oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
The Ubiquitous Interactor - Device Independent Access to Mobile Services  [PDF]
Stina Nylander,Markus Bylund,Annika Waern
Computer Science , 2003,
Abstract: The Ubiquitous Interactor (UBI) addresses the problems of design and development that arise around services that need to be accessed from many different devices. In UBI, the same service can present itself with different user interfaces on different devices. This is done by separating interaction between users and services from presentation. The interaction is kept the same for all devices, and different presentation information is provided for different devices. This way, tailored user interfaces for many different devices can be created without multiplying development and maintenance work. In this paper we describe the system design of UBI, the system implementation, and two services implemented for the system: a calendar service and a stockbroker service.
Predicting End-User Adoption to Mobile Services  [PDF]
Mohamed Alloghani
Journal of Data Analysis and Information Processing (JDAIP) , 2018, DOI: 10.4236/jdaip.2018.62002
Abstract: It is no doubt that the sub-field of Artificial Intelligence, which uses the tenets of Machine learning and data mining has progressively gained popularity in the past years to become one of fundamental yet revolutionary technologies. It is the basis of systems that can learn and improve using algorithms and big data with minimal programming or none. It is envisaged that mobile computing will empower end-users to seamlessly access and consume digital content services regardless of spatial or temporal orientations. Such are already the features of smart phones that at production are bundled with trending and necessary services. Of the many capabilities that advancement in technology have actualized in smart devices, gaming, video streaming, online library access, and m-commerce access services are the commonly among smart device owners. Given the near-exponential growth in ownership of smart devices, there is a need to identify and prioritize mobile services, and such was focus of this study. In specific, the study used Decision Tree, a popular machine learning algorithm, to predict the adoption of mobile services among smart device owners. Besides this purpose, the study identified the core uses of smart phones, and data used in the study was from an open source and was retrieved from Pew Research Centre Internet and Technology website. The dataset had 140 variables and 2001 themes, from which only the key attributes were selected for analysis. The study established that the level of education was the significant predictor of the mobile phones usage while race of the user emerged as the least predictor of smart device usage. The findings indicated that smart mobile phones were mostly used for entertainment, getting locations, direction and for recommendation purposes.
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs  [PDF]
Amal Saha,Sugata Sanyal
Computer Science , 2015,
Abstract: The information technology and security stakeholders like CIOs, CISOs and CTOs in financial services organization are often asked to identify the risks with mobile computing channel for financial services that they support. They are also asked to come up with approaches for handling risks, define risk acceptance level and mitigate them. This requires them to articulate strategy for supporting a huge variety of mobile devices from various vendors with different operating systems and hardware platforms and at the same time stay within the accepted risk level. These articulations should be captured in information security policy document or other suitable document of financial services organization like banks, payment service provider, etc. While risks and mitigation approaches are available from multiple sources, the senior stakeholders may find it challenging to articulate the issues in a comprehensive manner for sharing with business owners and other technology stakeholders. This paper reviews the current research that addresses the issues mentioned above and articulates a strategy that the senior stakeholders may use in their organization. It is assumed that this type of comprehensive strategy guide for senior stakeholders is not readily available and CIOs, CISOs and CTOs would find this paper to be very useful.
Study of Data Mining Approach for Mobile Computing Environment
Prof. R. R. Shelke,Dr. V. M. Thakare,Dr. R . V. Dharaskar
International Journal on Computer Science and Engineering , 2012,
Abstract: Efficient Data mining Techniques are required to discover useful Information andknowledge. This is due to the effective involvement of computers and the improvement inDatabase Technology which has provided large Data. The mobile Data Allocation scheme is proposed such that the data are replicated statically for traditional Databases’ for which themoving patterns of Mobile users to mine theresults and improve the Mobile system are used.Data mining services play an important role in the field of mobile communication industry. Data mining is also called knowledge discovery in several databaseincluding mobile databases. In thispaper,study of different data mining algorithms in mobile environment is given . Algorithms for maximum moving path,create,select , update, alter is studied .
Middleware Services for Network Disruption Tolerant Mobile Applications
International Journal of Networks and Communications , 2012, DOI: 10.5923/j.ijnc.20120206.04
Abstract: The demand for mobile application services has increased recently. However mobile wireless access technologies so far are not mature enough to address concerns with the reliability of mobile services. Therefore, mobile services are prone to failures caused by disruption of active wireless access network connections due to device movement. It is important to have proper mechanisms for managing mobile application services in case of loss of network connections. In this paper, we propose a middleware services that transparently performs required functionality to users in order to provide efficient mobile services in case of network disruption. Such middleware service provides an effective disconnection tolerant mobile application services.
Innovative Secure Mobile Banking Services  [cached]
Mousa T AL-Akhras,Rizik Al-Sayyed,Marwah Alian,Doaa Qwasmi
International Journal of Interactive Mobile Technologies (iJIM) , 2011, DOI: 10.3991/ijim.v5i1.1516
Abstract: Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking) describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking) sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface) and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following security requirements: Authentication, Confidentiality and Authorisation. This paper introduces the advantages and disadvantages of using mobility in the banking sector. Furthermore, this paper also presents the security, suitability and feasibility aspects of using m-banking in terms of technology and usability.
Consuming Web Services on Mobile Platforms  [PDF]
Alin COBARZAN
Informatica Economica Journal , 2010,
Abstract: Web services are an emerging technology that provides interoperability between applications running in different platforms. The Web services technology provide the best approach to Service Oriented Architecture envision of component collaboration for better business re-quirements fulfilment in large enterprise systems. The challenges in implementing Web services consuming clients for low-resources mobile devices connected through unreliable wireless connections are delimited. The paper also presents a communication architecture that moves the heavy load of XML-based messaging system from the mobile clients to an external middleware component. The middleware component will act like a gateway that lightly com-municates with the device in a client-server manner over a fast binary protocol and at the same time takes the responsibility of solving the request to the Web service.
AppBus: Mobile Device Application Collaboration via Short Term Memory  [cached]
Craig Janssen,Michael Pearce,Shriram Kollipara,Nitya Narasimhan
Journal of Software , 2006, DOI: 10.4304/jsw.1.2.40-47
Abstract: The increasing quality of computation and connectivity on mobile devices has motivated a need for data-sharing between resident services. Most such services rely on the user to transfer data manually between them. This approach is not only prone to input error but also creates a significant data-entry burden for the user on a mobile device. With AppBus, we envision a cooperative data- sharing facility that provides the equivalent of a “short-term memory” for the mobile device. By leveraging this transient data store and event notification system, services can collaborate in a loosely-coupled manner that makes their combined operation appear more intuitive and seamless. In this paper, we describe the design and implementation of AppBus for a mobile phone and initiate a discussion on both the utility and the limitations of this paradigm in mobile computing.
A Comparative Study on Temporal Mobile Access Pattern Mining Methods
Hanan Fahmy,Maha A.Hana,Yahia K. Helmy
International Journal of Advanced Computer Sciences and Applications , 2012,
Abstract: Mobile users behavior patterns is one of the most critical issues that need to be explored in mobile agent systems. Recently the algorithms of discovering frequent mobile user’s behavior patterns have been studied extensively. Existing mining methods have proposed frequent mobile user's behavior patterns statistically based on requested services and location information. Therefore, other studies considered that the mobile user's dynamic behavior patterns are usually associated with temporal access patterns. In this paper, temporal mobile access pattern methods are studied and compared in terms of complexity and accuracy. The advantages and disadvantages of these methods will be summarized as well
Phishing Detection Taxonomy for Mobile Device  [PDF]
Cik Feresa Mohd Foozy,Rabiah Ahmad,Mohd Faizal Abdollah
International Journal of Computer Science Issues , 2013,
Abstract: Phishing is one of the social engineering attacks and currently hit on mobile devices. Based on security report by Lookout, 30% of Lookout users clicking on an unsafe link per year by using mobile device. Few phishing detection techniques have been applied on mobile device. However, review on phishing detection technique on the detection technique redundant is still need. This paper addresses the current trend phishing detection for mobile device and identifies significant criterion to improve phishing detection techniques on mobile device. Thus, existing research on phishing detection technique for computer and mobile device will be compared and analysed. Hence, outcome of the analysis becomes a guideline in proposing generic phishing detection taxonomy for mobile device
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.