دانلود و نمایش مقالات مرتبط با mobile applications::صفحه 2
دانلود بهترین مقالات isi همراه با ترجمه فارسی

با سلام خدمت کاربران عزیز، به اطلاع می رساند ترجمه مقالاتی که سال انتشار آن ها زیر 2008 می باشد رایگان بوده و میتوانید با وارد شدن در صفحه جزییات مقاله به رایگان ترجمه را دانلود نمایید.

نتیجه جستجو - mobile applications

تعداد مقالات یافته شده: 23
ردیف عنوان نوع
11 آنتن های جدید پهن باند برای مخابرات سیار آینده
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 33
آنتن های فشرده، مسطح ، متقاطر و پهن باند سرآتش (انتهاآتش) مبتنی بر شکل جدید آسیاب بادی در این مقاله برای مخابرات سیار آینده، ارائه شده است. ساختار نامتقارن آنتن های پیشنهادی موجب تشعشع این آنتن ها در جهت تراز آنتن می شود در حالی که ساختار متقاطر، رفتار پهن باند را فراهم می آورد. در مرحله اول، یک آنتن UWB با استفاده از زیرلایه FR4 با اندازه 34 میلیمتر در 30 میلیمتر برای محدوده فرکانسی از 4 گیگاهرتز تا 10 گیگاهرتز و پیک بهره 5 dBi طراحی می شود. این آنتن سپس به آنتن دوم تبدیل شده و باند فرکانسی اش به بیشتر از 10 گیگاهرتز یعنی تا 150 گیگاهرتز تغییر می یابد. برای بهبود عملکرد آنتن دوم ، زیرلایه کم اتلاف از جنس راجرز RO4232 استفاده می شود. آنتن نهایی بهینه شده به حداقل پهنای باند کسری یعنی 175٪ در محدوده فرکانسی از 10 گیگاهرتز تا 150 گیگاهرتز دست می یابد و دارای پیک بهره 8.7dBi است در حالی که میانگین بهره کل برابر با 6.4dBi در تمام محدوده فرکانسی را حفظ می کند. طراحی و همچنین عملکرد تجزیه و تحلیل این آنتن نیز برای کاربردهای لینک ماهواره ای LEO به LEO با تجزیه و تحلیل توان اش، بررسی می شود.
کلمات کلیدی: شکل آسیاب بادی | تکنولوژی 5G | پیوندهای میانجی | LEO به LEO درون مداری | آنتن UWB | آنتن متقاطر سر آتش
مقاله ترجمه شده
12 A Survey on HTTPS Implementation by Android Apps: Issues and Countermeasures
یک بررسی در پیاده سازی HTTPS توسط برنامه های Android: مسائل و اقدامات مقابله با آن-2017
Received 5 July 2016; revised 5 October 2016; accepted 31 October 2016 Available online 11 November 2016 University of Cincinnati, United States KEYWORDS :HTTPS;Android;Mobile security;TLS/SSL;Mobile development Abstract As more and more sensitive data is transferred from mobile applications across unsecured channels, it seems imperative that transport layer encryption should be used in any nontrivial instance. Yet, research indicates that many Android developers do not use HTTPS or violate rules which protect user data from man-in-the-middle attacks. This paper seeks to find a root cause of the disparities between theoretical HTTPS usage and in-the-wild implementation of the protocol by looking into Android applications, online resources, and papers published by HTTPS and Android security researchers. From these resources, we extract a set of barrier categories that exist in the path of proper TLS use. These barriers not only include improper developer practices, but also server misconfiguration, lacking documentation, flaws in libraries, the fundamentally complexTLS PKI system, and a lack of consumer understanding of the importance of HTTPS. Following this discussion, we compile a set of potential solutions and patches to better secure Android HTTPS and the TLS/SSL protocol in general. We conclude our survey with gaps in current understanding of the environment and suggestions for further research. 2016 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CCBY-NC-NDlicense (http://creativecommons.org/licenses/by-nc-nd/4.0/).
KEYWORDS: HTTPS | Android | Mobile security | TLS/SSL | Mobile development
مقاله انگلیسی
13 Signalling over-privileged mobile applications using passive security indicators
سیگنالینگ برنامه های خاص تلفن همراه با استفاده از شاخص های امنیتی منفعل-2017
Article history:Available online 16 December 2016Keywords:Over-privilege Mobile applications Application store Usable security PrivacyAndroidAs mobile devices have evolved from simple phones to rich computing systems, the data stored on these multi-taskers have consequently become more sensitive and private. Due to this, modern mobile oper- ating systems include sophisticated permission systems for restricting the access to this device for the mobile applications. However, many applications acquire more permissions than required. These over- privileged applications can affect data security and user privacy. All application permissions are indicated to the user, but these notifications have been shown to be ignored or not understood. Thus, other mech- anisms need to be improved.This paper presents design approaches to communicate the degree of over-privilege in mobile applica- tions. It uses an additional rating system in application stores to inform users before making the decision of installing a specific application. The approaches have been evaluated in a usability study based on distinct prototype Android application stores. The findings show that passive security indicators can be applied to influence the decision-making process of users before downloading and installing an applica- tion.© 2016 Elsevier Ltd. All rights reserved.1.
