scispace - formally typeset
Search or ask a question

Showing papers on "Mobile technology published in 2016"


Proceedings ArticleDOI
01 Jan 2016
TL;DR: In this paper, some of the promising real time Mobile Edge Computing application scenarios are discussed and a state-of-the-art research efforts on Mobile Edge computing domain is presented.
Abstract: Mobile Edge Computing is an emerging technology that provides cloud and IT services within the close proximity of mobile subscribers. Traditional telecom network operators perform traffic control flow (forwarding and filtering of packets), but in Mobile Edge Computing, cloud servers are also deployed in each base station. Therefore, network operator has a great responsibility in serving mobile subscribers. Mobile Edge Computing platform reduces network latency by enabling computation and storage capacity at the edge network. It also enables application developers and content providers to serve context-aware services (such as collaborative computing) by using real time radio access network information. Mobile and Internet of Things devices perform computation offloading for compute intensive applications, such as image processing, mobile gaming, to leverage the Mobile Edge Computing services. In this paper, some of the promising real time Mobile Edge Computing application scenarios are discussed. Later on, a state-of-the-art research efforts on Mobile Edge Computing domain is presented. The paper also presents taxonomy of Mobile Edge Computing, describing key attributes. Finally, open research challenges in successful deployment of Mobile Edge Computing are identified and discussed.

523 citations


Journal ArticleDOI
TL;DR: A new mobile technology acceptance model (MTAM) which consists of mobile usefulness (MU) and mobile ease of use (MEU) to determine SCC adoption is proposed which confirms the role of MU in MTAM, but MEU needs for more attention in practice.
Abstract: The study investigates on the factors influencing users' IU to adopt SCC.MPC, MU and MPT have significant impact on IU.MEU, MPSR and MPFR are non-significant with IU.MPC and MPFR have significant influence on MU.MPC has significant influence on MEU while MPFR is non-significant with MEU. Smartphone credit card (SCC) is an emerging payment method using NFC-enabled smartphones. The proximity payment allows consumers to pay their products and services by waving their smartphones with a NFC reader. While there are advantageous adopting SCC, the adoption rate has not been encouraging. Interestingly, existing research work on past information technology and system models have so far focused primarily on organizational context and adopted specifically for work. Furthermore, past antecedents were mainly constructed using electronic commerce literatures which do not reflect the actual mobile environment. In contrast SCC is mainly adopted voluntarily by mobile users and for personal purposes. Thus this leads to the difficulty in drawing meaningful conclusion. The study addresses these limitations by proposing a new mobile technology acceptance model (MTAM) which consists of mobile usefulness (MU) and mobile ease of use (MEU) to determine SCC adoption. In anticipating on the complexity which exists in the mobile environment, additional mobile constructs namely mobile perceived security risk (MPSR), mobile perceived trust (MPT), mobile perceived compatibility (MPC) and mobile perceived financial resources (MPFR) were incorporated into the parsimonious MTAM. The integrated model was applied to 459 mobile users through a questionnaire approach and tested using partial least square-structural equation modelling-artificial neural network (PLS-SEM-ANN) has provided a new impact and a possible new research methodology paradigm as it is able to capture both linear and non-linear relationships. While the model confirms the role of MU in MTAM, MEU needs for more attention in practice. The results from the extended model showed that only three of the proposed hypotheses were non-significant in this study and thus warrant further investigation. The study contributes to academia by proposing new mobile constructs that brings together MTAM to assess the likelihood of mobile users to adopt SCC. The study also offers several important managerial implications which can be generalized to the mobile studies of other transportation, hotel, banking, and tourism industries.

333 citations


Journal ArticleDOI
TL;DR: A research model that incorporates antecedents of mobile shopping loyalty in a hotel booking context revealed that convenience, compatibility, and perceived ease of use (PEOU) had a significant impact on the users loyalty intentions toward MHB technology.

295 citations


Journal ArticleDOI
TL;DR: An overview of different continuous authentication methods on mobile devices is provided and the merits and drawbacks of the available approaches are discussed and promising avenues of research in this rapidly evolving field are identified.
Abstract: Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field.

