Abstract: The UK is leading in online retail and mobile
adoption. However, there is a dearth of information relating to mobile
apparel retail, and developing an understanding about consumer
browsing and purchase behaviour in m-retail channel would provide
apparel marketers, mobile website and app developers with the
necessary understanding of consumers’ needs. Despite the rapid
growth of mobile retail businesses, no published study has examined
shopping behaviour on fashion mobile apps and websites. A mixed method approach helped to understand why fashion
consumers prefer websites on smartphones, when diverse mobile
apps are also available. The following research methods were
employed: survey, eye-tracking experiments, observation, and
interview with retrospective think aloud. The mobile gaze tracking
device by SensoMotoric Instruments was used to understand
frustrations in navigation and other issues facing consumers in
mobile channel. This method helped to validate and compliment
other traditional user-testing approaches in order to optimize user
experience and enhance the development of mobile retail channel.
The study involved eight participants - females aged 18 to 35 years
old, who are existing mobile shoppers. The participants used the
Topshop mobile app and website on a smart phone to complete a task
according to a specified scenario leading to a purchase. The
comparative study was based on: duration and time spent at different
stages of the shopping journey, number of steps involved and product
pages visited, search approaches used, layout and visual clues, as
well as consumer perceptions and expectations. The results from the data analysis show significant differences in
consumer behaviour when using a mobile app or website on a smart
phone. Moreover, two types of problems were identified, namely
technical issues and human errors. Having a mobile app does not
guarantee success in satisfying mobile fashion consumers. The
differences in the layout and visual clues seem to influence the
overall shopping experience on a smart phone. The layout of search
results on the website was different from the mobile app. Therefore,
participants, in most cases, behaved differently on different
platforms. The number of product pages visited on the mobile app
was triple the number visited on the website due to a limited visibility
of products in the search results. Although, the data on traffic trends
held by retailers to date, including retail sector breakdowns for visits
and views, data on device splits and duration, might seem a valuable
source of information, it cannot explain why consumers visit many
product pages, stay longer on the website or mobile app, or abandon
the basket. A comprehensive list of pros and cons was developed by
highlighting issues for website and mobile app, and recommendations
provided. The findings suggest that fashion retailers need to be aware of
actual consumers’ behaviour on the mobile channel and their expectations in order to offer a seamless shopping experience. Added
to which is the challenge of retaining existing and acquiring new
customers. There seem to be differences in the way fashion
consumers search and shop on mobile, which need to be explored in
further studies.
Abstract: The use of information technology in education have
changed not only the learners learning style but also the way they
taught, where nowadays learners are connected with diversity of
information sources with means of knowledge available everywhere.
The advantage of network wireless technologies and mobility
technologies used in the education and learning processes lead to
mobile learning as a new model of learning technology. Currently,
most of mobile learning applications are developed for the formal
education and learning environment. Despite the long history and
large amount of research on mobile learning and instruction design
model still there is a need of well-defined process in designing
mobile learning applications. Based on this situation, this paper
emphasizes on identifying instruction design phase’s considerations
and influencing factors in developing mobile learning application.
This set of instruction design steps includes analysis, design,
development, implementation, evaluation and continuous has been
built from a literature study, with focus on standards for learning,
mobile application software quality and guidelines. The effort is part
of an Omani-funded research project investigating the development,
adoption and dissemination of mobile learning in Oman.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: New and more powerful communications technologies
continue to emerge at a rapid pace and their uses in education are
widespread and the impact remarkable in the developing societies.
This study investigates Mobile Collaboration Learning Technique
(MCLT) on learners’ outcome among students in tertiary institutions
of developing nations (a case of Nigeria students). It examines the
significance of retention achievement scores of students taught using
mobile collaboration and conventional method. The sample consisted
of 120 students using Stratified random sampling method. Five
research questions and hypotheses were formulated, and tested at
0.05 level of significance. A student achievement test (SAT) was
made of 40 items of multiple-choice objective type, developed and
validated for data collection by professionals. The SAT was
administered to students as pre-test and post-test. The data were
analyzed using t-test statistic to test the hypotheses. The result
indicated that students taught using MCLT performed significantly
better than their counterparts using the conventional method of
instruction. Also, there was no significant difference in the post-test
performance scores of male and female students taught using MCLT.
