• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 17
  • 17
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

THE DIFFUSION OF WIRELESS INTERNET TECHNOLOGY AMONG UNIVERSITY FACULTY MEMBERS

Lu, Yong 03 May 2006 (has links)
No description available.
2

A comparative study of mobile internet deployment models in New Zealand

Huang, Raymond Unknown Date (has links)
Internet services play an increasingly important role in modern society. Mobile Internet, a fast-growing technology that combines the Internet with mobile devices, has recently become popular. It is predicted that the convergence between mobile networks and the Internet would become the next generation of network architecture, and mobile IPv6 is likely to emerge as the most efficient and cost-effective instrument to achieve "anywhere and anytime" fast Internet and resolve the problems of worldwide mobility management. This research project reviews mobile Internet competition and the market mix in New Zealand, both major players and minor players being involved. The researcher also investigates the requirements of the mobile Internet deployment model from two perspectives: the market and the consumers. Finally the connection between end user services (for example, mobile Internet) and convergence (for example, network convergence and technology convergence) are examined in the research study conducted.The researcher applies a multi-case study strategy to conduct the research project and interview is adopted as the major research technique in order to collect research data. Several organizations which deploy mobile Internet services in New Zealand are chosen as participants, with the aim of offering both personal insights and business views to the research questions and objectives.
3

A comparative study of mobile internet deployment models in New Zealand

Huang, Raymond Unknown Date (has links)
Internet services play an increasingly important role in modern society. Mobile Internet, a fast-growing technology that combines the Internet with mobile devices, has recently become popular. It is predicted that the convergence between mobile networks and the Internet would become the next generation of network architecture, and mobile IPv6 is likely to emerge as the most efficient and cost-effective instrument to achieve "anywhere and anytime" fast Internet and resolve the problems of worldwide mobility management. This research project reviews mobile Internet competition and the market mix in New Zealand, both major players and minor players being involved. The researcher also investigates the requirements of the mobile Internet deployment model from two perspectives: the market and the consumers. Finally the connection between end user services (for example, mobile Internet) and convergence (for example, network convergence and technology convergence) are examined in the research study conducted.The researcher applies a multi-case study strategy to conduct the research project and interview is adopted as the major research technique in order to collect research data. Several organizations which deploy mobile Internet services in New Zealand are chosen as participants, with the aim of offering both personal insights and business views to the research questions and objectives.
4

Διερεύνηση παραμέτρων σχεδίασης ασύρματου μητροπολιτικού δικτύου στις ζώνες 2.4GHz και 5GHz

Ισμαήλ, Ιωσήφ 08 January 2013 (has links)
Στο πρώτο κεφάλαιο γίνεται μία εισαγωγή στην βασική θεωρία ασύρματης τεχνολογίας. Παρουσιάζονται βασικά χαρακτηριστικά όπως το φάσμα, η διάδοση, οι παρεμβολές και η διάθλαση, οι συχνότητες και τα κανάλια. Ακολουθεί η θεωρία κεραιών, η τοπολογία δικτύων και η εφαρμογή όλων των παραπάνω στα ασύρματα μητροπολητικά δίκτυα. Στο δεύτερο κεφάλαιο παρουσιάζονται τα πρωτόκολλα ασύρματων δικτύων και η εφαρμογή τους, στις ζώνες 2,4GHz και 5GHz και η σύγκριση των δύο παραπάνω ζωνών. Ακολουθεί η διευθυνσιοδότηση του δικτύου με το πρωτόκολλο IP και ο διαμοιρασμός του υποδικτύου 10.0.0.0/8 σε Β-class διευθύνσεις για κάθε νομό. Τέλος παρουσιάζονται τα πρωτόκολλα δρομολόγησης δικτύων και τα πλεονεκτήματα της χρήσης στατικής ή δυναμικής δρομολόγησης στα ασύρματα μητροπολιτικά δίκτυα. Στο τρίτο κεφάλαιο γίνεται διερεύνηση στα μοντέλα ηλεκτρομαγνητικής κάλυψης ανοικτών χώρων. Πιο συγκεκριμένα, παρουσιάζονται τα μοντέλα Free space loss, Hata, Walfisch-Bertoni και Walfisch – Ikegami, και οι παράμετροι και ο τρόπος εφαρμογής τους για τον υπολογισμό των απωλειών στον χώρο διάδοσης. Στο τέταρτο κεφάλαιο επιδιώκεται η εφαρμογή μοντέλων του κεφαλαίου 3 στα ασύρματα μητροπολιτικά δίκτυα με σκοπό την μοντελοποίηση τους. Γίνονται μετρήσεις σε ασύρματους σταθμούς βάσης σε αστική και ημιαστική περιοχή για τις ζώνες 2.4GHz και 5GHz. Ακολουθεί ο υπολογισμός του μέσου σφάλματος των μοντέλων του κεφαλαίου 3 για τα σημεία μετρήσεων και ο έλεγχος της αξιοπιστίας τους ώστε να είναι εφικτή η εφαρμογή των μοντέλων στις ζώνες 2.4GHz και 5GHz οι οποίες δεν ανήκουν στο εύρος συχνοτήτων που υποστηρίζουν τα μοντέλα. Σκοπός της παραπάνω διαδικασίας είναι η δυνατότητα εύρεσης της βέλτιστης θέσης σταθμών βάσης πριν την εγκατάστασή τους και η βελτιστοποίηση της θέσης υπαρχόντων σταθμών βάσης. / The first chapter is an introduction to the basic theory of wireless technology. Presents key characteristics such as range, propagation, interference and diffraction, frequencies and channels. Next, we represent the theory of antennas, network topology and application of the above in wireless metropolitan networks. In the second chapter there are presented the protocols of wireless networks and their application in zones 2,4 GHz and 5GHz and the comparison of these two zones. Below addressing network with the IP protocol and sharing the subnet 10.0.0.0 / 8 to B-class addresses for each county. Finally we represent the routing protocols and the advantages of using static or dynamic routing in wireless metropolitan area networks. The third chapter is exploring electromagnetic models covering open spaces. More specifically, we present the models Free space loss, Hata, Walfisch-Bertoni and Walfisch - Ikegami, and their parameters and how they are applied to calculate the loss in space propagation. In the fourth we try to apply the models of Chapter 3 in wireless metropolitan area networks in order to model them. We Perform measurements in wireless base stations in urban and suburban areas for the bands 2.4GHz and 5GHz. Followed by the calculation of the average error of the models of Chapter 3 points for measurement and control reliability so as to enable the application of models to 2.4GHz and 5GHz bands which do not belong to the range of frequencies that support the models. The purpose of this procedure is the finding of the optimal location of base stations before their installation and optimize the position of existing base stations.
5

Wireless Technology in Higher Education: The Perceptions of Faculty and Students Concerning the use of Wireless Laptops

Kuo, Chia-Ling 12 October 2005 (has links)
No description available.
6

Exploring of wireless technology to provide information sharing among military, United Nations and civilian organizations during complex humanitarian emergencies and peacekeeping operations

Bridges, Douglas M., Jr., Mason, Adonis R. 03 1900 (has links)
Approved for public release; distribution in unlimited. / Natural as well as man-made disasters have become commonalities of daily life in recent decades for a large portion of the world's population. This growing trend reflects the worldwide proliferation in recent years of Complex Humanitarian Emergencies (CHEs) and peace operations. Humanitarian emergencies and peace operations are a complex mix of related activities that require the combined efforts of the UN, military, International Organizations (IOs) and Non-Governmental Organizations (NGOs). Given the nature and similarities of their missions, there is an ongoing need for these organizations to have access to accurate, current, and comprehensive information about field conditions and each other's movements. In several of the CHEs and peacekeeping operations of recent years, a recurring problem has been poor communication due to inadequate equipment, non-compatibility of equipment and a non-standardized communications infrastructure. This thesis explores the impact and possible benefits that wireless technology can provide to help bridge the communication gap that exists among the UN and the NGOs who participate in CHEs and peacekeeping operations. / Lieutenant Commander, Supply Corps, United States Navy / Lieutenant, United States Navy
7

Smartphone Information Security Risks : Portable Devices and Workforce Mobility

Nunoo, Esi Maan January 2013 (has links)
Today’s world is characterised by a heavy dependence on information technology and technological devices to perform even the simplest of tasks. While this in itself is not a bad thing, our over dependence and neglect has put us in a situation where the confidentiality, integrity and availability of our information resources are continuously being questioned. ENISA (2010) report that in the third quarter of 2010 eighty million Smartphones were sold worldwide, with the UK, Germany, France, Spain, and Italy reporting a sixty million increment in the number of smartphone users. Reardon (2007) additionally predicted that between 2007 and 2012 there was going to be a 30% year-on-year growth in the sale of smartphones. The improvement of smartphones together with its rapidly decreasing unit price has placed smartphones within the reach of all employees. Due to the mobile nature of the device, it has brought challenges to the information security needs of organizations. As the sale of smartphone continue to increase so does the number of vulnerabilities on mobile operating systems. Knowing where to place the smartphone is of prime importance in this study. Is it just a socio-technical tool for private use or it must be extended to be used as a working tool? If so, how should it be used to limit the exposure of organizational information? The study makes use of interviews in finding out what users of the device think about the device and how secure they think their device is. The interviews also tries to find out how securely the users have configured their devices, their mobility rate and what policies have been put in place to help guide users of the device while using the device. Findings from this study indicate that smartphone threats are diverse, complicated and smart. As the price of the smartphone reduces and their functionality improves, the number of its users increases. This makes it a target for hackers and malware as they can exploit the device to gain personal and organizational data. In spite of this, the perception of users on the risks of using a smartphone for work is not as high as can be. Users still think that if only the phone is used for making and receiving calls, reading and replying to emails and checking calendar schedules, then there is nothing much to protect. In reality this is not the case. Smartphones have a lot more going on them than just the aforementioned. Users must be educated on the reality of the matter and be made aware of the current risks there are so as to increase their consciousness on this matter. Finally, the discussion in this study sheds some light on the challenges that mobility and smartphone usage for work pose to organizational information security. The choice of a counter measure depends on factors such as what kind of data the organization produces as well as what kind of usage patterns employees have. There is no one size fit all counter measure that can be implemented. Organizations must realize this and embark on the best solutions that are suitable for their organization. To get the best counter measures in place, organizations are advised to make their own risk assessments and weigh the risks against the potential benefits in their own specific cases. / <p>Validerat; 20130827 (global_studentproject_submitter)</p>
8

[en] WIRELESS TECHNOLOGY APPLICATION IN LOGISTIC / [pt] APLICAÇÃO DAS TECNOLOGIAS SEM FIO NA LOGÍSTICA

TAMARA DE BRITTO FIGUEIREDO 31 August 2004 (has links)
[pt] As atividades logísticas sofreram grandes transformações no decorrer do século XX, evoluindo de um nível meramente operacional, passando por diferentes fases de integração, alcançando por fim, uma postura estratégica. Em sua última etapa, a Logística assumiu um enfoque mais gerencial, em meio ao qual se desenvolveu o conceito de Supply Chain Management. Tal evolução se deu em meio a importantes mudanças econômicas e sociais, as quais repercutiram na transição dos Sistemas de Produção. Os efeitos da globalização aceleraram em muito esse processo. A necessidade de flexibilidade decorrente desses efeitos impulsionou por sua vez, o desenvolvimento de sofisticadas tecnologias da informação. Nas últimas décadas, em virtude da valorização de princípios de mobilidade, observou-se uma forte tendência ao emprego de tecnologias de informação sem fio, em muitas atividades logísticas. O presente trabalho visa fazer um levantamento das principais tecnologias de transmissão de informações por rádio-freqüência, por meio das quais, pode se gerenciar o fluxo bidirecional de informações e materiais, de forma a promover maior grau de integração da cadeia logística. Uma atenção especial foi atribuída a uma mais recente tecnologia de captura de dados: o RFID (RadioFrequency Identification), por meio da qual se pode realizar operações de controle e localização de uma entidade, dentro de determinada área de abrangência. O RFID vem aos poucos conquistando mercado no quadro brasileiro, no controle de mercadorias em linha de montagem, e de acesso de veículos. Com base nos resultados de um estudo empírico realizado pelo autor, abrangendo empresas fornecedoras de produtos e serviços da rede sem fio operantes no Brasil, pôde-se analisar alguns impactos da cultura RFID no SCM. / [en] Logistics activities suffered great transformations in the twentieth century, evolving from a mere operational level, passing through different stages of integration, and finally attaining a strategic position. In its final stage, Logistics took on a managerial approach within which the concept of Supply Chain Management was developed. This evolution took place amongst important economic and social changes which affected the Production Systems transition. The effects of globalization greatly accelerated this process. The need for flexibility as a result of these effects stimulated, in turn, the development of sophisticated information technologies. In the last decades, with the valuation of mobility principles, a growing trend towards the use of wireless information technologies was observed in many logistics activities. The present work aims at surveying the main radio frequency technologies for information transmission by means of which the bidirectional flow of information and materials can be managed in order to promote a greater degree of integration in the logistics chain. Special attention was attributed to a more recent data capture technology: RFID (Radio Frequency Identification), by means of which operations of control and tracking of an entity can be performed within a certain range. RFID has conquered the Brazilian market in such activities as assembly line merchandise control and vehicle tracking. Some impacts of RFID on the SCM could be analyzed from the results of an empirical study carried out with suppliers of wireless products and services.
9

Nouzové tlačítko pro seniory / Emergency Button for Seniors

Verbík, Josef January 2011 (has links)
This Thesis „Emergency Button for Seniors“ is about suggestion of realization of system emergency signalization. The System consists of programmable digital watch with wireless interface and PC with software processing signals. Status signalization is created by phone message and figuration of dialog on monitor. There is used free software for realization. Operation system on PC is Linux (distribution Ubontu 11.04). For graphic transitional plane PC application is used cross-platform framework QT. For watch firmware is used C compiler MSP430-GCC, MSP debug v0,15 and firmware OpenChronos.
10

Multiplexing NFC Antennas : An evaluation of the technique and its limitations / Multiplexande NFC Antenner

Gustafsson, Viktor, Ottosson, Per January 2023 (has links)
Introduction This study aims to investigate the possibility of driving multiple NFC antennas with a single NFC-controller by using a multiplexer. An artifact was developed and experiments were conducted in order to evaluate the design choice and in addition, to observe the impact of a multiplexer in an NFC system with respect to the number of successful tag detections, bit error rate (BER), the utilization of automatic antenna tuning (AAT) and the physical distance to the NFC tag. Data collected from the experiments was analyzed, and the results were discussed. The purpose of the thesis was concretized by formulating three research questions: [RQ1] How can the design proposed in the problem statement be implemented? [RQ2] How does the multiplexer impact the system’s ability to detect an NFC tag and read its contents at different distances? [RQ3] To which degree does the AAT-technology compensate for the issues caused by the multiplexer? Method This research has been conducted according to the design science research (DSR) methodology. DSR is a well-established methodology and suits the nature of this research, therefore it is used to answer the research questions. Findings The thesis demonstrates a viable solution using a multiplexer in NFC systems, with reduced detection distance as a factor to consider. The impact of AAT remains inconclusive, requiring further research. Implications This study shows that using a multiplexer in NFC systems can save costs and space, leading to more affordable and compact devices. It enables scalable, advanced NFC devices for diverse applications, encouraging wider adoption. However, developers must consider the impact of a multiplexer on detection distance when designing NFC-based applications Limitations This study has certain limitations. It focuses on a particular multiplexer and NFC antenna type, and specific testing conditions. It does not delve into the potential profitability, diverse applications, security or encryption concerns, compatibility with other devices, compliance with regulations, or hands-on verification of part connectivity.

Page generated in 0.0389 seconds