Search results for: secured mobile banking
1935 Lyapunov-Based Tracking Control for Nonholonomic Wheeled Mobile Robot
Authors: Raouf Fareh, Maarouf Saad, Sofiane Khadraoui, Tamer Rabie
Abstract:
This paper presents a tracking control strategy based on Lyapunov approach for nonholonomic wheeled mobile robot. This control strategy consists of two levels. First, a kinematic controller is developed to adjust the right and left wheel velocities. Using this velocity control law, the stability of the tracking error is guaranteed using Lyapunov approach. This kinematic controller cannot be generated directly by the motors. To overcome this problem, the second level of the controllers, dynamic control, is designed. This dynamic control law is developed based on Lyapunov theory in order to track the desired trajectories of the mobile robot. The stability of the tracking error is proved using Lupunov and Barbalat approaches. Simulation results on a nonholonomic wheeled mobile robot are given to demonstrate the feasibility and effectiveness of the presented approach.Keywords: mobile robot, trajectory tracking, Lyapunov, stability
Procedia PDF Downloads 3731934 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 3651933 Localization Mobile Beacon Using RSSI
Authors: Sallama Resen, Celal Öztürk
Abstract:
Distance estimation between tow nodes has wide scope of surveillance and tracking applications. This paper suggests a Bluetooth Low Energy (BLE) technology as a media for transceiver and receiver signal in small indoor areas. As an example, BLE communication technologies used in child safety domains. Local network is designed to detect child position in indoor school area consisting Mobile Beacons (MB), Access Points (AP) and Smart Phones (SP) where MBs stuck in children’s shoes as wearable sensors. This paper presents a technique that can detect mobile beacons’ position and help finding children’s location within dynamic environment. By means of bluetooth beacons that are attached to child’s shoes, the distance between the MB and teachers SP is estimated with an accuracy of less than one meter. From the simulation results, it is shown that high accuracy of position coordinates are achieved for multi-mobile beacons in different environments.Keywords: bluetooth low energy, child safety, mobile beacons, received signal strength
Procedia PDF Downloads 3461932 Mobile Phones in Saudi Arabian EFL Classrooms
Authors: Srinivasa Rao Idapalapati, Manssour Habbash
Abstract:
As mobile connectedness continues to sweep across the landscape, the value of deploying mobile technology to the service of learning and teaching appears to be both self-evident and unavoidable. To this end, this study explores the reasons for the reluctance of teachers in Saudi Arabia to use mobiles in EFL (English as a Foreign Language) classes for teaching and learning purposes. The main objective of this study is a qualitative analysis of the responses of the views of the teachers at a university in Saudi Arabia about the use of mobile phones in classrooms for educational purposes. Driven by the hypothesis that the teachers in Saudi Arabian universities aren’t prepared well enough to use mobile phones in classrooms for educational purposes, this study examines the data obtained through a questionnaire provided to about hundred teachers working at a university in Saudi Arabia through convenient sampling method. The responses are analyzed by qualitative interpretive method and found that teachers and the students are in confusion whether to use mobiles, and need some training sessions on the use of mobile phones in classrooms for educational purposes. The outcome of the analysis is discussed in light of the concerns bases adoption model and the inferences are provided in a descriptive mode.Keywords: mobile assisted language learning, technology adoption, classroom instruction, concerns based adoption model
Procedia PDF Downloads 3641931 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3961930 Development of Mobile Application for Energy Consumption Assessment of University Buildings
Authors: MinHee Chung, BoYeob Lee, Yuri Kim, Eon Ku Rhee
Abstract:
With an increase in the interest in the energy conservation for buildings, and the emergence of many methods and easily-understandable approaches to it, energy conservation has now become the public’s main interest, as compared to in the past when it was only focused upon by experts. This study aims to help the occupants of a building to understand the energy efficiency and consumption of the building by providing them information on the building’s energy efficiency through a mobile application. The energy performance assessment models are proposed on the basis of the actual energy usage and building characteristics such as the architectural scheme and the building equipment. The university buildings in Korea are used as a case to demonstrate the mobile application.Keywords: energy consumption, energy performance assessment, mobile application, university buildings
Procedia PDF Downloads 5451929 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 3851928 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3171927 Factors Affecting Employee’s Effectiveness at Job in Banking Sectors of Pakistan
Authors: Sajid Aman
Abstract:
Jobs in the banking sector in Pakistan are perceived as very tough, due to which employee turnover is very high. However, the managerial role is very important in influencing employees’ attitudes toward their turnout. This paper explores the manager’s role in influencing employees’ effectiveness on the job. The paper adopted a pragmatic approach by combining both qualitative and quantitative data. The study employed an exploratory sequential strategy under a mixed-method research design. Qualitative data was analyzed using thematic analysis. Five major themes, such as the manager’s attitude towards employees, his leadership style, listening to employee’s personal problems, provision of personal loans without interest and future career prospects, emerged as key factors increasing employee’s effectiveness in the banking sector. The quantitative data revealed that a manager’s attitude, leadership style, availability to listen to employees’ personal problems, and future career prospects and listening to employee’s personal problems are strongly associated with employees’ effectiveness at the job. However, personal loan without interest was noted as having no significant association with employee’s effectiveness at the job. The study concludes manager’s role is more important in the effectiveness of the employees at their job in the banking sector. It is suggested that managers should have a positive attitude towards employees and give time to listening to employee’s problems, even personal ones.Keywords: banking sector, employee’s effectiveness, manager’s role, leadership style
Procedia PDF Downloads 321926 Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba
Authors: Mavis Ofosuah Asante, Abena Abokoma Asemanyi, Belinda Osei-mensah, Stephen Osei Akyiaw
Abstract:
The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services.Keywords: mobile money, fraud, telecommunication, merchant
Procedia PDF Downloads 781925 Factors of Divergence of Shari’Ah Supervisory Opinions and Its Effects on the Harmonization of Islamic Banking Products and Services
Authors: Dlir Abdullah Ahmed
Abstract:
Overall aims of this study are to investigate the effects of differences of opinions among Shari’ah supervisory bodies on standardization and internationalization of Islamic banking products and services. The study has used semi-structured in-depth interview where five respondents from both the Middle East and Malaysia Shari’ah advisors participated in the interview sessions. The data were analyzed by both manual and software techniques. The findings reveal that indeed there are differences of opinions among Shari’ah advisors in different jurisdictions. These differences are due to differences in educational background, schools of thoughts, environment in which they operate, and legal requirements. Moreover, the findings also reveal that these differences in opinions among Shari’ah bodies create confusions among public and bankers, and negatively affect standardization of Islamic banking transactions. In addition, the study has explored the possibility to develop Islamic-based products. However, the finding shows that it is difficult for the industry to have Islamic-based products due to high competition from conventional counterpart, legal constraints and moral hazard. Furthermore, the findings indicate that lack of political will and unity, lack of technology are the main constraints to internationalization of Islamic banking products. Last but not least, the study found that there are possibility of convergence of opinions, standardization of Islamic banking products and services if there are unified international Shari’ah h advisory council, international basic requirements for Islamic Shari’ah h advisors, and increase training and educations of Islamic bankers. This study has several implications to the bankers, policymakers and researchers. The policymakers should be able to resolve their political differences and set up unified international advisory council and international research and development center. The bankers should increase training and educations of the workforce as well improve on their banking infrastructure to facility cross-border transactions.Keywords: Shari’ah h views, Islamic banking, products & services, standardization.
Procedia PDF Downloads 691924 Congestion Control in Mobile Network by Prioritizing Handoff Calls
Authors: O. A. Lawal, O. A Ojesanmi
Abstract:
The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.Keywords: call block, channel, handoff, mobile cellular network
Procedia PDF Downloads 3941923 Challenge Response-Based Authentication for a Mobile Voting System
Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono
Abstract:
A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.Keywords: authentication, data protection, mobile voting, security
Procedia PDF Downloads 4191922 An Empirical Study of Shariah Legitimacy of Islamic Banking Operations in Pakistan
Authors: Muhammad Khaleequzzaman, Muhammad Mansoori, Abdul Rashid
Abstract:
The legitimacy of Islamic banking refers to the compliance with the precepts of Shariah (Islamic law) of the pronouncements and their implementation, requisites of various contracts, as well as, observance of the welfare objectives. Therefore, the Islamic banks are supposed to follow the Islamic values focused to bring benefit to the society alongside the commercial motive. These distinguishing features establish identity of the Islamic banks separate from their conventional counterparts and require pursuing normative values of Islamic injunctions instead of profit maximization merely through commercial motive. Given this, the efficiency of the Islamic banks should be evaluated against the value judgements prescribed by the Islamic economic philosophy and their role in establishing the just economy. Nevertheless, the empirical evidence on such value-oriented role of Islamic banking is limited that is filled by this research. The primary focus of the research is two folds; developing a theoretical framework that affords a holistic approach of Shariah legitimacy of Islamic banking practices, including welfare pursuits in addition to the usual compliance mechanism, to help evaluating legitimacy of Islamic banking practices in Pakistan. Therefore, the research has been commissioned by developing the constructs of Shariah legitimacy through extensive review of the relevant literature. At the same time, the empirical analysis based on the opinion of 836 customers of Islamic and conventional banks in all the four provinces and the capital city of Pakistan has produced important conclusions regarding their perception about legitimacy of the Islamic banking practices. The results have helped to know as to how the legitimacy through Shariah perspective is viewed by them. The data analysis using various statistical techniques has yielded results consistent with the objectives of the study. The key findings of the theoretical framework conclude that the value judgements have been grossly ignored by the Islamic banks. The empirical research achieves that about half of the customers perceived Islamic banking as Shariah legitimate. On overall basis, the other half viewed contrary to this or preferred to remain indifferent. There is a need that Islamic banks should look into the desired goals of Shariah legitimacy in both contexts; the value judgement and the perception of the customers.Keywords: Islamic banking, Shariah legitimacy, Maqasid al Shariah (higher purposes of the lawgiver), value judgment, distributive justice
Procedia PDF Downloads 4111921 A Study on the Interest of Muslims towards Syariah Bank in Yogyakarta, Indonesia
Authors: Muhammad Hikmah
Abstract:
Based on the population census in 2015, Indonesia consists of 254.9 millions of people, and 80% of them are Muslims (Data of Central Bureau of Statistic). Indonesia becomes the highest number of Muslims civilization in the world. The question would be, is the number of population proportional to the growth of Syariah transaction in Indonesia? It is going to be discussed in this research. The problem limitation of this research is in Syariah Banking. Therefore, Syariah transaction in this study is described as transaction only in Syariah Banking. The researcher focused on the study in Yogyakarta, a city in Indonesia. The development of Syariah Bank assets until January 2016, based on statistic data launched by Financial Services Authority (FSA), has increased Rp 287.44 trillion, however, a total amount of bank achieves Rp 6.198,15 trillions. It means that the assets of Syariah Bank are only 4.64% from the total amount of banking assets in Indonesia, though, Syariah Banking was first established in 1991, known as Bank Muamalat. As we can see that in these 25 years, Syariah Banking could only reach that number. Based on the press conference of FSA and Syariah Banking Exhibition iB Vaganza in 2015, the number of Syariah Bank’s customers are under 10 millions. With 80% of Muslims, Syariah Bank is not able to be a market leader in Indonesia. This will be answered in this research, how much the interest if Muslims in Yogyakarta towards Syariah Bank compared to conventional bank. This study will be conducted in Yogyakarta. The sampling will represent to the muslims having good knowledge of Islam, such as dawn prayer worshipers in some mosques in Yogyakarta. There are some reasons why Indonesian muslims are not interested in Syariah Bank, such as the people do not put trust in Syariah Bank; there are some obligation where they work to have conventional bank; business matters services which is not covered by Syariah Bank where most of them are limited to the laws authorities; and there is no sufficient knowledge about the importance of syariah transaction from religion point of view. Each of them is going to be discussed in this research. The suggestions of this study are we should share our knowledge about Islamic transaction anywhere and we need to support Syariah Bank to have Syariah principles. For those who have the authority should be active as well to announce the rules of the constitution supporting the development of syariah transaction in order to be apply perfectly. We hope that trust from the people will increase, and we should provide Syariah Banking products which fulfill business needs. Finally, syariah transaction will be the solution for all people in the world in bussiness transaction.Keywords: shariah, Islamic, banking, Indonesia
Procedia PDF Downloads 3541920 A Proposed Algorithm for Obtaining the Map of Subscribers’ Density Distribution for a Mobile Wireless Communication Network
Authors: C. Temaneh-Nyah, F. A. Phiri, D. Karegeya
Abstract:
This paper presents an algorithm for obtaining the map of subscriber’s density distribution for a mobile wireless communication network based on the actual subscriber's traffic data obtained from the base station. This is useful in statistical characterization of the mobile wireless network.Keywords: electromagnetic compatibility, statistical analysis, simulation of communication network, subscriber density
Procedia PDF Downloads 3091919 Usability Evaluation of a Mobile Application to Enhance the Use of Smartphone, by Visually Impaired Users in Indonesia
Authors: Johanna Renny Octavia, Kamila Okta Saarah
Abstract:
Smartphone nowadays is widely used by many people all over the world. However, people with vision impairment may experience difficulties that interfere with the proper usage of the smartphone. In Indonesia, the population of visually impaired is about 13 million people (estimated 285 million people worldwide). There are a number of mobile applications developed to enhance the use of smartphone by visually impaired. This paper discusses the usability evaluation of a mobile application, namely Ray Vision, designed to help visually impaired in using smartphone. A series of usability testing with a number of Indonesian visually impaired revealed 28 usability problems in the mobile application that led to 14 design recommendations. The redesigned application was then re-evaluated through another usability testing series. The results showed that all five usability criteria assessed were increased (usefulness by 13%, effectiveness by 27%, efficiency by 27%, satisfaction by 23%, and learnability by 12%). The System Usability Score (SUS) was also increased by 14.92%.Keywords: mobile application, smartphone, usability evaluation, vision impaired
Procedia PDF Downloads 3121918 Cricket Injury Surveillence by Mobile Application Technology on Smartphones
Authors: Najeebullah Soomro, Habib Noorbhai, Mariam Soomro, Ross Sanders
Abstract:
The demands on cricketers are increasing with more matches being played in a shorter period of time with a greater intensity. A ten year report on injury incidence for Australian elite cricketers between the 2000- 2011 seasons revealed an injury incidence rate of 17.4%.1. In the 2009–10 season, 24 % of Australian fast bowlers missed matches through injury. 1 Injury rates are even higher in junior cricketers with an injury incidence of 25% or 2.9 injuries per 100 player hours reported. 2 Traditionally, injury surveillance has relied on the use of paper based forms or complex computer software. 3,4 This makes injury reporting laborious for the staff involved. The purpose of this presentation is to describe a smartphone based mobile application as a means of improving injury surveillance in cricket. Methods: The researchers developed CricPredict mobile App for the Android platforms, the world’s most widely used smartphone platform. It uses Qt SDK (Software Development Kit) as IDE (Integrated Development Environment). C++ was used as the programming language with the Qt framework, which provides us with cross-platform abilities that will allow this app to be ported to other operating systems (iOS, Mac, Windows) in the future. The wireframes (graphic user interface) were developed using Justinmind Prototyper Pro Edition Version (Ver. 6.1.0). CricPredict enables recording of injury and training status conveniently and immediately. When an injury is reported automated follow-up questions include site of injury, nature of injury, mechanism of injury, initial treatment, referral and action taken after injury. Direct communication with the player then enables assessment of severity and diagnosis. CricPredict also allows the coach to maintain and track each player’s attendance at matches and training session. Workload data can also be recorded by either the player or coach by recording the number of balls bowled or played in a day. This is helpful in formulating injury rates and time lost due to injuries. All the data are stored at a secured password protected data server. Outcomes and Significance: Use of CricPredit offers a simple, user friendly tool for the coaching or medical staff associated with teams to predict, record and report injuries. This system will assist teams to capture injury data with ease thus allowing better understanding of injuries associated with cricket and potentially optimize the performance of such cricketers.Keywords: injury, cricket, surveillance, smartphones, mobile
Procedia PDF Downloads 4591917 Mobile Health Approaches in the Management of Breast Cancer: A Qualitative Content Analysis
Authors: Hyekyung Woo, Gwihyun Kim
Abstract:
mHealth, which encompasses mobile health technologies and interventions, is rapidly evolving in various medical specialties, and its impact is evident in oncology. This review describes current trends in research addressing the integration of mHealth into the management of breast cancer by examining evaluations of mHealth and its contributions across the cancer care continuum. Mobile technologies are perceived as effective in prevention and as feasible for managing breast cancer, but the diagnostic accuracy of these tools remains in doubt. Not all phases of breast cancer treatment involve mHealth, and not all have been addressed by research. These drawbacks in the application of mHealth to breast cancer management call for intensified research to strengthen its role in breast cancer care.Keywords: mobile application, breast cancer, content analysis, mHealth
Procedia PDF Downloads 3121916 Islamic Corporate Social Responsibility Disclosure and Financial Performance on Islamic Banking in Indonesia
Authors: Yasmin Umar Assegaf, Falikhatun, Salamah Wahyuni
Abstract:
This study aims to provide empirical evidence about the influence of Islamic Corporate Social Responsibility Disclosures of the financial performance of Islamic banking with the characteristics of the company, as a control variable in Islamic banking in Indonesia. ICSR disclosures are an independent variable, while the Financial Performance is the dependent variable (proxied by Return on Assets (ROA), Return on Equity (ROE), Income Expense Ratio (IER), and Non-net Interest Margin (NIM). The control variables used are firm size, firm age and the type of audit. The population of the study was all Islamic Banks (BUS) operate in Indonesia. The research sample is Islamic Commercial Bank which has existed in Indonesia since 2002 and publishes financial statements between the years of 2007-2011. The sample of the study were include 31 Annual Report published. The results of this study concluded that there are significant influences between the ICSR Disclosures and financial performance. The disclosure is partially effect on ROA, IER and NIM, whereas there is no influence on ROE. Further result shows that all control variables (Firm Size, Age, and Type of Audit Companies) does not have any influence on ICSR Disclosures in Indonesia. This research gives a suggestion for further research to compare these ICSR disclosures in Indonesia with ICSR disclosures in other countries that have Islamic banking, by using other measure variables of financial performance, to get more comprehensive model and real picture.Keywords: ROA, ROE, IER, NIM, company size, age of the company, audit type, Islamic banking
Procedia PDF Downloads 3481915 Mobile Asthma Action Plan for Adolescent with Asthma: A Systematic Review
Authors: Reisy Tane
Abstract:
Asthma is the common health problems in adolescents. Self-management is one way to improve health status in adolescent with asthma. Mobile technology has the potential to improve self-management in adolescents with asthma. Objective: the aim of this study to determine the effectiveness of using the mobile technology Asthma Action Plan to improve self management. Method: this study is Systematic review approach using PRISM template. The literature search started on first September 2017 by using electronic data Pro Quest and Google Scholars with keywords ‘Mobile AAP’ and ‘Adolescent Asthma’. Results and Conclusion: M-AAP is effective to improve adolescent self-management with asthma because it is easy to use and provide information appropriately. The improvement of self-management in teenagers will enhance the quality of life of adolescents with asthma. The recommendation of this study is the addition of parental control content in the application appropriate with Family Centered Care (FCC) philosophy on pediatric nursing. In addition, it is expected the development of applications for other chronic diseases such as diabetes mellitus and congestive heart failure.Keywords: asthma, mobile AAP, adolescent, self-management
Procedia PDF Downloads 1961914 An Evaluation and Guidance for mHealth Apps
Authors: Tareq Aljaber
Abstract:
The number of mobile health apps is growing at a fast frequency as it's nearly doubled in a year between 2015 and 2016. Though, there is a lack of an effective evaluation framework to verify the usability and reliability of mobile phone health education applications which would help saving time and effort for the numerous user groups. This abstract describing a framework for evaluating mobile applications in specifically mobile health education applications, along with a guidance select tool to assist different users to select the most suitable mobile health education apps. The effective framework outcome is intended to meet the requirements and needs of the different stakeholder groups additionally to enhancing the development of mobile health education applications with software engineering approaches, by producing new and more effective techniques to evaluate such software. This abstract highlights the significance and consequences of mobile health education apps, before focusing the light on the required to create an effective evaluation framework for these apps. An explanation of the effective evaluation framework is going to be delivered in the abstract, beside with some specific evaluation metrics: an efficient hybrid of selected heuristic evaluation (HE) and usability evaluation (UE) metrics to enable the determination of the usefulness and usability of health education mobile apps. Moreover, an explanation of the qualitative and quantitative outcomes for the effective evaluation framework was accomplished using Epocrates mobile phone app in addition to some other mobile phone apps. This proposed framework-An Evaluation Framework for Mobile Health Education Apps-consists of a hybrid of 5 metrics designated from a larger set in usability evaluation and heuristic evaluation, illuminated grounded on 15 unstructured interviews from software developers (SD), health professionals (HP) and patients (P). These five metrics corresponding to explicit facets of usability recognised through a requirements analysis of typical stakeholders of mobile health apps. These five hybrid selected metrics were scattered across 24 specific questionnaire questions, which are available on request from first author. This questionnaire has been sent to 81 participants distributed in three sets of stakeholders from software developers (SD), health professionals (HP) and patients/general users (P/GU) on the purpose of ranking three sets of mobile health education applications. Finally, the outcomes from the questionnaire data helped us to approach our aims which are finding the profile for different stakeholders, finding the profile for different mobile health educations application packages, ranking different mobile health education application and guide us to build the select guidance too which is apart from the Evaluation Framework for Mobile Health Education Apps.Keywords: evaluation framework, heuristic evaluation, usability evaluation, metrics
Procedia PDF Downloads 4031913 A Data Mining Approach for Analysing and Predicting the Bank's Asset Liability Management Based on Basel III Norms
Authors: Nidhin Dani Abraham, T. K. Sri Shilpa
Abstract:
Asset liability management is an important aspect in banking business. Moreover, the today’s banking is based on BASEL III which strictly regulates on the counterparty default. This paper focuses on prediction and analysis of counter party default risk, which is a type of risk occurs when the customers fail to repay the amount back to the lender (bank or any financial institutions). This paper proposes an approach to reduce the counterparty risk occurring in the financial institutions using an appropriate data mining technique and thus predicts the occurrence of NPA. It also helps in asset building and restructuring quality. Liability management is very important to carry out banking business. To know and analyze the depth of liability of bank, a suitable technique is required. For that a data mining technique is being used to predict the dormant behaviour of various deposit bank customers. Various models are implemented and the results are analyzed of saving bank deposit customers. All these data are cleaned using data cleansing approach from the bank data warehouse.Keywords: data mining, asset liability management, BASEL III, banking
Procedia PDF Downloads 5521912 The Effect of Artificial Intelligence on Marketing Distribution
Authors: Yousef Wageh Nagy Fahmy
Abstract:
Mobile phones are one of the direct marketing tools used to reach today's hard-to-reach consumers. Cell phones are very personal devices and you can have them with you anytime, anywhere. This offers marketers the opportunity to create personalized marketing messages and send them at the right time and place. The study examined consumer attitudes towards mobile marketing, particularly SMS marketing. Unlike similar studies, this study does not focus on young people, but includes consumers between the ages of 18 and 70 in the field study.The results showed that the majority of participants found SMS marketing disruptive. The biggest problems with SMS marketing are subscribing to message lists without the recipient's consent; large number of messages sent; and the irrelevance of message contentKeywords: direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools
Procedia PDF Downloads 721911 Research and Development of Methodology, Tools, Techniques and Methods to Analyze and Design Interface, Media, Pedagogy for Educational Topics to be Delivered via Mobile Technology
Authors: Shimaa Nagro, Russell Campion
Abstract:
Mobile devices are becoming ever more widely available, with growing functionality, and they are increasingly used as enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material's user interfaces for mobile devices is beset by many unresolved research problems such as those arising from constraints associated with mobile devices or from issues linked to effective learning. The proposed research aims to produce: (i) a method framework for the design and evaluation of educational material’s interfaces to be delivered on mobile devices, in multimedia form based on Human Computer Interaction strategies; and (ii) a software tool implemented as a fast-track alternative to use the method framework in full. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the method framework. The method framework is a framework to enable an educational designer to effectively and efficiently create educational multimedia interfaces to be used on mobile devices by following a particular methodology that contains practical and usable tools and techniques. It is a method framework that accepts any educational material in its final lesson plan and deals with this plan as a static element, it will not suggest any changes in any information given in the lesson plan but it will help the instructor to design his final lesson plan in a multimedia format to be presented in mobile devices.Keywords: mobile learning, M-Learn, HCI, educational multimedia, interface design
Procedia PDF Downloads 3721910 An Inquiry on 2-Mass and Wheeled Mobile Robot Dynamics
Authors: Boguslaw Schreyer
Abstract:
In this paper, a general dynamical model is derived using the Lagrange formalism. The two masses: sprang and unsprang are included in a six-degree of freedom model for a sprung mass. The unsprung mass is included and shown only in a simplified model, although its equations have also been derived by an author. The simplified equations, more suitable for the computer model of robot’s dynamics are also shown.Keywords: dynamics, mobile, robot, wheeled mobile robots
Procedia PDF Downloads 3361909 Development of a Mobile Image-Based Reminder Application to Support Tuberculosis Treatment in Africa
Authors: Haji Ali Haji, Hussein Suleman, Ulrike Rivett
Abstract:
This paper presents the design, development and evaluation of an application prototype developed to support tuberculosis (TB) patients’ treatment adherence. The system makes use of graphics and voice reminders as opposed to text messaging to encourage patients to follow their medication routine. To evaluate the effect of the prototype applications, participants were given mobile phones on which the reminder system was installed. Thirty-eight people, including TB health workers and patients from Zanzibar, Tanzania, participated in the evaluation exercises. The results indicate that the participants found the mobile graphic-based application is useful to support TB treatment. All participants understood and interpreted the intended meaning of every image correctly. The study findings revealed that the use of a mobile visual-based application may have potential benefit to support TB patients (both literate and illiterate) in their treatment processes.Keywords: ICT4D, mobile technology, tuberculosis, visual-based reminder
Procedia PDF Downloads 4301908 Survey on Energy Efficient Routing Protocols in Mobile Ad-Hoc Networks
Authors: Swapnil Singh, Sanjoy Das
Abstract:
Mobile Ad-Hoc Network (MANET) is infrastructure less networks dynamically formed by autonomous system of mobile nodes that are connected via wireless links. Mobile nodes communicate with each other on the fly. In this network each node also acts as a router. The battery power and the bandwidth are very scarce resources in this network. The network lifetime and connectivity of nodes depends on battery power. Therefore, energy is a valuable constraint which should be efficiently used. In this paper, we survey various energy efficient routing protocol. The energy efficient routing protocols are classified on the basis of approaches they use to minimize the energy consumption. The purpose of this paper is to facilitate the research work and combine the existing solution and to develop a more energy efficient routing mechanism.Keywords: delaunay triangulation, deployment, energy efficiency, MANET
Procedia PDF Downloads 6151907 Influences Driving the Teachers’ Adoption of Mobile Learning
Authors: L. A. Alfarani, M. McPherson, N. Morris
Abstract:
The growth of mobile learning depends primarily on the participation of teachers and their belief in the possibilities that this technology has for enhancing learning. The need to integrate technology into education seems clear-cut, however, its acceptance in Saudi higher education remains low. Thus, determining the particular factors that affect faculty acceptance of technology is vital. This paper focuses on TAM which depends on two factors: perceived usefulness and perceived ease of use, this theory are used to predict faculty members’ behavioural intentions towards using mobile learning technology. 279 faculty members in one Saudi university have responded to the online questionnaire. The findings have revealed that there is a statistically significant difference in both usefulness and ease of using m-learning factors.Keywords: TAM theory, mobile learning technology acceptance, usefulness, ease of use
Procedia PDF Downloads 5241906 Factors Affecting Expectations and Intentions of University Students in Educational Context
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: learning technology, instructional technology, mobile learning, technology
Procedia PDF Downloads 451