Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
231 |
Design and Implementation of Multi-Device Services / Utveckling av tjänster med multipla användargränssnittNylander, Stina January 2007 (has links)
We present a method for developing multi-device services which allows for the creation of services that are adapted to a wide range of devices. Users have a wide selection of electronic services at their disposal such as shopping, banking, gaming, and messaging. They interact with these services using the computing devices they prefer or have access to, which can vary between situations. In some cases, the services that they want to use func-tions with the device they have access to, and sometimes it does not. Thus, in order for users to experience their full benefits, electronic services will need to become more flexible. They will need to be multi-device services, i.e. be accessible from different devices. We show that multi-device services are often used in different ways on different devices due to variations in device capabilities, purpose of use, context of use, and usability. This suggests that multi-device services not only need to be accessible from more than one device, they also need to be able to present functionality and user interfaces that suit various devices and situations of use. The key problem addressed in this work is that there are too many device-service combinations for developing a service version for each device. In-stead, there is a need for new methods for developing multi-device services which allows the creation of services that are adapted to various devices and situations. The challenge of designing and implementing multi-device services has been addressed in two ways in the present work: through the study of real-life use of multi-device services and through the creation of a development method for multi-device services. Studying use of multi-device services has gener-ated knowledge about how to design such services which give users the best worth. The work with development methods has resulted in a design model building on the separation of form and content, thus making it possible to create different presentations to the same content. In concrete terms, the work has resulted in design guidelines for multi-device services and a system prototype based on the principles of separation between form and content, and presentation control.
|
232 |
Wearable and mobile computing support for field service engineersPuchchkayala, Anil January 2014 (has links)
Due to the rapid development in electronics and radio communication systems, modern technologies are implemented to improve the safety and security of workplaces in order to save field service engineers lives and their health. In this thesis, an automated safety suit was implemented with integrated sensors for monitoring the safety of field service engineers. The basic idea of the prototype is to ensure safety for the field service engineers who are working in adverse environmental conditions. This safety suit includes embedded devices which can communicate with mobile devices and by means of that provides aid for the people working in several fields such as confined spaces, high altitudes etc. In this prototype, a different type of sensors are proposed for monitoring environmental and health conditions like temperature, CO gas levels, relative humidity, body temperature and heartbeat. A mobile application is proposed to monitor and control the automated safety suit, which also identifies the environmental changes and provide prompt alerts to the user. Keeping the usage of automated safety suit in mind, the system is designed in a user friendly manner and all the key elements are considered and implemented accordingly for the requirements of service engineers who are working in confined spaces and hazardous places.
|
233 |
Tactile display for mobile interactionPasquero, Jerome. January 2008 (has links)
Interaction with mobile devices suffers from a number of shortcomings, most of which are linked to the small size of screens. Artificial tactile feedback promises to be particularly well suited to the mobile interaction context. To be practical, tactile transducers for mobile devices must be small and light, and yet be capable of displaying a rich set of expressive stimuli. This thesis introduces a tactile transducer for mobile interaction that is capable of distributed skin stimulation on the fingertip. The transducer works on a principle that was first investigated because of its potential application to the display of Braille. A preliminary study was conducted on an earlier version of the transducer. It concluded that subjects were able to identify simple Braille characters with a high rate of success. Then, a complete re-design of the transducer addressed the goal of integration in a handheld prototype for mobile interaction. The resulting device comprises a liquid crystal graphic display co-located with the miniature, low-power, distributed tactile transducer. Next, it was needed to measure the perceptual differences between the stimuli that the device could display. Our experiences with one evaluation approach raised questions relating to the methodology for data collection. Therefore, an analysis of the process was carried out using a stimulus set obtained with the device. By means of multidimensional scaling analysis, both the perceptual parameters forming the stimuli space and the evaluation technique were validated. Finally, two experiments were carried out with the objective to develop new mobile interactions paradigms that combined visual and tactile feedback. Both experiments modeled a list scrolling task on the device. The first experiment found a marginal improvement in performance when tactile feedback was employed. It also came at a higher attentional cost dedicated to operating the device. For the second experiment, the scrolling paradigm and the tactile feedback were improved. This lead to a decrease in the reliance on vision when tactile feedback was enabled. Results showed a 28% decrease in the number of key presses that controlled the visibility state of the scroll list.
|
234 |
Routing performance in ad hoc networks.Gugrajah, Yuvaan Ramesh. January 2003 (has links)
An ad hoc network is a multi-hop wireless network in which mobile nodes communicate over a shared wireless channel. The network is formed cooperatively without specific user administration or configuration and is characterised by a distributed network management system and the absence of a wired backbone. Military, law enforcement, and disaster relief operations are often carried out in situations with no pre-existing network infrastructure and can benefit from such networks because base stations, which are single points of failure, are undesirable from a reliability standpoint. The rising popularity of mobile computing has also created a potentially large commercial market for multimedia applications applied over wireless ad hoc networks. This dissertation focuses on the routing aspects of ad hoc networking. The multi-hop routes between nodes constantly change as the mobile nodes migrate. Ad hoc network routing algorithms must therefore adapt to the dynamic and unpredictable topology changes, the random radio propagation conditions and portable power sources. Various routing protocols have been proposed in the literature for ad hoc networks. These protocols together with comparative simulations are discussed and a new protocol based on load balancing and signal quality determination is proposed . and the simulation results are presented. Currently the proposed routing protocols are compared using simulation packages which are often time consuming. This dissertation proposes a mathematical model for evaluating the routing protocols and the resultant end-to-end blocking probabilities. The mathematical model is based on a derivation of the reduced load approximation for analysing networks modelled as loss networks and the evaluation incorporates and adapts models that have been used for the analysis of cellular Code Division Multiple Access (CDMA) systems. While analytical methods of solving blocking probability can potentially generate results orders of magnitude faster than simulation, they are more importantly essential to network sensitivity analysis, design and optimisation. / Thesis (M.Sc.Eng.)-University of Natal, Durban, 2003.
|
235 |
Design and implementation of an on-demand ad-hoc routing algorithm for a positional communication system.Quazi, Tahmid Al-Mumit. January 2003 (has links)
A mobile ad-hoc network is an autonomous network of mobile devices that are connected via wireless links. In such networks there is no pre-existing infrastructure and nodes are free to move in a random fashion. Due to this mobility mobile ad-hoc networks have dynamic topologies. A host in the network typically has limited bandwidth and energy resources. Routing is a major challenge in the development of such systems and there have been many solutions proposed in the recent past. The aim of this work is to design and implement a routing scheme for a Positional Communication System (PCS). The PCS is a network of mobile handheld pocket PCs connected via wireless interfaces. The system allows voice and data communication between nodes in the network. This dissertation addresses the process of designing a routing protocol for an ad-hoc network. There have been many proposed algorithms that solve the routing problem in a mobile ad-hoc network. It is a difficult task to compare the performance of'these protocols qualitatively as there are many parameters that affect network performance. Various simulation packages for networks of this type exist. One such package is the Network Simulator (NS-2). It is a discrete time event simulator that can be used to model wired and wireless networks. This dissertation presents NS-2 simulations that compare four recently proposed routing algorithms. From this comparison study it is shown that on-demand algorithms perform best in a mobile ad-hoc environment. The dissertation then describes the design of a novel on-demand routing algorithm. The ondemand algorithms proposed thus far use a blind flooding technique during the route discovery process. This method is inefficient and creates excessive routing overhead. The routing protocol proposed in the dissertation implements a query localization technique that significantly reduces the network traffic. The protocol also introduces a load checking metric in addition to the metric used by most on-demand schemes, namely hop count. Simulation results show that such a scheme makes the on-demand routing algorithm more efficient and scalable than existing ones. It is widely believed that prior to implementing a routing protocol in real world systems it is essential that it is tested and validated on a test-bed. The dissertation presents the implementation of an on-demand routing algorithm in a Positional Communication System test-bed, where each handheld PC in the network runs an embedded Linux operating system. / Thesis (M.Sc.Eng.)-University of Natal, Durban, 2003.
|
236 |
Approaches for contextualization and large-scale testing of mobile applicationsWang, Jiechao 15 May 2013 (has links)
In this thesis, we focused on two problems in mobile application development: contextualization and large-scale testing. We identified the limitations of current contextualization and testing solutions. On one hand, advanced-remote-computing- based mobilization does not provide context awareness to the mobile applications it mobilized, so we presented contextify to provide context awareness to them without rewriting the applications or changing their source code. Evaluation results and user surveys showed that contextify-contextualized applications reduce users' time and effort to complete tasks. On the other hand, current mobile application testing solutions cannot conduct tests at the UI level and in a large-scale manner simultaneously, so we presented and implemented automated cloud computing (ACT) to achieve this goal. Evaluation results showed that ACT can support a large number of users and it is stable, cost-efficiency as well as time-efficiency.
|
237 |
Location management techniques for next generation wireless systemsWang, Wenye 05 1900 (has links)
No description available.
|
238 |
User and design perspectives of mobile augmented reality / Title on signature form: User and design perspectives on mobile augmented realityCooper, Daniel M. 08 July 2011 (has links)
Augmented Reality is one of the hottest trends in
mobile media, yet there is a substantial lack of
user studies within this field of research. The
purpose of this study is to evaluate the value of
mobile augmented reality as a vehicle for information delivery on the basis of a usability
and design analysis. Using a multi-dimensional
qualitative method, this study examines the impressions of users and designers regarding
mobile augmented reality, along with a heuristic
evaluation of select mobile applications. This
analysis finds that (1) users believe mobile augmented reality offers great promise as a
medium for visual communication, and (2) it’s
current execution is limited by technical
restraints, design flaws and a lack of compelling
content. It is concluded that mobile augmented
reality will one day revolutionize how consumers
engage geographical and time-basedinformation.
Yet, like all new technologies, mobile augmented
reality needs time to mature in order to address
these limitations. Finally, based on the findings
of this study, this thesis offers suggested
guidelines for future developments in this
medium. / Department of Telecommunications
|
239 |
Context-sensitive, adaptable, assistive services and technology / Context sensitive, adaptable, assistive services and technology / Title on signature sheet: Toward adaptable context-sensitive wireless assistive servicesStanley, Dannie M. January 2008 (has links)
Our research posits a context-sensitive, adaptable, assistive services and technology system (CAAST) that takes advantage of the advancements in mobile computing to provide barrier-free access to environmental information and devices. To inform our research we explore the following topics: the deficiencies associated with current assistive technologies; the advances in wireless sensor node technology; the interference and accuracy problems associated with wireless location detection; the coordination problems associated with service discovery; the management and coordination problems associated with decentralized sensor nodes; the separation of information and activities from the human interface; the efficiency and abstraction problems associated with interface description languages; and the adaptation of information and activities to meet the needs of those with disabilities. As a result of our research into these areas we devise an assistive technology, CAAST, that intends to be a comprehensive approach to universal access to information and activities for those with disabilities. / Department of Computer Science
|
240 |
Verifying Physical Endpoints to Secure Digital SystemsStuder, Ahren M. 01 May 2011 (has links)
The proliferation of electronic devices supporting sensing, actuation, and wireless communication enables the monitoring and/or control of a variety of physical systems with digital communication. Such “cyber physical systems” blur the boundaries of the digital and physical worlds, where correct information about the physical world is needed for the correct operation of the digital system. Often in these systems the physical source or destination of information is as important as the information itself. However, the omni-directional and invisible nature of wireless communication makes it difficult to determine communication endpoints. This allows a malicious party to intercept wireless messages or pose as other entities in the system. As such, these systems require new protocols to associate the endpoints of digital communication with physical entities.
Traditional security approaches that associate cryptographic keys with names can help verify endpoints in static systems where a string accurately describes the role of a device. In other systems, the role of a device depends on its physical properties, such as location, which change over time. This dynamic nature implies that identification of an endpoint based on a static name is insufficient. Instead, we can leverage devices’ sensing and actuation capabilities to verify the physical properties and determine the physical endpoints of communication. We investigate three different scenarios where the physical source and/or destination is important and propose endpoint verification techniques: verifying the physical endpoints during an exchange between two smartphones, verifying the receiver of information is in a physical space to enable location-based access control, and verifying the source of information to protect Vehicle-to-Vehicle (V2V) applications. We evaluate our proposals in these systems and show that our solutions fulfill the security requirements while utilizing existing hardware.
Exchanging Information Between Smartphones Shake on it (SHOT) allows users to verify the endpoints during an exchange of information between two smartphones. In our protocol, the phones use their vibrators and accelerometers to establish a human-observable communication channel. The users hold the phones together while the phones use this channel to bootstrap and verify the authenticity of an exchange that occurs over the higher-bandwidth wireless channel. Users can detect the injection of information from other devices as additional vibrations, and prevent such attacks. Our implementation of SHOT for the DROID smartphone is able to support sender and receiver verification during an exchange between two smartphones in 15 seconds on average.
Location-Based Access Control We propose using location-based access control to protect sensitive files on laptops, without requiring any effort from the user to provide security. With a purely wireless electronic system, verifying that a given device is in a physical space is a challenge; either the definition of the physical space is vague (radio waves can travel beyond walls) or the solution requires expensive hardware to measure a message’s time of flight. Instead, we use infrared as a signal that walls can contain. We develop key derivation protocols that ensure only a receiver in the physical room with access to the signal can derive the key. We implement a system that uses the laptop’s webcam to record the infrared signal, derive a key, and decrypt sensitive files in less than 5 seconds.
Source Verification for V2V Networks A number of V2V applications use information about nearby vehicles to prevent accidents or reduce fuel consumption. However, false information about the positioning of vehicles can cause erroneous behavior, including accidents that would not occur in the absence of V2V. As such, we need a way to verify which vehicle sent a message and that the message accurately describes the physical state of that vehicle. We propose using LED lights on vehicles to broadcast the certificate a vehicle is currently using. Receivers can use onboard cameras to film the encoding of the certificate and estimate the relative location of the vehicle. This visual channel allows a receiver to associate a physical vehicle at a known location with the cryptographic credentials used to sign a location claim. Our simulations indicate that even with a pessimistic visual channel, visual verification of V2V senders provides sufficient verification capabilities to support the relevant applications.
|
Page generated in 0.0526 seconds