SMS (Short Message Service) for languagelearning. Specifically, SMS is one of the cell phone features which enable communicative language practice(Chinnery, 2006). In both studies conducted by Kennedy and Levy (2008) and Levy and Kennedy (2005), thestudents were sent Italian words, idioms, and example sentences via students’ mobile phones as SMS messages.Both projects proved the use of SMS in language learning as a successful technique. In addition, almost all ofparticipants showed positive attitude toward receiving text messages. Li and Erben (2007) also reported that theuse of instant messages enabled the language learners to increase their intercultural awareness and criticalthinking skills. Like Thornton and Houser (2005), Lu’s (2008) and Zhang et al.’s (2011) studies both conductedsimilar experimental study to investigate the effectiveness of vocabulary learning by using SMS. In Lu (2008),30 high school students were divided into two groups. One group learned English vocabulary via mobile phone,while the other used print materials. The result indicated that mobile users show greater gain in vocabulary thanpaper-based learners. Zhang et al. (2011) also found that the group studying vocabulary via mobile phone SMS text messages retrieved more vocabulary in the posttests than the other group learning through paper material. Inthe same vein, Motallebzadeh and Ganjali (2011) examined the effects of
According to Wolfe (1994), technology adoption studies are divided into three types. Innovativeness research usually focuses on ex- amining factors that influence users to adopt a particular technology. Diffusion research, on the other hand, emphasizes the trend of tech- nology adoption among a specific adopting population, while process research concentrates on the activities of adopting and implement- ing technologies by users. The unit of analy- sis of these technology adoption studies can be the society, organization, group, or indi- vidual user. Organization-level adoption studies address the concerns of organizations in adopting technologies, including organiza- tional factors that influence decisions to adopt (Damanpour 1987), processes that or- ganizations go through in adopting a new technology (Tornatzky and Fleischer 1990), and approaches to selecting the appropriate technology for the organizations (Noori 1990). Within this group of inquiries, some studies focus on companies in which mobiletechnologies are their core business (e.g. Shamshubaridah et al. 2010; Said and Adham 2010; Said et al. 2013). For example, Said et al. studied the evolution and strategies of four telecommunications companies in Ma- laysia.
Aside of the effect of mobiletechnologies and persuasiveness of the race, there is a space of study about the technology itself. A study is not in the field of technical configuration, rather on what makes the people adopt the mobiletechnologies. The purpose is to examine the importance of particular quality of mobile technology in technological acquisition. This study of adoption would benefits to the continuation of the respected technologies. Mobiletechnologies such as hand phone, smart phone, and tablet are in the realm of a rapidly innovation rate, and competition as well. These technologies are competing to be adopted by the users. In this case, young people as the frontline of adopting new innovation (Livingstone, 2002).
Hutchison Telecommunications (Hong Kong) Limited (“Hutchison Telecom Hong Kong”) is currently one the largest mobile telecommunication service operators in Hong Kong. Since 1983, it has always been a pioneer in the development of mobile telecommunication deploying multiple mobiletechnologies including 1G AMPS/ TACS, 2G GSM/ CDMA and 2.5G GPRS/ IS95B in Hong Kong. Hutchison Telecom Hong Kong is committed to providing high quality mobile telecommunication services, telecom retail services and call centre services in Hong Kong and Macau, as well as mobile telecommunications consultancy services in Mainland China. It is also the first operator in Hong Kong to roll out world-class 3G service under the “3” brand, leading Hutchison Telecom Hong Kong’s technical and service excellence into the 3G era. Hutchison Telecom Hong Kong is a subsidiary of Hutchison Telecommunications International Limited (“Hutchison Telecom”). Hutchison Telecom is a leading listed telecommunications operator (SEHK:2332; NYSE:HTX) focusing on dynamic markets. It currently offers mobile and fixed-line telecommunication services in Hong Kong, and operates or is rolling out mobile telecommunication services in India, Israel, Macau, Thailand, Sri Lanka, Ghana, Indonesia and Vietnam. For more information about Hutchison Telecom Hong Kong, see www.three.com.hk. For more information about Hutchison Telecom, see www.htil.com.