Based on the findings, the following submissions was made that:
Mobile collaboration system be encouraged in the institutions to
boost knowledge sharing among learners, workshop and training
should be organized to train teachers on the use of this technique,
schools and government should consistently align curriculum
standard to trends of technological dictates and formulate policies
and procedures towards responsible use of MCLT.
Abstract: Many existing amusement parks have been operated
with assistance of a variety of information and communications
technologies to design friendly and efficient service systems for
tourists. However, these systems leave various levels of decisions to
tourists to make by themselves. This incurs pressure on tourists and
thereby bringing negative experience in their tour. This paper
proposes a smart amusement park system to offer each tourist the
GPS-based customized plan without tourists making decisions by
themselves. The proposed system consists of the mobile app
subsystem, the central subsystem, and the detecting/counting
subsystem. The mobile app subsystem interacts with the central
subsystem. The central subsystem performs the necessary computing
and database management of the proposed system. The
detecting/counting subsystem aims to detect and compute the number
of visitors to an attraction. Experimental results show that the
proposed system can not only work well, but also provide an
innovative business operating model for owners of amusement parks.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: The aim of this work was to characterize a potential
target group of people interested in participating into a training
program in organic farming in the context of mobile-learning. The
information sought addressed in particular, but not exclusively,
possible contents, formats and forms of evaluation that will
contribute to define the course objectives and curriculum, as well as
to ensure that the course meets the needs of the learners and their
preferences. The sample was selected among different European
countries. The questionnaires were delivered electronically for
answering on-line and in the end 135 consented valid questionnaires
were obtained. The results allowed characterizing the target group
and identifying their training needs and preferences towards m-learning
formats, giving valuable tools to design the training offer.
Abstract: High frequency automotive interior noise above 500
Hz considerably affects automotive passenger comfort. To reduce this
noise, sound insulation material is often laminated on body panels or
interior trim panels. For a more effective noise reduction, the sound
reduction properties of this laminated structure need to be estimated.
We have developed a new calculate tool that can roughly calculate the
sound absorption and insulation properties of laminate structure and
handy for designers. In this report, the outline of this tool and an
analysis example applied to floor mat are introduced.
Abstract: In this paper, we report the development of the device
for diagnostics of cardiovascular system state and associated
automated workstation for large-scale medical measurement data
collection and analysis. It was shown that optimal design for the
monitoring device is wristband as it represents engineering trade-off
between accuracy and usability. Monitoring device is based on the
infrared reflective photoplethysmographic sensor, which allows
collecting multiple physiological parameters, such as heart rate and
pulsing wave characteristics. Developed device uses BLE interface
for medical and supplementary data transmission to the coupled
mobile phone, which processes it and send it to the doctor's
automated workstation. Results of this experimental model
approbation confirmed the applicability of the proposed approach.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: Nowadays, several research studies point up that an
active lifestyle is essential for physical and mental health benefits.