294 citations


Journal ArticleDOI
TL;DR: This state-of-the-art review assesses the current literature of mHealth and aims to provide a framework for the advances in mHealth by understanding the various device, patient, and clinical factors as they relate to digital health from device designs and patient engagement, to clinical workflow and device regulation.
Abstract: The convergence of science and technology in our dynamic digital era has resulted in the development of innovative digital health devices that allow easy and accurate characterization in health and disease. Technological advancements and the miniaturization of diagnostic instruments to modern smartphone-connected and mobile health (mHealth) devices such as the iECG, handheld ultrasound, and lab-on-a-chip technologies have led to increasing enthusiasm for patient care with promises to decrease healthcare costs and to improve outcomes. This ‘hype’ for mHealth has recently intersected with the ‘real world’ and is providing important insights into how patients and practitioners are utilizing digital health technologies. It is also raising important questions regarding the evidence supporting widespread device use. In this state-of-the-art review, we assess the current literature of mHealth and aim to provide a framework for the advances in mHealth by understanding the various device, patient, and clinical factors as they relate to digital health from device designs and patient engagement, to clinical workflow and device regulation. We also outline new strategies for generation and analysis of mHealth data at the individual and population-based levels.

282 citations


Journal ArticleDOI
TL;DR: In this article, the authors define mobile shopper marketing as the planning and execution of all mobile-based marketing activities that influence a shopper along and beyond the path-to-purchase: from the initial shopping trigger, to the purchase, consumption, repurchase and recommendation stages.

277 citations


Journal ArticleDOI
TL;DR: The evolution toward a "network of functions," network slicing, and software-defined mobile network control, management, and orchestration is discussed, and the roadmap for the future evolution of 3GPP EPS and its technology components is detailed and relevant standards defining organizations are listed.
Abstract: As a chain is as strong as its weakest element, so are the efficiency, flexibility, and robustness of a mobile network, which relies on a range of different functional elements and mechanisms. Indeed, the mobile network architecture needs particular attention when discussing the evolution of 3GPP EPS because it is the architecture that integrates the many different future technologies into one mobile network. This article discusses 3GPP EPS mobile network evolution as a whole, analyzing specific architecture properties that are critical in future 3GPP EPS releases. In particular, this article discusses the evolution toward a "network of functions," network slicing, and software-defined mobile network control, management, and orchestration. Furthermore, the roadmap for the future evolution of 3GPP EPS and its technology components is detailed and relevant standards defining organizations are listed.

259 citations


Journal ArticleDOI
TL;DR: In this article, the authors provide a systematic overview of game design and note how principles derived from that field are highly applicable to gamification in mobile marketing settings, aided by the work of Schell (2008), whose Elemental Game Tetrad Model allows them to offer a coherent look at how gamification should affect mobile marketing outcomes.

251 citations


Journal ArticleDOI
TL;DR: A framework of Big Data-Driven (BDD) mobile network optimization is proposed and the characteristics of big data that are collected not only from user equipment but also from mobile networks are presented.
Abstract: Big data offers a plethora of opportunities to mobile network operators for improving quality of service. This article explores various means of integrating big data analytics with network optimization toward the objective of improving the user quality of experience. We first propose a framework of Big Data-Driven (BDD) mobile network optimization. We then present the characteristics of big data that are collected not only from user equipment but also from mobile networks. Moreover, several techniques in data collection and analytics are discussed from the viewpoint of network optimization. Certain user cases on the application of the proposed framework for improving network performance are also given in order to demonstrate the feasibility of the framework. With the integration of the emerging fifth generation (5G) mobile networks with big data analytics, the quality of our daily mobile life is expected to be tremendously enhanced.

245 citations


Journal ArticleDOI
TL;DR: It is suggested that facilitating access to information and increasing engagement to learning are the two main impacts of mobile technology in the classroom, and the choice of Apps is related to teachers' perception of how mobile technology impacts in learning.

241 citations


Journal ArticleDOI
TL;DR: This paper investigates to what extent an external attacker can identify the specific actions that a user is performing on her mobile apps, and design a system that achieves this goal using advanced machine learning techniques, and compares the solution with the three state-of-the-art algorithms.
Abstract: Mobile devices can be maliciously exploited to violate the privacy of people. In most attack scenarios, the adversary takes the local or remote control of the mobile device, by leveraging a vulnerability of the system, hence sending back the collected information to some remote web service. In this paper, we consider a different adversary, who does not interact actively with the mobile device, but he is able to eavesdrop the network traffic of the device from the network side (e.g., controlling a Wi-Fi access point). The fact that the network traffic is often encrypted makes the attack even more challenging. In this paper, we investigate to what extent such an external attacker can identify the specific actions that a user is performing on her mobile apps. We design a system that achieves this goal using advanced machine learning techniques. We built a complete implementation of this system, and we also run a thorough set of experiments, which show that our attack can achieve accuracy and precision higher than 95%, for most of the considered actions. We compared our solution with the three state-of-the-art algorithms, and confirming that our system outperforms all these direct competitors.

