Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
481 |
Mobile Cloud Computing: Offloading Mobile Processing to the CloudZambrano, Jesus 01 January 2015 (has links)
The current proliferation of mobile systems, such as smart phones, PDA and tablets, has led to their adoption as the primary computing platforms for many users. This trend suggests that designers will continue to aim towards the convergence of functionality on a single mobile device. However, this convergence penalizes the mobile system in computational resources such as processor speed, memory consumption, disk capacity, as well as in weight, size, ergonomics and the user’s most important component, battery life. Therefore, this current trend aims towards the efficient and effective use of its hardware and software components. Hence, energy consumption and response time are major concerns when executing complex algorithms on mobile devices because they require significant resources to solve intricate problems.
Current cloud computing environments for performing complex and data intensive computation remotely are likely to be an excellent solution for off-loading computation and data processing from mobile devices restricted by reduced resources. In cloud computing, virtualization enables a logical abstraction of physical components in a scalable manner that can overcome the physical constraint of resources. This optimizes IT infrastructure and makes cloud computing a worthy cost effective solution.
The intent of this thesis is to determine the types of applications that are better suited to be off-loaded to the cloud from mobile devices. To this end, this thesis quantitatively and
qualitatively compares the performance of executing two different kinds of workloads locally on two different mobile devices and remotely on two different cloud computing providers. The results of this thesis are expected to provide valuable insight to developers and architects of mobile applications by providing information on the applications that can be performed remotely in order to save energy and get better response times while remaining transparent to users.
|
482 |
Verteilte Mobilität - Eine spannende HerausforderungWerner, Matthias 05 July 2013 (has links)
Cyber-physikalische Systeme (CPS) sind eine erweitere Sicht auf eingebettete Systeme, die die konkreten umgebenden Elemente in das Systemdesign einbeziehen. Das Design solcher Systeme erfordert neue Herangehensweisen: Während beispielsweise in "normalen" verteilten Systemen Aspekte wie "Bewegung" oder "Ort" möglichst transparent und damit für den Nutzer unsichtbar gestaltet werden, benötigen CPS-Anwendungen häufig Bewusstsein für Bewegung oder Ort, d.h., sie sind _motion aware_ oder _location aware_.
Die Professur "Betriebssysteme" der TUC hat sich die Frage gestellt, wie eine generische Unterstützung für solche verteilte mobile Systeme aussehen könnte. Im Vortrag werden Probleme, Konzepte und erste Lösungsansätze für ein künftiges Betriebssystem für diese Art von Systemen vorgestellt.
|
483 |
Wearables im industriellen Einsatz: Befähigung zu mobiler IT-gestützter Arbeit durch verteilte tragbare BenutzungsschnittstellenZiegler, Jens 10 December 2015 (has links)
Die industrielle Instandhaltung ist ein erheblicher Kostenfaktor während der Betriebsphase einer verfahrenstechnischen Produktionsanlage. Insbesondere der Mangel an technischen Möglichkeiten zum Informationsaustausch des Instandhaltungspersonals mit der digitalen Anlage während der Arbeiten im Feld erzeugt hohe Kosten. Durch die entstehenden Medienbrüche sinkt die Qualität der Informationen in der Digitalen Anlage erheblich. Mobile Informationssysteme können diese Medienbrüche beseitigen und die Informationsqualität in der Digitalen Anlage entscheidend verbessern. Das Konzept der Distributed Wearable User Interfaces (DWUI) stellt einen integrierten Ansatz zur flexiblen Zusammenstellung gebrauchstauglicher Benutzungsschnittstellen für komplexe Arbeitsabläufe in widrigen Arbeitssituationen bereit. Diese setzen sich aus Interaktionsgeräten zusammen, die in einem kabellosen körpernahen Funknetzwerk miteinander verbunden sind und in ihrer Kombination die Benutzungsschnittstelle zu einem mobilen System bilden. Die Geräte sind ergonomisch und funktional optimal am Körper des Nutzers verteilt, wobei jedes Gerät eigenständig nutzbar und für eine bestimmte Aufgabe oder einen bestimmten Nutzungskontext optimiert ist. Die Ein- und Ausgaberäume der Geräte werden in einem integrierten Interaktionsraum harmonisiert.
Im Rahmen dieser Arbeit wird zunächst der Nutzungskontext der mobilen IT-gestützten Instandhaltung verfahrenstechnischer Produktionsanlagen im Hinblick auf Nutzungsszenarien und Anwendungsfälle für mobile Informationssysteme festgelegt. Darauf aufbauend werden Anforderungen an derartige Systeme spezifiziert und Gestaltungsgrundlagen und Empfehlungen speziell für DWUI-basierte mobile Informationssysteme erarbeitet. Anschließend wird eine Reihe spezieller Interaktionsgeräte vorgestellt, die verschiedene Interaktionsprinzipien, Techniken und Modalitäten umsetzen. Um diese Geräte in einem kollaborativen DWUI organisieren zu können, wird ein spezielles Kommunikationsprotokoll entworfen und prototypisch umgesetzt. Eine mobile Anwendung zur Instandhaltungsunterstützung wird vorgestellt, welche das DWUI-Kommunikationsprotokoll unterstützt und mit verschiedenen DWUI-Konfigurationen vollständig bedienbar ist. Diese Anwendung wird integriert in ein komplexes Unternehmensnetzwerk, über das sie Zugriff auf industrietypische computergestützte Planungswerkzeuge erhält. Anhand des resultierenden Gesamtsystems werden die prinzipielle Tauglichkeit und die Vorteile des DWUI-Konzepts demonstriert.
|
484 |
Mobility-based Routing Overhead Management in Reconfigurable Wireless Ad hoc NetworksGikaru, Wilfred Githuka 09 November 2004 (has links)
Mobility-Based Routing Overhead Management in Reconfigurable Wireless Ad Hoc Networks Routing Overheads are the non-data message packets whose roles are establishment and maintenance of routes for data packets as well as neighbourhood discovery and maintenance. They have to be broadcasted in the network either through flooding or other techniques that can ensure that a path exists before data packets can be sent to various destinations. They can be sent reactively or periodically to neighbours so as to keep nodes updated on their neighbourhoods. While we cannot do without these overhead packets, they occupy much of the limited wireless bandwidth available in wireless networks. In a reconfigurable wireless ad hoc network scenario, these packets have more negative effects, as links need to be confirmed more frequently than in traditional networks mainly because of the unpredictable behaviour of the ad hoc networks. We therefore need suitable algorithms that will manage these overheads so as to allow data packet to have more access to the wireless medium, save node energy for longer life of the network, increased efficiency, and scalability. Various protocols have been suggested in the research area. They mostly address routing overheads for suitability of particular protocols leading to lack of standardisation and inapplicability to other protocol classes. In this dissertation ways of ensuring that the routing overheads are kept low are investigated. The issue is addressed both at node and network levels with a common goal of improving efficiency and performance of ad hoc networks without dedicating ourselves to a particular class of routing protocol. At node level, a method hereby referred to as "link availability forecast", that minimises routing overheads used for maintenance of neighbourhood, is derived. The targeted packets are packets that are broadcasted periodically (e.g. hello messages). The basic idea in this method is collection of mobility parameters from the neighbours and predictions or forecasts of these parameters in future. Using these parameters in simple calculations helps in identifying link availabilities between nodes participating in maintenance of networks backbone. At the network level, various approaches have been suggested. The first approach is the cone flooding method that broadcasts route request messages through a predetermined cone shaped region. This region is determined through computation using last known mobility parameters of the destination. Another approach is what is hereby referred as "destination search reverse zone method". In this method, a node will keep routes to destinations for a long time and use these routes for tracing the destination. The destination will then initiate route search in a reverse manner, whereby the source selects the best route for next delivery. A modification to this method is for the source node to determine the zone of route search and define the boundaries within which the packet should be broadcasted. The later method has been used for simulation purposes. The protocol used for verification of the improvements offered by the schemes was the AODV. The link availability forecast scheme was implemented on the AODV and labelled AODV_LA while the network level implementation was labelled AODV_RO. A combination of the two schemes was labelled AODV_LARO.
|
485 |
Performance evaluation of routing protocols using NS-2 and realistic traces on driving simulatorChen, Mingye 21 May 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / With the rapid growth in wireless mobile communication technology, Vehicular Ad-hoc Network (VANET) has emerged as a promising method to effectively solve transportation-related issues. So far, most of researches on VANETs have been conducted with simulations as the real-world experiment is expensive. A core problem affecting the fidelity of simulation is the mobility model employed. In this thesis, a sophisticated traffic simulator capable of generating realistic vehicle traces is introduced. Combined with network simulator NS-2, we used this tool to evaluate the general performance of several routing protocols and studied the impact of intersections on simulation results. We show that static nodes near the intersection tend to become more active in packet delivery with higher transferred throughput.
|
486 |
A secure mobile agent e-commerce protocolYu, Min-Chieh 09 December 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.
|
487 |
The Spillable Environment: Expanding a Handheld Device's Screen Real Estate and Interactive CapabilitiesClement, Jeffrey S. 07 August 2007 (has links) (PDF)
Handheld devices have a limited amount of screen real estate. If a handheld device could take advantage of larger screens, it would create a more powerful user interface and environment. As time progresses, Moore's law predicts that the computational power of handheld devices will increase dramatically in the future, promoting the interaction with a larger screen. Users can then use their peripheral vision to recognize spatial relationships between objects and solve problems more easily with this integrated system. In the spillable environment, the handheld device uses a DiamondTouch Table, a large, touch-sensitive horizontal table, to enhance the viewing environment. When the user moves the handheld device on the DiamondTouch, the orientation of the application changes accordingly. A user can let another person see the application by rotating the handheld device in that person's direction. A user could conveniently use this system in a public area. In a business meeting, a user can easily show documents and presentations to other users around the DiamondTouch table. In an academic setting, a tutor could easily explain a concept to a student. A user could effortlessly do all of this while having all of his/her information on the handheld device. A wide range of applications could be used in these types of settings.
|
488 |
thesis.pdfJianliang Wu (15926933) 30 May 2023 (has links)
<p>Bluetooth is the de facto standard for short-range wireless communications. Besides Bluetooth Classic (BC), Bluetooth also consists of Bluetooth Low Energy (BLE) and Bluetooth Mesh (Mesh), two relatively new protocols, paving the way for its domination in the era of IoT and 5G. Meanwhile, attacks against Bluetooth, such as BlueBorne, BleedingBit, KNOB, BIAS, and BThack, have been booming in the past few years, impacting the security and privacy of billions of devices. These attacks exploit both design issues in the Bluetooth specification and vulnerabilities of its implementations, allowing for privilege escalation, remote code execution, breaking cryptography, spoofing, device tracking, etc.</p>
<p><br></p>
<p>To secure Bluetooth, researchers have proposed different approaches for both Bluetooth specification (e.g., formal analysis) and implementation (e.g., fuzzing). However, existing analyses of the Bluetooth specification and implementations are either done manually, or the automatic approaches only cover a small part of the targets. As a consequence, current research is far from complete in securing Bluetooth.</p>
<p><br></p>
<p>Therefore, in this dissertation, we propose the following research to provide missing pieces in prior research toward completing Bluetooth security research in terms of both Bluetooth specification and implementations. (i) For Bluetooth security at the specification level, we start from one protocol in Bluetooth, BLE, and focus on the previously unexplored reconnection procedure of two paired BLE devices. We conduct a formal analysis of this procedure defined in the BLE specification to provide security guarantees and identify new vulnerabilities that allow spoofing attacks. (ii) Besides BLE, we then formally verify other security-critical protocols in all Bluetooth protocols (BC, BLE, and Mesh). We provide a comprehensive formal analysis by covering the aspects that prior research fails to include (i.e., all possible combinations of protocols and protocol configurations) and considering a more realistic attacker model (i.e., semi-compromised device). With this model, we are able to rediscover five known vulnerabilities and reveal two new issues that affect BC/BLE dual-stack devices and Mesh devices, respectively. (iii) In addition to the formal analysis of specification security, we propose and build a comprehensive formal model to analyze Bluetooth privacy (i.e., device untraceability) at the specification level. In this model, we convert device untraceability into a reachability problem so that it can be verified using existing tools without introducing false results. We discover four new issues allowed in the specification that can lead to eight device tracking attacks. We also evaluate these attacks on 13 Bluetooth implementations and find that all of them are affected by at least two issues. (iv) At the implementation level, we improve Bluetooth security by debloating (i.e., removing code) Bluetooth stack implementations, which differs from prior automatic approaches, such as fuzzing. We keep only the code of needed functionality by a user and minimize their Bluetooth attack surface by removing unneeded Bluetooth features in both the host stack code and the firmware. Through debloating, we can remove 20 known CVEs and prevent a wide range of attacks again Bluetooth. With the research presented in this thesis, we improve Bluetooth security and privacy at both the specification and implementation levels.</p>
|
489 |
Optimising the usability of content rich e-learning material: an eye tracking experimentMpofu, Bongeka 11 1900 (has links)
This research was aimed at the optimisation of the usability of content-rich computer and mobile based e-learning material. The goal was to preserve the advantages of paper based material in designing optimised modules that were mobile and computer-based, but at the same time avoiding the pitfalls of converting traditional paper based learning material for use on screen. A mobile eye tracker was used to analyse how students studied similar course content on paper, and on mobile device. Screen based eye tracking was also used to analyse how participants studied corresponding content on a desktop screen. Eye movements which were recorded by an eye tracker revealed the sequences of fixations and saccades on the text that was read by each participant. By analysing and comparing the eye gaze patterns of students reading the same content on three different delivery platforms, the differences between these platforms were identified in terms of their delivery of content rich, text based study material. The results showed that more students read online content on a computer screen than on mobile devices. The inferential analysis revealed that the differences in reading duration, comprehension, linearity and fixation count on the three platforms were insignificant. There were significant differences in saccade length. This analysis was used to identify strong aspects of the respective platforms and consequently derive guidelines for using these aspects optimally to design content rich material for delivery on computer screen and mobile device. The limitations of each platform were revealed and guidelines for avoiding these were derived / Computing / M.A. (Computing)
|
490 |
Interprétation interactive de documents structurés : application à la rétroconversion de plans d'architecture manuscritsGhorbel, Achraf 11 December 2012 (has links) (PDF)
Cette thèse entre dans le cadre de projet ANR-Mobisketch (http://mobisketch.irisa.fr/). Ce projet vise à élaborer une solution logicielle générique orientée stylo pour la réalisation de documents techniques : schémas, plans... L'objectif est d'aboutir à un continuum entre un document technique sous sa forme papier et ce même document sous sa forme numérique interprétée. Ce continuum nécessite deux analyseurs cohérents : un pour la phase de reconnaissance et un autre pour la composition/édition. Nous nous sommes intéressés dans cette thèse à l'analyseur pour la reconnaissance de documents. Le but de nos travaux était d'élaborer une approche interactive, générique et incrémentale. L'originalité de notre méthode de reconnaissance, nommée IMISketch, est la sollicitation de l'utilisateur durant la phase d'analyse. En effet, le processus d'analyse est capable de solliciter l'utilisateur s'il rencontre des cas d'ambigüités. Deux cas d'ambigüité peuvent se présenter : l'ambigüité structurelle et l'ambigüité de forme. L'ambigüité structurelle est levée par le système d'analyse quand il hésite entre deux segmentations différentes pour interpréter un symbole. Par exemple, dans un plan d'architecture, une ambigüité structurelle peut être levée pour trouver la bonne segmentation des primitives entre un mur et un ouvrant (porte, fenêtre, etc.). L'ambigüité de forme est levée s'il existe plusieurs hypothèses concurrentes pour étiqueter un symbole, par exemple une ambigüité entre une porte et une fenêtre. L'intégration de l'utilisateur dans la boucle de reconnaissance évite une correction a posteriori fastidieuse des erreurs de reconnaissance tout en permettant d'avoir un système auto-évolutif au fur et à mesure de l'analyse. Le processus de reconnaissance est basé sur une séparation de l'analyseur et des connaissances liées au type de document à reconnaître. Les connaissances structurelles a priori du document sont exprimées à travers un langage visuel grammatical basé sur l'écriture de règles de production. L'application de chaque règle est quantifiée par l'attribution d'un score à chaque hypothèse sous tendue par une branche de l'arbre d'analyse. La description grammaticale ainsi produite permet de piloter l'analyseur. Notre analyseur à base de règles est capable de mettre en concurrence des hypothèses possibles d'interprétation, afin de solliciter l'utilisateur lorsque c'est nécessaire. De plus, afin de limiter la combinatoire, l'analyseur se base sur un contexte local de recherche. Nous avons également mis en place un processus d'exploration hybride original, guidé par la description grammaticale, qui permet d'accélérer localement l'analyse tout en limitant le risque de réaliser une fausse interprétation. Notre méthode interactive a été validée sur les plans d'architecture dessinés à main levée. Ces plans sont composés de murs, de trois types d'ouvrants et d'une dizaine de classes de mobilier. Ces travaux montrent que la sollicitation de l'utilisateur permet d'améliorer la qualité de reconnaissance des documents.
|
Page generated in 0.1315 seconds