991 resultados para Mobile cloud


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a transition from passive, traditional delivery of teaching to an active, “cloud-based” method, in a freshman engineering-physics course. The course is delivered to a traditional on-campus cohort, and also to an offcampus cohort by means of distance education and online learning. Cloud teaching refers to delivering education by means of websites and mobile-technology applications, where constant student attendance at the host campus is not always necessary. This is contrasted with traditional on-campus teaching, which occurs in a classroom. The use of lectures has been reduced while the use of tutorial and lab classes has increased. The new course structure was delivered for the first time in 2014, has run for two semesters, and will continue in 2015. It was found that student performance in the new structure was no worse than that in the older structure. Off-campus students in general welcomed the changes, while on-campus satisfaction did not change from before to after the transition.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the publiccloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on a study that investigates the emotions elicited from appraising SMS-based mobile marketing (m-marketing) communications under three marketing conditions: product consistency, incentives and permission giving. Results from the experimental design show that appraising m-marketing communications elicits both single emotions and mixed emotions; that is, a mixture of positive and negative emotions in the same response. Additionally, the results show that the influence of specific marketing conditions may increase or reduce the intensity of the emotions elicited. This study contributes to marketing practice by examining consumer appraisals of m-marketing communications under different combinations of marketing conditions. The results provide insights into which emotions are likely to be elicited as a result, and how a specific marketing condition might influence their levels of intensity. The study contributes to marketing theory also through combining appraisal theory with Richins (1997) consumption emotion set.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on a Q-methodology study on the consumption of mobile phones and opinions on SMS-marketing, extracted from interpretive interviews and focus groups. The Metaphors Q-sort, developed within a framework of Holt's (1995) four metaphors of consumption, identifies three experiential value clusters in the consumption of mobile phones: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revelers. The SMS-marketing Q-sort identifies two key clusters of subjective opinions on various aspects of SMS-based mobile-marketing. By integrating the findings from these two Q-sorts, we demonstrate that while all three value clusters express positive opinions towards ‘location specific’ and ‘customer initiated contact’ SMS-marketing, there are noticeable differences in how marketers should develop their strategies to maximize the consumers’ perceived experiential value derived from the consumption of their mobile phones. Keywords: mobile phones; experiential consumption: SMS-marketing; Q-methodology

Relevância:

20.00% 20.00%

Publicador: