參考文獻 |
ABIresearch. (2013). NFC Installed Base to Exceed 500m Devices Within 12 Months; OEMs Credited for NFC Leadership as MNOs Slow to Act. Retrieved JUN. 25, 2015, from https://www.abiresearch.com/press/nfc-installed-base-to-exceed-500m-devices-within-1/
Barbier, G., & Liu, H. (2011). Data Mining in Social Media. In C. C. Aggarwal (Ed.), Social Network Data Analytics (pp. 327-352): Springer US.
Benyo, B., Vilmos, A., Kovacs, K., & Kutor, L. (2007). NFC Applications and Business Model of the Ecosystem, Proceedings of Mobile and Wireless Communications Summit, 2007. 16th IST (pp. 1-5).
Cayan LLC. (2013). Comparing QR Codes vs NFC in the Battle for Your Mobile Wallet. Retrieved JUN. 26, 2015, from https://cayan.com/comparing-qr-codes-vs-nfc-in-battle-for-your-mobile-wallet
Ceipidor, U. B., Medaglia, C. M., Volpi, V., Moroni, A., Sposato, S., Carboni, M., & Caridi, A. (2013). NFC technology applied to touristic-cultural field: A case study on an Italian museum, Proceedings of the 2013 5th International Workshop on Near Field Communication (pp. 1-6).
Chakraborty, G., Pagolu, M., & Garla, S. (2014). Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS: SAS Institute.
Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y., & Chiu, J. H. (2010). NFC Mobile Transactions and Authentication Based on GSM Network, Proceedings of the Second International Workshop on Near Field Communication (NFC), 2010 (pp. 83-89).
Chyi-Ren, D., Yu-Hong, L., Liao, J., Hao-Wei, Y., & Wei-Luen, K. (2011). A Location-based Mobile Advertisement Publishing System for Vendors, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG) (pp. 24-29).
Cunha, C. R., Peres, E., Morais, R., Oliveira, A. A., Matos, S. G., Fernandes, M. A., . . . Reis, M. J. C. S. (2010). The use of mobile devices with multi-tag technologies for an overall contextualized vineyard management. Computers and Electronics in Agriculture, 73(2), 154-164. doi: http://dx.doi.org/10.1016/j.compag.2010.05.007
Curran, K., Millar, A., & Mc Garvey, C. (2012). Near field communication. International Journal of Electrical and Computer Engineering (IJECE), 2(3), 371-382.
Denso Wave Incorporated. (n.d.). What is a QR Code. Retrieved MAR. 3, 2015, from http://www.qrcode.com/en/about/
eBizMBA Inc. (2015). Top 15 Most Popular Social Networking Sites. Retrieved Apr. 2, 2015, from http://www.ebizmba.com/articles/social-networking-websites
Fu, L. (2011). Design of QR code-based Mall shopping guide system, Proceedings of the International Conference on Information Science and Technology (ICIST), 2011 (pp. 450-453).
Fuller, C. M., Biros, D. P., & Delen, D. (2011). An investigation of data and text mining methods for real world deception detection. Expert Systems with Applications, 38(7), 8392-8398. doi: http://dx.doi.org/10.1016/j.eswa.2011.01.032
Ghag, O., & Hegde, S. (2012). A Comprehensive Study of Google Wallet as an NFC Application. International Journal of Computer Applications, 58(16), 37-42.
Ghiron, S. L., Sposato, S., Medaglia, C. M., & Moroni, A. (2009). NFC Ticketing: A Prototype and Usability Test of an NFC-Based Virtual Ticketing Application, Proceedings of the First International Workshop on Near Field Communication, 2009. NFC ′09. (pp. 45-50).
Gold, A. (2013). NFC is Here- But Who Wins? Series 1: Part One. Retrieved Jun. 26, 2015, from http://www.scanlife.com/blog/2013/08/nfc-is-here-but-who-wins-series-1-part-one/
Haberman, O., Damala, A., Pellerin, R., Haberman, U., & Gressier-Soudan, E. (2010). Exploring Contemporary Painting through Spatial Annotations Using RFID Tags, Proceedings of the VAST′10, Virtual Reality, Archaeology and Cultural Heritage, The 8th EUROGRAPHICS Workshop on Graphics and Cultural Heritage, Short and Project Papers, Paris, France, September 21-24, 2010. (pp. 49-52). X, France.
Harpaz, R., Callahan, A., Tamang, S., Low, Y., Odgers, D., Finlayson, S., . . . Shah, N. (2014). Text Mining for Adverse Drug Events: the Promise, Challenges, and State of the Art. Drug Safety, 37(10), 777-790. doi: 10.1007/s40264-014-0218-z
Hasoo, E., Hoonjung, L., & Heekuck, O. (2013). Conditional privacy preserving security protocol for NFC applications. Transactions on Consumer Electronics, IEEE, 59(1), 153-160. doi: 10.1109/TCE.2013.6490254
He, W., Zha, S., & Li, L. (2013). Social media competitive analysis and text mining: A case study in the pizza industry. International Journal of Information Management, 33(3), 464-472. doi: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.001
Hou, A. L., Feng, Y., & Geng, Y. (2011). QR code image detection using run-length coding, Proceedings of Computer Science and Network Technology (ICCSNT), 2011 International Conference on (Vol. 4, pp. 2130-2134).
Hu, X., Tang, L., Tang, J., & Liu, H. (2013). Exploiting social relations for sentiment analysis in microblogging. Paper presented at the Proceedings of the sixth ACM international conference on Web search and data mining, Rome, Italy.
Khari, M., & Bajaj, C. (2014). Near Field Communication Technology benefitted for Metro Rides. International Journal of Advanced Engineering and Global Technology, 2(7), 828-838.
Kouloumpis, E., Wilson, T., Moore, J. D., Kouloumpis, E., Wilson, T., & Moore, J. D. (2011). Twitter Sentiment Analysis: The Good the Bad and the OMG! Proceedings of the Fifth International Conference on Weblogs and Social Media, Barcelona, Catalonia, Spain, July 17-21, 2011 (pp. 538-541): AAAI Press.
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In T. Tryfonas & I. Askoxylakis (Eds.), Human Aspects of Information Security, Privacy, and Trust (Vol. 8533, pp. 79-90). Heraklion, Crete, Greece: Springer International Publishing.
Law, C.-Y., & So, S. (2010). QR Codes in education. Journal of Educational Technology Development and Exchange, 3(1), 85-100.
Leong, L. Y., Hew, T. S., Tan, G. W. H., & Ooi, K. B. (2013). Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach. Expert Systems with Applications, 40(14), 5604-5620. doi: http://dx.doi.org/10.1016/j.eswa.2013.04.018
Liu, B. (2012). Sentiment Analysis and Opinion Mining: Morgan & Claypool Publishers.
Mareli, M., Rimer, S., Paul, B. S., Ouahada, K., & Pitsillides, A. (2013). Experimental evaluation of NFC reliability between an RFID tag and a smartphone, Proceedings of AFRICON, 2013 (pp. 1-5).
Narayanan, A. S. (2012). QR Codes and Security Solutions. International Journal of Computer Science and Telecommunications, 3(7), 69-72.
NearFieldCommunication.org. (n.d.). Near Field Communication Technology Standards. Retrieved MAR.20, 2015, from http://www.nearfieldcommunication.org/technology.html
Net Asia Company Limited. (n.d.). Research about the Usage of QR Code - Result from 502 Mobile Phone Users. Retrieved MAR. 16, 2015, from http://www.mobile-research.jp/investigation/research_date_080314.html
NFC Forum. (n.d.). What Is NFC? Retrieved MAR. 20, 2015, from nfc-forum.org/what-is-nfc/
Ok, K., Coskun, V., Aydin, M. N., & Ozdenizci, B. (2010). Current benefits and future directions of NFC services, Proceedings of the International Conference on Education and Management Technology (ICEMT), 2010 (pp. 334-338).
Ondrus, J., & Pigneur, Y. (2009). Near field communication: an assessment for future payment systems. Information Systems and e-Business Management, 7(3), 347-361. doi: 10.1007/s10257-008-0093-1
Parry, T. (2008). R U Ready 4 QR Codes? Retrieved Mar. 16, 2015, from http://multichannelmerchant.com/ecommerce/r-u-ready-4-qr-codes-01102008/
Portio Research. (2011). Portio Research Mobile Factbook 2011. Chippenham, UK: Portio Research.
QRator. (n.d.). About the Project. Retrieved APR. 7, 2015, from http://www.qrator.org/about-the-project/
RapidNFC. (2013). NFC Tags vs QR Codes - How to Make the Right ChoiceNFC Tags vs QR Codes - How to Make the Right Choice. Retrieved JUN. 25, 2015, from http://rapidnfc.com/blog/73/nfc_tags_vs_qr_codes_how_to_make_right_choice
Reed, I. S., & Solomon, G. (1960). Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300-304. doi: doi:10.1137/0108018
Rouillard, J. (2008). Contextual QR Codes, Proceedings of the Third International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008. (pp. 50-55). Athens, Greece: IEEE.
Saif, H., He, Y., & Alani, H. (2012). Semantic Sentiment Analysis of Twitter. In P. Cudré-Mauroux, J. Heflin, E. Sirin, T. Tudorache, J. Euzenat, M. Hauswirth, J. Parreira, J. Hendler, G. Schreiber, A. Bernstein, & E. Blomqvist (Eds.), The Semantic Web – ISWC 2012 (Vol. 7649, pp. 508-524): Springer Berlin Heidelberg.
Salton, G., & Buckley, C. (1988). Term-weighting approaches in automatic text retrieval. Information Processing & Management, 24(5), 513-523. doi: http://dx.doi.org/10.1016/0306-4573(88)90021-0
SAS Institute Inc. (2014). Getting Started with SAS Text Miner 13.2. Cary, NC, USA: SAS Institute Inc.
Sharma, V., Gusain, P., & Kumar, P. (2013). Near field communication, Proceedings of the Conference on Advances in Communication and Control Systems-2013: Atlantis Press.
Shen, C. W., & Kuo, C. J. (2015). Learning in massive open online courses: Evidence from social media mining. Computers in Human Behavior. doi: http://dx.doi.org/10.1016/j.chb.2015.02.066
Soon, T. J. (2008). QR code. Synthesis Journal, 59-78.
Steffen, R., BMW Group Research and Technology, Preißinger, J., Schöllermann, T., Müller, A., & Schnabel, I. (2010). Near Field Communication (NFC) in an Automotive Environment, Proceedings of the 2010 Second International Workshop on Near Field Communication (NFC) (pp. 15-20).
Susono, H., & Shimomura, T. (2006). Using mobile phones and QR codes for formative class assessment. Current developments in technology-assisted education, 2(2006), 1006-1010.
Tales of Things. (n.d.). About Tales of Things. Retrieved APR. 7, 2015, from http://talesofthings.com/about/
Tan, A.-H. (1999). Text Mining: The state of the art and the challenges, Proceedings of the Pacific Asia Conf on Knowledge Discovery and Data Mining PAKDD, 1999. (pp. 65–70).
Tan, G. W. H., Ooi, K. B., Chong, S. C., & Hew, T. S. (2014). NFC mobile credit card: The next frontier of mobile payment? Telematics and Informatics, 31(2), 292-307. doi: http://dx.doi.org/10.1016/j.tele.2013.06.002
Taylor, J. (2011). How Companies Can Use QR Codes To Enhance The Customer Experience. Retrieved MAR. 24, 2015, from http://www.businessinsider.com/qr-codes-connecting-the-consumer-with-your-mobile-brand-2011-3
Tumasjan, A., Sprenger, T. O., Sandner, P. G., & Welpe, I. M. (2010). Predicting elections with twitter: What 140 characters reveal about political sentiment, Proceedings of Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media (pp. 178-185).
Vazquez-Briseno, M., Hirata, F. I., Sanchez-Lopez, J. d. D., Jimenez-Garcia, E., Navarro-Cota, C., & Nieto-Hipolito, J. I. (2010). Using RFID/NFC and QR-Code in Mobile Phones to Link the Physical and the Digital World. In I. Deliyannis (Ed.), Interactive Multimedia (pp. 219-242). Rijeka, Croatia: InTech.
Wilson, T., Hoffmann, P., Somasundaran, S., Kessler, J., Wiebe, J., Choi, Y., . . . Patwardhan, S. (2005). OpinionFinder: a system for subjectivity analysis. Paper presented at the Proceedings of HLT/EMNLP on Interactive Demonstrations, Vancouver, British Columbia, Canada.
Witten, I. H., Don, K. J., Dewsnip, M., & Tablan, V. (2004). Text mining in a digital library. International Journal on Digital Libraries, 4(1), 56-59. doi: 10.1007/s00799-003-0066-4
Xue, D., & Hairong, L. (2008). Creative Use of QR Codes in Consumer Communication. International Journal of Mobile Marketing, 3(2), 61-67.
Zafarani, R., Abbasi, M. A., & Liu, H. (2014). Social Media Mining: An Introduction: Cambridge University Press. |