Keywords: Over-privilege | Mobile applications | Application store | Usable security | Privacy Android
مقاله انگلیسی
14 A cross-domain framework for designing healthcare mobile applications mining social networks to generate recommendations of training and nutrition planning
یک چارچوب متقابل دامنه برای طراحی برنامه های کاربردی سیار بهداشت و درمان برای ایجاد برنامه های آموزشی و برنامه ریزی تغذیه-2017
Nowadays, people are practicing physical exercise in order to maintain good health conditions. Such physical workouts are required by a plan, which should be designed and supervised by sport specialists and medical assistants. Thus, the exercise sessions shall start with consultation of a coach, doctor and dietician; however, many times this scenario is not presented. In typical activities such as running, cycling and fitness, people use health mobile apps with their smartphones, which offer support for these activities. Nevertheless, the functionality and operation of these applications are isolated, because many and long questionnaires are performed. Additionally, the physical and health state of a user is not considered. These issues would be taken into account for determining recommendations about the time for doing exercise and the kind of activity for each person. In this work, a social semantic mobile framework to generate recommendations where a mobile applica tion allows sensing the physical performance, taking into consideration medical criteria with smartphones is proposed. The approach includes a semantic cross-information that comes from social network and official data as well as sport activities and medical knowl edge. This knowledge is translated into application ontologies related directly to health, nutrition and training domains. The methodology also covers physical fitness tests and a monitoring tool for evaluating the nutrition plan and the correct execution of the training. As case study, the mobile application offers to evaluate the physical and health conditions of a runner, automatically generate a nutrition plan and training, monitor plans and recom puted them if users make changes in their routines. The data provided from the social net work are used as feedback in the application, in order to make the training and nutrition plans more flexible by applying spatio-temporal analysis based on machine learning. Finally, the generated training and nutrition plans were validated by specialists, they have demonstrated 82% of effectiveness rate in exercise training routines and 86% in nutrition plans. In addition, the results were compared with isolated approaches and manual recom mendations made by specialists, the obtained overall performance was 81%.
مقاله انگلیسی
15 Breaking into the vault: privacy, security and forensic analysis of android vault applications
شکستن به درون طاق : حریم خصوصی ،امنیت و تحلیل و بررسی قانونی برنامه کاربردی طاق اندروید-2017
In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts they produce. Our results showed that 12 18 obfuscated their code and 5 18 applications used native libraries hindering the reverse engineering process of these applications. However, we still recovered data from the applications without root access to the Android device as we were able to ascertain hidden data on the device without rooting for 10 18 of the applications. 6 18 of the vault applications were found to not encrypt photos they stored, and 8 18 were found to not encrypt videos. 7 18 of the applications were found to store passwords in cleartext. We were able to also implement a swap attack on 5 18 applications where we achieved unauthorized access to the data by swapping the files that contained the password with a self-created one. In some cases, our findings illustrate unfavorable security implementations of privacy enhancing applications, but also showcase practical mechanisms for investigators to gain access to data of evidentiary value. In essence, we broke into the vaults.
Keywords: Forensics | Mobile applications | Privacy | Security | Vault Applications | Android
مقاله انگلیسی
16 Exploiting Mobile Big Data: Sources, Features, and Applications
بهره برداری از داده های بزرگ سیار: منابع، ویژگی ها و برنامه های کاربردی-2017
The worldwide rollout of 4G LTE mobile com munication networks has accelerated the prolif eration of the mobile Internet and spurred a new wave of mobile applications on smartphones. This new wave has provided mobile operators an enormous opportunity to collect a huge amount of data to monitor the technical and transaction al aspects of their networks. Recent research on mobile big data mining have shown its great potential for diverse purposes ranging from improving traffic management, enabling personal and contextual services, to monitoring city dynam ics and so on. The mobile big data research has a multi-disciplinary nature that demands distinct knowledge from mobile communications, signal processing, and data mining. The research field of mobile big data has emerged quickly in recent years, but is somewhat fragmented. This article aims to provide an integrated picture of this emerging field to bridge multiple disciplines and hopefully to inspire future research.
