4,194 research outputs found

    A Conceptual Framework for Mobile Learning

    Get PDF
    Several technology projects have been launched to explore the opportunities that mobile technologies bring about when tackling issues of democratic participation and social inclusion through mobile learning. Mobile devices are cheaper than for instance a PC, and their affordance, usability and accessibility are such that they can potentially complement or even replace traditional computer technology. The importance of communication and collaboration features of mobile technologies has been stressed in the framework of ICT-mediated learning. In this paper, a theoretical framework for mobile learning and e-inclusion is developed for people outside the conventional education system. The framework draws upon the fields of pedagogy (constructivist learning in particular), mobile learning objects and sociology.Mobile Learning, Digital Divide, Constructivist Pedagogy, Forms Of Capital

    The Evolution of First Person Vision Methods: A Survey

    Full text link
    The emergence of new wearable technologies such as action cameras and smart-glasses has increased the interest of computer vision scientists in the First Person perspective. Nowadays, this field is attracting attention and investments of companies aiming to develop commercial devices with First Person Vision recording capabilities. Due to this interest, an increasing demand of methods to process these videos, possibly in real-time, is expected. Current approaches present a particular combinations of different image features and quantitative methods to accomplish specific objectives like object detection, activity recognition, user machine interaction and so on. This paper summarizes the evolution of the state of the art in First Person Vision video analysis between 1997 and 2014, highlighting, among others, most commonly used features, methods, challenges and opportunities within the field.Comment: First Person Vision, Egocentric Vision, Wearable Devices, Smart Glasses, Computer Vision, Video Analytics, Human-machine Interactio

    EFFECTIVE METHODS AND TOOLS FOR MINING APP STORE REVIEWS

    Get PDF
    Research on mining user reviews in mobile application (app) stores has noticeably advanced in the past few years. The main objective is to extract useful information that app developers can use to build more sustainable apps. In general, existing research on app store mining can be classified into three genres: classification of user feedback into different types of software maintenance requests (e.g., bug reports and feature requests), building practical tools that are readily available for developers to use, and proposing visions for enhanced mobile app stores that integrate multiple sources of user feedback to ensure app survivability. Despite these major advances, existing tools and techniques still suffer from several drawbacks. Specifically, the majority of techniques rely on the textual content of user reviews for classification. However, due to the inherently diverse and unstructured nature of user-generated online textual reviews, text-based review mining techniques often produce excessively complicated models that are prone to over-fitting. Furthermore, the majority of proposed techniques focus on extracting and classifying the functional requirements in mobile app reviews, providing a little or no support for extracting and synthesizing the non-functional requirements (NFRs) raised in user feedback (e.g., security, reliability, and usability). In terms of tool support, existing tools are still far from being adequate for practical applications. In general, there is a lack of off-the-shelf tools that can be used by researchers and practitioners to accurately mine user reviews. Motivated by these observations, in this dissertation, we explore several research directions aimed at addressing the current issues and shortcomings in app store review mining research. In particular, we introduce a novel semantically aware approach for mining and classifying functional requirements from app store reviews. This approach reduces the dimensionality of the data and enhances the predictive capabilities of the classifier. We then present a two-phase study aimed at automatically capturing the NFRs in user reviews. We also introduce MARC, a tool that enables developers to extract, classify, and summarize user reviews

    Driving the Technology Value Stream by Analyzing App Reviews

    Get PDF
    An emerging feature of mobile application software is the need to quickly produce new versions to solve problems that emerged in previous versions. This helps adapt to changing user needs and preferences. In a continuous software development process, the user reviews collected by the apps themselves can play a crucial role to detect which components need to be reworked. This paper proposes a novel framework that enables software companies to drive their technology value stream based on the feedback (or reviews) provided by the end-users of an application. The proposed end-to-end framework exploits different Natural Language Processing (NLP) tasks to best understand the needs and goals of the end users. We also provide a thorough and in-depth analysis of the framework, the performance of each of the modules, and the overall contribution in driving the technology value stream. An analysis of reviews with sixteen popular Android Play Store applications from various genres over a long period of time provides encouraging evidence of the effectiveness of the proposed approach

    Identify Human Error In Using Mobile Device That Lead To Security Threat

    Get PDF
    Human errors are the most critical issues that contributes to the information security threat. Mobile device are the main devices that can be manipulates by the attacker towards their victims. The attackers nowadays more interested in attacking the mobile devices because of the current trend which the users used their mobile devices to perform all their daily task and stores their data inside the mobile devices. Users always think that it would be easier to stores all the information inside their mobile devices but did not concern the risk of their actions. This research are used to identify the human errors in using mobile device that contributes to the information security threat. The first part of this reports will identify and discuss in details of the common human errors from the previous research result and also the possible attack related to the errors perform. The second part will explain about the research process in details such as the method that will be used to perform the research, the research objective, research scope and goals and many more. The questionnaires are the method used to collect all the data from the user to identify the most common human error in using mobile devices. The guidelines from other researcher are also identify in this research to ensure that the new guideline proposed are the best practice guidelines that can be used by all users. The comparison between the literature review, questionnaires and the previous guidelines are the used to design the new guidelines. The research will be proposed a best practice security guidelines that applicable for the mobile device user to reduce and minimize the risk of become the victims of the cybercrime

    Overcoming Language Dichotomies: Toward Effective Program Comprehension for Mobile App Development

    Full text link
    Mobile devices and platforms have become an established target for modern software developers due to performant hardware and a large and growing user base numbering in the billions. Despite their popularity, the software development process for mobile apps comes with a set of unique, domain-specific challenges rooted in program comprehension. Many of these challenges stem from developer difficulties in reasoning about different representations of a program, a phenomenon we define as a "language dichotomy". In this paper, we reflect upon the various language dichotomies that contribute to open problems in program comprehension and development for mobile apps. Furthermore, to help guide the research community towards effective solutions for these problems, we provide a roadmap of directions for future work.Comment: Invited Keynote Paper for the 26th IEEE/ACM International Conference on Program Comprehension (ICPC'18
    • …
    corecore