دانلود و نمایش مقالات مرتبط با mobile applications::صفحه 1
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - mobile applications

تعداد مقالات یافته شده: 22
ردیف عنوان نوع
1 Energy management for cost minimization in green heterogeneous networks
مدیریت انرژی برای به حداقل رساندن هزینه در شبکه های ناهمگن سبز-2020
With the fast development of cyber–physical systems, mobile applications and traffic demands have been significantly increasing in this decade. Likewise, the concerns about the electricity consumption impacts on environments and the energy costs of wireless networks have also been growing greatly. In this paper, we study the problem of energy cost minimization in a heterogeneous networks with hybrid energy supplies, where the network architecture consists of radio access part and wireless backhaul links. Owing to the diversities of mobile traffic and renewable energy, the energy cost minimization problem involves both temporal and spatial dimensional optimization. We decompose the whole problem into four subproblems and correspondingly our proposed solution consists of four parts: At first, we obtain estimated average energy consumption profiles for all base stations based on the temporal traffic statistics; Second, we formulate the green energy allocation optimization in the temporal domain to minimize energy cost for each BS. Third, given the allocated green energy and practical user distribution in each slot, we propose a centralized and a distributed user association algorithm to minimize total energy cost in the spatial dimension. Fourth, based on the actual user association scheme, we readjust the green energy allocation for each BS to further improve green energy utilization. Simulation results show that our proposed solution can significantly reduce the total energy cost, compared with the recent peer algorithms.
Keywords: Energy cost minimization | Green energy | Heterogeneous networks | Cyber–physical systems
مقاله انگلیسی
2 An overview of and factor analytic approach to flow theory in online contexts
مروری بر رویکرد تحلیلی و عاملی نظریه جریان در زمینه های آنلاین-2020
An overview of flow theory is presented from the literature across multiple disciplines, including information systems, ecommerce, marketing, digital gaming, user interface, management, and cultural contexts. Flow can play a pivotal role in the user experience and impact the user interaction with a site, computing device, or app. It is worthwhile to examine the effects of flow experience on users and incorporate these findings in designing engaging user experiences and interfaces in both web sites and mobile applications. To further understand these implications, the present study gave a questionnaire to 310 participants in a computer laboratory setting following an online shopping episode. The factor analysis revealed three dimensions of flow experience: control, attention focus, and cognitive enjoyment. All three dimensions had very low correlations. No gender effect on flow was found.
Keywords: Flow | Flow theory | User experience | Ecommerce | Cognitive enjoyment | Factor analysis
مقاله انگلیسی
3 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
4 EOG-based eye tracking protocol using baseline drift removal algorithm for long-term eye movement detection
پروتکل ردیابی چشم مبتنی بر EOG با استفاده از الگوریتم حذف پایه رانش برای تشخیص حرکت دراز مدت چشم-2019
This paper presents a new method to remove baseline drift and noise by using a differential electroocu- lography (EOG) signal based on a fixation curve (DOSbFC) and a new electrode positioning scheme based on eyeglasses for user convenience. In addition, a desktop application and mobile applications to con- trol the human–computer interface were implemented. Finally, we created experimental EOG eyeglasses and a new detection protocol using the proposed method for long-term step-by-step detection of eye movements and user comfort. The proposed DOSbFC calculates the difference values of accumulated EOG signals between the initial eye movement and fixation time. It allows long-term detection of eye move- ments with high accuracy and only requires a single calibration. The vertical and ground electrodes of the standard electrode positioning scheme caused discomfort of subjects; the proposed electrode positioning scheme solves these problems and enables the use of existing eyeglasses without design modification. The experimental results demonstrated that the average accuracy of the long-term eye movement detec- tion was 94%, whereas those of the band pass filter and wavelet transform were 61% and 64%, respec- tively. This was because baseline drift and noise were removed by averaging the signal variations. Further experimental results demonstrated that the average information transfer rate of the proposed method was 6.0, whereas those of the band pass filter and wavelet transform were 1.1 and 0.9, respectively.
Keywords: Human–computer interaction | Ubiquitous computing | Pattern recognition | Signal processing systems | Electrooculography
مقاله انگلیسی
5 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly.
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
6 Modelling continued use of information systems from a forward-looking perspective: Antecedents and consequences of hope and anticipated regret
مدلسازی استفاده مستمر از سیستمهای اطلاعاتی از یک دیدگاه گاه به جلو: سوابق و پیامدهای امید و حسرت پیش بینی شده -2018
This study focuses on two future-oriented emotions, hope and anticipated regret, to predict continued use of information systems. Empirical results based on two studies show that these emotions can exert independent and additive effects on continued use, controlling for previous use behaviour and satisfaction. Interestingly, the effect of hope on continued use is insignificant during initial use but becomes significant at the later stage. Furthermore, disconfirmation and involvement are identified as antecedents of hope and anticipated regret. These findings suggest that incorporating forward-looking variables into models of continued use is necessary and that their influence can be dynamic in nature.
