162,079 research outputs found

    A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    Get PDF
    This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.Security, Secure Architecture, Mobile Applications, Business Intelligence, Web Service

    A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    Get PDF
    This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service

    The Future of Mobile Industry

    Get PDF
    This paper discusses the future of mobile industry along with some of the background leading to the emergence of wireless technology. First, it gives an overview of today’s telecommunication network and the major differences between fixed wired networks and wireless networks. The discussion then focuses on the challenges facing the wireless industry and the way out through aggressive innovation by employing Wireless Intelligence Network (WIN) technology. The paper also discusses some important trends in wireless industry and the customers expectations which are also part of the challenges for the mobile industry. Finally particular reference is made to the developing nations especially Nigeria in the ongoing trends in mobile communication industry

    The Digitalisation of African Agriculture Report 2018-2019

    Get PDF
    An inclusive, digitally-enabled agricultural transformation could help achieve meaningful livelihood improvements for Africa’s smallholder farmers and pastoralists. It could drive greater engagement in agriculture from women and youth and create employment opportunities along the value chain. At CTA we staked a claim on this power of digitalisation to more systematically transform agriculture early on. Digitalisation, focusing on not individual ICTs but the application of these technologies to entire value chains, is a theme that cuts across all of our work. In youth entrepreneurship, we are fostering a new breed of young ICT ‘agripreneurs’. In climate-smart agriculture multiple projects provide information that can help towards building resilience for smallholder farmers. And in women empowerment we are supporting digital platforms to drive greater inclusion for women entrepreneurs in agricultural value chains

    Agent oriented AmI engineering

    Get PDF

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm

    Proximal business intelligence on the semantic web

    Get PDF
    This is the post-print version of this article. The official version can be accessed from the link below - Copyright @ 2010 Springer.Ubiquitous information systems (UBIS) extend current Information System thinking to explicitly differentiate technology between devices and software components with relation to people and process. Adapting business data and management information to support specific user actions in context is an ongoing topic of research. Approaches typically focus on providing mechanisms to improve specific information access and transcoding but not on how the information can be accessed in a mobile, dynamic and ad-hoc manner. Although web ontology has been used to facilitate the loading of data warehouses, less research has been carried out on ontology based mobile reporting. This paper explores how business data can be modeled and accessed using the web ontology language and then re-used to provide the invisibility of pervasive access; uncovering more effective architectural models for adaptive information system strategies of this type. This exploratory work is guided in part by a vision of business intelligence that is highly distributed, mobile and fluid, adapting to sensory understanding of the underlying environment in which it operates. A proof-of concept mobile and ambient data access architecture is developed in order to further test the viability of such an approach. The paper concludes with an ontology engineering framework for systems of this type – named UBIS-ONTO

    A FRAMEWORK FOR INTELLIGENT VOICE-ENABLED E-EDUCATION SYSTEMS

    Get PDF
    Although the Internet has received significant attention in recent years, voice is still the most convenient and natural way of communicating between human to human or human to computer. In voice applications, users may have different needs which will require the ability of the system to reason, make decisions, be flexible and adapt to requests during interaction. These needs have placed new requirements in voice application development such as use of advanced models, techniques and methodologies which take into account the needs of different users and environments. The ability of a system to behave close to human reasoning is often mentioned as one of the major requirements for the development of voice applications. In this paper, we present a framework for an intelligent voice-enabled e-Education application and an adaptation of the framework for the development of a prototype Course Registration and Examination (CourseRegExamOnline) module. This study is a preliminary report of an ongoing e-Education project containing the following modules: enrollment, course registration and examination, enquiries/information, messaging/collaboration, e-Learning and library. The CourseRegExamOnline module was developed using VoiceXML for the voice user interface(VUI), PHP for the web user interface (WUI), Apache as the middle-ware and MySQL database as back-end. The system would offer dual access modes using the VUI and WUI. The framework would serve as a reference model for developing voice-based e-Education applications. The e-Education system when fully developed would meet the needs of students who are normal users and those with certain forms of disabilities such as visual impairment, repetitive strain injury (RSI), etc, that make reading and writing difficult
    • 

    corecore