمامی سناریوها مناسب نیستند. ما در این مقاله پروتکل های مختلف پیام رسانی را بررسی می کنیم، به نحوی که بتوانیم پروتکل مناسب را براساس نیازهای کاربردی انتخاب کنیم.
کلیدواژه ها: اینترنت اشیاء | MQTT | CoAP | XMPP | DDS | AMQP
مقاله ترجمه شده
4 Is mobile payment still relevant in the fintech era?
آیا پرداخت سیار هنوزهم در عصر فناوری مناسب است؟-2018
Mobile phones have provided such an enormous opportunity for financial development, and are anticipated to become a common tool for carrying out various financial transactions. Hundreds of mobile payment services have been introduced across the globe. Strikingly, many of these efforts have failed. This study analyzes whether mobile payment is still relevant in the fintech era. I compare three mobile payment projects – Oi Paggo in Brazil, TCASH in Indonesia, and M-PESA in Kenya – as case studies. I argue that mobile payment systems currently operate in such complex and multidimensional networks with shared common infrastructures and compete for producing and providing value to the customers on the basis of these infrastructures. Three attributes of industry and network structure are immediately of interest: (1) cutting the vertical supply chain more finely may encourage large players to extend their domination, (2) the basic platform continues to be governed by multinational operators (MNOs) – telecom firms, and (3) openness may be decreasing or increasing even as the number of independent parties in the supply chain drops.
keywords: Case study methods |Developing countries |Financial transactions |Financial services |Fintech |Innovation |Mobile payment |Modularity |Networks |Payment networks |Platforms |Technology ecosystems
مقاله انگلیسی
5 طراحی شکل موج برای شبکه های 5G: تحلیل و مقایسه
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 20
نسل بعدی شبکه های سلولی، شامل فراهم آوردن گستره ی وسیعی از سرویس ها برای انواع مختلف ترمینال ها، از سرویس های صوت و داده در تلفن های همراه گرفته تا انتقال بسته های کوچک در ترمینال-های عظیم نوع ماشینی است. اگرچه امروزه شکل موج های مبتنی بر زیرحامل متعامد در بسیاری از سیستم های عملی مورد استفاده قرار می گیرند، اما آنها به سختی می توانند الزامات شبکه های 5G در حال ظهور را برآورده سازند. بنابراین، شکل موج های انعطاف پذیرتر برای پرداختن به این چالش های بی سابقه پیشنهاد شده اند. در این مقاله، ما تحلیلی جامع و مقایسه ای برای شکل موج های متداول ارائه خواهیم داد. برای ارائه ی تحلیلی دقیق، نه تنها اصول اساسی شکل موج ها را بیان می کنیم بلکه مشخصه های اساسی را نیز آشکار خواهیم ساخت. افزون بر این، مقایسه ی جامعی به لحاظ معیارهای عملیاتی مختلف نیز ارائه خواهد شد، که درکی کلی از شکل موج های جدید فراهم خواهد آورد.
کلیدواژه ها: 5G | شکل موج | تحلیل | مقایسه
مقاله ترجمه شده
6 Corruption in Africa: What role does ICT diffusion play
فساد در افریقا : چه نقشی انتشار فناوری اطلاعات و ارتباطات را بازی میکند-2017
This paper assesses the determinants of corruption in Africa and focuses on the effect of ICT diffusion on corruption. Using a sample of 47 African countries over the period from 1996 to 2014, empirical findings provide evidence of high corruption inertia in Africa and show that the rule of law is the strongest factor determining the level of corruption. Results reveal that African economies can benefit from the anti-corruption effects of ICT adoption only once a threshold of rule of law is reached. Thus, policies based on the use of the internet and mobile phones are effective in combating corruption in Africa but need to be strengthened by greater law enforcement.
Keywords: Corruption | Bribery | ICT diffusion | Rule of law | African countries
مقاله انگلیسی
7 Complementarity and substitution between physical and virtual travel for instrumental information sharing in remote rural regions: A social network approach
همکاری و جایگزینی بین سفر فیزیکی و مجازی برای به اشتراک گذاری اطلاعات سازنده در مناطق روستایی دورافتاده: یک رویکرد شبکه اجتماعی-2017
International development practitioners are highly optimistic that mobile phones can improve the lives of the inhabitants of remote rural areas in developing countries with an underdeveloped transportation infrastructure. However, the instrumental role of telecommunication is unclear in contexts where residents’ information-sharing networks are strongly geographically constrained by their limited mobility. Empirical research on the interactions between telecommunication and travel in rural areas of developing coun tries is lacking. This study analyses physical and virtual contact patterns within 1270 instrumental information-sharing relationships reported by the inhabitants of the Pulau Panggung and Sumber Rejo rural subdistricts of Indonesia. In 2013, we implemented an exogenous mobil ity intervention. In 2014, we administered a network survey in 16 randomly selected farm ing groups to map local residents’ egocentric and sociocentric physical and virtual travel networks. By comparing the observed networks with simulated random networks, analysing the relationship characteristics and their history, and performing a regression analysis with fixed effects, we examine the complementarity and substitution between telecommunica tion and travel in the creation and maintenance of social networks. By examining the effects of the exogenous intervention, we can explain the mechanisms underlying the uncovered associations. The results suggest path dependency between physical and virtual travel in remote rural areas. The implication for transportation policy is that physical mobility is a precondition for the creation of virtual information-sharing links. Instrumental communication relation ships that do not socially require regular physical co-presence can be partially substituted by virtual travel only after virtual links have been created through physical mobility. Therefore, in contrast with general expectations, mobile telephony in remote rural regions is more practical if the transportation infrastructure is adequately developed. The paper concludes with a discussion of the potential contribution of the sociocentric network perspective to transportation research.
Keywords: Physical travel | Virtual travel | Social networks | Developing countries | Rural regions
مقاله انگلیسی
8 Pervasive social networking forensics_ Intelligence and evidence from mobile device extracts
اطلاعات جغرافیایی پزشکی قانونی شبکه های اجتماعی فراگیر : اطلاعات و شواهد از عصاره دستگاه های سیار-2017
In pervasive social networking forensics, mobile devices (e.g. mobile phones) are a typical source of evidence. For example, figures from an Australian law enforcement agency show the number of mobile phones submitted for analysis increasing at an average of 60% per annum since 2006, and data from FBI regional computer forensics laboratory showing an increase of 67% per annum for mobile phone examinations. When coupled with the growth in capacity of memory card and device storage, which doubles approximately every 15 months, there is an ongoing and increasing growth in the volume of data available for evidence and intelligence analysis. There is a potential for information relevant to a range of crimes within the extracted data, such as terrorism and organised crime investigations, with potential cross-device and cross-case linkages. In this paper, we propose the Digital Forensic Intelligence Analysis Cycle (DFIAC). Using mobile device extracts from an Australian law enforcement agency, we demonstrate the utility of DFIAC in locating information across an increasing volume of forensically extracted data from mobile devices, and a greater understanding of the developing trends in relation to mobile device forensic analysis.
Keywords: Digital forensic intelligence analysis cycle | Forensic intelligence analysis | Mobile device forensic extracts | Pervasive social networking forensics Social communication forensics | Social networking app forensics | Big forensic data
مقاله انگلیسی
9 Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud
رمزنگاری متقارن قابل جستجو قابل استفاده برای ذخیره داده های چندرسانه ای اجتماعی پویا در ابر-2017
Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no longer searchable. Dynamic Searchable Symmetric Encryption (DSSE) is an advanced cryptographic primitive addressing the above issue, which maintains efficient keyword search over dynamic encrypted data without disclosing much information to the storage provider. Existing DSSE schemes implicitly assume that original user data is centralized, so that a searchable index can be built at once. Nevertheless, especially in pervasive social networking applications, user-side data centralization is not reasonable. E.g., social chatting records are often separately distributed over multiple devices such as mobile phones, laptops, tablet computers, etc. In this paper, we propose the notion of Multi-Data-Source DSSE (MDS-DSSE), which allows each data source to build a local index individually and enables the storage provider to merge all local indexes into a global index afterwards. We propose a novel MDS-DSSE scheme, in which an adversary only learns the number of data sources, the number of entire data files, the access pattern and the search pattern, but not any other distribution information such as how data files or search results are distributed over data sources. We offer rigorous security proof of our scheme, and report experimental results to demonstrate the efficiency of our scheme.
Keywords: Searchable encryption | Multiple data sources | Data outsourcing | Social networks | Cloud computing
مقاله انگلیسی
10 Modeling and Validation of SMS Worm Propagation over Social Networks
مدل سازی و اعتبار انتشار کرم sms در شبکه های اجتماعی-2017
Smartphones are getting more and more popular. SMS worms propagate themselves by sending messages, which can quickly infect millions of mobile phones and do great damage to users. Thus it is urgent to analyze and predict the propagation of SMS worms to lessen their potential threat. However, most existing models generate the similar smooth exponential curves which cannot accurately characterize the propagation of real world SMS worms. In this paper, we propose a novel model, SAIDR, based on the social network. In order to more accurately portray the real behaviors of mobile users, SAIDR first introduces two new states, the affected state and the dormant state. Furthermore, SAIDR takes three critical factors into account: the behaviors of users’ checking newly arrived messages, the asymmetrical trust relationships between mobile users and the security consciousness of users. Moreover, comprehensive experiments have been done to evaluate the SAIDR model. Compared with the real world worm and the existing models, our model is more reasonable and thus can describe and predict the propagation dynamic of SMS worms better.
Keywords: SMS worm | propagation model | social network |active rate | trust degree
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi