CINXE.COM
Search results for: mobile service
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: mobile service</title> <meta name="description" content="Search results for: mobile service"> <meta name="keywords" content="mobile service"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="mobile service" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="mobile service"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5066</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: mobile service</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5066</span> Behavioral Pattern of 2G Mobile Internet Subscribers: A Study on an Operator of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azfar%20Adib">Azfar Adib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Like many other countries of the world, mobile internet has been playing a key role in the growth of internet subscriber base in Bangladesh. This study has attempted to identify particular behavioral or usage patterns of 2G mobile internet subscribers who were using the service of the topmost internet service provider (as well as the top mobile operator) of Bangladesh prior to the launching of 3G services (when 2G was fully dominant). It contains some comprehensive analysis carried on different info regarding 2G mobile internet subscribers, obtained from the operator’s own network insights.This is accompanied by the results of a survey conducted among 40 high-frequency users of this service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20internet" title="mobile internet">mobile internet</a>, <a href="https://publications.waset.org/abstracts/search?q=Symbian" title=" Symbian"> Symbian</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=iPhone" title=" iPhone"> iPhone</a> </p> <a href="https://publications.waset.org/abstracts/66690/behavioral-pattern-of-2g-mobile-internet-subscribers-a-study-on-an-operator-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5065</span> Research on Load Balancing Technology for Web Service Mobile Host</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yao%20Lu">Yao Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiuguo%20Zhang"> Xiuguo Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhiying%20Cao"> Zhiying Cao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, Load Balancing idea is used in the Web service mobile host. The main idea of Load Balancing is to establish a one-to-many mapping mechanism: An entrance-mapping request to plurality of processing node in order to realize the dividing and assignment processing. Because the mobile host is a resource constrained environment, there are some Web services which cannot be completed on the mobile host. When the mobile host resource is not enough to complete the request, Load Balancing scheduler will divide the request into a plurality of sub-requests and transfer them to different auxiliary mobile hosts. Auxiliary mobile host executes sub-requests, and then, the results will be returned to the mobile host. Service request integrator receives results of sub-requests from the auxiliary mobile host, and integrates the sub-requests. In the end, the complete request is returned to the client. Experimental results show that this technology adopted in this paper can complete requests and have a higher efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dinic" title="Dinic">Dinic</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20balancing" title=" load balancing"> load balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20host" title=" mobile host"> mobile host</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a> </p> <a href="https://publications.waset.org/abstracts/63208/research-on-load-balancing-technology-for-web-service-mobile-host" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5064</span> A Design for Application of Mobile Agent Technology to MicroService Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masayuki%20Higashino">Masayuki Higashino</a>, <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Kawato"> Toshiya Kawato</a>, <a href="https://publications.waset.org/abstracts/search?q=Takao%20Kawamura"> Takao Kawamura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20agent" title="mobile agent">mobile agent</a>, <a href="https://publications.waset.org/abstracts/search?q=microservice" title=" microservice"> microservice</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title=" distributed system"> distributed system</a> </p> <a href="https://publications.waset.org/abstracts/87238/a-design-for-application-of-mobile-agent-technology-to-microservice-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5063</span> Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yangrae%20Cho">Yangrae Cho</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinseok%20Kim"> Jinseok Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Yongtae%20Park"> Yongtae Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20app%20service" title="mobile app service">mobile app service</a>, <a href="https://publications.waset.org/abstracts/search?q=usage%20pattern" title=" usage pattern"> usage pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=Hidden%20Markov%20Model" title=" Hidden Markov Model"> Hidden Markov Model</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20detection" title=" pattern detection"> pattern detection</a> </p> <a href="https://publications.waset.org/abstracts/40873/modeling-usage-patterns-of-mobile-app-service-in-app-market-using-hidden-markov-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40873.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5062</span> The Effective Operations Competitive Advantages of Mobile Phone Service Providers across Countries: The Case of Middle East Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yazan%20Khalid%20Abed-Allah%20Migdadi">Yazan Khalid Abed-Allah Migdadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is identifying the effective operations competitive advantages of mobile phone service providers across countries. All Arab countries in the Middle East region were surveyed except Syria, and 27 out of 31 service providers were surveyed. Data collected from corporations’ annual reports, websites and other professional institutions published sources. Multiple linear regression analysis test was used to identify the relationship between operations competitive advantages and market share. The effective operations competitive advantages were; diversity of offers and service accessibility <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competitive%20advantage" title="competitive advantage">competitive advantage</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunication%20operations" title=" mobile telecommunication operations"> mobile telecommunication operations</a>, <a href="https://publications.waset.org/abstracts/search?q=Middle%20East" title=" Middle East"> Middle East</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20provider" title=" service provider"> service provider</a> </p> <a href="https://publications.waset.org/abstracts/71025/the-effective-operations-competitive-advantages-of-mobile-phone-service-providers-across-countries-the-case-of-middle-east-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5061</span> Maintaining User-Level Security in Short Message Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Arudchelvam">T. Arudchelvam</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20W.