[PDF][PDF] A SEM Approach to Assess M-Learning Intentions Among Students of Design: An Empirical Analysis Using the TRUTAUT Model

S Srivastava, NS Bhati - Journal of Information Technology Education …, 2024 - jite.org
ABSTRACT Aim/Purpose This research aims to examine the mobile learning (m-learning)
intentions of students pursuing design courses at graduate and undergraduate levels in …

MEC network resource allocation strategy based on improved PSO in 5G communication network

Y Chen - International Journal on Semantic Web and Information …, 2023 - igi-global.com
Relying on features such as high-speed, low latency, support for cutting-edge technology,
internet of things, and multimodality, 5G networks will greatly contribute to the transformation …

Smartphone penetration test: Securing Industry 5.0 mobile applications

EW Aditya, NH Zakaria, F Azzali… - The Future of Human …, 2024 - taylorfrancis.com
Undoubtedly, the ubiquitous presence of mobile devices, and particularly the indispensable
role of smartphones, in our daily lives is undeniable. Projections indicate that the number of …

Identity-Based Integrity Verification and Public Auditing Scheme in Cloud Storage System Against Malicious Auditors

H Zhang, Y Yuan, X Xin, Y Qu - Tehnički vjesnik, 2023 - hrcak.srce.hr
Sažetak The cloud storage system provides users with convenient storage services.
However, users who use cloud storage services lose absolute control over the data once …

Securing Mobile Workspaces in the Cloud: Navigating Bring Your Own Device Challenges with Cyber Resilience

HV Srikrishna, JS Murthy - Cloud Security, 2024 - taylorfrancis.com
In the realm of Cloud Bring Your Own Device (BYOD) security, organizations are proactively
addressing past failures through strategic mitigations. Comprehensive user training and …

A Design and Development Approach for Mild Cognitive Impairment Screening

H Kim - Tehnički vjesnik, 2023 - hrcak.srce.hr
Sažetak Mild cognitive impairment (MCI) is a precursor to dementia and its early diagnosis
in patients is important for appropriate intervention. In this study, an IoT (Internet of Things) …

A Review of Smartphone as an Office: Security Risks and Mitigation Measures

TM Mukisa, J Murumba - Science, Engineering and Technology, 2023 - setjournal.com
Smartphones have become the most popular mode of communication as well as a novel
mode of work, allowing users to work from anywhere and increasing their efficiency and …