User Analysis Mechanisms based Mobile Fitness System
نویسندگان
چکیده
منابع مشابه
Easing Text-based Mobile Device User Authentication Mechanisms
We discuss how a variety of techniques relevant to text entry or user identification could be used to facilitate reasonably fast and secure methods for authenticating mobile device users. In particular, we explore how mobile device text-entry methods could be used to speed up both the initial authentication of a mobile device user as well as subsequent password entry for authentication to other...
متن کاملUser Interface Design in Mobile Educational Applications
Introduction: User interfaces are a crucial factor in ensuring the success of mobile applications. Mobile Educational Applications not only provide flexibility in learning, but also allow learners to learn at any time and any place. The purpose of this article is to investigate the effective factors affecting the design of the user interface in mobile educational applications. Methods: Quantita...
متن کاملUser Perceptions on Interacting with Mobile Fitness Devices
In this paper, we present a mobile fitness proof-of-concept demonstrator that includes several sensors for measuring physiological issues in a human body, i.e., heart rate meter, 3-axis accelerometer for step counter and energy consumption, and bioresistance meter for fat percentage, body water content and galvanic skin response. In addition, we describe user perceptions representing various di...
متن کاملAge Based User Interface in Mobile Operating System
The mobile phones are becoming now an irreplaceable utility of every household. It serves as wall clock, alarm clock, calculator, calendar, timer and many more, but have this multi-functionality overloaded the interface of the new generation of the mobile phones. The youth have adapted well to these multiple functionalities graphical user interface, but the interface has now haunting effects fo...
متن کاملAnalysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2016
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v6i6.pp3154-3160