• Title/Summary/Keyword: mobile users

Search Result 2,991, Processing Time 0.032 seconds

An Analysis on Key Factors of Mobile Fitness Application by Using Text Mining Techniques : User Experience Perspective (텍스트마이닝 기법을 이용한 모바일 피트니스 애플리케이션 주요 요인 분석 : 사용자 경험 관점)

  • Lee, So-Hyun;Kim, Jinsol;Yoon, Sang-Hyeak;Kim, Hee-Woong
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.117-137
    • /
    • 2020
  • The development of information technology leads to changes in various industries. In particular, the health care industry is more influenced so that it is focused on. With the widening of the health care market, the market of smart device based personal health care also draws attention. Since a variety of fitness applications for smartphone based exercise were introduced, more interest has been in the health care industry. But although an amount of use of mobile fitness applications increase, it fails to lead to a sustained use. It is necessary to find and understand what matters for mobile fitness application users. Therefore, this study analyze the reviews of mobile fitness application users, to draw key factors, and thereby to propose detailed strategies for promoting mobile fitness applications. We utilize text mining techniques - LDA topic modeling, term frequency analysis, and keyword extraction - to draw and analyze the issues related to mobile fitness applications. In particular, the key factors drawn by text mining techniques are explained through the concept of user experience. This study is academically meaningful in the point that the key factors of mobile fitness applications are drawn by the user experience based text mining techniques, and practically this study proposes detailed strategies for promoting mobile fitness applications in the health care area.

High Quality Network and Device Aware Multimedia Content Delivery for Mobile Cloud

  • Saleem, Muhammad;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4886-4907
    • /
    • 2019
  • The use of mobile devices is increasing in multimedia applications. The multimedia contents are delivered to mobile users over heterogeneous networks. Due to fluctuation in bandwidth and user mobility, the service providers are facing difficulties in providing Quality of Service (QoS) guaranteed delivery for multimedia applications. Multimedia applications depend on QoS parameters such as delay, bandwidth, and jitter to offer better user experience. The existing schemes use the single source and multisource delivery but are unable to balance between stream quality and network congestion for mobile users. We proposed a Quality Oriented Multimedia Content Delivery Scheme (QOMCDS) for the mobile cloud to deliver better quality multimedia contents for the mobile user. The multimedia contents are delivered to the mobile device based on the device's parameters and network environment. The objective video quality assessment models like Peak Signal-to-Noise Ratio (PSNR), Structural Similarity (SSIM), and Video Quality Measurement (VQM) are used to measure the quality of the video. The client side Quality of Experience metric such as Startup delay, Rebuffering events, and Bitrate switch count was used for evaluation. The proposed scheme is evaluated using dash.js and is compared to existing schemes. The results show significant improvement over existing multimedia content delivery schemes.

Mobile RFID Technology Standardization Activities and Strategy (모바일 RFID 기술 표준화 활동 및 전략)

  • Oh, Se-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1698-1707
    • /
    • 2011
  • Mobile RFID technology as a typical Convergence technology combines RFID communication, mobile communication and network infrastructure, and information processing technology. As it enables users to communicate with the surroundings, Mobile RFID technology is now recognized to serve as the basis technology for the Ubiquitous Information Society where users can get the needed information anytime and anywhere. Through lots of efforts for the early technology development and standardization activities on Mobile RFID technology, Korea has been leading technology standardization as well as technology initiatives. Thus, this research paper describes the domestic and the international standardization activities on Mobile RFID technology as well as the latest standardization status. Further this paper summarizes the major standardization issues, and then proposes the standardization strategy of Mobile RFID technology by analyzing the relevant and influential factors.

Usability Evaluation Criteria for Mobile Navigation Using AHP

  • Jeong, Ye Seul;Jeong, Byung Yong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.5
    • /
    • pp.443-448
    • /
    • 2013
  • Objective: Purposes of this study are selecting main factors in evaluating the usability of mobile navigation and comprehending mutual importance among the factors. Background: Mobile navigation services have been more diffused than ever as the number of smartphone users sharply increased. However users are having trouble with the usage of mobile navigation services due to the lack of research in the area. Method: In order to attain results, general research on mobile navigation, 1st general survey, and 2nd comparative survey on navigation UI experts were performed. Empirical studies about the results were performed using AHP method. Results: As the result of AHP analysis, accuracy was drawn out to be the most important factor followed by accessibility and visibility. Regarding the characteristics of navigation system, the provision of accurate POI(Point of Interest) was considered to be the most important factor for the experts. And effectiveness was considered to be the most important, followed by satisfaction and efficiency. Conclusion: When evaluating the usability of mobile navigation, prior factors such as accuracy, visibility, and aesthetics should be considered in advance and general evaluation concentrated on effectiveness must be performed. Application: The results of this study are expected to be a fundamental data to mobile navigation design.

Mobile Application Privacy Leak Detection and Security Enhancement Research (모바일 어플리케이션 개인정보 유출탐지 및 보안강화 연구)

  • Kim, Sungjin;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.195-203
    • /
    • 2019
  • Mobile applications stores such as Google Play Store and Apple App Store, are widely used to distribute a variety of applications including finance, shopping, and entertainment. Recently, however, vulnerabilities of the mobile applications are likely to violate users' privacy such as personal information leakage. In this paper, we classify mobile applications that can be download from mobile stores, and analyze the personal information that could be leaked when users are using the mobile applications. As a result of analysis, we found that personal information are leaked in some widely used mobile applications in practice. On the basis of our experiment results, we propose some mitigations to enhance security of the mobile applications and prevent leakage of personal information.

Inexperience and Experience with Mobile Data Services;Extended TAM

  • Kim, Byoung-Soo;Choi, Minn-Seok;Han, In-Goo
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.521-526
    • /
    • 2007
  • This study proposed an expanded technology acceptance model (TAM) incorporating perceived fee (PFE) and perceived enjoyment into the original TAM We examined that the extended TAM provides supplementary information about behavior intentions (BI) toward mobile data services (MDS). This study also investigated some significant differences in the relative influence of the determinants of BI toward MDS depending on experience. The extended TAM was empirically evaluated by using survey data collected from 149 inexperienced users and 393 experienced users. The findings indicated that PFE is the strongest determinant of BI toward MDS, and the antecedents leading to users' BI vary over time. The results may provide further insights into MDS practitioners and marketing managers.

  • PDF

The Study on Mobile Service Methods of Location-based Social Media (위치기반 소셜 미디어의 모바일 서비스 기법 연구)

  • Choi, Jin-Oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.114-116
    • /
    • 2012
  • According to common use of smart mobile devices, various services based on the location become to appear. Futhermore, as the number of social media users using the mobile devices grows rapidly, the needs for Social Media services based on location also increase. With proposing the method to access and analysis the location-based social media database by standard SNS API, this thesis introduces technical methods to generate and the information which users want to get and to service them by mobile in real time.

  • PDF

A Study on Mobile OTP Generation Model (모바일 OTP 생성 모델에 관한 연구)

  • Jeong, Yoon-Su;Han, Sang-Ho;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.183-191
    • /
    • 2012
  • This study proposes dual certification model using both what users know and what users own. In detail, this mobile OTP generation model is made up of mobile OTP generation and extraction algorithm satisfying the conditions for reviewing mobile OTP implementation. In order to improve the security of the existing OTP-based systems, the suggested method utilizes user's ID and random number at the mobile OTP generation stage.

A STUDY ON ENCODING/DECODING TECHNIQUE OF SENSOR DATA FOR A MOBILE MAPPING SYSTEM

  • Bae, Sang-Keun;Kim, Byung-Guk
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.705-708
    • /
    • 2005
  • Mobile Mapping Systems using the vehicle equipped the GPS, IMU, CCD Cameras is the effective system for the management of the road facilities, update of the digital map, and etc. They must provide users with the sensor data which is acquired by Mobile Mapping Systems in real-time so that users can process what they want by using the latest data. But it' s not an easy process because the amount of sensor data is very large, particularly image data to be transmitted. So it is necessary to reduce the amount of image data so that it is transmitted effectively. In this study, the effective method was suggested for the compression/decompression image data using the Wavelet Transformation and Huffman Coding. This technique will be possible to transmit of the geographic information effectively such as position data, attitude data, and image data acquired by Mobile Mapping Systems in the wireless internet environment when data is transmitted in real-time.

  • PDF

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.