%20E.%20N.%20Fernando"> W. W. E. N. Fernando</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SMS" title="SMS">SMS</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20level%20security" title=" user level security"> user level security</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=short%20message%20service" title=" short message service"> short message service</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20communication" title=" mobile communication"> mobile communication</a> </p> <a href="https://publications.waset.org/abstracts/49955/maintaining-user-level-security-in-short-message-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5060</span> Allocation of Mobile Units in an Urban Emergency Service System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dimitra%20Alexiou">Dimitra Alexiou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In an urban area the allocation placement of an emergency service mobile units, such as ambulances, police patrol must be designed so as to achieve a prompt response to demand locations. In this paper, a partition of a given urban network into distinct sub-networks is performed such that; the vertices in each component are close and simultaneously the difference of the sums of the corresponding population in the sub-networks is almost uniform. The objective here is to position appropriately in each sub-network a mobile emergency unit in order to reduce the response time to the demands. A mathematical model in the framework of graph theory is developed. In order to clarify the corresponding method a relevant numerical example is presented on a small network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=graph%20partition" title="graph partition">graph partition</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20service" title=" emergency service"> emergency service</a>, <a href="https://publications.waset.org/abstracts/search?q=distances" title=" distances"> distances</a>, <a href="https://publications.waset.org/abstracts/search?q=location" title=" location"> location</a> </p> <a href="https://publications.waset.org/abstracts/19027/allocation-of-mobile-units-in-an-urban-emergency-service-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19027.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">499</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5059</span> Mobile Cloud Middleware: A New Service for Mobile Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Akherfi">K. Akherfi</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Harroud"> H. Harroud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different technologies such as 3Gs). This paper presents a review on the concept of CC and MCC. Then, it discusses what has been done regarding middleware in CC and MCC. Later, it shows the architecture of our proposed middleware along with its functionalities which will be provided to mobile clients in order to overcome the well-known problems (such as low battery power, slow CPU speed and, little memory etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context-aware" title="context-aware">context-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=middleware" title=" middleware"> middleware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a> </p> <a href="https://publications.waset.org/abstracts/5233/mobile-cloud-middleware-a-new-service-for-mobile-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5058</span> Telecontrolled Service Robots for Increasing the Quality of Life of Elderly and Disabled</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nayden%20Chivarov">Nayden Chivarov</a>, <a href="https://publications.waset.org/abstracts/search?q=Denis%20Chikurtev"> Denis Chikurtev</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaloyan%20Yovchev"> Kaloyan Yovchev</a>, <a href="https://publications.waset.org/abstracts/search?q=Nedko%20Shivarov"> Nedko Shivarov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper represents methods for improving the efficiency and precision of service mobile robot. This robot is used for increasing the quality of life of elderly and disabled people. The key concept of the proposed Intelligent Service Mobile Robot is its easier adaptability to achieve services for a wide range of Elderly or Disabled Person’s needs, by performing different tasks for supporting Elderly or Disabled Persons care. We developed robot autonomous navigation and computer vision systems in order to recognize different objects and bring them to the people. Web based user interface is developed to provide easy access and tele-control of the robot by any device through the internet. In this study algorithms for object recognition and localization are proposed for providing successful object recognition and accuracy in the positioning. Different methods for sending movement commands to the mobile robot system are proposed and evaluated. After executing some experiments to show the results of the research, we can summarize that these systems and algorithms provide good control of the service mobile robot and it will be more useful to help the elderly and disabled persons. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=service%20robot" title="service robot">service robot</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20robot" title=" mobile robot"> mobile robot</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20navigation" title=" autonomous navigation"> autonomous navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20vision" title=" computer vision"> computer vision</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20user%20interface" title=" web user interface"> web user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=ROS" title=" ROS"> ROS</a> </p> <a href="https://publications.waset.org/abstracts/65573/telecontrolled-service-robots-for-increasing-the-quality-of-life-of-elderly-and-disabled" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65573.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5057</span> Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20S.%20Jagadeesh%20Kumar">P. S. Jagadeesh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Meenakshi%20Sundaram"> S. Meenakshi Sundaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20adoption" title="cloud adoption">cloud adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=backend%20as%20a%20service" title=" backend as a service"> backend as a service</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20intelligence" title=" business intelligence"> business intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=secured%20mobile%20banking" title=" secured mobile banking"> secured mobile banking</a> </p> <a href="https://publications.waset.org/abstracts/78153/enabling-cloud-adoption-based-secured-mobile-banking-through-backend-as-a-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78153.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5056</span> Facilitating Factors for the Success of Mobile Service Providers in Bangkok Metropolitan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yananda%20Siraphatthada">Yananda Siraphatthada</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objectives of this research were to study the level of influencing factors, leadership, supply chain management, innovation, competitive advantages, business success, and affecting factors to the business success of the mobile phone system service providers in Bangkok Metropolitan. This research was done by the quantitative approach and the qualitative approach. The quantitative approach was used for questionnaires to collect data from the 331 mobile service shop managers franchised by AIS, Dtac and TrueMove. The mobile phone system service providers/shop managers were randomly stratified and proportionally allocated into subgroups exclusive to the number of the providers in each network. In terms of qualitative method, there were in-depth interviews of 6 mobile service providers/managers of Telewiz and Dtac and TrueMove shop to find the agreement or disagreement with the content analysis method. Descriptive Statistics, including Frequency, Percentage, Means and Standard Deviation were employed; also, the Structural Equation Model (SEM) was used as a tool for data analysis. The content analysis method was applied to identify key patterns emerging from the interview responses. The two data sets were brought together for comparing and contrasting to make the findings, providing triangulation to enrich result interpretation. It revealed that the level of the influencing factors – leadership, innovation management, supply chain management, and business competitiveness had an impact at a great level, but that the level of factors, innovation and the business, financial success and nonbusiness financial success of the mobile phone system service providers in Bangkok Metropolitan, is at the highest level. Moreover, the business influencing factors, competitive advantages in the business of mobile system service providers which were leadership, supply chain management, innovation management, business advantages, and business success, had statistical significance at .01 which corresponded to the data from the interviews. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20service%20providers" title="mobile service providers">mobile service providers</a>, <a href="https://publications.waset.org/abstracts/search?q=facilitating%20factors" title=" facilitating factors"> facilitating factors</a>, <a href="https://publications.waset.org/abstracts/search?q=Bangkok%20Metropolitan" title=" Bangkok Metropolitan"> Bangkok Metropolitan</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20success" title=" business success"> business success</a> </p> <a href="https://publications.waset.org/abstracts/14507/facilitating-factors-for-the-success-of-mobile-service-providers-in-bangkok-metropolitan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5055</span> Mobile Number Portability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Geetha">R. Geetha</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Arunkumar"> J. Arunkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Gopal"> P. Gopal</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Loganathan"> D. Loganathan</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Pavithra"> K. Pavithra</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Vikashini"> C. Vikashini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Number Portability is an attempt to switch over from one network to another network facility for mobile based on applications. This facility is currently not available for mobile handsets. This application is intended to assist the mobile network and its service customers in understanding the criteria; this will serve as a universal set of requirements which must be met by the customers. This application helps the user's network portability. Accessing permission from the network provider to enable services to the user and utilizing the available network signals. It is enabling the user to make a temporary switch over to other network. The main aim of this research work is to adapt multiple networks at the time of no network coverage. It can be accessed at rural and geographical areas. This can be achieved by this mobile application. The application is capable of temporary switch over between various networks. With this application both the service provider and the network user are benefited. The service provider is benefited by charging a minimum cost for utilizing other network. It provides security in terms of password that is unique to avoid unauthorized users and to prevent loss of balance. The goal intended to be attained is a complete utilization of available network at significant situations and to provide feature that satisfy the customer needs. The temporary switch over is done to manage emergency calls when user is in rural or geographical area, where there will be a very low network coverage. Since people find it trend in using Android mobile, this application is designed as an Android applications, which can be freely downloaded and installed from Play store. In the current scenario, the service provider enables the user to change their network without shifting their mobile network. This application affords a clarification for users while they are jammed in a critical situation. This application is designed by using Android 4.2 and SQLite Version3. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20number" title="mobile number">mobile number</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20number" title=" random number"> random number</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm" title=" alarm"> alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=imei%20number" title=" imei number"> imei number</a>, <a href="https://publications.waset.org/abstracts/search?q=call" title=" call"> call</a> </p> <a href="https://publications.waset.org/abstracts/1709/mobile-number-portability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5054</span> Determinants of the Users Intention of Social-Local-Mobile Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Chen%20Chen">Chia-Chen Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Mu-Yen%20Chen"> Mu-Yen Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SoLoMo%20%28social" title="SoLoMo (social">SoLoMo (social</a>, <a href="https://publications.waset.org/abstracts/search?q=local" title=" local"> local</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20mobile%29" title=" and mobile)"> and mobile)</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation%20diffusion%20theory" title=" innovation diffusion theory"> innovation diffusion theory</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20externality" title=" network externality"> network externality</a> </p> <a href="https://publications.waset.org/abstracts/13054/determinants-of-the-users-intention-of-social-local-mobile-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">528</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5053</span> Design of Middleware for Mobile Group Control in Physical Proximity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Moon-Tak%20Oh">Moon-Tak Oh</a>, <a href="https://publications.waset.org/abstracts/search?q=Kyung-Min%20Park"> Kyung-Min Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Tae-Eun%20Yoon"> Tae-Eun Yoon</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoon%20Choi"> Hoon Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Chil-Woo%20Lee"> Chil-Woo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20user" title="group user">group user</a>, <a href="https://publications.waset.org/abstracts/search?q=middleware" title=" middleware"> middleware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20service" title=" mobile service"> mobile service</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20proximity" title=" physical proximity"> physical proximity</a> </p> <a href="https://publications.waset.org/abstracts/2331/design-of-middleware-for-mobile-group-control-in-physical-proximity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">506</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5052</span> Delivering User Context-Sensitive Service in M-Commerce: An Empirical Assessment of the Impact of Urgency on Mobile Service Design for Transactional Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniela%20Stephanie%20Kuenstle">Daniela Stephanie Kuenstle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Complex industries such as banking or insurance experience slow growth in mobile sales. While today’s mobile applications are sophisticated and enable location based and personalized services, consumers prefer online or even face-to-face services to complete complex transactions. A possible reason for this reluctance is that the provided service within transactional mobile applications (apps) does not adequately correspond to users’ needs. Therefore, this paper examines the impact of the user context on mobile service (m-service) in m-commerce. Motivated by the potential which context-sensitive m-services hold for the future, the impact of temporal variations as a dimension of user context, on m-service design is examined. In particular, the research question asks: Does consumer urgency function as a determinant of m-service composition in transactional apps by moderating the relation between m-service type and m-service success? Thus, the aim is to explore the moderating influence of urgency on m-service types, which includes Technology Mediated Service and Technology Generated Service. While mobile applications generally comprise features of both service types, this thesis discusses whether unexpected urgency changes customer preferences for m-service types and how this consequently impacts the overall m-service success, represented by purchase intention, loyalty intention and service quality. An online experiment with a random sample of N=1311 participants was conducted. Participants were divided into four treatment groups varying in m-service types and urgency level. They were exposed to two different urgency scenarios (high/ low) and two different app versions conveying either technology mediated or technology generated service. Subsequently, participants completed a questionnaire to measure the effectiveness of the manipulation as well as the dependent variables. The research model was tested for direct and moderating effects of m-service type and urgency on m-service success. Three two-way analyses of variance confirmed the significance of main effects, but demonstrated no significant moderation of urgency on m-service types. The analysis of the gathered data did not confirm a moderating effect of urgency between m-service type and service success. Yet, the findings propose an additive effects model with the highest purchase and loyalty intention for Technology Generated Service and high urgency, while Technology Mediated Service and low urgency demonstrate the strongest effect for service quality. The results also indicate an antagonistic relation between service quality and purchase intention depending on the level of urgency. Although a confirmation of the significance of this finding is required, it suggests that only service convenience, as one dimension of mobile service quality, delivers conditional value under high urgency. This suggests a curvilinear pattern of service quality in e-commerce. Overall, the paper illustrates the complex interplay of technology, user variables, and service design. With this, it contributes to a finer-grained understanding of the relation between m-service design and situation dependency. Moreover, the importance of delivering situational value with apps depending on user context is emphasized. Finally, the present study raises the demand to continue researching the impact of situational variables on m-service design in order to develop more sophisticated m-services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20consumer%20behavior" title="mobile consumer behavior">mobile consumer behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20service%20design" title=" mobile service design"> mobile service design</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20service%20success" title=" mobile service success"> mobile service success</a>, <a href="https://publications.waset.org/abstracts/search?q=self-service%20technology" title=" self-service technology"> self-service technology</a>, <a href="https://publications.waset.org/abstracts/search?q=situation%20dependency" title=" situation dependency"> situation dependency</a>, <a href="https://publications.waset.org/abstracts/search?q=user-context%20sensitivity" title=" user-context sensitivity"> user-context sensitivity</a> </p> <a href="https://publications.waset.org/abstracts/52867/delivering-user-context-sensitive-service-in-m-commerce-an-empirical-assessment-of-the-impact-of-urgency-on-mobile-service-design-for-transactional-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52867.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5051</span> Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing" title="mobile grid computing">mobile grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20authority%20%28CA%29" title=" certificate authority (CA)"> certificate authority (CA)</a>, <a href="https://publications.waset.org/abstracts/search?q=SSL%2FTLS%20protocol" title=" SSL/TLS protocol"> SSL/TLS protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=secured%20service%20certificates" title=" secured service certificates"> secured service certificates</a> </p> <a href="https://publications.waset.org/abstracts/29817/adaptive-certificate-based-mutual-authentication-protocol-for-mobile-grid-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5050</span> Study on the OTP Authentication Method and Security for User Mobility in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jong-Won%20Lee">Jong-Won Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=OTP" title=" OTP"> OTP</a>, <a href="https://publications.waset.org/abstracts/search?q=mobility" title=" mobility"> mobility</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/16655/study-on-the-otp-authentication-method-and-security-for-user-mobility-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5049</span> Service Blueprint for Improving Clinical Guideline Adherence via Mobile Health Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Y.%20O%E2%80%99Connor">Y. O’Connor</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Heavin"> C. Heavin</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20O%E2%80%99%20Connor"> S. O’ Connor</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Gallagher"> J. Gallagher</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Wu"> J. Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20O%E2%80%99Donoghue"> J. O’Donoghue</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: To improve the delivery of paediatric healthcare in resource-poor settings, Community Health Workers (CHW) have been provided with a paper-based set of protocols known as Community Case Management (CCM). Yet research has shown that CHW adherence to CCM guidelines is poor, ultimately impacting health service delivery. Digitising the CCM guidelines via mobile technology is argued in extant literature to improve CHW adherence. However, little research exist which outlines how (a) this process can be digitised and (b) adherence could be improved as a result. Aim: To explore how an electronic mobile version of CCM (eCCM) can overcome issues associated with the paper-based CCM protocol (poor adherence to guidelines) vis-à-vis service blueprinting. This service blueprint will outline how (a) the CCM process can be digitised using mobile Clinical Decision Support Systems software to support clinical decision-making and (b) adherence can be improved as a result. Method: Development of a single service blueprint for a standalone application which visually depicts the service processes (eCCM) when supporting the CHWs, using an application known as Supporting LIFE (Low cost Intervention For disEase control) as an exemplar. Results: A service blueprint is developed which illustrates how the eCCM solution can be utilised by CHWs to assist with the delivery of healthcare services to children. Leveraging smartphone technologies can (a) provide CHWs with just-in-time data to assist with their decision making at the point-of-care and (b) improve CHW adherence to CCM guidelines. Conclusions: The development of the eCCM opens up opportunities for the CHWs to leverage the inherent benefit of mobile devices to assist them with health service delivery in rural settings. To ensure that benefits are achieved, it is imperative to comprehend the functionality and form of the eCCM service process. By creating such a service blueprint for an eCCM approach, CHWs are provided with a clear picture regarding the role of the eCCM solution, often resulting in buy-in from the end-users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adherence" title="adherence">adherence</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20health%20workers" title=" community health workers"> community health workers</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title=" developing countries"> developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20clinical%20decision%20support%20systems" title=" mobile clinical decision support systems"> mobile clinical decision support systems</a>, <a href="https://publications.waset.org/abstracts/search?q=CDSS" title=" CDSS"> CDSS</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20blueprint" title=" service blueprint"> service blueprint</a> </p> <a href="https://publications.waset.org/abstracts/37005/service-blueprint-for-improving-clinical-guideline-adherence-via-mobile-health-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37005.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5048</span> Secure Cryptographic Operations on SIM Card for Mobile Financial Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok">Kerem Ok</a>, <a href="https://publications.waset.org/abstracts/search?q=Serafettin%20Senturk"> Serafettin Senturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdar%20Aktas"> Serdar Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Cem%20Cevikbas"> Cem Cevikbas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SIM%20card" title="SIM card">SIM card</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20financial%20services" title=" mobile financial services"> mobile financial services</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20data%20storage" title=" secure data storage"> secure data storage</a> </p> <a href="https://publications.waset.org/abstracts/54843/secure-cryptographic-operations-on-sim-card-for-mobile-financial-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5047</span> The Effects of Mobile Communication on the Nigerian Populace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chapman%20Eze%20Nnadozie">Chapman Eze Nnadozie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communication, the activity of conveying information, remains a vital resource for the growth and development of any given society. Mobile communication, popularly known as global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM, which is a wireless technology, remains the fastest growing communication means worldwide. Indeed, mobile phones have become a critical business tool and part of everyday life in both developed and developing countries. This study examines the effects of mobile communication on the Nigerian populace. The methodology used in this study is the survey research method with the main data collection tool as questionnaires. The questionnaires were administered to a total of seventy respondents in five cities across the country, namely: Aba, Enugu, Bauchi, Makurdi, and Lagos. The result reveals that though there is some quality of service issues, mobile communication has very significant positive efforts on the economic and social development of the Nigerian populace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=effect" title="effect">effect</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20communication" title=" mobile communication"> mobile communication</a>, <a href="https://publications.waset.org/abstracts/search?q=populace" title=" populace"> populace</a>, <a href="https://publications.waset.org/abstracts/search?q=GSM" title=" GSM"> GSM</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20technology" title=" wireless technology"> wireless technology</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20phone" title=" mobile phone"> mobile phone</a> </p> <a href="https://publications.waset.org/abstracts/72087/the-effects-of-mobile-communication-on-the-nigerian-populace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5046</span> International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anthony%20Vandarakis">Anthony Vandarakis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today’s International Service Learning practices require an update: modern technologies, fresh educational frameworks, and a new operating system to accountably prosper. This paper describes a model of International Service Learning (ISL), which combines current technological hardware, electronic platforms, and asynchronous communications that are grounded in inclusive pedagogy. This model builds on the work around collaborative field trip learning, extending the reach to international partnerships across continents. Mobile technology, 21<sup>st</sup> century skills and summit-basecamp modeling intersect to support novel forms of learning that tread lightly on fragile natural ecosystems, affirm local reciprocal partnership in projects, and protect traveling participants from common yet avoidable cultural pitfalls. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=International%20Service%20Learning" title="International Service Learning">International Service Learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ISL" title=" ISL"> ISL</a>, <a href="https://publications.waset.org/abstracts/search?q=field%20experiences" title=" field experiences"> field experiences</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title=" mobile technology"> mobile technology</a>, <a href="https://publications.waset.org/abstracts/search?q=out%20there%20in%20here" title=" out there in here"> out there in here</a>, <a href="https://publications.waset.org/abstracts/search?q=summit%20basecamp%20pedagogy" title=" summit basecamp pedagogy"> summit basecamp pedagogy</a> </p> <a href="https://publications.waset.org/abstracts/119646/international-service-learning-30-using-technology-to-improve-outcomes-and-sustainability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119646.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5045</span> Meeting User’s Information Need: A Study on the Acceptance of Mobile Library Service at UGM Library</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Fikriansyah%20Wicaksono">M. Fikriansyah Wicaksono</a>, <a href="https://publications.waset.org/abstracts/search?q=Rafael%20Arief%20Budiman"> Rafael Arief Budiman</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Very%20Setiawan"> M. Very Setiawan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, a wide range of innovative mobile library (M-Library) service is provided for the users in the library. The M-Library service is an innovation that aims to bring the collections of the library to users who currently use their smartphone so often. With M-Library services, it is expected that the users can fulfill their information needs more conveniently and practically. This study aims to find out how users use M-Library services provided by UGM library. This study applied a quantitative approach to investigate how to use the application M-Library. The Technology Acceptance Model (TAM) theory is applied to perform the analysis in terms of perceived usefulness, perceived ease of use, attitude towards behavior, behavioral intention and actual system usage. The results show that overall the users found that the M-Library application is useful to meet their information needs. Such as facilitate user to access e-resources, search UGM library collections, online booking collections, and reminder for returning book. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=m-library" title="m-library">m-library</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20library%20services" title=" mobile library services"> mobile library services</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance" title=" technology acceptance"> technology acceptance</a>, <a href="https://publications.waset.org/abstracts/search?q=library%20of%20UGM" title=" library of UGM"> library of UGM</a> </p> <a href="https://publications.waset.org/abstracts/58587/meeting-users-information-need-a-study-on-the-acceptance-of-mobile-library-service-at-ugm-library" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">229</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5044</span> Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arpapron%20Phokajang">Arpapron Phokajang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=faculty%20of%20management%20science" title="faculty of management science">faculty of management science</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20usage%20behavior" title=" internet usage behavior"> internet usage behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20phones" title=" mobile phones"> mobile phones</a>, <a href="https://publications.waset.org/abstracts/search?q=Suan%20Sunandha%20Rajabhat%20University" title=" Suan Sunandha Rajabhat University"> Suan Sunandha Rajabhat University</a> </p> <a href="https://publications.waset.org/abstracts/44810/internet-usage-behavior-on-mobile-phones-of-the-faculty-of-management-science-students-at-suan-sunandha-rajabhat-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44810.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5043</span> Agent Based Location Management Protocol for Mobile Adhoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mallikarjun%20B.%20Channappagoudar">Mallikarjun B. Channappagoudar</a>, <a href="https://publications.waset.org/abstracts/search?q=Pallapa%20Venkataram"> Pallapa Venkataram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The dynamic nature of Mobile adhoc network (MANET) due to mobility and disconnection of mobile nodes, leads to various problems in predicting the movement of nodes and their location information updation, for efficient interaction among the application specific nodes. Location management is one of the main challenges to be considered for an efficient service provision to the applications of a MANET. In this paper, we propose a location management protocol, for locating the nodes of a MANET and to maintain uninterrupted high-quality service for distributed applications by intelligently anticipating the change of location of its nodes. The protocol predicts the node movement and application resource scarcity, does the replacement with the chosen nodes nearby which have less mobility and rich in resources, with the help of both static and mobile agents, and maintains the application continuity by providing required network resources. The protocol has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. It consumes much less time (response time), gives better location accuracy, utilize less network resources, and reduce location management overhead. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20agent" title="mobile agent">mobile agent</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20management" title=" location management"> location management</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20applications" title=" distributed applications"> distributed applications</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20adhoc%20network" title=" mobile adhoc network"> mobile adhoc network</a> </p> <a href="https://publications.waset.org/abstracts/49320/agent-based-location-management-protocol-for-mobile-adhoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49320.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">394</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5042</span> Mobile Phone Banking Applies and Customer Intention: A Case Study in Libya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iman%20E.%20Bouthahab">Iman E. Bouthahab</a>, <a href="https://publications.waset.org/abstracts/search?q=Badea%20B.%20Geador"> Badea B. Geador</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aim of this paper is to explore the prospect of a new approach of mobile phone banking in Libya. This study evaluates customer knowledge on commercial mobile banking in Libya. To examine the relationship between age, occupation and intention for using mobile banking for commercial purpose, a survey was conducted to gather information from one hundred Libyan bank clients. The results indicate that Libyan customers have accepted the new technology and they are ready to use it. There is no significant joint relationship between age and occupation found in intention to use mobile banking in Libya. On the other hand, the customers’ knowledge about mobile banking has a greater relationship with the intention. This study has implications for demographic researches and consumer behaviour disciplines. It also has profitable implications for banks and managers in Libya, as it will assist in better understanding of the Libyan consumers and their activities, when they develop their market strategies and new service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking" title="mobile banking">mobile banking</a>, <a href="https://publications.waset.org/abstracts/search?q=intention" title=" intention"> intention</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20knowledge" title=" customer knowledge"> customer knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=banks%20in%20Libya" title=" banks in Libya "> banks in Libya </a> </p> <a href="https://publications.waset.org/abstracts/10636/mobile-phone-banking-applies-and-customer-intention-a-case-study-in-libya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10636.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5041</span> Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aarohi%20Surya">Aarohi Surya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=customer%20satisfaction" title="customer satisfaction">customer satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20quality" title=" service quality"> service quality</a>, <a href="https://publications.waset.org/abstracts/search?q=responsiveness" title=" responsiveness"> responsiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20banking" title=" online banking"> online banking</a> </p> <a href="https://publications.waset.org/abstracts/48618/perception-of-consumer-behavior-on-mobile-banking-offered-by-the-national-and-multinational-banks-in-uae-with-special-reference-to-emirates-nbd-and-citibank" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48618.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5040</span> Energy Efficient Routing Protocol with Ad Hoc On-Demand Distance Vector for MANET</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Thamizhmaran">K. Thamizhmaran</a>, <a href="https://publications.waset.org/abstracts/search?q=Akshaya%20Devi%20Arivazhagan"> Akshaya Devi Arivazhagan</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Anitha"> M. Anitha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On the case of most important systematic issue that must need to be solved in means of implementing a data transmission algorithm on the source of Mobile adhoc networks (MANETs). That is, how to save mobile nodes energy on meeting the requirements of applications or users as the mobile nodes are with battery limited. On while satisfying the energy saving requirement, hence it is also necessary of need to achieve the quality of service. In case of emergency work, it is necessary to deliver the data on mean time. Achieving quality of service in MANETs is also important on while. In order to achieve this requirement, Hence, we further implement the Energy-Aware routing protocol for system of Mobile adhoc networks were it being proposed, that on which saves the energy as on every node by means of efficiently selecting the mode of energy efficient path in the routing process by means of Enhanced AODV routing protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ad-Hoc%20networks" title="Ad-Hoc networks">Ad-Hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=AODV" title=" AODV"> AODV</a>, <a href="https://publications.waset.org/abstracts/search?q=EAODV" title=" EAODV"> EAODV</a> </p> <a href="https://publications.waset.org/abstracts/22293/energy-efficient-routing-protocol-with-ad-hoc-on-demand-distance-vector-for-manet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22293.