• Title/Summary/Keyword: Characteristics of Mobile Platform

Search Result 139, Processing Time 0.021 seconds

Mobile News Engagement in a South Asian Context: Roles of Demographics, Motivations, and News Type Preferences in News Exposure and Participation in Bangladesh

  • Alam, Md. Asraful;Kim, Kyun Soo
    • International Journal of Contents
    • /
    • v.17 no.2
    • /
    • pp.48-64
    • /
    • 2021
  • This study examines mobile news engagement-conceptualized as news exposure and participation-in the context of South Asia which has experienced tremendous growth in mobile-Internet users without receiving much attention from communication scholars. Along with demographic characteristics, this research incorporates motivational factors (grounded on uses and gratifications-U&G-approach) and news type preferences to explore their roles in mobile news engagement among urban citizens in Bangladesh. Results of a self-administered survey (N = 504) revealed that participants' mobile news engagement partially varied depending on their demographic differences, particularly gender, age, and education. Our study also unveiled that individuals' motivation for sharing information seemed to be a strong predictor of mobile news exposure and participation. In addition, Bangladeshi respondents were more likely to be interested in the hard news in terms of expressing views on news comments and sharing news via mobile platform. Conversely, preference for soft type news had a significant influence on news exposure through mobile browsing. This study provides insights into the understanding of global phenomena of mobile news engagement by unpacking the case of Bangladesh where mobile news usage seems to be an evolving state.

Attention Behavior to Mobile Content: Focusing on Exposure and Involvement of Pikicast Content (모바일 콘텐츠에 대한 주목 행동: 피키캐스트 콘텐츠의 노출과 관여 행동을 중심으로)

  • Kim, Eun-Mee;Park, Hyun-Ah;Ihm, Jeniffer So-Young
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.12-21
    • /
    • 2017
  • In this study, we divided attention to mobile contents into two dimensions (i.e., exposure and involvement), and explored the characteristics of and the relationship between the attention behaviors, using contents data from Pikicast. First, this study investigated the relationship between exposure and involvement in order to examine whether double-jeopardy effects appear in mobile contents as well. In addition, we examined how different attention behaviors differ according to platform and subject attributes(i.e., soft and hard). As a result, we found that there was a positive correlation between exposure and involvement in mobile platforms. Also, we found that the attention behaviors, especially sharing behaviors, were different in each platform. In terms of subject attributes, the attention indices such as the number of comments and sharing, which were immediate responses, were related to the soft content, whereas the attention indices such as the consumption time and the complete-read rate were related to the hard content requiring cognitive effort.This study is meaningful to understand the essence of the attention behavior in the mobile environment from a content - oriented perspective rather than the most existing research with a user - centered perspective.

Metadata Processing Technique for Similar Image Search of Mobile Platform

  • Seo, Jung-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.1
    • /
    • pp.36-41
    • /
    • 2021
  • Text-based image retrieval is not only cumbersome as it requires the manual input of keywords by the user, but is also limited in the semantic approach of keywords. However, content-based image retrieval enables visual processing by a computer to solve the problems of text retrieval more fundamentally. Vision applications such as extraction and mapping of image characteristics, require the processing of a large amount of data in a mobile environment, rendering efficient power consumption difficult. Hence, an effective image retrieval method on mobile platforms is proposed herein. To provide the visual meaning of keywords to be inserted into images, the efficiency of image retrieval is improved by extracting keywords of exchangeable image file format metadata from images retrieved through a content-based similar image retrieval method and then adding automatic keywords to images captured on mobile devices. Additionally, users can manually add or modify keywords to the image metadata.

X-File Viewer on a Mobile Platform (모바일 플랫폼상의 X-File Viewer)

  • Ha, Kyeoung-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2010
  • In this paper, we propose a mobile document viewer which is executable on a variety of mobile platforms. The proposed viewer is designed with file decoding engine and independent module which are adopted with os independent. The proposed viewer can be used as a basis of document editing tool by analyzing the characteristics of the document file.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Implementation of a Remote Bio-Equipment System for Smart Healthy Housing Properties

  • Han, Seung-Hoon
    • KIEAE Journal
    • /
    • v.14 no.6
    • /
    • pp.23-29
    • /
    • 2014
  • It is essential to investigate the structure and the main characteristics of BSN (Bio-Sensor Network) platform in built smart healthcare environment while designing healthy housing facilities. For this study, WSN (Wireless Sensor Network) data transmission technologies have been employed with medical sensors, and optimal medical devices would provide various Web 2.0 services by connecting to the WiBro network. The BSN platform normally recognizes in surroundings of WBAN (Wireless Body Area Network) or WPAN (Wireless Personal Area Network), and it is possible to manage sensor nodes by utilizing SOAP (Simple Object Access Protocol) and REST (REpresentational State Transfer). In addition, the feature of SNMP (Simple Network Management Protocol) for mobile gateway is also included for being adapted to huge network structure. Finally, BSN platform will play a role as important clues for developing personal WSN service models for smart healthy housing properties.

Economic Activities in Digital Platforms: Types, Natures, Risks, Policy Suggestions (플랫폼 경제활동에 대한 시론적 고찰: 유형, 특성, 예상위험, 정책대안을 중심으로)

  • Kim, Suyoung;Kang, Myungjoo;Ha, Eunsol
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.199-231
    • /
    • 2018
  • The development of ICT has led to changes in the pattern and the meaning of work and requires restructuring of the existing social security system, which was established chiefly for the wage workers in the industrial economy. However, while economic activities within the digital platform markets are different from industrial labour, there is still a lack of discussion on what social problems platform workers can face and how to cope with them. As a comprehensive sketch of economic activities in platform economy, this study identifies the types of platform workers and analyses three characteristics of their economic activities - flexibility, virtuality, and connectivity. It then examines what social risks can be derived form the three characteristics. This research lastly suggests alternative social safety nets and policies to alleviates the social risks and problems that platform workers may face in the digital society.

A Study on the way to use push notification through analysis of push notification system in mobile social network games : focus on Puzzle games (소셜 네트워크 게임 내 푸시알림 시스템 분석을 통한 푸시알림 활용 방안 : 퍼즐게임을 중심으로)

  • Shin, Hyun-Ju;Lee, Dong-Lyeor
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.427-432
    • /
    • 2015
  • Recently, Mobile Social Network Game market has grown rapidly because Smart devices has been spreading to many people and improving performance. Push notification, which is a success factor of the mobile social network game brought about stress to the user. However, there is no study on push notifications in the mobile social network game; it was difficult to understand for the use of push notifications. The Games of Kakao talk platform has various push notification system and provides detailed descriptions. On the other hand, the game linked to Facebook has minimal push notification system. In the future, if game companies develop push notification system by the characteristics of user, mobile social network games be able to derive the user's use continuously.

Aesthetic Characteristics and UX Evaluation of Mobile Platforms (모바일 플랫폼의 미학적 특징과 UX 평가)

  • Chung, Donghun
    • Science of Emotion and Sensibility
    • /
    • v.18 no.3
    • /
    • pp.71-80
    • /
    • 2015
  • Minimalism means abstinence characterized by simplicity, clarity, repetition, and exclusion while skeuomorphism means visual metaphor design characterized by retro, function, and emotion. Mobile platform interface has been developed based on those two aesthetic characteristics and user experience is evaluated using apple iOS6 and iOS7 representing skeuomorphism and minimalism respectively in this paper. Those two aesthetic designs on typography, color, and icon were tested with a sample of 35 undergraduate participants in the repeated measures design and the results showed that participants distinguished two types of aesthetic designs, and evaluated that iOS7 is superior to iOS6 on typography and identity. Comparing the levels of the three variables, aesthetic of typography, and accuracy, aesthetic and consistency of icon design were significantly differentiated and this means that although accuracy of icon design of iOS6 is superior to iOS7, iOS7 is superior in the rest of it. Overall, the participants had a positive evaluation toward iOS7.

The Model Proposal of Mobile Cloud Security Technology (모바일 클라우드 보안기술의 모델 제안)

  • Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.151-156
    • /
    • 2011
  • The Korean domestic cloud market will reach a value of 2 trillion Korean won by 2014. The domestic market is expected to grow rapidly in size despite the fact that there exist activation barriers in mobile cloud services, concerns about the reliability of service, and concerns about security and confidentiality of data. Under these circumstances, existing IT security technologies may be be utilized to provide sufficient response characteristics. Despite this, they must be optimized for mobile cloud computing and enhanced to mitigate inherent security flaws. In this study, mobile cloud security is covered along with use cases that cover the cases where mobile devices are particularly vulnerable and suggest ways to mitigate security vulnerabilities.