51,014 research outputs found

    A Novel Gesture-based CAPTCHA Design for Smart Devices

    Get PDF
    CAPTCHAs have been widely used in Web applications to prevent service abuse. With the evolution of computing environment from desktop computing to ubiquitous computing, more and more users are accessing Web applications on smart devices where touch based interactions are dominant. However, the majority of CAPTCHAs are designed for use on computers and laptops which do not reflect the shift of interaction style very well. In this paper, we propose a novel CAPTCHA design to utilise the convenience of touch interface while retaining the needed security. This is achieved through using a hybrid challenge to take advantages of human’s cognitive abilities. A prototype is also developed and found to be more user friendly than conventional CAPTCHAs in the preliminary user acceptance test

    Tablet personal computer integration in higher education: Applying the unified theory of acceptance and use technology model to understand supporting factors

    Get PDF
    Many educational institutions have implemented ubiquitous or required laptop, notebook, or tablet personal computing programs for their students. Yet, limited evidence exists to validate integration and acceptance of the technology among student populations. This research examines student acceptance of mobile computing devices using a modification of the Unified Theory of Acceptance and Use of Technology (UTAUT) recently developed by leading researchers in the technology acceptance field. The objective of the study is to identify the variance of selected acceptance elements that contribute to the overall behavioral intent to use Tablet PCs (TPC). These outcomes are then used as a means to forecast, explain, and improve integration of the technology in the higher education context. The research also contributes to UTAUT\u27s theoretical validity and empirical applicability and to the management of information technology (IT) based initiatives in education. (Contains 4 tables and 2 figures.

    A proposal to support ubiquitous libraries

    Get PDF
    Ubiquitous computing aims to make tasks that depend on computing transparent to the users, providing resources and services anytime and anywhere. This paper proposes a computational model to support ubiquitous libraries. The model provides appropriate information and tools to the librarian to maintain resources and services in a library, as well tools that allow offering better services to the library users. We developed a prototype that has been evaluated by thirteen volunteers in the Library of Centro Universitário Univates (Univates). The results showed a good acceptance of the model.Keywords: Ubiquitous Computing, Mobile Computing, Ubiquitous Libraries, Intelligent Systems

    Developing an integrated model for mobile learning usability evaluation : case of eBooks

    Get PDF
    Thesis (Master’s in Information Technology) -- Central University of Technology, Free State, 2018Mobile computing, as prognosticated in the ubiquitous computing vision, is increasingly becoming a predominant aspect of contemporary computing in organisations and society. The penetration of mobile phones in sub-Sahara Africa has occurred with amazing rapidity: for many young people, they now represent a very significant element of their daily lives. Africa has a booming global cell phone penetration, at 67.5%, the fastest growing mobile market in the world. Adoption of these emerging technologies for socio-economic development may contribute to the betterment of people’s lives. Mobile learning has the potential to transform higher education through the adoption of mobile devices which support ubiquitous learning. The purpose of this current study is to develop an Integrated Framework Model (IFM) for mobile learning usability (MLU) evaluation of e-books through the integration of the Technology Acceptance Model and Task Technology Fit theory. The Technology Acceptance Model is widely used in studies relating to technology acceptance. The Task-Technology Fit theory has been used in Information Systems together with usability as a measure of performance. Two additional constructs, namely, Social Influence and Perceived Enjoyment were adopted from the Unified Theory of Acceptance and Use of Technology model and from Motivational Models. Integrating the Technology Acceptance Model and Task-Technology Fit theory provides a model that includes the individual characteristics (Technology Acceptance Model) and the technology and task characteristics (Task Technology Fit). A quantitative research design was primarily employed. A pilot study was administered as a guide for the main study questionnaire. The questionnaire was based on the constructs in the IFM. The pilot study consisted of participants registered for a module, called Computer Security, at the Central University of Technology. The main study participants were students registered for Oracle and CCNA short courses. The results of the study reveal that individual characteristics, task characteristics and technology characteristics positively influence the usability of e-books in higher education. Usability positively influences adoption, which in turn influences performance among students in higher education

    Near field communication enabled mobile payments: preliminary study

    Get PDF
    The ubiquitous computing has made consumers life easy, it has given the new way to interact with family and friends and perform many activities which were impossible in previous time. One of the profound achievement of ubiquitous computing is Mobile Payment and an advanced mode of the mobile payment is the near field communication mobile payment. In this study the authors have proposed theoreti-cal near field communication mobile payment model that is based on extended unified technology acceptance and use of technology (UTAUT2) .In this paper, the author have performed the pilot study to validate the variables and to verify their reliability among the proposed items. The results has proven that there is a reliability among the items in variables, as the Cronbach’s alpha value for the vari-ables is above or equal to 0.7

    Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    Get PDF
    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.This research was supported by Industrial Computers and Computer Networks program (I2RC) (2015/2016) funded by the University of Alicante

    A framework for the design of privacy preserving pervasive healthcare

    Get PDF
    Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous approaches, we extract and combine common elements in order to unify the approaches and create a more formal methodology for designing privacy mechanisms in pervasive healthcare applications. In doing so we also consider the manner in which ubiquitous technologies impact on privacy and methods for reducing this impact. We demonstrate how the framework can be applied by using examples from the previous approaches. In addressing privacy issues, the framework aims to remove a large obstacle to deployment of pervasive healthcare systems, acceptance of the technology.<br /
    corecore