مقاله انگلیسی
17 Using extended web technologies to develop Bluetooth multi-platform mobile applications for interact with smart things
استفاده از فن آوری های وب گسترده برای توسعه بلوتوث چند پلت فرم برنامه های کاربردی تلفن همراه برای ارتباط برقرار کردن با چیزهای هوشمند-2015
Nowadays the classic web paradigms are being subjected to changes; every day millions of users around the world use their Smartphones to access web applications from anywhere. The World Wide Web it is one of the biggest repositories of information in the world, and that information is stored in internet servers and repositories, but today in the real world there are many other information sources such as electronic devices with communication capabilities: smart appliances and sensor networks. The Smartphones are equipped with communication hardware elements like the Bluetooth module, which allows the Smartphone to exchange information with nearby electronic devices. Every day more and more mobile applications are being developed for native platforms that use Bluetooth’s communication module to send and receive information from different sources. Native mobile applications use the specific platform’s APIs to manage the Bluetooth communication actions (send and receive information, search for devices, etc.), however, web applications do not have technical capabilities to manage the Smartphone’s Bluetooth communication module and thereof cannot use that kind of information. The main objective of this research work is to design a novel framework that allows classic web applications to use information from nearby electronic devices. The proposed framework must be easy to use and able to be integrated with common web technologies. Developers can use this framework to include new information sources and data exchange procedures in an easy way. The new type of information can be merged with the web to develop or improve algorithms and web applications.
Keywords: Mobile Web Applications | Web information fusion | Context-aware communication | Bluetooth | Web browser | Internet of things
مقاله انگلیسی
18 Global perspectives on accounting information systems: mobile and cloud approach
دیدگاه های جهانی در سیستم های اطلاعاتی حسابداری: رویکرد تلفن همراه و ابر-2015
Cloud computing and mobile applications today are no longer buzzwords, but important resources in the business strategies of companies. More and more SMEs have adopted and currently are using cloud computing and mobile technologies. Big companies developed their own big data centers, private cloud or hybrid cloud as a support for their processes within the shared services architecture. Since Accounting Information Systems (AIS) process and store a series of sensitive and confidential data (general ledger, payroll database, and financial database), cloud and mobile technology adoption requires a rigorous analysis of data and application security. In this paper, based on a quantitative research of existing literature and specialized practice,we wish tosynthesize the potential of cloud and mobile technologies in the AIS. We also provided a SWOT analysis of these technologies in the context of AIS. Keywords: Accounting Information Systems; Mobile Accounting; Cloud Computing.
مقاله انگلیسی
19 دیدگاه های جهانی درباره سیستم های اطلاعات حسابداری: رویکرد سیار و ابری
سال انتشار: 2015 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 12
امروزه کاربردهای محاسبات ابری و تلفن همراه زمان زیادی نیست که باب شده است، ولی منابع اصلی در استراتژی های تجاری شرکت ها و موسسات محسوب می شوند. SMEs بطور فوق العاده ای مورد پذیرش قرار گرفته و در حال حاضر فناوری های محاسبات ابری و موبایل مورد استفاده قرار می گیرند. شرکت های بزرگ با توسعه مراکز بزرگ داده های خود، از سیستم های ابری خصوصی یا هیبرید بعنوان پشتیبان برای پروسه های خود در داخل ساختار خدمات استفاده می کنند. از زمانیکه سیستم های اطلاعات حسابداری (AIS ) مجموعه ای از داده های مهم و محرمانه (دفتر کل عمومی، پایگاه حقوق بگیران، و پایگاه مالی) را پردازش و ذخیره می کند، اتخاذ فناوری سیستم ابری و تلفن همراه نیازمند آنالیز دقیق داده ها و امنیت استعمال آنهاست. براساس تحقیق و بررسی کمی مطبوعات موجود و شیوه اختصاصی، هدف از مقاله حاضر، ترکیب پتانسیل فناوری های سیستم ابری و موبایل در AIS است. همچنین تجزیه و تحلیل این تکنولوژی ها در مضمون AIS ارائه می شود. کلمات کلیدی: سیستم های اطلاعات حسابداری، موبایل حسابداری، محاسبات ابری
مقاله ترجمه شده
20 Network-centric performance analysis of runtime application migration in mobile cloud computing
تجزیه و تحلیل کارایی شبکه-محور در مهاجرت برنامه در زمان اجرا در محاسبات ابری موبایل-2015
Mobile cloud computing alleviates the limitations of resource-constrained mobile devices by leveraging the cloud resources. Currently, software-level solutions, also known as computational offloading, migrate the cloud-based mobile applications at runtime to the cloud datacenter to optimize the application execution time. However, the application execution frameworks mainly focus on migrating the application without considering the various critical network-centric parameters, such as traffic load and mobility speed, in application migration decision. In this paper, we analyze the effect of network-centric parameters on the application migration process. The performance of the migration process is analyzed by simulating the migration process in OMNeT++. The effects of various parameters, such as number of users in a WLAN, size of a file containing the application and its running states, traffic load on the wireless access point, message length, number of hops to the cloud, and mobility speed, are studied on the application performance metrics such as application migration time and packet drop ratio. Our analysis shows that the application and its running states migration time is affected by the changes in the network conditions. Based on our research findings, we recommend application execution framework designers to incorporate the network-centric parameters along with other parameters in the decision process of the application migration. Keywords: Mobile cloud computing Application offloading/migration Seamless application execution Performance analysis Cloud-based mobile application
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi