ANALYSIS OF MOBILE TECHNOLOGIES AND APPLICATIONS

Veljko Radičević, Zoran G Pavlović, Dragan Nikolić

Abstract


Technologies represent a means or an opportunity for the realization of an activity or process. Internet technologies enable communication between service users and servers via a computer network. It includes software and hardware components of the client and server that exchange messages within communication with Internet standards and protocols. The development of the Internet and digital business in recent years has led to changes in the amount and types of information available. Applications can communicate with databases, application servers, content management systems, data warehouses, workflow systems, browsers, message queues, research and analytics web packages, and other applications to integrate services and business processes within a single enterprise. It is obvious that the boundaries that have traditionally existed between database management systems, content management systems, data warehouses, and other data management systems are becoming less important and there is a great need for a platform that provides a single overview of all services. Mobile applications enable the connection and realization of digital activities via internet technologies. The user interface should be primarily tailored to users where usability parameters are important: efficiency, learning, and satisfaction. Based on the above, the authors created a starting point for the implementation of new applications. This paper presents mobile technologies and applications that are increasingly represented every day and provide users with various digital capabilities in wireless connection and exchange of requested data and services.


Keywords


wireless technologies, digitalization of business processes, innovative business models, service user, service provider

Full Text:

PDF (Serbian)

References


Ahn, J. H., Lee, S. H., & Lee, T.-J. (2016, 11). Anti-Collision Protocol for Coexistence of RFID and NFC P2P Communications. IEEE Communications Letters, 20(11), 2185 - 2188.

Aktivia, R., Djatna, T., & Nurhadryani, Y. (2014). Visual Usability Design for Mobile Application Based on User Personality,. (pp. 177-182). International Conference on Advanced Computer Science and Information System Year: 2014.

Alouini, M. S. (2017). Paving the way towards 5G wireless communication networks. 2017 2nd International Conference on Telecommunication and Networks (TEL-NET). Noida, India: IEEE.

Choi, B., Raghu, T. S., Vinze, A., & Dooley, K. J. (2009). Process Model for e Business Standards Development: A Case of ebXML Standards. IEEE Transactions on Engineering Management, 56(3), 448 - 467, DOI: 10.1109/TEM.2009.

Christian, L., Juwitasary, H., Chandra, Y. U., Putra, E. P., & Fifilia. (2019). Evaluation of The E-Service Quality for the Intention of Community to Use NFC Technology for Mobile Payment with TAM. 2019 International Conference on Information Management and Technology (ICIMTech). Jakarta/Bali, Indonesia,.

Dlodlo, N. (2015). The internet of things in transport management in South Africa. International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) (pp. 19-26). Windhoek, Namibia: IEEE.

Grubert, J., Langlotz, T., Zollmann, S., & Regenbrecht, H. (2017). Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality. IEEE Transactions on Visualization and Computer Graphics, 23(6), 1706 - 1724.

Hossain, M. S., & Ghulam, M. (2017). An Emotion Recognition System for Mobile Applications. IEEE Access, 5, 2281-2287. doi:10.1109/ACCESS.2017.2672829

Hyotaek, S., Jin-Soo, K., & Seungryoul, M. (2014, 08). System-Wide Cooperative Optimization for NAND Flash-Based Mobile Systems. IEEE Transactions on Computers, 63(8), 2052 - 2065. doi:10.1109/TC.2013.74

Ichino, M., Yamazaki, Y., & Yoshiura, H. (2015, 02 01). Speaker verification method for operation system of consumer electronic devices. IEEE Transactions on Consumer Electronics, 61(1), 96 - 102. doi:10.1109/TCE.2015.7064116

Kaushik, K., & Dahiya, S. (2018). Security and Privacy in IoT based E-Business and Retail. 2018 International Conference on System Modeling & Advancement in Research Trends (SMART). Moradabad, India,: IEEE.

Lee, I., & Lee, B.-C. (2012, 11). Measuring the Value of RFID Investment: Focusing on RFID Budget Allocation. IEEE Transactions on Engineering Management, 59(4), 551 - 559.

Lin, S.-S., Hu, M.-C., Lee, C.-H., & Lee, T.-Y. (2015, 09). Efficient QR Code Beautification With High Quality Visual Content. IEEE Transactions on Multimedia, 17(9), 1515-1524.

Liu, S., Fu, Z., & Yu, B. (2019). Rich QR Codes With Three-Layer Information Using Hamming Code. IEEE Access, 7, 78640-78651.

Lu, Y., Li, X., Zhong, J., & Xiong, Y. (2010). Research on the Innovation of Strategic Business Model in Green Agricultural Products Based on Internet of Things (IOT). 2010 2nd International Conference on E-business and Information System Security. Wuhan, China: IEEE.

Pavlović, Z., Banjanin, M., Vukmirović, J., & Vukmirović, D. (2020). Contactless ICT Transaction Model Of The Urban Transport Service. Research journal TRANSPORT, 35(5), 500-510. doi:10.3846/transport.2020.12529

Pavlović, Z., Bundalo, Z., Bursać, M., & Tričković, G. (2021). Use of information technologies in railway transport. 2021 20th International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo, Bosnia and Herzegovina, 2021,,https://ieeexplore.ieee.org/document/9400521 (pp. 1-4). East Sarajevo, Bosnia and Herzegovina,: IEE.

Radenković, B., Despotović Zrakić, M., Bogdanović, Z., Barać, D., & Labus, A. (2015). Elektronsko poslovanje (1 ed.). Beograd: Fakultet organizacionih nauka Beograd.

Raheel, S. (2016). Improving the User Experience using an Intelligent Adaptive User Interface in Mobile Applications, . IEEE International Multidisciplinary Conference on Engineering Technology (IMCET) .

Stipkovic, S., Bruns, R., & Dunkel, J. (2013). Pervasive Computing by Mobile Complex Event Processing. 2013 IEEE 10th International Conference on e-Business Engineering. Coventry, UK: IEEE.

Subotić, M., Radičević, V., Pavlović, Z., & Ćirović, G. (2021). Development of a New Risk Assessment Methodology for Light Goods Vehicles on Two-Lane Road Sections. Computer and Engineering Science, Symmetry 2021, 13(7), 1271. doi:10.3390/sym13071271

Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.-M., & Guichard, C. (2016, 03). Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Transactions on Information Forensics and Security, 11(3), 571-583.

Tracy, K. W. (2012). Mobile Application Development Experiences on Apple??s iOS and Android OS. IEEE Potentials, 31(4), 30-34. doi:10.1109/MPOT.2011.2182571

Wang, D., Yao, H., Li, Y., Jin, H., Zou, D., & Robert H. Deng. (2017). A Secure, Usable, and Transparent Middleware for Permission Managers on Android,. IEEE Transactions on Dependable and Secure Computing, 14(4), 350-362. doi:10.1109/TDSC.2015.2479613

Wang, G., Feng, G., Qin, S., & Wen, R. (2017, 02). Efficient traffic engineering for 5g core and backhaul networks. Journal of Communications and Networks, 19(1), 80-92.

Wei, L., & Liying, S. (2018). Design and Application of Large Passenger Flow Warning System for Urban Rail Transit. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), DOI: 10.1109/IAEAC.2018.8577506 (pp. 192-195). Chongqing, China: IEEE.

Wu, S. X., Cheng, B., Qiao, H., & Chen, J. (2015). Mobile business process personalization for end users. IEEE Journals & Magazines, 12(12), 1-12 DOI 10.1109/CC.2015.7385516.

Yao, C.-Y., & Hsia, W.-C. (2018, 06 01). An Indoor Positioning System Based on the Dual-Channel Passive RFID Technology. IEEE Sensors Journal, 18(11), 4654 - 4663.

Zhao, X., & Zhang, L. (2013). Discussion on the development of E-business pattern in Internet of Things environment. 2013 Chinese Automation Congress. Changsha, China: IEEE.


Refbacks

  • There are currently no refbacks.