2. To provide students with skills to apply design and development principles in the construction of recent mobiletechnologies, such as architectures, wireless technologies, mobile software development, and game design 3. To prepare students with abilities to keep up-to-date with the latest Mobile Application and Technology trends 4. To prepare students with abilities in problem solving, good communication skills and ethics to be able to work as
The Malaysian Communications and Multimedia Commissions (2008) found that in 2008 for every 100 Malaysians there are 90.6 mobile phones and broadband subscription in Malaysia and it was increased by nearly 50% from 2007 to 2008. More than two million mobile phone users in Malaysia were 19 years old or younger. However, mobile learning in Malaysia is still in its infancy. The combination of mobile and communication technologies is recognized as a potentially powerful and flexible learning and teaching tool. The continuous development of mobiletechnologies has created a new platform for supporting communication in learning. There are five properties of mobile devices that produce unique educational affordances: portability, social interactivity, context sensitivity, connectivity and individuality (Naismith et al., 2005). This study focuses on using such technologies to help students to improve their English language skills.
Perkembangan teknologi informasi khususnya pada perangkat mobile (mobile device) telah banyak dipergunakan oleh masyarakat untuk mengakses informasi dengan mudah dan cepat. Banyaknya informasi yang dapat akses secara online dengan menggunakan mobile tidak terlepas dari banyaknya sistem informasi yang dikembangkan oleh setiap perusahaan dalam mendukung aktivitas bisnisnya. Layanan mobile tidak hanya terbatas pada melakukan transaksi tetapi juga memungkinkan komunikasi, kolaborasi dan koordinasi melalui perangkat mobile. Di kota Pontianak Kalimantan Barat, sudah banyak hotel yang menyediakan berbagai fasilitas menarik yang dapat diakses secara online dan juga menyediakan sistem pesan kamar online. Namun yang menjadi permasalahan adalah ketika membuka halaman website yang dibuat tanpa memperhatikan kapasitas dari perangkat mobile, menyebabkan ukuran layar tidak cocok sama sekali dan itu menjadi penyebab banyaknya pengguna mobile yang merasa tidak nyaman pada hal situs web hotel yang dikembangkan saat ini menjadi harapan untuk pemesanan kamar hotel secara online. Jaringan nirkabel dan seluler telah mengalami pertumbuhan eksponensial dalam hal kemampuan perangkat mobile, namun untuk mengakses website yang besar dan desain yang kaku akan menjadi masalah dalam menampilkan konten dari website tersebut.
kemunculan teknologi-teknologi yang disruptif (Disruptive Technologies) mengubah nilai yang ditawarkan ke pasar.Maksudnya lebih lanjut adalah bahwa ketika pertama kali muncul di pasar, teknologi disruptif selalu menawarkan kinerja yang lebih rendah dalam hal atribut yang diinginkan oleh khalayak pelanggan umum. Namun teknologi disruptif memiliki atribut lain yang dihargai lebih dan diinginkan oleh sekelompok pelanggan tertentu (biasanya merupakan pelanggan baru). Dan biasanya teknologi tersebut lebih murah, lebih kecil, serta lebih mudah dan lebih nyaman untuk dipakai berulang kali.contohnya adalah ipad, dimana fisik layar iPad lebih kecil daripada komputer notebook dan netbook, dan tanpa papan ketik. Kemudian kapasitas penyimpanan driveyang lebih sedikit dibandingkan komputer notebook dan netbook. iPad dilengkapi dengan User Experience yang mencengangkan dengan tampilan (interface) iOS-nya. Pelanggan pun bisa menggunakan iPad untuk berbagai keperluan seperti email, edit dokumen, dan juga bermain games, serta mengunduh berita di internet.iPad dilengkapi dengan AppStore yang memberikan akses kepada beratus-ratus ribu aplikasi. Akhirnya sekarang, iPad telah banyak digunakan sebagai pengganti komputer notebook dan netbook untuk keperluan tertentu.
Abstract The huge amount of data generated, the speed at which it is produced, and its heterogeneity in terms of format, represent a challenge to the current storage, process and analysis capabilities. Those data volumes, commonly referred as Big Data, can be exploited to extract useful information and to produce helpful knowl- edge for science, industry, public services and in general for humankind. Big Data analytics refer to advanced mining techniques applied to Big Data sets. In general, the process of knowledge discovery from Big Data is not so easy, mainly due to data characteristics, as size, complexity and variety, that require to address several issues. Cloud computing is a valid and cost-effective solution for supporting Big Data storage and for executing sophisticated data mining applications. Big Data ana- lytics is a continuously growing field, so novel and efficient solutions (i.e., in terms of platforms, programming tools, frameworks, and data mining algorithms) spring up everyday to cope with the growing scope of interest in Big Data. This chapter discusses models, technologies and research trends in Big Data analysis on Clouds. In particular, the chapter presents representative examples of Cloud environments that can be used to implement applications and frameworks for data analysis, and an overview of the leading software tools and technologies that are used for developing scalable data analysis on Clouds.
The content of this book is very interesting and important as it covers a wide range of technologies and technical disciplines including complex systems such as: robotics, mechatronics systems, automation, manufacturing, cyber-physical sys- tems, autonomous systems, sensor, networks, control systems, energy systems, automotive systems, biological systems, vehicular networking and connected vehicles, effectiveness and logistics systems, smart grids, nonlinear systems, power systems, social systems, economic systems and other. The papers included in this content have been presented at the international conference New Technologies, Development and Application, held in Sarajevo, Bosnia and Herzegovina, on 28 – 30 June 2018. Majority of organized conferences are usually focusing on a narrow part of the issues within a certain discipline while conferences such these are rare. There is a need to hold such conferences. The value of this conference is that various researchers, programmers, engineers and practitioners come to the same place where ideas and latest technology achievements are exchanged. Such events lead to the creation of new ideas, solutions and applications in the manufacturing processes of various technologies. New coexistence is emerging, horizons are expanding, and unexpected changes and analogies arise. Best solutions and applications in technologies are critically evaluated.
z How much infrastructure? Justifying information system applications is not an easy job due to the intangible benefits and the rapid changes in technologies that often make systems obsolete. Justifying infrastructure is even more difficult since many users and applications share the
The push by mobile operators to gain control of the consumer market has led to the development of several innovative applications and technologies. Further exploitation of their existing network infrastructure has paved the way for other means of generating revenue and increasing their competitive edge in the telecommunication sector. The provision of value added services has become a trend by operators to boost their Average Revenue Per User (ARPU) [1,2]. Location-based Services (LBS) are one of such value added services that take advantage of a mobile device’s location to provide information such as security alerts and advertising. It is described as any application service that exploits the position of a mobile terminal . The main challenge of a wireless network is to keep track of a mobile’s location with some level of precision and at the same time maintain the Quality of Service (QoS) .
In this scenario, the end user benefits twice—she finds a better jogging route and works out the cause of her allergy problem. The ability for machines to find patterns and synthesize them supports end users in making their own decisions and developing their own hypothesis. It stops short of presuming to know what the answer is; instead, the problem the user is trying to resolve shifts over time, and her use of biosensors and other data shifts with that evolution. Within this scenario, different designers might make different decisions about how much automation is useful. Some end users will want to see more of the granular data, while other end users might want a system to alert them to what other people have also tried to collect. No air quality monitoring system manufacturer will be able to anticipate all the uses to which that data could be put, but the ability to compose data in ways designers cannot anticipate makes it possible for end users as well as companies to benefit from data exhaust—the flow does not go one way. With improved data security technologies that would allow people better control over their data exhaust, it is possible that the balance could be evened up even more. Another difference is that the institutional beneficiaries of the data are more heterogeneous, which opens up the possibility for additional solutions should it prove impossible to simply avoid poor air quality by changing one’s route through the city. It is entirely possible, of course, that the various actors involved in this scenario may have poor relations or conflicting incentives and might not want to see data exchanged in this way. But by emphasizing exploration, we open up the possibility to create alignment or otherwise manage conflicting incentives and decrease the probability of the data simply falling into disuse.
Links Modeling and MIPv6 Module. As we do not intend to perform an analysis on link technologies, we have implemented a simple wireless NIC (Network Interface Controller) on each node and router. The wireless NIC uses the well-known CSMA (Carrier Sense Multiple Access) protocol at the MAC (Medium Access Control) layer as in some existing air-ground systems like VDL mode 2, and an ideal physical channel free of errors (bit error, collision … ). Hence, base stations have been omitted as the mobile nodes communicate directly with routers equipped with a wireless NIC. In doing so, it allows us to focus only on network layer mechanisms. Besides, movement detection at the network layer is performed when MNs receive an Router Advertise- ment (RA) announcing a new network preﬁx. The RFC 6275 recommends to set the RA periodicity between 30 ms and 70 ms. This value seems very low in our context. As it is a source of signaling trafﬁc, the value has been increased up to 300 ms. A further analysis on the impact of this parameter will be investigated. Besides, route optimization has been removed from the MIPv6 module because ATS traf ﬁc may not be forwarded by other non-certiﬁed providers.