Spelling suggestions: "subject:"well phone"" "subject:"well rhone""
101 |
Služby dopravců ve smluvní osobní přepravě a taxislužbě / Services of the carriers in contractual personal transportation and taxi serviceZamboj, Martin January 2015 (has links)
This Master´s Thesis is designed for services of the carriers on contractual personel transportation and taxi service especially in the Prague. Within the framework of this thesis legislative condition for personal transportation are examined. Thesis is describing the biggest carriers in personal transportation and taxi service. In the end the cell phone aplications, which deal with personal transportation are described.
|
102 |
Bio-Swap: a biometrics-based solution to combat SIM swap fraudJordaan, Adriaan Louis 22 June 2011 (has links)
M.Sc. (Computer Science) / The past couple of years have seen an explosion in the number of online fraud schemes – Total annual losses exceed tens of millions of Rands. Many people and organizations from all over the world have fallen victim to it. Nobody is safe; everybody is vulnerable. As we increasingly make use of the Internet and mobile technology to do our work and to perform chores such as online banking or shopping, we become even more vulnerable. Fraudsters make use of ever-more sophisticated techniques and clever schemes to target the unsuspecting end-users of mobile and Internet technology, and to trick them into surrendering their personal information so that electronic transactions can be carried out in their name. Examples include cheque and credit card fraud, phishing, identity theft and spyware, to name but a few. Services such as Internet- and cell phone banking especially, provide a haven of possibilities to make easy money because the technology is relatively new, and it is being used by evermore people who believe that it is fast, safe and secure and will therefore make their lives easier. One of the latest scams at the time of this writing is “SIM swap fraud”: Fraudsters target specific victims, perform SIM swaps on their cell phone numbers, and then proceed to empty the victims’ bank accounts. This is all done in a matter of minutes, so the victims only realize what has happened when it is too late to do anything about it. Needless to say, a solution must be found that will prevent unauthorized SIM swaps and strengthen online banking security. This dissertation does exactly that. It examines the digital world known as cyberspace, identifies how SIM swap fraudsters manage to defraud their targets, and presents a biometrics-based security system to combat SIM swap fraud.
|
103 |
An Observational Evaluation of Safety Resulting from Driver DistractionDube, Christina M 18 March 2015 (has links)
Distracted driving is a dangerous activity that continues to claim lives on roadways throughout the United States. A goal of this research was to collect distracted driving behavior data through observation in the field. A methodological approach was devised to keep data collection consistent across the observation periods. Analysis of the data provided information regarding trends in distraction type or driving behavior while engaging in a secondary activity. In combination with the observational portion of this research, another key component to understanding distracted driving was the crash report narrative key word search. By searching through the crash reports, it was determined which key words have high discriminating powers that indicate distraction was a key component to a crash. Additionally, the key word search demonstrated how accurately distraction related crashes are reported via the crash report form. This research contributed to the existing literature regarding distracted driving and also expanded the methods of research that are currently in use.
|
104 |
Šifrování bezdrátové hlasové komunikace / Encryption of Wireless Data CommunicationKlikar, Václav January 2014 (has links)
This thesis deals with voice encryption in wireless communication. First, the necessary theoretical base about mobile telephone network is presented and followed by a description and comparison of existing voice encryption methods in wireless communication. After that, modern cryptographic algorithms are briefly described and a method based on voice over Internet protocol is proposed. This method is implemented as an Android application.
|
105 |
Využití mobilního telefonu k analýze tekutých vzorků / Use of cell phone in liquids analysisKřístek, Tomáš January 2016 (has links)
Technological development, broad availability and ubiquity of mobile phones made it possible in recent years to start a progression leading to the integration of mobile phones into biomedical analytical methods, the development of telemedicine and mobile personal health applications. This paper deals with the literature review of the mobile phone usage in biomedicine, with emphasis on the methods of optical analysis and technical solutions using 3D printing technology. It provides a draft and practical implementation of salivary cortiol level measuring system using a mobile phone, ELISA analytical methods, 3D printing technology and a set of custom Matlab functions connected with Matlab Mobile application and Mathworks Cloud. Also provides critical evaluation of results and method possibilities, and presents set of proposals and findings for quality of measurment optimization.
|
106 |
Využití mobilního telefonu k analýze tekutých vzorků / Use of cell phone in liquids analysisKřístek, Tomáš January 2016 (has links)
Technological development, broad availability and ubiquity of mobile phones made it possible in recent years to start a progression leading to the integration of mobile phones into biomedical analytical methods, the development of telemedicine and mobile personal health applications. This paper deals with the literature review of the mobile phone usage in biomedicine, with emphasis on the methods of optical analysis and technical solutions using 3D printing technology. It provides a draft and practical implementation of salivary cortiol level measuring system using a mobile phone, ELISA analytical methods, 3D printing technology and a set of custom Matlab functions connected with Matlab Mobile application and Mathworks Cloud. Also provides critical evaluation of results and method possibilities, and presents set of proposals and findings for quality of measurment optimization.
|
107 |
The West Virginia Prescription Drug Abuse Quitline: Challenges and Lessons Learned From Running a Remote QuitlineWhite, Rebecca J., Zullig, Keith J., Lander, Laura, Shockley, Clara, Pack, Robert, Sullivan, Carl 01 January 2012 (has links)
The West Virginia Prescription Drug Abuse Quitline (WVPDAQ) is a resource that offers education and support to individuals and families affected by prescription drug abuse. The WVPDAQ began functioning September 11, 2008, through the use of mobile phone and laptop technology. Although some helplines and quitlines use some aspects of remote technology, most function through traditional call center and landline technology, making the WVPDAQ unique. This article describes the process evaluation of the WVPDAQ and outlines both the positive findings and challenges faced by the WVPDAQ. Lessons learned and future recommendations for remote quitline endeavors are also presented. It is hoped that the experiences and information regarding the WVPDAQ presented can provide best-practice insight for public health practitioners and evaluation personnel who are considering using alternative technologies to deliver quitline services.
|
108 |
Differing Types of Cellular Phone Conversations and Dangerous DrivingDula, Chris S., Martin, Benjamin A., Fox, Russell T., Leonard, Robin L. 01 January 2011 (has links)
This study sought to investigate the relationship between cell phone conversation type and dangerous driving behaviors. It was hypothesized that more emotional phone conversations engaged in while driving would produce greater frequencies of dangerous driving behaviors in a simulated environment than more mundane conversation or no phone conversation at all. Participants were semi-randomly assigned to one of three conditions: (1) no call, (2) mundane call, and, (3) emotional call. While driving in a simulated environment, participants in the experimental groups received a phone call from a research confederate who either engaged them in innocuous conversation (mundane call) or arguing the opposite position of a deeply held belief of the participant (emotional call). Participants in the no call and mundane call groups differed significantly only on percent time spent speeding and center line crossings, though the mundane call group consistently engaged in more of all dangerous driving behaviors than did the no call participants. Participants in the emotional call group engaged in significantly more dangerous driving behaviors than participants in both the no call and mundane call groups, with the exception of traffic light infractions, where there were no significant group differences. Though there is need for replication, the authors concluded that whereas talking on a cell phone while driving is risky to begin with, having emotionally intense conversations is considerably more dangerous.
|
109 |
Using a cell phone application to support caregivers of children with Autism Spectrum DisorderPelser, Kerry-Beth January 2019 (has links)
This mini-dissertation aims to explore the daily realities faced by caregivers of children with autism spectrum disorder and the implications thereof on the use of a cell phone application that can assist in easing the tension between the need for support and the lack of resources to secure that support whenever necessary. Bronfenbrenner’s bio-ecological systems theory, in addition to the assets-based approach, forms the basis on which the study is conceptualised. Using a qualitative approach, a case study research design was used to select the participant by means of purposive sampling. The research participant used the application that was selected for a period of ten days, after which a semi-structured interview was conducted as the primary mode of data collection. The data were then analysed, using inductive thematic analysis, after which themes and subthemes were derived. The findings of the study indicated that the research participant faces a meaningful lack of financial support and social support, and that the cell phone application was seen as a useful tool for supporting her child in spite of this. The study contributed to expanding the current research body on this topic. A major limitation was the sample size of the study being too small for the results to be generalised. Recommendations include that cell phone applications be designed with users’ cultural and language preferences in mind and that more studies of this nature be done. / Dissertation (MEd)--University of Pretoria, 2019. / Educational Psychology / MEd / Unrestricted
|
110 |
Common Characteristics of Young People Who Text: The Connection to Autonomy, Identity and Self-EsteemDavis, Elizabeth M. 01 May 2010 (has links)
This study examined the relationship between adolescents' use of texting and their level of identity development, cognitive autonomy, and self-esteem. One hundred and nineteen Utah State University students participated in this study by filling out a questionnaire that included a section designed specifically to learn the texting habits of the participants, and also included sections derived from previously existing measures on identity, autonomy, and self-esteem. The results show statistical significance of age and texting. Participants who were 23 years+ sent significantly less than those participants who were 19-22 years. Areas of gender, identity, and self-esteem were also analyzed. Implications of these findings for future research were also discussed.
|
Page generated in 0.0512 seconds