Mobile phones have greatly influenced people’s habits and attitudes
also in the way they exercise. Our research work is mainly focused on
investigating how to exploit mobile technologies to favour people’s
exertion experience. To this end, we developed an exertion framework
users can exploit through a real world mobile application, called
EverywhereSport Run (EWRun), designed to act as a virtual personal
trainer to support runners during their trainings. In this work, inspired
by both previous findings in the field of interaction design for people
with visual impairments, feedback gathered from real users of our
framework, and positive results obtained from two experimentations,
we present some new interaction facilities we designed to enhance
the interaction experience during a training. The positive obtained
results helped us to derive some interaction design recommendations
we believe will be a valid support for designers of future mobile
systems conceived to be used in circumstances where there are limited
possibilities of interaction.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: Most of the existing video streaming protocols
provide video services without considering security aspects in
decentralized mobile ad-hoc networks. The security policies adapted
to the currently existing non-streaming protocols, do not comply with
the live video streaming protocols resulting in considerable
vulnerability, high bandwidth consumption and unreliability which
cause severe security threats, low bandwidth and error prone
transmission respectively in video streaming applications. Therefore
a synergized methodology is required to reduce vulnerability and
bandwidth consumption, and enhance reliability in the video
streaming applications in MANET. To ensure the security measures
with reduced bandwidth consumption and improve reliability of the
video streaming applications, a Secure Low-bandwidth Video
Streaming through Reliable Multipath Propagation (SLVRMP)
protocol architecture has been proposed by incorporating the two
algorithms namely Secure Low-bandwidth Video Streaming
Algorithm and Reliable Secure Multipath Propagation Algorithm
using Layered Video Coding in non-overlapping zone routing
network topology. The performances of the proposed system are
compared to those of the other existing secure multipath protocols
Sec-MR, SPREAD using NS 2.34 and the simulation results show
that the performances of the proposed system get considerably
improved.
Abstract: Zn alloy and composite coatings are widely used in
buildings and structures, automobile and fasteners industries to
protect steel component from corrosion. In this paper, Zn-Ni-Al2O3
nanocomposite coatings were electrodeposited on mild steel using a
novel sol enhanced electroplating method. In this method, transparent
Al2O3 sol was added into the acidic Zn-Ni bath to produced Zn-Ni-
Al2O3 nanocomposite coatings. The effect of alumina sol on the
electrodeposition process, and coating properties was investigated
using cyclic voltammetry, XRD, ESEM and Tafel test. Results from
XRD tests showed that the structure of all coatings was single γ-
Ni5Zn21 phase. Cyclic voltammetry results showed that the
electrodeposition overpotential was lower in the presence of alumina
sol in the bath, and caused the reduction potential of Zn-Ni to shift to
more positive values. Zn-Ni-Al2O3 nanocomposite coatings produced
more uniform and compact deposits, with fine grained microstructure
when compared to Zn-Ni coatings. The corrosion resistance of Zn-Ni
coatings was improved significantly by incorporation of alumina
nanoparticles into the coatings.
Abstract: This paper presents the design, development and
evaluation of an application prototype developed to support
tuberculosis (TB) patients’ treatment adherence. The system makes
use of graphics and voice reminders as opposed to text messaging to
encourage patients to follow their medication routine. To evaluate the
effect of the prototype applications, participants were given mobile
phones on which the reminder system was installed. Thirty-eight
people, including TB health workers and patients from Zanzibar,
Tanzania, participated in the evaluation exercises. The results
indicate that the participants found the mobile image-based
application is useful to support TB treatment. All participants
understood and interpreted the intended meaning of every image
correctly. The study findings revealed that the use of a mobile visualbased
application may have potential benefit to support TB patients
(both literate and illiterate) in their treatment processes.
Abstract: The new era of digital communication has brought up
many challenges that network operators need to overcome. The high
demand of mobile data rates require improved networks, which is a
challenge for the operators in terms of maintaining the quality of
experience (QoE) for their consumers. In live video transmission,
there is a sheer need for live surveillance of the videos in order to
maintain the quality of the network. For this purpose objective
algorithms are employed to monitor the quality of the videos that are
transmitted over a network. In order to test these objective algorithms,
subjective quality assessment of the streamed videos is required, as the
human eye is the best source of perceptual assessment. In this paper we
have conducted subjective evaluation of videos with varying spatial
and temporal impairments. These videos were impaired with frame
freezing distortions so that the impact of frame freezing on the quality
of experience could be studied. We present subjective Mean Opinion
Score (MOS) for these videos that can be used for fine tuning the
objective algorithms for video quality assessment.