Journal ArticleDOI
TL;DR: The motivation and development of networked healthcare applications and systems is presented along with the adoption of cloud computing in healthcare, and a cloudlet-based mobile cloud-computing infrastructure to be used for healthcare big data applications is described.
Abstract: Mobile devices are increasingly becoming an indispensable part of people’s daily life, facilitating to perform a variety of useful tasks. Mobile cloud computing integrates mobile and cloud computing to expand their capabilities and benefits and overcomes their limitations, such as limited memory, CPU power, and battery life. Big data analytics technologies enable extracting value from data having four Vs: volume, variety, velocity, and veracity. This paper discusses networked healthcare and the role of mobile cloud computing and big data analytics in its enablement. The motivation and development of networked healthcare applications and systems is presented along with the adoption of cloud computing in healthcare. A cloudlet-based mobile cloud-computing infrastructure to be used for healthcare big data applications is described. The techniques, tools, and applications of big data analytics are reviewed. Conclusions are drawn concerning the design of networked healthcare systems using big data and mobile cloud-computing technologies. An outlook on networked healthcare is given.

Journal ArticleDOI
TL;DR: The aim of this article is to develop an architecture based on an ontology capable of monitoring the health and workout routine recommendations to patients with chronic diseases.

Journal ArticleDOI
TL;DR: This paper serves as a survey of the most significant work performed in the area of mobile phone computing combined with the IoT/WoT, and a selection of over 100 papers is presented, which constitute the mostsignificant work in the field up to date.
Abstract: As the Internet of Things (IoT) and the Web of Things (WoT) are becoming a reality, their interconnection with mobile phone computing is increasing. Mobile phone integrated sensors offer advanced services, which when combined with Web-enabled real-world devices located near the mobile user (e.g., body area networks, radio-frequency identification tags, energy monitors, environmental sensors, etc.), have the potential of enhancing the overall user knowledge, perception and experience, encouraging more informed choices and better decisions. This paper serves as a survey of the most significant work performed in the area of mobile phone computing combined with the IoT/WoT. A selection of over 100 papers is presented, which constitute the most significant work in the field up to date, categorizing these papers into ten different domains, according to the area of application (i.e., health, sports, gaming, transportation, and agriculture), the nature of interaction (i.e., participatory sensing, eco-feedback, actuation, and control), or the communicating actors involved (i.e., things and people). Open issues and research challenges are identified, analyzed and discussed.

Journal ArticleDOI
TL;DR: The aim of this paper is to understand the extent to which mobile technologies have an impact on consumer behaviour, with emphasis on the drivers motivating consumers to adopt the consumer experience of mobile shopping, and investigate the impact of mobile technologies on consumer dynamics.

Journal ArticleDOI
TL;DR: This position article formalizes this paradigm, discusses its most significant application opportunities, and outlines the major challenges in performing real-time energy-efficient management of the distributed resources available at both mobile devices and Internet-connected data centers.
Abstract: Big data stream mobile computing is proposed as a paradigm that relies on the convergence of broadband Internet mobile networking and real-time mobile cloud computing. It aims at fostering the rise of novel self-configuring integrated computing-communication platforms for enabling in real time the offloading and processing of big data streams acquired by resource-limited mobile/wireless devices. This position article formalizes this paradigm, discusses its most significant application opportunities, and outlines the major challenges in performing real-time energy-efficient management of the distributed resources available at both mobile devices and Internet-connected data centers. The performance analysis of a small-scale prototype is also included in order to provide insight into the energy vs. performance tradeoff that is achievable through the optimized design of the resource management modules. Performance comparisons with some state-of-the-art resource managers corroborate the discussion. Hints for future research directions conclude the article.

Journal ArticleDOI
TL;DR: The current state of mobile applications for health behavioural change with an emphasis on applications that promote physical activity is reviewed, and system credibility support was found to have only low levels of representation as a persuasive systems design feature in mobile application for supporting physical activity.
Abstract: Persuasive technology in mobile applications can be used to influence the behaviour of users. A framework known as the Persuasive Systems Design model has been developed for designing and evaluating systems that influence the attitudes or behaviours of users. This paper reviews the current state of mobile applications for health behavioural change with an emphasis on applications that promote physical activity. The inbuilt persuasive features of mobile applications were evaluated using the Persuasive Systems Design model. A database search was conducted to identify relevant articles. Articles were then reviewed using the Persuasive Systems Design model as a framework for analysis. Primary task support, dialogue support, and social support were found to be moderately represented in the selected articles. However, system credibility support was found to have only low levels of representation as a persuasive systems design feature in mobile applications for supporting physical activity. To ensure that available mobile technology resources are best used to improve the wellbeing of people, it is important that the design principles that influence the effectiveness of persuasive technology be understood.

Journal ArticleDOI
28 Jun 2016-Zdm
TL;DR: This literature survey focuses on identifying recent advances in research on digital technology in the field of mathematics education and discusses some of the implications that these digital technologies may have for mathematics education research and practice as well as making some recommendations for future research.
Abstract: In this literature survey we focus on identifying recent advances in research on digital technology in the field of mathematics education. To conduct the survey we have used internet search engines with keywords related to mathematics education and digital technology and have reviewed some of the main international journals, including the ones in Portuguese and Spanish. We identify five sub-areas of research, important trends of development, and illustrate them using case studies: mobile technologies, massive open online courses (MOOCs), digital libraries and designing learning objects, collaborative learning using digital technology, and teacher training using blended learning. These examples of case studies may help the reader to understand how recent developments in this area of research have evolved in the last few years. We conclude the report discussing some of the implications that these digital technologies may have for mathematics education research and practice as well as making some recommendations for future research in this area.

Proceedings ArticleDOI
16 May 2016
TL;DR: A hierarchical model that is composed of MEC servers and Cloudlets infrastructures is proposed to increase the coverage area for the mobile users in which the users can accomplish their requested services with minimal costs in terms of power and delay.
Abstract: Extending the coverage area of mobile cloud computing services will allow new services to be provisioned to the mobile users. The main obstacle for achieving this goal is related to the deployments challenges and limitations of the Cloudlets system. Mobile Edge Computing (MEC) system emerged recently providing an opportunity to fill the gap of the Cloudlets system by providing resources-rich computing resources with proximity to the end users. In this paper, we are proposing a hierarchical model that is composed of MEC servers and Cloudlets infrastructures. The objective of the proposed model is to increase the coverage area for the mobile users in which the users can accomplish their requested services with minimal costs in terms of power and delay. An extensive experimental evaluation is conducted showing the superiority of the proposed model.

Journal ArticleDOI
TL;DR: This paper surveys the literature over the period of 1991-2014 from the emerging concepts to applications of context-awareness in mobile platforms by providing up-to-date research and future research directions and points out the challenges faced and enlightens them by proposing possible solutions.
Abstract: The evolution of smartphones together with increasing computational power has empowered developers to create innovative context-aware applications for recognizing user-related social and cognitive activities in any situation and at any location. The existence and awareness of the context provide the capability of being conscious of physical environments or situations around mobile device users. This allows network services to respond proactively and intelligently based on such awareness. The key idea behind context-aware applications is to encourage users to collect, analyze, and share local sensory knowledge in the purpose for a large-scale community use by creating a smart network. The desired network is capable of making autonomous logical decisions to actuate environmental objects and also assist individuals. However, many open challenges remain, which are mostly arisen because the middleware services provided in mobile devices have limited resources in terms of power, memory, and bandwidth. Thus, it becomes critically important to study how the drawbacks can be elaborated and resolved and, at the same time, better understand the opportunities for the research community to contribute to the context-awareness. To this end, this paper surveys the literature over the period of 1991–2014 from the emerging concepts to applications of context-awareness in mobile platforms by providing up-to-date research and future research directions. Moreover, it points out the challenges faced in this regard and enlightens them by proposing possible solutions.

Journal ArticleDOI
TL;DR: This systematic review reveals the trends in mobile learning in science with a comprehensive analysis and synthesis of studies from the year 2000 onward.
Abstract: The use of mobile learning in education is growing at an exponential rate. To best understand how mobile learning is being used, it is crucial to gain a collective understanding of the research that has taken place. This systematic review reveals the trends in mobile learning in science with a comprehensive analysis and synthesis of studies from the year 2000 onward. Major findings include that most of the studies focused on designing systems for mobile learning, followed by a combination of evaluating the effects of mobile learning and investigating the affective domain during mobile learning. The majority of the studies were conducted in the area of life sciences in informal, elementary (5–11 years) settings. Mobile devices were used in this strand of science easily within informal environments with real-world connections. A variety of research methods were employed, providing a rich research perspective. As the use of mobile learning continues to grow, further research regarding the use of mobile technologies in all areas and levels of science learning will help science educators to expand their ability to embrace these technologies.