keywords: Continued use| Hope| Anticipated regret| Appraisal theory| Disconfirmation| Mobile applications
مقاله انگلیسی
7 ٍٍEducational apps from the Android Google Play for Greek preschoolers: A systematic review
برنامه های کاربردی آموزشی از بازی اندروید گوگل برای پیش دبستانی های یونان: یک بررسی سیستماتیک-2018
In the seven years since the introduction of the tablet (Apple iPad) in 2010, the use of software for smart mobile devices has grown rapidly in popularity and has become a hotly debated issue in the field of education and child development. However, the rise in popularity of mobile applications (apps) mainly addressed to young children is not in line with a corresponding increase in their quality, as there is conflicting evidence about the real value and suitability of educational apps. The purpose of this study was to examine whether self-proclaimed educational apps for Greek preschoolers have been designed in accordance with developmentally appropriate standards to contribute to the social, emotional and cognitive development of children in formal and informal learning environments. The study results were discouraging. The majority of the apps aimed to teach children the basics about numbers and letters. Overall, they were drill-and-practice-style, based on a low level of thinking skills, thereby promoting rote learning, and were unable to contribute to a deeper conceptual understanding of certain concepts.
keywords: Media in education| Applications in subject areas| Elementary education| Interactive learning environments
مقاله انگلیسی
8 ارزیابی عملکرد شبکه های نوری و بی سیم برای پروژه CONDOR
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 20
شبکه های بی سیم و نوری امروزه به طور گسترده مورد استفاده قرار می گیرند. این شبکه ها با توجه به اتصال نوری خود توانایی بالایی ایجاد کرده و اجازه توسعه برنامه های کاربردی چند کاربره را می دهند. از آنجائیکه عملکرد شبکه یک مسئله مهم برای ارائه خدمات به تعداد زیادی از کاربران است در حالی که اطمینان از کیفیت خدمات کاربران مورد نیاز می¬باشد، هدف این پروژه CONDOR ارزیابی عملکرد شبکه های بی سیم و نوری از لحاظ کیفیت لینک، خروجی، حرکت نامنظم اتفاقی و تاخیر است. نتایج ما نشان می دهد که خروجی بالا در شبکه های نوری و بی سیم یک بار خروجی بزرگ از طریق برنامه های تلفن همراه را حمایت می¬کند، در حالی که اتصالات شبکه بی سیم P2P برخی از برنامه های ویدئویی را برهم می زند.
کلید واژه ها: عملکرد شبکه | برنامه های موبایل | شبکه بی سیم P2P
مقاله ترجمه شده
9 Understanding the web maturity of Polish DMOs
درک بلوغ وب DMOs لهستان-2018
In recent years, online communication has become an integral part of the functioning of different institutions and enterprises. This includes the area of tourism. Due to the immense marketing opportunities offered by in formation and communication technologies, it can be argued that destination management organizations (DMOs) around the world should rise to the challenge of climbing to the next level of ‘web maturity’. The aims of this study are focused on investigating and comparing the online marketing activities of selected Polish DMOs in the years 2012 and 2016, as well as discovering and explaining the main motivations, facilitators and barriers to conducting such activities. The study is also an attempt to identify how any barriers encountered that are en countered may be overcome, and presents some potential solutions and good practices for DMOs to learn from. The results of the study show that Facebook is still the most popular social media platform used by Polish tourist organizations. Current trends are mainly focused on mobile applications development. In turn, there is a lack of relevant skills, financial and human resources, which are the main barriers related to the increased use of web marketing.
Keywords: eTourism ، Web maturity ، Online marketing ، DMOs ، Poland
مقاله انگلیسی
10 آنتن های جدید پهن باند برای مخابرات سیار آینده
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 10 - تعداد صفحات فایل doc فارسی: 33
آنتن های فشرده، مسطح ، متقاطر و پهن باند سرآتش (انتهاآتش) مبتنی بر شکل جدید آسیاب بادی در این مقاله برای مخابرات سیار آینده، ارائه شده است. ساختار نامتقارن آنتن های پیشنهادی موجب تشعشع این آنتن ها در جهت تراز آنتن می شود در حالی که ساختار متقاطر، رفتار پهن باند را فراهم می آورد. در مرحله اول، یک آنتن UWB با استفاده از زیرلایه FR4 با اندازه 34 میلیمتر در 30 میلیمتر برای محدوده فرکانسی از 4 گیگاهرتز تا 10 گیگاهرتز و پیک بهره 5 dBi طراحی می شود. این آنتن سپس به آنتن دوم تبدیل شده و باند فرکانسی اش به بیشتر از 10 گیگاهرتز یعنی تا 150 گیگاهرتز تغییر می یابد. برای بهبود عملکرد آنتن دوم ، زیرلایه کم اتلاف از جنس راجرز RO4232 استفاده می شود. آنتن نهایی بهینه شده به حداقل پهنای باند کسری یعنی 175٪ در محدوده فرکانسی از 10 گیگاهرتز تا 150 گیگاهرتز دست می یابد و دارای پیک بهره 8.7dBi است در حالی که میانگین بهره کل برابر با 6.4dBi در تمام محدوده فرکانسی را حفظ می کند. طراحی و همچنین عملکرد تجزیه و تحلیل این آنتن نیز برای کاربردهای لینک ماهواره ای LEO به LEO با تجزیه و تحلیل توان اش، بررسی می شود.
کلمات کلیدی: شکل آسیاب بادی | تکنولوژی 5G | پیوندهای میانجی | LEO به LEO درون مداری | آنتن UWB | آنتن متقاطر سر آتش
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi