E-commerce nowadays has expanded in the past years, and it is substituting the traditional brick and mortar stores. And most of the brands now have their own web or mobile application so the users can shop online, it is easier and faster. Building an e-commerce application is like any other software it goes through phases in the SDLC. This paper is going to be a guide to adapt the Agile mythology in the development of the mobile e-commerce application.
This document provides a marketing plan for a new Android app called skEdit. The app allows users to scan documents and convert them to PDF format using their phone's camera. It aims to make the lives of college students, professionals, and others easier by providing a simple solution to scan important documents and access them from anywhere. The plan outlines the app's situation analysis, goals to achieve over 1 million premium users in a year, strategies to target college students and professionals, and tactics for the product, branding, pricing, communication, and distribution. It also proposes an organizational structure and processes for implementing the strategies.
Mobile business intelligence reporting provides several benefits for organizations looking to enable a mobile workforce. It allows workers to access important information anytime from their mobile devices, improving productivity. Security concerns are addressed through standard authentication methods that provide easy access similar to email. Content should be personalized for different user segments to boost adoption of mobile reporting.
SMAC and Innovation Transformation covers the topics:
• Innovation
• Leadership Agility
• Leading Organizational Change
• Lean Startup Principles
• SMAC and the Transformation of Innovation
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanIOSRJBM
The paper investigates the relationship between the perceived usefulness, perceived ease of use, perceived enjoyment, social needs, subjective norms, self-efficacy and personal attitude with a mediating role of Intention to adopt smart phone apps and impact on the customer behavior. The current recognition of smart phones is a result of rapid development in smart phone apps that offer much kind of mobile persistent services. We used theory of planned behavior for consumer intention to adopt these apps. Our findings suggest that consumer intention is always based on these factors like perceived usefulness, perceived ease of use, perceived enjoyment, social needs, subjective norms, self-efficacy and personal attitude now a days and that intention to adopt apps will impact the consumer behavior
Consumerizacao e BYOD: grande desafio para TICezar Taurion
O fenômeno da consumerização e a politica de BYOD traz beneficos significativos para as empresas, mas cria um grande desafio para TI. A resposta não é impedir nem deixar correr solto, mas mudar o mind-set de TI.
The document discusses trends in the mobile application market and talent supply and demand for mobile development. Some key points:
- The global mobile app market reached $25 billion in revenue in 2012-2013, with over 56 billion app downloads. However, demand for mobile developers is outpacing supply.
- Locations like the US, India, China, Israel, and parts of Europe have large concentrations of mobile development talent. Companies are setting up centers in these locations or acquiring startups for talent.
- Skills like iOS, Android, and HTML5 development are in high demand but facing talent shortages. Companies are trying to close gaps through training, social media outreach, and outsourcing work.
By embracing a persona-guided approach to mobile apps, organizations can challenge the status quo and ensure proper business relevance of all user profiles, both inside and outside the company's four walls.
The document discusses the relevance of information technology in the effective management of small and medium enterprises (SMEs) in Lagos, Nigeria. It finds that the use of information technology by SME managements can help improve productivity, market shares, and management effectiveness. However, SMEs in Nigeria have yet to fully harness the benefits of information technology for functions like efficient management, customer service, and business operations. The study recommends education and training to increase awareness and literacy of information technology among SME managers and employees.
This document provides a marketing plan for a new Android app called skEdit. The app allows users to scan documents and convert them to PDF format using their phone's camera. It aims to make the lives of college students, professionals, and others easier by providing a simple solution to scan important documents and access them from anywhere. The plan outlines the app's situation analysis, goals to achieve over 1 million premium users in a year, strategies to target college students and professionals, and tactics for the product, branding, pricing, communication, and distribution. It also proposes an organizational structure and processes for implementing the strategies.
Mobile business intelligence reporting provides several benefits for organizations looking to enable a mobile workforce. It allows workers to access important information anytime from their mobile devices, improving productivity. Security concerns are addressed through standard authentication methods that provide easy access similar to email. Content should be personalized for different user segments to boost adoption of mobile reporting.
SMAC and Innovation Transformation covers the topics:
• Innovation
• Leadership Agility
• Leading Organizational Change
• Lean Startup Principles
• SMAC and the Transformation of Innovation
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanIOSRJBM
The paper investigates the relationship between the perceived usefulness, perceived ease of use, perceived enjoyment, social needs, subjective norms, self-efficacy and personal attitude with a mediating role of Intention to adopt smart phone apps and impact on the customer behavior. The current recognition of smart phones is a result of rapid development in smart phone apps that offer much kind of mobile persistent services. We used theory of planned behavior for consumer intention to adopt these apps. Our findings suggest that consumer intention is always based on these factors like perceived usefulness, perceived ease of use, perceived enjoyment, social needs, subjective norms, self-efficacy and personal attitude now a days and that intention to adopt apps will impact the consumer behavior
Consumerizacao e BYOD: grande desafio para TICezar Taurion
O fenômeno da consumerização e a politica de BYOD traz beneficos significativos para as empresas, mas cria um grande desafio para TI. A resposta não é impedir nem deixar correr solto, mas mudar o mind-set de TI.
The document discusses trends in the mobile application market and talent supply and demand for mobile development. Some key points:
- The global mobile app market reached $25 billion in revenue in 2012-2013, with over 56 billion app downloads. However, demand for mobile developers is outpacing supply.
- Locations like the US, India, China, Israel, and parts of Europe have large concentrations of mobile development talent. Companies are setting up centers in these locations or acquiring startups for talent.
- Skills like iOS, Android, and HTML5 development are in high demand but facing talent shortages. Companies are trying to close gaps through training, social media outreach, and outsourcing work.
By embracing a persona-guided approach to mobile apps, organizations can challenge the status quo and ensure proper business relevance of all user profiles, both inside and outside the company's four walls.
The document discusses the relevance of information technology in the effective management of small and medium enterprises (SMEs) in Lagos, Nigeria. It finds that the use of information technology by SME managements can help improve productivity, market shares, and management effectiveness. However, SMEs in Nigeria have yet to fully harness the benefits of information technology for functions like efficient management, customer service, and business operations. The study recommends education and training to increase awareness and literacy of information technology among SME managers and employees.
It innovations, impressions & implications-23-jan-2013 at mpste-mumbaiSanjeev Deshmukh
Information Technology is a platform for Innovation. We see many innovations around us wherein IT acts as an enabler. This presentation highlights some of the characteristics of IT, its desirable feature for enabling innovations and in general, its implications for society. Web 2.0 has revolutionized our world view and in turn this has a multiplier effect !
AI & India : The potential to be the next global centre of innovationUmakant Soni
The combination of a large and rapidly growing mobile-internet connected population along with startups being able to access their data along with open-source intelligence research means they can leverage decades of research, apply it to data, and pipe the results to build context-aware, predictive and extremely personalised business models.
This can be built on intelligent process automation and forecasting frameworks for speed and precision. Overall, these businesses will have potential for step-changes in operational efficiency and effectiveness in understanding and fulfilling customer needs.
This is especially so in India, where small screens on many smartphones can create vast pools of data to power AI. By further automating business decisions through machine learning, and surfacing them through smart, intelligent interfaces, these startups will disrupt older technologies and traditional businesses – based on heuristical approaches – and can emerge as “new category leaders”.
This presentation explores the new ways we are working and the implications for business and for workers. Each theme has 4 trends and each trend is supported by 4 examples, supporting statistics and implications defined by PSFK Labs team.
Best Practices for Providing Accessibility in the Mobile Device IndustryDerek Mitchell, MBA
This document provides a summary of best practices for providing accessibility in the mobile device industry. It discusses U.S. accessibility policy, disability demographics, universal design concepts, the U.S. mobile device industry, and analyzes the accessibility practices of four companies. The document proposes establishing accessibility standards and guidelines to standardize practices across the industry and better meet the needs of disabled consumers.
Best Practices for Providing Accessibility in the Mobile Device Industry (rev...Derek Mitchell, MBA
This document discusses accessibility in the mobile device industry. It defines accessibility and discusses how to measure the accessibility of products and services. It also covers types of disabilities, demographics of people with disabilities, and their significant purchasing power. The document proposes guidelines for companies to improve accessibility, including auditing initiatives, embedding accessibility in company culture, engaging the disabled community, including accessibility in business processes, and focusing on universal design. It provides examples of best practices from companies like Apple, AT&T, Orange, and others. The goal is to remove barriers and create an inclusive society through accessible technology.
The MTAM Connected Tech Campus is a 24/7, 365 days-per-year, highly-interactive global virtual environment for industries utilizing connected technologies. In industry areas for Mobility / Connected Transportation, Smart Manufacturing, Connected Health and Smart Cities activities such as trade shows, live-streamed conferences, industry-specific job fairs, and training (self-directed and instructor-led) will take place.
The document discusses the BYOD (Bring Your Own Device) trend and its evolution from BYOD to BYOT, bringing additional challenges for companies. It notes that BYOD started as an effect of technology democratization rather than a business need. Companies now need to develop BYOD policies to address security concerns around personal and business data separation and access to internal infrastructure, as well as flexibility with diverse personal devices and technologies. The best way for companies to provide security is through a comprehensive BYOD policy and tools like MDM for mobile device management.
BT On The Productivity Puzzle in CollaborationLeon Benjamin
Leon Benjamin, Sei Mani's co-founder contributes to its strategic partner BT' and its perspective on the value of collaboration in the enterprise.
As a concept, mobile and flexible working is nothing new and the idea of where people work has widened to pretty much anywhere. The issue is no longer ‘where’ people work, the question we’re now asking is ‘how’ people work.
This essay contends that rather than a future of “Models will Run the World,” the route to AI software creates a focus on intelligent data. To move towards the latter, humans will need to contribute their judgement to how data is organized for machine learning to train algorithms. They will decide what biases may be included in the training data and check for any issues that might arise from these biases once algorithms are run in production.
To achieve success in this “intelligent data” world, humans will play a very different role in the workforce. Jobs will shift to those that support, conserve and evaluate the results that algorithms provide. They may also expand in “domain expertise” areas, as where knowledge of regulatory requirements for finance needs to be incorporated in new models that financial institutions want to create and the algorithms they need to run.
u
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Capgemini
Cisco has estimated that the Internet of Things (IoT) has the potential to generate about $19 trillion of value over the coming years. The staggering potential size-of-the-prize has certainly caught the attention of the world’s business community. In a recent survey of senior business leaders around the globe, 96% said their companies would be using IoT in some way within the next 3 years. However, there is a catch – most organizations are yet to derive significant commercial value from IoT. Our research shows that 70% of organizations do not generate service revenues from their IoT solutions. We have looked at why organizations are falling short in monetizing the IoT, and have tried to capture some initial observations on monetization models in what is still a very fast-developing marketplace.
Software Park Thailand plans to promote cloud computing in Thailand over the next five years by focusing on four pillars: promoting cloud data centers, promoting local software as a service, promoting cloud usage among SMEs and governments, and developing Thailand into a cloud outsourcing center. It aims to make Thailand a leader in cloud computing in the region. Several companies discussed in the document, including Anise Asia, Cloud Creation, and TOT, are working to expand cloud computing offerings and promote cloud adoption among businesses, especially SMEs, in Thailand.
This document discusses how mobility and emerging technologies will transform the business landscape in the coming years. It notes that the IT industry is changing and that a paradigm shift is underway, driven by new generations that are digital natives. It also discusses how mobility is becoming a key priority for businesses and will impact organizations across industries, requiring new strategies and mobile-first applications. Finally, it suggests that CIOs may need to take on new roles like Chief Innovation Officer or Chief Digital Officer in order to stay relevant and help lead their organizations through this period of technological disruption and change.
[Updated 2/27/17] Brian Solis, principal analyst of Altimeter, a Prophet Company, has tracked the autonomous industry for two years and has assembled the most comprehensive report on “The State of The Autonomous Driving.” The updated report features the latest developments among companies driving the future, including 76 automakers, startups and universities. The report also includes an infographic that organizes all of the companies by technology focus and its open to third party creative commons use. This report will be updated regularly, if you would like to contribute updates please contact Brian via email at brian@altimetergroup.com
The document discusses the concept of contextual computing and the contextual enterprise. It begins by describing how IBM's Watson system was able to increase the amount of data and metadata available for reasoning by connecting related information and drawing context from existing data, without being connected to the internet. The document then defines contextual computing as applying a similar paradigm of understanding relationships between data and how different processes operate on that data. Finally, it discusses how smart devices can act as natural aggregators of personal context data and how that data can be used to deliver broader contextual applications and services.
The document summarizes the rise of the app economy in Thailand and opportunities for Thai software developers. Key points:
- Thailand is entering the era of the app economy, dominated by mobile devices, cloud computing, and social networking. This represents a shift from the PC era.
- The app economy provides opportunities for developers through jobs creating apps and maintaining app ecosystems and platforms. However, consumer apps face competition while enterprise apps have strict requirements.
- For Thai developers, opportunities exist in both consumer and enterprise mobile apps, as well as localization of apps. Success requires understanding business needs and processes. Monetization is also a challenge due to app discovery issues.
- Trends driving the app economy include the
This presentation describes the opportunities and impact that social media and related mobile apps marketplace are having on Enterprise Content Management (ECM)
The document discusses mobile strategy and metrics. It covers topics such as mobile commerce, applications, and the size of the app economy. It also discusses how mobility has impacted business through context over process, ecosystems rather than products, and changing revenue models. The document outlines challenges in developing enterprise applications and metrics to measure including funnel analysis, social stickiness, mapping context, and social graphs.
Traveling the Big Data Super Highway: Realizing Enterprise-wide Adoption and ...Cognizant
When it comes to big data, companies need to determine best fit with existing investments and incorporate proven best practices that enable them to run better and run differently.
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
This document provides a review and analysis of mobile application development processes using agile methodologies. It begins with an introduction to agile software development and discusses how agile principles are a natural fit for mobile application development given the dynamic environment. The document then reviews several proposed mobile application development processes that combine agile and non-agile techniques, including Mobile-D, RaPiD7, a hybrid methodology, MASAM, and a Scrum and Lean Six Sigma integration approach. It concludes by noting that while agile methodologies show promise for mobile development, further empirical validation is still needed.
Comparative Study and Analysis of Multiplatform Mobile Application DevelopmentIJMTST Journal
This document summarizes and compares different approaches to multi-platform mobile application development. It begins with an introduction to the need for cross-platform development due to the variety of mobile operating systems. It then reviews 15 previous studies on developing applications for multiple platforms. These studies explored tools like PhoneGap and approaches like model-driven architecture. The document proposes a student information management system and discusses challenges and advantages of cross-platform development. It concludes that the approach ensures a consistent experience across different mobile platforms.
It innovations, impressions & implications-23-jan-2013 at mpste-mumbaiSanjeev Deshmukh
Information Technology is a platform for Innovation. We see many innovations around us wherein IT acts as an enabler. This presentation highlights some of the characteristics of IT, its desirable feature for enabling innovations and in general, its implications for society. Web 2.0 has revolutionized our world view and in turn this has a multiplier effect !
AI & India : The potential to be the next global centre of innovationUmakant Soni
The combination of a large and rapidly growing mobile-internet connected population along with startups being able to access their data along with open-source intelligence research means they can leverage decades of research, apply it to data, and pipe the results to build context-aware, predictive and extremely personalised business models.
This can be built on intelligent process automation and forecasting frameworks for speed and precision. Overall, these businesses will have potential for step-changes in operational efficiency and effectiveness in understanding and fulfilling customer needs.
This is especially so in India, where small screens on many smartphones can create vast pools of data to power AI. By further automating business decisions through machine learning, and surfacing them through smart, intelligent interfaces, these startups will disrupt older technologies and traditional businesses – based on heuristical approaches – and can emerge as “new category leaders”.
This presentation explores the new ways we are working and the implications for business and for workers. Each theme has 4 trends and each trend is supported by 4 examples, supporting statistics and implications defined by PSFK Labs team.
Best Practices for Providing Accessibility in the Mobile Device IndustryDerek Mitchell, MBA
This document provides a summary of best practices for providing accessibility in the mobile device industry. It discusses U.S. accessibility policy, disability demographics, universal design concepts, the U.S. mobile device industry, and analyzes the accessibility practices of four companies. The document proposes establishing accessibility standards and guidelines to standardize practices across the industry and better meet the needs of disabled consumers.
Best Practices for Providing Accessibility in the Mobile Device Industry (rev...Derek Mitchell, MBA
This document discusses accessibility in the mobile device industry. It defines accessibility and discusses how to measure the accessibility of products and services. It also covers types of disabilities, demographics of people with disabilities, and their significant purchasing power. The document proposes guidelines for companies to improve accessibility, including auditing initiatives, embedding accessibility in company culture, engaging the disabled community, including accessibility in business processes, and focusing on universal design. It provides examples of best practices from companies like Apple, AT&T, Orange, and others. The goal is to remove barriers and create an inclusive society through accessible technology.
The MTAM Connected Tech Campus is a 24/7, 365 days-per-year, highly-interactive global virtual environment for industries utilizing connected technologies. In industry areas for Mobility / Connected Transportation, Smart Manufacturing, Connected Health and Smart Cities activities such as trade shows, live-streamed conferences, industry-specific job fairs, and training (self-directed and instructor-led) will take place.
The document discusses the BYOD (Bring Your Own Device) trend and its evolution from BYOD to BYOT, bringing additional challenges for companies. It notes that BYOD started as an effect of technology democratization rather than a business need. Companies now need to develop BYOD policies to address security concerns around personal and business data separation and access to internal infrastructure, as well as flexibility with diverse personal devices and technologies. The best way for companies to provide security is through a comprehensive BYOD policy and tools like MDM for mobile device management.
BT On The Productivity Puzzle in CollaborationLeon Benjamin
Leon Benjamin, Sei Mani's co-founder contributes to its strategic partner BT' and its perspective on the value of collaboration in the enterprise.
As a concept, mobile and flexible working is nothing new and the idea of where people work has widened to pretty much anywhere. The issue is no longer ‘where’ people work, the question we’re now asking is ‘how’ people work.
This essay contends that rather than a future of “Models will Run the World,” the route to AI software creates a focus on intelligent data. To move towards the latter, humans will need to contribute their judgement to how data is organized for machine learning to train algorithms. They will decide what biases may be included in the training data and check for any issues that might arise from these biases once algorithms are run in production.
To achieve success in this “intelligent data” world, humans will play a very different role in the workforce. Jobs will shift to those that support, conserve and evaluate the results that algorithms provide. They may also expand in “domain expertise” areas, as where knowledge of regulatory requirements for finance needs to be incorporated in new models that financial institutions want to create and the algorithms they need to run.
u
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Capgemini
Cisco has estimated that the Internet of Things (IoT) has the potential to generate about $19 trillion of value over the coming years. The staggering potential size-of-the-prize has certainly caught the attention of the world’s business community. In a recent survey of senior business leaders around the globe, 96% said their companies would be using IoT in some way within the next 3 years. However, there is a catch – most organizations are yet to derive significant commercial value from IoT. Our research shows that 70% of organizations do not generate service revenues from their IoT solutions. We have looked at why organizations are falling short in monetizing the IoT, and have tried to capture some initial observations on monetization models in what is still a very fast-developing marketplace.
Software Park Thailand plans to promote cloud computing in Thailand over the next five years by focusing on four pillars: promoting cloud data centers, promoting local software as a service, promoting cloud usage among SMEs and governments, and developing Thailand into a cloud outsourcing center. It aims to make Thailand a leader in cloud computing in the region. Several companies discussed in the document, including Anise Asia, Cloud Creation, and TOT, are working to expand cloud computing offerings and promote cloud adoption among businesses, especially SMEs, in Thailand.
This document discusses how mobility and emerging technologies will transform the business landscape in the coming years. It notes that the IT industry is changing and that a paradigm shift is underway, driven by new generations that are digital natives. It also discusses how mobility is becoming a key priority for businesses and will impact organizations across industries, requiring new strategies and mobile-first applications. Finally, it suggests that CIOs may need to take on new roles like Chief Innovation Officer or Chief Digital Officer in order to stay relevant and help lead their organizations through this period of technological disruption and change.
[Updated 2/27/17] Brian Solis, principal analyst of Altimeter, a Prophet Company, has tracked the autonomous industry for two years and has assembled the most comprehensive report on “The State of The Autonomous Driving.” The updated report features the latest developments among companies driving the future, including 76 automakers, startups and universities. The report also includes an infographic that organizes all of the companies by technology focus and its open to third party creative commons use. This report will be updated regularly, if you would like to contribute updates please contact Brian via email at brian@altimetergroup.com
The document discusses the concept of contextual computing and the contextual enterprise. It begins by describing how IBM's Watson system was able to increase the amount of data and metadata available for reasoning by connecting related information and drawing context from existing data, without being connected to the internet. The document then defines contextual computing as applying a similar paradigm of understanding relationships between data and how different processes operate on that data. Finally, it discusses how smart devices can act as natural aggregators of personal context data and how that data can be used to deliver broader contextual applications and services.
The document summarizes the rise of the app economy in Thailand and opportunities for Thai software developers. Key points:
- Thailand is entering the era of the app economy, dominated by mobile devices, cloud computing, and social networking. This represents a shift from the PC era.
- The app economy provides opportunities for developers through jobs creating apps and maintaining app ecosystems and platforms. However, consumer apps face competition while enterprise apps have strict requirements.
- For Thai developers, opportunities exist in both consumer and enterprise mobile apps, as well as localization of apps. Success requires understanding business needs and processes. Monetization is also a challenge due to app discovery issues.
- Trends driving the app economy include the
This presentation describes the opportunities and impact that social media and related mobile apps marketplace are having on Enterprise Content Management (ECM)
The document discusses mobile strategy and metrics. It covers topics such as mobile commerce, applications, and the size of the app economy. It also discusses how mobility has impacted business through context over process, ecosystems rather than products, and changing revenue models. The document outlines challenges in developing enterprise applications and metrics to measure including funnel analysis, social stickiness, mapping context, and social graphs.
Traveling the Big Data Super Highway: Realizing Enterprise-wide Adoption and ...Cognizant
When it comes to big data, companies need to determine best fit with existing investments and incorporate proven best practices that enable them to run better and run differently.
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
This document provides a review and analysis of mobile application development processes using agile methodologies. It begins with an introduction to agile software development and discusses how agile principles are a natural fit for mobile application development given the dynamic environment. The document then reviews several proposed mobile application development processes that combine agile and non-agile techniques, including Mobile-D, RaPiD7, a hybrid methodology, MASAM, and a Scrum and Lean Six Sigma integration approach. It concludes by noting that while agile methodologies show promise for mobile development, further empirical validation is still needed.
Comparative Study and Analysis of Multiplatform Mobile Application DevelopmentIJMTST Journal
This document summarizes and compares different approaches to multi-platform mobile application development. It begins with an introduction to the need for cross-platform development due to the variety of mobile operating systems. It then reviews 15 previous studies on developing applications for multiple platforms. These studies explored tools like PhoneGap and approaches like model-driven architecture. The document proposes a student information management system and discusses challenges and advantages of cross-platform development. It concludes that the approach ensures a consistent experience across different mobile platforms.
How to build effective and cheaper m-payments with Open SourceBMI Healthcare
How can the use of open source software help you to save money and improve efficiency in m-payment app development? Our whitepaper highlights the measurable benefits and assists you on how to manage legal, security, IP and quality risks effectively.
A Connected Enterprise - Transformation Through Mobility and Social Networks IJMIT JOURNAL
Due to rapid changes in business dynamics, there is a growing demand to encourage social
conversations/exchanges and the ability to connect and communicate with peers, partners, customers and
other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise
applications.
This paper highlights a distinct set of needs and key customer challenges that must be considered and
addressed for deployment of Social Collaboration applications and Mobility services in enterprises. It not
only addresses the Critical Success Factors for enterprise mobility enablement but also outlines the unique
business requirements to rapidly create social collaboration culture and the discipline of turning social
data into meaningful insights to drive business decisions in real-time
A connected enterprise transformation through mobility and social networksIJMIT JOURNAL
Due to rapid changes in business dynamics, there is a growing demand to encourage social
conversations/exchanges and the ability to connect and communicate with peers, partners, customers and
other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise
applications.
MOBILE APPLICATION DEVELOPMENT METHODOLOGIES ADOPTED IN OMANI MARKET: A COMPA...mathsjournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible
software process, which can deal with many challenges facing the mobile app development process. These
challenges include: volatility of requirements, strong user involvement, development time tightness, process
simplicity, and production of valuable software in low cost. This research study investigates the current
mobile app development approaches adopted in Omani market and provides a comparison between
existing methods. The results reveal that Agile approach is the most popular model for mobile software
engineering in Omani, as it naturally fits most of the applications required in this market. The study also
discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that
XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature
for different mobile app processes. The study provides also a series of recommendations for mobile app
developers which should help in selecting the most appropriate method that suits the targeted market
sector.
MOBILE APPLICATION FOR DONATION OF ITEMSvivatechijri
Development of NGO is also development of society prestige, which makes significance contribution to diverse areas. Since NGO are non-profit organization, they always lack resources. Thus, to fulfill the requirements “UNNATI SAMAJ “app will be a rescue. Using this app any donor can donate food, clothes, and other items which can be utilize by needy ones. For e.g. from big organized parties, often food gets wasted, so using the app’s Google API technology people can donate the food to nearest NGO without needed to search up for contact information. Thus, our app will be a direct bridge between all NGOs and donors.
Mobile Application Development Methodologies Adopted in Omani Market: A Compa...ijseajournal
Popularity of mobile phones and huge growing for mobile applications make developers in need for flexible software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approaches adopted in Omani market and provides a comparison between existing methods. The results reveal that Agile approach is the most popular model for mobile software engineering in Omani, as it naturally fits most of the applications required in this market. The study also discusses various agile process models such as Scrum, XP, Lean, DSDM, and others. It is concluded that XP model is the most preferable model used by Omani developers due to its dynamic and adaptive nature for different mobile app processes. The study provides also a series of recommendations for mobile app developers which should help in selecting the most appropriate method that suits the targeted market sector.
The presentation is for the teacher and the student to learn and grow with their projects applying systematic thinking along with methodologies that foster such thinking. I used emerging business technology applications to serve as examples to highlight the extensive preparation that goes along to achieve any successful product. I just focused on the influence of the smart phone, social, mobile, cloud convergence with a few examples from education, daily digital routines and healthcare.
Adequate Solution for Business to Customer (B2C) by an ongoing Mobile SystemAM Publications
Today’s the era of mobile science and mobile secure technology in which business needs a solution that
impact on current scenario to their customers for making the easy purchase of the goods and items. Mobile system
based application have the design formation in the different developing languages which developed the systematic
arrangement of selling goods and particular as orders have been made by their premium customer, those could
consider as the adequate management system for business to customer. This solution would resolve by the design
views of application over mobile technology those helps for placing orders of goods as customer opted on the
application system.
The Effectiveness of Internet Marketing in Increasing the Reach and Awareness...Dr. Amarjeet Singh
The present research seeks to expound the effective
of Internet marketing in increasing the read and awareness of
consumers. Impatient the research conducted a good review
about the privies literature related to the study. It leads a brief
idea of the study before articulating the statement of the
problem. From the statement of the problem deducting the
researcher found that the social media , mobile apps and
internet marketing have Promina impact with the
effectiveness and in cornering the awareness of the consumer
.hence the research subdivided the research problem into four
different objective such translates the formation of the study
states that these is no significant relationship between level of
effectiveness and level of utilization of internet marketing on
consumer in kingdom of Bahrain . Further the research
employs multiple methodologies to a new conclusion on the
particular issue, the study used convening sampling method
combined with the spss software for data analyse.
The study aims to assess the Effectiveness of Internet
in Business to increase reach and awareness among consumers
in Bahrain. Data and correspondence innovation has changed
quickly in the previous 20 years with a key advancement being
the development of online networking. Business, which does
not utilize internet-based life, tends to lose on key client
base. The rise of social media means it’s unusual to find an
organization that does not reach its customers and prospects
through one social media platform or another. Companies see
the importance of using social media to connect with
customers and build revenue.
Businesses have realized they can use social media to generate
insights, stimulate demand, and create targeted product
offerings. This is important in traditional brick-and-motor
businesses, and, obviously, in the world of e-commerce.
In this research, to adequately address the research questions
a variety of data collection methods and instruments were
used such as questionnaire survey and t-test.
From the study, the researcher concluded that there is no
significant relationship between the Level of utilization &
Effectiveness of Internet marketing among consumers in
Bahrain. Therefore, the researchers accept the null
hypothesis.
The problems faced by the respondents on the Level
of utilization & Effectiveness of Internet marketing among
consumers in Bahrain is privacy, censorship and online
security. The Internet, social media, online advertising, mobile
apps etc. as a whole, can be seen as technology that has greatly
enhanced our lives but should be done responsibly.
Marketing ecosystem: 7 challenges facing marketers todayTony Davis
The marketing technology landscape has exploded. Marketers are spoiled for choice with an array of platforms, products, integrations and connections. In this presentation, we take a step back from the technology to look at 7 major challenges faced by marketers wanting to navigate the marketing ecosystem.
This study investigates the importance of the usability of a Mobile First Company (MFC) app. The number of
MFCs is growing rapidly worldwide, and the existence of such companies primarily rely on their apps being used. There
is a broad range of usability literature, however scarce data exists, that describes how app usability contributes to the
success of MFCs. This research uses a case study to empirically extract an initial link between MFC success and the perceived usability of its app. Arabic-System Usability Scale (A-SUS) is employed to evaluate the usability of an MFC app
in Kuwait. The results are used to start collecting data in order to initiate a correlation between MFC success with its app
perceived usability.
How to adopt successful m-payment collaboration with AgileBMI Healthcare
Why retaining collaboration is imperative in m-payment ecosystem? Our whitepaper discusses agile as a dynamic and successful approach that enables you to make and release changes rapidly without impacting on quality or customer expectations.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Top 20 Cited Research Articles in Information Management - 2021IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
Building the Right Mobile App Development Strategy: The rate at which the mobile app market is growing reflects the important role it plays in the communication space. Statistics show that mobility is the primary way people are interacting and getting things done. Mobile phones prices and browsing rates get cheaper every day, and number of mobile internet users have multiplied manifold in the past few years. This has also led increase in the download numbers of mobile applications.
In this presentation, Achyuth introduces SMAC and associated trends. Achyuth opines that Analytics is the brain that enabled SMAC to happen and he wants to develop a solution to help Small and Medium businesses to have their own analytics brain.
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET Journal
This document describes a proposed system to detect advertisement behavior in Android applications. The system uses a third-party server to monitor advertisements before they are loaded into applications. The server analyzes incoming advertisements to check for malicious code or behaviors that could access private user information without permission. If risky behaviors are detected, the server restricts the advertisement's access and prompts the user to approve any requested permissions. The goal is to prevent unauthorized access of user data by advertisements embedded in applications. The document outlines the system architecture and modules, including adding apps/ads, decompiling ad components to analyze them, and clustering ads by category.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of
time is consumed in collecting requirements from the organization to build an archiving system. Sometimes
the system does not meet the organization needs. This paper proposes a domain-based requirement
engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and
SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed
during analyzing and designing the archiving systems decreased significantly. The proposed methodology
also reduces the system errors that may happen at the early stages of the development of the system.
Similar to A Comparative Study E-Commerce Development Method: Adapting an Agile Approach in Mobile Occasion E – Commerce System (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
A Comparative Study E-Commerce Development Method: Adapting an Agile Approach in Mobile Occasion E – Commerce System
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
DOI: 10.5121/ijcsit.2019.11402 17
A COMPARATIVE STUDY E-COMMERCE
DEVELOPMENT METHOD: ADAPTING AN AGILE
APPROACH IN MOBILE OCCASION E – COMMERCE
SYSTEM
Beshair Khalid Alsiddiq and Nor Shahida Mohd Jamail
Collage of Computer and Information Science, Prince Sultan University,
Riyadh, Saudi Arabia
ABSTRACT
E-commerce nowadays has expanded in the past years, and it is substituting the traditional brick and
mortar stores. And most of the brands now have their own web or mobile application so the users can shop
online, it is easier and faster. Building an e-commerce application is like any other software it goes through
phases in the SDLC. This paper is going to be a guide to adapt the Agile mythology in the development of
the mobile e-commerce application.
KEYWORDS
E – commerce, Agile, E – commerce application.
1. INTRODUCTION
In recent times, with the rising ability of the mobile e-commerce market, specialists are looking
for increasingly adaptable strategies that can be utilized to conform to dynamic condition where
the mobile e-commerce framework condition are changing after some time. The agile strategy
encourages the software developing processes to accept the new changes at any phase of the
project, clients are dealt with independently as associates and unpreventable developmental
changes can be recognized. Agile methodologies construct a hugely collaborative to the software
improvement.[1] Normally, it’s connects with the 'lean' practice, agile software advancement
intently pursues into stream of the business esteem, including the attention to the exercises that
straightforwardly adds the task true objective of the software’s quality. The Agile manifesto
distributes the characterize methodology, it is currently known as the agile software development
process and the guiding force for Agile users.
Agile methodologies appeared to suit changing business requirements and for better
administration of the software improvement lifecycle.It gives rehearses that encourage
correspondence between the engineer and the client, and undergo develop-deliver feedback
cycles, to have increasingly explicit perspective on the requirements, and be prepared for any
change whenever.Agile development methodology enables organizations to build the correct item
and engages groups to consistently upgrade their release to optimize its value all through
advancement, enabling them to be as competitive as conceivable in themarketplace. [7,8]
Subsequently, the fundamental point of the approach is to convey what is required at a suitable
time during the advancement cycle. Agile methodologies are among the best programming
advancement ways to deal with apply now and again, when the client's requirements are not
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
18
correct, or when the due dates and spending plans are tight. However, other than the advantages
related in utilizing agile advancements in mobile software development, there are issues that
brings up concerns in detailing gains in quality, profitability and business fulfillment by various
groups. It has been accounted for that agile strategies had been effective in conveying for
themajority parts of cases, there are clashing reports that guarantee that the approach is still too
young to even think about requiring extensive academic proof of their success of their prosperity.
This paper is an attempt to survey the distributed literature on the utilization of the agile
methodologies for the improvement of mobilesoftware as the specialists trust that agile
innovations offer an answer for portable explicit applications that require excellent advancement
processes.[9]
2. LITERATURE REVIEW
Agile development is a methodology depends mostly on producing a high-quality product in less
time, small groups and also less documenting. Researchers and experts have shown that agile is
suitable for all kind of systems especially for the small projects.
Abrahamsson et al. [3] declared the features of the agile technologies that suits in mobile software
development and why it is suitable. The different conflicts include, environment dispersal, few
members in the development team, known customer, small systems and short development
cycles. Harleen K. Flora1, Dr. Swati V. Chande. [1] noted that agile methodology is the most
suitable fit for the mobile application developments process. Also, most of the studies for the
application of the techniques that agile development contains to the mobile application
development indicates the need for software development processes tailored to suite the mobile
application requirements.Srinivasan J, Dobrin R, Lundqvist K. [4] illustrated that agile techniques
hold a great promising to decrease the cycle times and also providing a greater worth to the all
key that the stakeholders involved in the software ecosystem. While these methods seem to be
very suitable for the embedded systems development process, the uses have not become a very
widespread practice.
E – COMMERCE:
In the 1970s was the first online transaction. The action was made using the ARPANET (early
packet-switching network). Students at Stanford University and the Massachusetts Institute of
Technology (MIT) made the deal quietly because it was an illegal drug deal [2]. That’s was the
start of the e-commerce. E-commerce is an online business when the user can purchase or sell an
item by electronic methods, it’s indicated to both online retail and electronic transactions.
MOBILE E – COMMERCE APPLICATION:
Kevin Duffy started the expression of the m – commerce in 1997 at the launch of the Global
Mobile Commerce Forum, to be a sign of "the conveyance of electronic business capacities”
precisely to the customers hand, and anywhere, by the wireless technologies. The mobile e-
commerce application will be developed through the SDLC stages (Software Development Life
Cycle), which are:
1. Planning and analyzing.
2. Designing.
3. The Implementation.
4. Testing the system.
5. The Maintenance.
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
19
SDLC can hail errors in software invention before they can be found (which will cost a lot greater
expense) in advanced stages. Although, it is extremely more than that, the Software Development
Life Cycle can spread out a configuration to get everything right and at time the first run through.
Agile development is one of the newest and fastest mythology of the software development life
cycle, it launches the product fast and contiguously updates it to a better application.
Figure 1. Software Development Life Cycle.
3. E-COMMERCE OCCASION SYSTEM
The motivation behind this research is to investigate a portion of the issues confronted when
starting to think about doing events and occasions that could impact the last outcomes began with
organizing the event and money related expense. Following the approaching gatherings and
occasions help to abstain from clashing in future occasions. Event planning is the way toward
arranging a festival, celebration, party or pretty much any occasions. It incorporates planning,
choosing the dates and setting.
With the assistance of social media, it empowers to design an occasion better. Events are
recreation activities and work possibilities for people." Events unite people together to have great
time and make delightful memories. They enhance the quality of people’s life due to the fact of
providing a significant economic and providing a revenue for special projects. Hillary
Commission for Sport, (1997) said, notwithstanding size, occasions require a high level of
arranging, a scope of abilities and a ton of energy.
FourSquare (a geolocation stage) is a location-based social networking application, for mobile
devices. Clients "check-in" at scenes utilizing a portable site, text messaging or a gadget explicit
application. The occasion coordinators have worked together with Foursquare to make another
experience like winning an identification to get access to an after-party, this is extremely a
proficient method to make the occasion livelier and intuitiveness between visitors appears to be a
lot less demanding and smoother. For example, the occasion by Ralph Lauren Big Pony
Fragrance Dinner.
According to Andersson and Wesslau (2000), when utilizing occasions, organizations to get the
possibility to have their own-right to the consumer during the duration of the event. This implies
if an organization figures out how to motivate the customer to go to the occasion, the contortion
from the competitors will be gone or if nothing else limited amid the span of the occasion.
Additionally, occasions contain substantial components, for example, nourishment, refreshments
and different items sold or given away, however are basically an administration in that they
comprise of immaterial encounters of limited length inside an impermanent, oversaw climate.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
20
Similarly, as with all administrations, this experiential "item" is delivered and expended at the
same time, is exceptionally heterogeneous and extremely hard to store or control.
In other hand, OpenSooq is an application that only covers the Middle East and North Africa
region. With more than a quarter of a billion hits per month, monthly traffic is growing, making it
one of the leading online markets in the Middle East and North Africa. But this huge platform not
focus on events and party’s planner it only an e-commerce platform for different goods. The open
now is a part of the iMENA Group in 2012. The open sooq enables vendors to deliver their
products and services online to millions of users without an intermediary, while visitors can easily
browse thousands of goods, products and services covering different categories; real estate,
automobiles, electronics, Work and many more. The application gives users the same
functionality they can see on the site, and can browse and publish ads to buy, sell or rent all types
of products and services, as well as advertise or even apply for vacancies. But now days we need
an urgent to tools that focus on events and party’s planner that organize and plan our events to
make our life easier and more flexible.
4. AGILE APPROACH
Agile software development is an approach of programming, the enhancements of the software
going to be under the requirements and the arrangements that will be developed over the mutual
effort of self-sorting out and cross-utilitarian groups and their customer(s)/end user(s). It
advocates many – sided arranging, transformative advancement, experimental learning, and
constant enhancement, and also it empowers quick and flexible reaction to the change.Agile
spread-out, by the Manifesto for Agile Software Development. Due to great qualities and
standards which embrace in the manifesto are supported in a wide scope of programming
advancement structures, including Scrum and Kanban. There is considerable anecdotal evidence
that adapting agile methods and qualities will improve the lightness of software experts, groups
and associations; in any case, some exact examinations have discovered no logical proof.The
Agile Manifesto set up a typical arrangement of larger qualities and standards for the majority of
the individual agile approaches. Its subtleties the main four fundamental beliefs for empowering
high-performance, efficiency, and outputs which are:
• Individuals and communications.
• Establishing a functional software.
• The customer’s cooperation.
• reacting to change.
Those four important qualities are upheld by 12 standards which underlie the Agile Manifesto:
1. The Satisfaction of the Customer.
2. Welcoming changing requirements.
3. Short time of the delivery cycle.
4. The cooperation among business people and developers.
5. A motivational atmosphere between team members.
6. Face confronting correspondence.
7. A functional software-Primary measure of progress.
8. Agile promoting sustainable development.
9. Continuous attention regarding technical excellence and good design.
10. Simplicity.
11. Self-Organization to have the best outcomes.
12. Self-improvement.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
21
THE AGILE SDLC:
Underneath Agile SDLC looks similar to the classic Software Development Life Cycle, however,
when plunged further, it is not the situation due to the fact that the agile Software Development
Life Cycle is hugely cooperative, iterative, and step – by – step to the jobs which individuals take
considerably more vigorous than on classic project.
Figure 2. Agile SDLC
TECHNIQUES:
A portion of the most outstanding agile software development techniques:
1. Extreme Programming (XP):
The main purposes are to improve the software’s quality and responsiveness to
changing customer requirements. As a kind of agile progress, it advocates visit "deliveries" in
a short time of improvement cycles, which is intended to upgrade efficiency and present
checkpoints at which new customer requirements can be embraced.
2. Scrum:
It is about managing knowledge work, with an assurance on the new improvement of
the software. It was created for small teams that are consist of three to nine members, they
will divide their tasks to a number of activities which will be done inside the timeboxed
iterations, called " sprints ", and these activities will not exceed one month to be done and
most usually couple of weeks to finish these activities, at that point tracking the progress and
then planning again in 15-minute stand-up gatherings, called day by day scrums.
3. Agile Modeling (AM):
Agile Modeling (AM), is a training - based methodology for modeling and
documentation of software-based systems. It is expected to be an accumulation of qualities,
principles, and practices for displaying software that can be adapted on a software
development project in a more adaptable way than conventional demonstrating strategies.
4. Crystal:
It focuses on individuals and the communication among them while they work on a
software development project. There is additional attention on business-criticality and
business-need of the framework under development. Unlike traditional development methods,
Crystal doesn't fix the apparatuses and systems of development, however, it keeps individuals
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
22
and processes at the center of the improvement processes. Also, it isn't just the people or the
processes that are matters, rather the communication between the two that is what matters the
most.
5. Dynamic Systems Development Method (DSDM):
Rather than settling measures of functionality in an item, afterward changing time
and assets that will achieve the functionality, will be better to fix the time and resources, then
afterward modifying all measure of functionality appropriately.
6. Adaptive Software Development (ASD):
It combines the rules of the continuous adoption of the system to the current
performance situation. Adaptive software development substitutes the traditional waterfall
cycle with a duplicating series of speculating, team up, and learn cycles. This dynamic cycle
accommodates nonstop learning and adjustment to the new condition of the project.
7. Feature-Driven Development (FDD):
The main focus is the designing and building stages and the priority is the quality
viewpoints all through the whole progress and incorporates repeated and sensible deliveries,
alongside with careful observation of the project’s process.
8. Internet-Speed Development (ISD):
Addresses the issue of taking care of quick release for the development cycles in very
short time. Also, the structure made up of time drivers, quality conditions and process
changes.
5. AGILE ADAPTATION IN E-COMMERCE
Each mobile e – commerce application has its own challenges depending on its unique features.
And most of the e-commerce applications developers follows the traditional development process
to make sure that the project has been developed in time, in budget and to achieve the
application’s requirements and needs. Here is the development life cycle of a mobile application:
1. Concept/ Scope.
2. Requirement Analysis.
3. Planning.
4. Design preparation.
5. Development.
6. Testing.
7. Final Delivery.
8. Maintenance.
Each step has a very suitable agile technique to provide a better product that will be delivered in
time for the costumers and on budget for the organization, because agile is about short time,
flexibility in the development cycle which responses fast to the customer’s needs. Also, it is a
continuous building a two – way software pipeline between the organization and its customer.
The process of the software will be a continuous delivery and updating the software from the
start.
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
23
Figure 3: Mobile application Life Cycle.
Table 1.
Phase Suitable
Agile
Technique
Reason
Concept / Scope. Scrum Focuses on managing the project and
improving the software to deliver in
time with best quality.
Requirement Analysis. XP Focuses on the requirements, the XP
technique adapts and accepts all of the
changing requirements at any time and
stage.
Planning. Scrum / XP The main focuses in this phase is the
requirements and the software itself as
well. The requirements might change
so the XP will accept it and adapts to
the system, with changing
requirements maybe change the
software might occurs as well, so
Scrum will manage the software
changes and also projects managing.
Designing/Preparation. Scrum To managing the project properly and
to improve the software as well, to
deliver the best quality of the
software.
Development/Testing. XP XP accepts any chang es, so the
development phase it may occurs
some changes wither it was in the
requirements or changes in the
software.
Final Delivery. Scrum Managing the project/system.
Maintenance. XP Changes might occur.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No
DIAGRAM:
Figure 4: Diagram for Agile Mobile Application
International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4
Figure 4: Diagram for Agile Mobile Application
4, August 2019
24
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
25
6. CONCLUSION
Choosing the best software methodology for the mobile e-commerce application is not hard nor
easy. There is no only one suitable model for all the projects, planning requirements and also the
payment model, but agile methodology especially for the small businesses will hugely help the
most, due to its fucose on the project and the customer’s needs and satisfaction as well in the
same time. These small businesses that does not have a huge data it suits the best for agile
because there is less documentation and publishing a product in short time. And for the e-
commerce applications and e-commerce businesses in general as well their main focus is
satisfying the customer, publishing a system in a short amount of time and providing a high-
quality product. Also, agile methodology has multiple techniques which were introduce above
that can suites most of the projects.
ACKNOWLEDGEMENTS
We would like to acknowledge the Artificial Intelligence and Data Analytics (AIDA) Lab, Prince
Sultan University, Riyadh, Saudi Arabia for supporting this work.
REFERENCES
[1] Harleen K. Flora, Dr. Swati V. Chande, "A Review and Analysis on Mobile Application
Development Processes using Agile Methodologies ". International Journal of Research in
Computer Science, 3 (4): pp. 9-18, July 2013. doi: 10.7815/ijorcs.34.2013.068.
[2] Knibbs, K. (2015, April 6). Remember How the First Thing Ever Sold Online Was a Baggie of
Weed?
[3] P. Abrahamsson, “Keynote: Mobile software development – the business opportunity of today”,
Proceedings of the International Conference on Software Development, Reykjavik, Iceland, pp. 20-
23, 2005.
[4] Srinivasan J, Dobrin R, Lundqvist K. ‘State of the Art’ in Using Agile Methods for Embedded
Systems Development. Mälardalen University.
[5] Flora, K. H. ADOPTING AN AGILE APPROACH FOR THE DEVELOPMENT OF MOBILE
APPLICATIONS.International School of Informatics and Management. July 2012.
[6] Stamelos. I, Sfetsos, P. (2007). “Agile Software Development Quality Assurance”. 978-1-59904-
216-9, IDEA GROUP PUBLISHING
[7] “Manifesto for Agile Software Development”. Agile Alliance, 2001.
[8] A.I. Wasserman, “Software Engineering Issues or Mobile Application Development,” Proceedings
of the FSE/SDP workshop on Future of Software Engineering Research, FoSER '10, 397-400. doi:
10.1145/1882362.1882443
[9] R. Holler, “Mobile Application Development: A Natural Fit with Agile Methodologies”.
VersionOne, LLC.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019
26
AUTHORS
Beshair Alsiddiq is a Software Engineering students in Prince Sultan University. She
really committed in research and her interest are in Software Engineering, Cloud
Computing and Mobile Development.
Dr. Nor Shahida Mohd Jamail is currently in Prince Sultan University, Riyadh, Saudi
Arabia as an Assistant Professor. She obtained her PHD in Software Engineering from
Universiti Putra Malaysia. Her specialized are purely in Software Engineering,
Software Process Modelling, Software Testing and Cloud Computing Services. She had
involved in Machine Learning Research Group in Prince Sultan University and also
involved in 3 big research project which collaborated with Sultan Idris Educational
University. Besides, she is the co-Chair, Track Chair, Committee in several
International Conference published by IEEE, Scopus indexed. Her current research interests are on Cloud
Computing, Quality in Software Engineering and Software Modelling, Big data, Machine Learning and
more on commercialization of research products. She can be contacted at njamail@psu.edu.sa