Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
361 |
Learning from small data set for object recognition in mobile platforms.Liu, Siyuan 05 1900 (has links)
Did you stand at a door with a bunch of keys and tried to find the right one to unlock the door? Did you hold a flower and wonder the name of it? A need of object recognition could rise anytime and any where in our daily lives. With the development of mobile devices object recognition applications become possible to provide immediate assistance. However, performing complex tasks in even the most advanced mobile platforms still faces great challenges due to the limited computing resources and computing power.
In this thesis, we present an object recognition system that resides and executes within a mobile device, which can efficiently extract image features and perform learning and classification. To account for the computing constraint, a novel feature extraction method that minimizes the data size and maintains data consistency is proposed. This system leverages principal component analysis method and is able to update the trained classifier when new examples become available . Our system relieves users from creating a lot of examples and makes it user friendly.
The experimental results demonstrate that a learning method trained with a very small number of examples can achieve recognition accuracy above 90% in various acquisition conditions. In addition, the system is able to perform learning efficiently.
|
362 |
Mobile systems for monitoring Parkinson's diseaseMemedi, Mevludin January 2011 (has links)
This thesis presents the development and evaluation of IT-based methods and systems for supporting assessment of symptoms and enabling remote monitoring of Parkinson‟s disease (PD) patients. PD is a common neurological disorder associated with impaired body movements. Its clinical management regarding treatment outcomes and follow-up of patients is complex. In order to reveal the full extent of a patient‟s condition, there is a need for repeated and time-stamped assessments related to both patient‟s perception towards common symptoms and motor function. In this thesis, data from a mobile device test battery, collected during a three year clinical study, was used for the development and evaluation of methods. The data was gathered from a series of tests, consisting of selfassessments and motor tests (tapping and spiral drawing). These tests were carried out repeatedly in a telemedicine setting during week-long test periods. One objective was to develop a computer method that would process tracedspiral drawings and generate a score representing PD-related drawing impairments. The data processing part consisted of using the discrete wavelet transform and principal component analysis. When this computer method was evaluated against human clinical ratings, the results showed that it could perform quantitative assessments of drawing impairment in spirals comparatively well. As a part of this objective, a review of systems and methods for detecting the handwriting and drawing impairment using touch screens was performed. The review showed that measures concerning forces, accelerations, and radial displacements were the most important ones in detecting fine motor movement anomalies. Another objective of this thesis work was to design and evaluate an information system for delivering assessment support information to the treating clinical staff for monitoring PD symptoms in their patients. The system consisted of a patient node for data collection based on the mobile device test battery, a service node for data storage and processing, and a web application for data presentation. A system module was designed for compiling the test battery time series into summary scores on a test period level. The web application allowed adequate graphic feedback of the summary scores to the treating clinical staff. The evaluation results for this integrated system indicate that it can be used as a tool for frequent PD symptom assessments in home environments.
|
363 |
A Development of a Mobile Application for Monitoring Siemens S7-1200 Controller Variables Through FirebaseDiaz, Alexander, Rivera, Steven, Vinces, Leonardo, Del Carpio, Christian 01 January 2021 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / Production systems need to be monitored because failure to do so can cause a delay in production due to a lack of remote monitoring. There are solutions that provide this information, but they are limited, because they are owned and very expensive solutions. This paper proposes the development of a mobile application for the monitoring of S7-1200 programmable controller variables through Firebase. The goal is to use open-source-type tools to develop a real-time variable monitoring application of a programmable controller capable of hosting a Web server, and the sent data to the Firebase cloud, in order to avoid modifying the driver software and the data stored in memory. The implemented system of sending, handling and presenting variables is developed with tools of open source type, since they have as an advantage to have greater freedom in programming, unlike proprietary solutions or services. The tests were performed on the Siemens S7-1200 controller with a plastic injection molding machine. / Revisión por pares
|
364 |
Friendship based trust model to secure routing protocols in mobile Ad Hoc networksShabut, Antesar R.M., Dahal, Keshav P., Awan, Irfan U. January 2014 (has links)
No / Trust management in mobile ad hoc networks (MANETs) has become a significant issue in securing routing protocols to choose reliable and trusted paths. Trust is used to cope with defection problems of nodes and stimulate them to cooperate. However, trust is a highly complex concept because of the subjective nature of trustworthiness, and has several social properties, due to its social origins. In this paper, a friendship-based trust model is proposed for MANETs to secure routing protocol from source to destination, in which multiple social degrees of friendships are introduced to represent the degree of nodes' trustworthiness. The model considers the behaviour of nodes as a human pattern to reflect the complexity of trust subjectivity and different views. More importantly, the model considers the dynamic differentiation of friendship degree over time, and utilises both direct and indirect friendship-based trust information. The model overcomes the limitation of neglecting the social behaviours of nodes when evaluating trustworthiness. The empirical analysis shows the greater robustness and accuracy of the trust model in a dynamic MANET environment.