Proceedings ArticleDOI
24 Oct 2016
TL;DR: Results show that VoiceLive is robust to different phone placements and is compatible to different sampling rates and phone models, and uses such unique TDoA dynamic which doesn't exist under replay attacks for liveness detection.
Abstract: Voice authentication is drawing increasing attention and becomes an attractive alternative to passwords for mobile authentication. Recent advances in mobile technology further accelerate the adoption of voice biometrics in an array of diverse mobile applications. However, recent studies show that voice authentication is vulnerable to replay attacks, where an adversary can spoof a voice authentication system using a pre-recorded voice sample collected from the victim. In this paper, we propose VoiceLive, a practical liveness detection system for voice authentication on smartphones. VoiceLive detects a live user by leveraging the user's unique vocal system and the stereo recording of smartphones. In particular, with the phone closely placed to a user's mouth, it captures time-difference-of-arrival (TDoA) changes in a sequence of phoneme sounds to the two microphones of the phone, and uses such unique TDoA dynamic which doesn't exist under replay attacks for liveness detection. VoiceLive is practical as it doesn't require additional hardware but two-channel stereo recording that is supported by virtually all smartphones. Our experimental evaluation with 12 participants and different types of phones shows that VoiceLive achieves over 99% detection accuracy at around 1% Equal Error Rate (EER). Results also show that VoiceLive is robust to different phone placements and is compatible to different sampling rates and phone models.

Proceedings ArticleDOI
01 Jun 2016
TL;DR: This position paper focuses in depth on a Hadoop based framework for ad-hoc mobile cloud computing and refers to a research paper and the authors' decision to use and port Hadoops to build a Virtual Cloud Computing Provider for Mobile Devices.
Abstract: Along with the explosive growth of the mobile applications and up-raising cloud computing concept, mobile cloud computing appears to be a new potential technology for mobile services. Mobile cloud computing maps cloud computing ideas on top of the mobile environment, and overcomes obstacles that deal with performance (i.e. battery life, CPU, storage, and bandwidth), environment (i.e. heterogeneity, scalability, availability) and security (i.e. reliability, privacy) discussed in mobile computing. In this position paper we are going to focus in depth on a Hadoop based framework for ad-hoc mobile cloud computing — we specifically refer to a research paper and the authors' decision to use and port Hadoop to build a Virtual Cloud Computing Provider for Mobile Devices. In the beginning, we are going to outline a short introduction and enumerate the challenges that we face implementing a framework for mobile cloud computing. We conclude this paper with a short example of other Map-Reduce based MCC (Mobile Cloud Computing) framework, which achieved better performance using its own custom implementation.

Journal ArticleDOI
TL;DR: It is concluded that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.
Abstract: Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system IDS is an efficient approach for protecting wireless communications in the Fifth Generation 5G context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright © 2015John Wiley & Sons, Ltd.

Proceedings ArticleDOI
01 Mar 2016
TL;DR: A platform is proposed, named WiCloud, to provide edge networking, proximate computing and data acquisition for innovative services, and the open challenges that must be addressed before the commercial deployment of MEC are discussed.
Abstract: Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. This paper presents an investigation on the progress of MEC, and proposes a platform, named WiCloud, to provide edge networking, proximate computing and data acquisition for innovative services. Furthermore, the open challenges that must be addressed before the commercial deployment of MEC are discussed.

Journal ArticleDOI
TL;DR: A novel framework to deliver mobile big data over content- centric mobile social networks is proposed, where each datum consists of interest packets and data packets, respectively.
Abstract: Due to the rapid development of mobile social networks, mobile big data play an important role in providing mobile social users with various mobile services. However, as mobile big data have inherent properties, current MSNs face a challenge to provide mobile social user with a satisfactory quality of experience. Therefore, in this article, we propose a novel framework to deliver mobile big data over content- centric mobile social networks. At first, the characteristics and challenges of mobile big data are studied. Then the content-centric network architecture to deliver mobile big data in MSNs is presented, where each datum consists of interest packets and data packets, respectively. Next, how to select the agent node to forward interest packets and the relay node to transmit data packets are given by defining priorities of interest packets and data packets. Finally, simulation results show the performance of our framework with varied parameters.

Journal ArticleDOI
TL;DR: The security analysis of the proposed AMUA protocol demonstrates that it satisfies the security requirements in practical applications and is provably secure in the novel security model and is more practical for various mobile applications.
Abstract: Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices enable anytime, anywhere access to the Internet. The fast growth of many types of mobile services used by various users has made the traditional single-server architecture inefficient in terms of its functional requirements. To ensure the availability of various mobile services, there is a need to deploy multi-server architectures. To ensure the security of various mobile service applications, the anonymous mobile user authentication (AMUA) protocol without online registration using the self-certified public key cryptography (SCPKC) for multi-server architectures was proposed in the past. However, most of the past AMUA solutions suffer from malicious attacks or have unacceptable computation and communication costs. To address these drawbacks, we propose a new AMUA protocol that uses the SCPKC for multi-server architectures. In contrast to the existing AMUA protocols, our proposed AMUA protocol incurs lower computation and communication costs. By comparing with two of the latest AMUA protocols, the computation and the communication costs of our protocol are at least 74.93% and 37.43% lower than them, respectively. Moreover, the security analysis of our AMUA protocol demonstrates that it satisfies the security requirements in practical applications and is provably secure in the novel security model. By maintaining security at various levels, our AMUA protocol is more practical for various mobile applications.

BookDOI
21 Apr 2016
TL;DR: This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies and presents the new framework possibilities offered by 5G mobile networks.
Abstract: This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot ofemerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

Journal ArticleDOI
TL;DR: It was demonstrated that the use of a mobile LMS positively influenced online students' academic achievement and a better understanding of students' usage of mobile devices in higher education was presented.
Abstract: Mobile learning has become widespread, and higher education institutions have started adopting mobile technology to cope with the needs of students. Despite its adoption in higher education settings, little research has been done to examine factors influencing the adoption of mobile learning management systems (LMSs) and the learning effects on students' academic achievement. To explore the relationships among factors and the educational effectiveness of mobile LMSs, students' demographic backgrounds (age and employment status), self-reported psychological data (self-efficacy, innovativeness, perceived ease of use, and perceived usefulness of mobile LMSs), and external factors (subjective norms) were collected from 1604 students from 10 repetitions of the same course in an online university in Korea, in addition to their test scores. The logistic regression results showed that age and employment status were significant factors in predicting students' adoption of mobile LMSs and that there were potential connections between mobile LMS use and students' gender, age, and psychological characteristics. In addition, the study demonstrated that the use of a mobile LMS positively influenced online students' academic achievement. The findings from this empirical study present a better understanding of students' usage of mobile devices in higher education. Factors influencing the adoption of mobile LMS were investigated.The use of mobile LMS was affected by multi-dimensional characteristics of factors.The use of mobile LMS had a positive relationship with students' achievement.

Proceedings ArticleDOI
12 Mar 2016
TL;DR: It is demonstrated that CPUs play a crucial role in modern mobile system-on-chips (SoCs) and specialized accelerators appear to be a promising alternative that can help sustain the power, performance, and energy improvements that mobile computing necessitates.
Abstract: In this paper, we assess the past, present, and future of mobile CPU design. We study how mobile CPU designs trends have impacted the end-user, hardware design, and the holistic mobile device. We analyze the evolution often cutting-edge mobile CPU designs released over the past seven years. Specifically, we report measured performance, power, energy and user satisfaction trends across mobile CPU generations. A key contribution of our work is that we contextualize the mobile CPU's evolution in terms of user satisfaction, which has largely been absent from prior mobile hardware studies. To bridge the gap between mobile CPU design and user satisfaction, we construct and conduct a novel crowdsourcing study that spans over 25,000 survey participants using the Amazon Mechanical Turk service. Our methodology allows us to identify what mobile CPU design techniques provide the most benefit to the end-user's quality of user experience. Our results quantitatively demonstrate that CPUs play a crucial role in modern mobile system-on-chips (SoCs). Over the last seven years, both single-and multicore performance improvements have contributed to end-user satisfaction by reducing user-critical application response latencies. Mobile CPUs aggressively adopted many power-hungry desktop-oriented design techniques to reach these performance levels. Unlike other smartphone components (e.g. display and radio) whose peak power consumption has decreased over time, the mobile CPU's peak power consumption has steadily increased. As the limits of technology scaling restrict the ability of desktop-like scaling to continue for mobile CPUs, specialized accelerators appear to be a promising alternative that can help sustain the power, performance, and energy improvements that mobile computing necessitates. Such a paradigm shift will redefine the role of the CPU within future SoCs, which merit several design considerations based on our findings.