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5039</span> Mobile Learning in Teacher Education: A Review in Context of Developing Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehwish%20Raza">Mehwish Raza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile learning (m-learning) offers unique affordances to learners, setting them free of limitations posed by time and geographic space; thus becoming an affordable device for convenient distant learning. There is a plethora of research available on mobile learning projects planned, implemented and evaluated across disciplines in the context of developed countries, however, the potential of m-learning at different educational levels remain unexplored with little evidence of research carried out in developing countries. Despite the favorable technical infrastructure offered by cellular networks and boom in mobile subscriptions in the developing world, there is limited focus on utilizing m-learning for education and development purposes. The objective of this review is to unify findings from m-learning projects that have been implemented in developing countries such as Pakistan, Bangladesh, Philippines, India, and Tanzania for teachers’ in-service training. The purpose is to draw upon key characteristics of mobile learning that would be useful for future researchers to inform conceptualizations of mobile learning for developing countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design%20model" title="design model">design model</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title=" developing countries"> developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20characteristics" title=" key characteristics"> key characteristics</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a> </p> <a href="https://publications.waset.org/abstracts/69187/mobile-learning-in-teacher-education-a-review-in-context-of-developing-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69187.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">447</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5038</span> Inter-Cell-Interference Mitigation Scheme in Wireless Communication System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jae-Hyun%20Ro">Jae-Hyun Ro</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong-Jun%20Kim"> Yong-Jun Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Eui-Hak%20Lee"> Eui-Hak Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyoung-Kyu%20Song"> Hyoung-Kyu Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile communication has been developing very rapidly since it appeared. However, although mobile communication market has been rapidly developing, many mobile users are not offered good quality of service (QoS) due to increment of the amount of data traffic. Recently, femtocell is very hot issue in mobile communication because femtocell can solve the problems of data traffic and offer better QoS to mobile users. However, the deployment of femtocell in existing macrocell coverage area is not so simple due to the influence of inter-cell-interference (ICI) with existing macrocell. Thus, this paper proposes femtocell scheme which is able to reduce the influence of ICI to deploy femtocell easily. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CDD" title="CDD">CDD</a>, <a href="https://publications.waset.org/abstracts/search?q=femtocell" title=" femtocell"> femtocell</a>, <a href="https://publications.waset.org/abstracts/search?q=interference" title=" interference"> interference</a>, <a href="https://publications.waset.org/abstracts/search?q=macrocell" title=" macrocell"> macrocell</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDM" title=" OFDM"> OFDM</a> </p> <a href="https://publications.waset.org/abstracts/32633/inter-cell-interference-mitigation-scheme-in-wireless-communication-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">502</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5037</span> Enhancing Inservice Education Training Effectiveness Using a Mobile Based E-Learning Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Richard%20Patrick%20Kabuye">Richard Patrick Kabuye</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on the addressing the enhancement of in-service training programs as a tool of transforming the existing traditional approaches of formal lectures/contact hours. This will be supported with a more versatile, robust, and remotely accessible means of mobile based e-learning, as a support tool for the traditional means. A combination of various factors in education and incorporation of the eLearning strategy proves to be a key factor in effective in-service education. Key factor needs to be factored in so as to maintain a credible co-existence of the programs, with the prevailing social, economic and political environments. Effective in-service education focuses on having immediate transformation of knowledge into practice for a good time period, active participation of attendees, enable before training planning, in training assessment and post training feedback training analysis which will yield knowledge to the trainers of the applicability of knowledge given out. All the above require a more robust approach to attain success in implementation. Incorporating mobile technology in eLearning will enable the above to be factored together in a more coherent manner, as it is evident that participants have to take time off their duties and attend to these training programs. Making it mobile, will save a lot of time since participants would be in position to follow certain modules while away from lecture rooms, get continuous program updates after completing the program, send feedback to instructors on knowledge gaps, and a wholly conclusive evaluation of the entire program on a learn as you work platform. This study will follow both qualitative and quantitative approaches in data collection, and this will be compounded incorporating a mobile eLearning application using Android. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=in%20service" title="in service">in service</a>, <a href="https://publications.waset.org/abstracts/search?q=training" title=" training"> training</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=e-%20learning" title=" e- learning"> e- learning</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a> </p> <a href="https://publications.waset.org/abstracts/62510/enhancing-inservice-education-training-effectiveness-using-a-mobile-based-e-learning-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=168">168</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=169">169</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20service&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>