|
365 |
Dependable Wearable SystemsEdgardo A Barsallo Yi (11656702) 09 December 2021 (has links)
<div>As wearable devices, like smartwatches and fitness monitors, gain popularity and are being touted for clinical purposes, evaluating the resilience and security of wearable operating systems (OSes) and their corresponding ecosystems becomes essential. One of the most dominant OSes for wearable devices is Wear OS, created by Google. Wear OS and Android (its counterpart OS for mobile devices) share similar features, but the unique characteristics and uses of wearable devices posses new challenges. For example, wearable applications are generally more dependent on device sensors, have complex communication patterns (both intra-device and inter-device), and are context-aware. Current research efforts on the Wear OS are more focused on the efficiency and performance of the OS itself, overlooking the resilience or security of the OS or its ecosystem.</div><div> </div><div>This dissertation introduces a systematic analysis to evaluate the Wear OS's resilience and security. The work is divided into two main parts. First, we focus our efforts on developing novel tools to evaluate the robustness of the wearable OS and uncover vulnerabilities and failures in the wearable ecosystem. We provide an assessment and propose techniques to improve the system's overall reliability. Second, we turn our attention to the security and privacy of smart devices. We assess the privacy and security of highly interconnected devices. We demonstrate the feasibility of privacy attacks under these scenarios and propose a defense mechanism to mitigate these attacks.</div><div> </div><div>For the resilience part, we evaluate the overall robustness of the Wear OS ecosystem using a fuzz testing-based tool [DSN2018]. We perform an extensive fault injection study by mutating inter-process communication messages and UI events on a set of popular wearable and mobile applications. The results of our study show similarities in the root cause of failures between Wear OS and Android; however, the distribution of exception differ in both OSes. Further, our study evidence that input validation has improved in the Android ecosystem with respect to prior studies. Then, we study the impact of the state of a wearable device on the overall reliability of the applications running in Wear OS [MobiSys2020]. We use distinguishable characteristics of wearable apps, such as sensor activation and mobile-wearable communication patterns, to derive a state model and use this model to target specific fuzz injection campaigns against a set of popular wearable apps. Our experiments revealed an abundance of improper exception handling on wearable applications and error propagation across mobile and wearable devices. Furthermore, our results unveiled a flawed design of the wearable OS, which caused the device to reboot due to excessive sensor use.</div><div><br></div><div>For the security and privacy part, we assess user awareness toward privacy risks under scenarios with multiple interconnected devices. Our results show that a significant majority of the users have no reservation while granting permission to their devices. Furthermore, users tend to be more conservative while granting permission on their wearables. Based on the results of our study, we demonstrate the practicability of leaking sensitive information inferred from the user by orchestrating an attack using multiple devices. Finally, we introduce a tool based on NLP (Natural Language Processing) techniques that can aid the user in detecting this type of attack.</div>
|
366 |
Wearables im industriellen EinsatzZiegler, Jens 18 May 2016 (has links) (PDF)
Die industrielle Instandhaltung ist ein erheblicher Kostenfaktor während der Betriebsphase einer verfahrenstechnischen Produktionsanlage. Insbesondere der Mangel an technischen Möglichkeiten zum Informationsaustausch des Instandhaltungspersonals mit der digitalen Anlage während der Arbeiten im Feld erzeugt hohe Kosten. Durch die entstehenden Medienbrüche sinkt die Qualität der Informationen in der Digitalen Anlage erheblich. Mobile Informationssysteme können diese Medienbrüche beseitigen und die Informationsqualität in der Digitalen Anlage entscheidend verbessern. Das Konzept der Distributed Wearable User Interfaces (DWUI) stellt einen integrierten Ansatz zur flexiblen Zusammenstellung gebrauchstauglicher Benutzungsschnittstellen für komplexe Arbeitsabläufe in widrigen Arbeitssituationen bereit. Diese setzen sich aus Interaktionsgeräten zusammen, die in einem kabellosen körpernahen Funknetzwerk miteinander verbunden sind und in ihrer Kombination die Benutzungsschnittstelle zu einem mobilen System bilden. Die Geräte sind ergonomisch und funktional optimal am Körper des Nutzers verteilt, wobei jedes Gerät eigenständig nutzbar und für eine bestimmte Aufgabe oder einen bestimmten Nutzungskontext optimiert ist. Die Ein- und Ausgaberäume der Geräte werden in einem integrierten Interaktionsraum harmonisiert.
Im Rahmen dieser Arbeit wird zunächst der Nutzungskontext der mobilen IT-gestützten Instandhaltung verfahrenstechnischer Produktionsanlagen im Hinblick auf Nutzungsszenarien und Anwendungsfälle für mobile Informationssysteme festgelegt. Darauf aufbauend werden Anforderungen an derartige Systeme spezifiziert und Gestaltungsgrundlagen und Empfehlungen speziell für DWUI-basierte mobile Informationssysteme erarbeitet. Anschließend wird eine Reihe spezieller Interaktionsgeräte vorgestellt, die verschiedene Interaktionsprinzipien, Techniken und Modalitäten umsetzen. Um diese Geräte in einem kollaborativen DWUI organisieren zu können, wird ein spezielles Kommunikationsprotokoll entworfen und prototypisch umgesetzt. Eine mobile Anwendung zur Instandhaltungsunterstützung wird vorgestellt, welche das DWUI-Kommunikationsprotokoll unterstützt und mit verschiedenen DWUI-Konfigurationen vollständig bedienbar ist. Diese Anwendung wird integriert in ein komplexes Unternehmensnetzwerk, über das sie Zugriff auf industrietypische computergestützte Planungswerkzeuge erhält. Anhand des resultierenden Gesamtsystems werden die prinzipielle Tauglichkeit und die Vorteile des DWUI-Konzepts demonstriert.
|
367 |
The governance of significant enterprise mobility security risksBrand, Johanna Catherina 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous
risks originate from using mobile devices for business-related tasks and most of
these risks pose a significant security threat to organisations’ information.
Organisations should therefore apply due care during the process of governing the
significant enterprise mobility security risks to ensure an effective process to mitigate
the impact of these risks.
Information technology (IT) governance frameworks, -models and -standards can
provide guidance during this governance process to address enterprise mobility
security risks on a strategic level. Due to the existence of the IT gap these risks are
not effectively governed on an operational level as the IT governance frameworks,
-models and -standards do not provide enough practical guidance to govern these
risks on a technical, operational level.
This study provides organisations with practical, implementable guidance to apply
during the process of governing these risks in order to address enterprise mobility
security risks in an effective manner on both a strategic and an operational level.
The guidance given to organisations by the IT governance frameworks, -models and
-standards can, however, lead to the governance process being inefficient and
costly. This study therefore provides an efficient and cost-effective solution, in the
form of a short list of best practices, for the governance of enterprise mobility
security risks on both a strategic and an operational level. / AFRIKAANSE OPSOMMING: Ondernemingsmobiliteit kom deesdae as ‘n megatendens in die besigheidswêreld te
voorskyn. Talle risiko's ontstaan as gevolg van die gebruik van mobiele toestelle vir
sake-verwante take en meeste van hierdie risiko's hou 'n beduidende
sekuriteitsbedreiging vir organisasies se inligting in. Organisasies moet dus tydens
die risikobestuursproses van wesenlike mobiliteit sekuriteitsrisiko’s die nodige sorg
toepas om ‘n doeltreffende proses te verseker ten einde die impak van hierdie
risiko’s te beperk.
Informasie tegnologie (IT)- risikobestuurraamwerke, -modelle en -standaarde kan op
‘n strategiese vlak leiding gee tydens die risikobestuursproses waarin mobiliteit
sekuriteitsrisiko’s aangespreek word. As gevolg van die IT-gaping wat bestaan, word
hierdie risiko’s nie effektief op ‘n operasionele vlak bestuur nie aangesien die ITrisikobestuurraamwerke,
-modelle en -standaarde nie die nodige praktiese leiding
gee om hierdie risiko’s op ‘n tegniese, operasionele vlak te bestuur nie.
Om te verseker dat organisasies mobiliteit sekuriteitsrisiko’s op ‘n effektiewe manier
op beide ‘n strategiese en operasionele vlak bestuur, verskaf hierdie studie praktiese,
implementeerbare leiding aan organisasies wat tydens die bestuursproses van
hierdie risiko’s toegepas kan word.
Die leiding aan organisasies, soos verskaf in die IT-risikobestuurraamwerke, -
modelle en -standaarde, kan egter tot’n ondoeltreffende en duur
risikobestuursproses lei. Hierdie studie bied dus 'n doeltreffende, koste-effektiewe
oplossing, in die vorm van 'n kort lys van beste praktyke, vir die bestuur van die
mobiliteit sekuriteitsrisiko’s op beide 'n strategiese en 'n operasionele vlak.
|
368 |
Using link layer information to enhance mobile IP handover mechanism : an investigation into the design, analysis and performance evaluation of the enhanced mobile IP handover mechanism using link layer information schemes in the IP environmentAlnas, Mohamed Jimaa Ramadan January 2010 (has links)
Mobile computing is becoming increasingly important, due to the rise in the number of portable computers and the desire to have continuous network connectivity to the Internet, irrespective of the physical location of the node. We have also seen a steady growth of the market for wireless communication devices. Such devices can only have the effect of increasing the options for making connections to the global Internet. The Internet infrastructure is built on top of a collection of protocols called the TCP/IP protocol suite. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the core protocols in this suite. There are currently two standards: one to support the current IPv4 and one for the upcoming IPv6 [1]. IP requires the location of any node connected to the Internet to be uniquely identified by an assigned IP address. This raises one of the most important issues in mobility because, when a node moves to another physical location, it has to change its IP address. However, the higher-level protocols require the IP address of a node to be fixed for identifying connections. The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet Engineering Task Force (IETF) that addresses this issue. It enables mobile devices to stay connected to the Internet regardless of their locations, without changing their IP addresses and, therefore, an ongoing IP session will not be interrupted [2, 3, 4]. More precisely, Mobile IP is a standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher-level protocols like TCP. However, before Mobile IP can be broadly deployed, there are still several technical barriers, such as long handover periods and packet loss that have to be overcome, in addition to other technical obstacles, including handover performance, security issues and routing efficiency [7]. This study presents an investigation into developing new handover mechanisms based on link layer information in Mobile IP and fast handover in Mobile IPv6 environments. The main goal of the developed mechanisms is to improve the overall IP mobility performance by reducing packet loss, minimizing signalling overheads and reducing the handover processing time. These models include the development of a cross-layer handover scheme using link layer information and Mobile Node (MN) location information to improve the performance of the communication system by reducing transmission delay, packet loss and registration signalling overheads. Finally, the new schemes are developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of these schemes.
|
369 |
Contribution à la flexibilité et à la rapidité de conception des systèmes automatisés avec l'utilisation d'UMLChiron, Fabien 01 December 2008 (has links) (PDF)
La dynamique actuelle des marchés entraîne avec elle une complexité croissante des demandes du client et nécessairement des contraintes de production. Les méthodologies traditionnelles de conception de systèmes montrent leurs limites dans des contextes très changeants pour lesquels les spécifications sont amenées à évoluer rapidement, des éléments technologiques particuliers de réalisation étant souvent pris en compte trop tôt dans le travail d'étude, limitant la versabilité des développements. Les entreprises doivent alors capitaliser au maximum les efforts menés dans les phases amont de spécification pour optimiser les temps d'étude. Notre travail de recherche s'intéresse plus précisément au domaine des systèmes antomatisés et se propose de répondre à la problématique précédente en utilisant des techniques issues du monde de l'informatique pour la réalisation des sytèmes physiques, comme l'OOA (Approche Orienté Objet) et la modélisation objet UML (Langage de Modélisation Unifié) avec la perspective d'une spécialisation tardive et d'une génération automatique selon les cibles technologiques choisies, comme le préconise la logique IDM (Ingéniérie Dirigée par les Modèles). L'originalité de ce mémoire est de décrire une méthodologie et une organisation de travail pour la conception des systèmes automatisés, en s'appuyant sur le concept d'objet d'automatisme multi-facettes. De plus, nous proposons une utilisation de l'extension SysML (Langage de Modélisation des Systèmes) pour la représentation d'éléments d'automatismes particuliers, les blocs fonctions de la norme IEC 61131-3, à travers le stéréotype "block". Enfin nous montrons comment il est possible d'obtenir une première génération de code automate en passant par les spécifications PLCopen, définissant un lien entre une syntaxe XML (Langage de balisage eXtensible), se voulant standard, et les langages de la norme IEC 61131-3. Le passage par cette représentation standardisée permet de garder l'indépendance des implémentations vis-à-vis d'un environnement intégré de développement particulier. Le processus de conception décrit a été appliqué à un cas d'étude industriel réel appartenant au domaine de la palettisation robotisée.
|
370 |
Gnafuy : 基於行動裝置下的分散式運算研究 / Gnafuy : a framework for ubiquitous mobile computation陳晉杰, Chen, Jin Jie Unknown Date (has links)
隨著科技日新月異的發展,智慧型手機本身通訊與運算能力也隨著軟體和硬體的改善而不斷地增強,其便利性與高機動性的特色使得越來越多人持有智慧型手機,最後成為人們生活中不可或缺的部份。總觀來說,持有與使用率的上升,不知不覺的形成一種共享經濟與無所不在的行動運算網絡。
基於普及性與相對優秀的運算效能,我們設計與實作出Gnafuy,一個基於行動裝置下的分散式運算框架,希望借用世界上所有閒置行動運算裝置的資源來實行無所不在的運算。
我們發展出一套應用程式介面(API)供開發者依照自己的需求來撰寫自己的分散式運算程式,藉由遵循Gnafuy所制定的應用程式介面,開發者可只專注在演算法本身的開發,而不需要在意其演算法如何被分配到手機上以及待處理資料的分配情形。本篇文章還討論了Gnafuy所採用的分散式運算的程式模型,以及我們如何藉由一個手機應用程式將任務部署至自願者的智慧型手機中,我們發展出一套伺服器端的機制來增加訊息傳遞的成功率,以及偵測計算後回傳結果是否正確,排除被惡意程式污染的客戶端結果。
|
Page generated in 0.0378 seconds