• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 36
  • 22
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 163
  • 163
  • 39
  • 26
  • 26
  • 24
  • 21
  • 19
  • 19
  • 19
  • 16
  • 15
  • 15
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Určení pozice mobilního zařízení v prostoru / Localization of Mobile Device in Space

Komár, Michal January 2013 (has links)
This thesis focuses on the current localization options of the Android mobile phone platform. It explores the possibilities of locating mobile devices not only with the use of inertial sensors, but also the possibility of localization using integrated video camera. The work describes the measurements done with available inertial sensors, introduces visual localization algorithm and design a system using these two approaches.
152

MobilisBuddy - Integration sozialer Netzwerke in distanzabhängige Dienste auf mobilen Endgeräten

Schuster, Daniel, Springer, Thomas, Söllner, Benjamin, Hering, Dirk, Schill, Alexander January 2009 (has links)
No description available.
153

Referenzarchitektur eines Frameworks für die Entwicklung kompositer, ubiquitärer Anwendungen

Mroß, Oliver, Schlegel, Thomas January 2011 (has links)
Durch die zunehmende Anzahl mobiler Endgeräte wie Smartphones sowie der Digitalisierung des öffentlichen Raums stehen ubiquitäre Umgebungen verstärkt im Fokus der Forschung. Werden die Endgeräte und zugehörigen Dienste einer solchen Umgebung zu einer kompositen, ubiquitären Anwendung (kubi App) zusammengefasst, so kann der Anwender auf diese über eine komposite Benutzerschnittstelle zugreifen, z. B. von seinem persönlichen Smartphone aus. Aus der Übertragung des Mashup-Entwicklungsansatzes auf ubiquitäre Umgebungen ergeben sich Implikationen, die im vorliegenden Beitrag untersucht werden sollen. Anhand der Untersuchung verwandter Forschungsarbeiten lassen sich wichtige funktionale Anforderungen aus der Perspektive der ubiquitären Umgebung und der Endgeräte formulieren, die im Rahmen dieses Beitrages vorgestellt werden. Anhand der Anforderungen wird eine Referenzarchitektur zu einem Entwicklungsframework für kubi Apps vorgestellt, die als Grundlage zur Entwicklung zukünftiger Laufzeitumgebungen dienen soll.
154

Marché et tarification des plateformes de vente d'applications mobiles comme marchés bifaces : analyse comparée France-Chine / Pricing strategies of the app store platform in the mobile app market based on two-sided markets theory : a comparative study of France and China

Hai, Xiaodong 14 January 2014 (has links)
Application mobile devient un canal important de l'accès internet mobile. Trois groupes d'utilisateurs finaux affiliés avec deux plates-formes bifaces sur le marché d'applications mobiles ont attiré une attention considérable. App store (App-store) est une plate-forme de distribution de l'application connectée avec les développeurs et les utilisateurs. Plateforme de publicitaire (Ad-store) fournit des services de publicité pour les annonceurs grâce à des applications de développeurs. Sur ce marché, les développeurs, les annonceurs et les utilisateurs sont trois groupes d'utilisateurs finaux. Le marché de l'application mobile est un marché biface compliqué. Il y a des externalités de réseau étendues et interactives. L’étude se concentre sur les stratégies de tarification pour la plate-forme App-store. L'App-store et Ad-store sont les deux plates-formes bifaces. L’App-store partage les revenus des ventes d'applications avec les développeurs. L'Ad-store partage les revenus publicitaires avec les développeurs. La plate-forme App-store met en oeuvre la tarification asymétrique côté développeur et côté utilisateur. Côté développeur est le côté de la subvention ainsi que du côté des recettes pour la plateforme App-store. Le cout d'achat de l'appareil mobile est une déterminante particulière de tarification. Les redevances d'adhésion sont négligeables dans ce marché et les redevances d'utilisation sont réalisables. C'est un duopole sur le marché des applications mobiles. Le modèle des ventes d'appareils mobiles d'Apple et le modèle d'in-app publicité de Google sont extrêmement réussis. App-store, Ad-store et les appareils mobiles sont les trois points de génération de profits. / Mobile app is becoming an important mobile internet access channel. Three groups of end users affiliated with two Two-sided platforms in the mobile app market have attracted considerable attention. App store platform (App-store) is an app distribution platform connected with developers and users. App ad platform (Ad-store) supplies advertising services for advertisers through developers’ apps. Developers, users and advertisers are end users. Mobile app market is a complicated two-sided market. There are widespread and interactive network externalities. The study focuses on the pricing strategies for the app store platform. App-store shares paid app sales and in-app purchase revenues with developers. Ad-store shares in-app advertising revenues with developers. The App-store platform implements asymmetric pricing to developer side and user side. Developer side is the subsidy side as well as the revenue side for App-store platform. Mobile device purchasing cost constitutes a particular App-store platform pricing determinant. Membership fees are negligible in the mobile app market. Usage fee is workable. It is a duopoly in the mobile app market. Apple and Google are the two giants with distinct business models. Both Apple’s mobile device sales model and Google’s in-app advertising model are extremely successful. App-store, Ad-store and mobile devices are the three key profit makers in this market. Vertical integration inside this ecosystem will generate considerable revenues. Chinese users have higher price elasticity of demand and they are particularly sensitive to the app prices when compared with the French.
155

Une base de connaissance personnelle intégrant les données d'un utilisateur et une chronologie de ses activités / A personal knowledge base integrating user data and activity timeline

Montoya, David 06 March 2017 (has links)
Aujourd'hui, la plupart des internautes ont leurs données dispersées dans plusieurs appareils, applications et services. La gestion et le contrôle de ses données sont de plus en plus difficiles. Dans cette thèse, nous adoptons le point de vue selon lequel l'utilisateur devrait se voir donner les moyens de récupérer et d'intégrer ses données, sous son contrôle total. À ce titre, nous avons conçu un système logiciel qui intègre et enrichit les données d'un utilisateur à partir de plusieurs sources hétérogènes de données personnelles dans une base de connaissances RDF. Le logiciel est libre, et son architecture innovante facilite l'intégration de nouvelles sources de données et le développement de nouveaux modules pour inférer de nouvelles connaissances. Nous montrons tout d'abord comment l'activité de l'utilisateur peut être déduite des données des capteurs de son téléphone intelligent. Nous présentons un algorithme pour retrouver les points de séjour d'un utilisateur à partir de son historique de localisation. À l'aide de ces données et de données provenant d'autres capteurs de son téléphone, d'informations géographiques provenant d'OpenStreetMap, et des horaires de transports en commun, nous présentons un algorithme de reconnaissance du mode de transport capable de retrouver les différents modes et lignes empruntés par un utilisateur lors de ses déplacements. L'algorithme reconnaît l'itinéraire pris par l'utilisateur en retrouvant la séquence la plus probable dans un champ aléatoire conditionnel dont les probabilités se basent sur la sortie d'un réseau de neurones artificiels. Nous montrons également comment le système peut intégrer les données du courrier électronique, des calendriers, des carnets d'adresses, des réseaux sociaux et de l'historique de localisation de l'utilisateur dans un ensemble cohérent. Pour ce faire, le système utilise un algorithme de résolution d'entité pour retrouver l'ensemble des différents comptes utilisés par chaque contact de l'utilisateur, et effectue un alignement spatio-temporel pour relier chaque point de séjour à l'événement auquel il correspond dans le calendrier de l'utilisateur. Enfin, nous montrons qu'un tel système peut également être employé pour faire de la synchronisation multi-système/multi-appareil et pour pousser de nouvelles connaissances vers les sources. Les résultats d'expériences approfondies sont présentés. / Typical Internet users today have their data scattered over several devices, applications, and services. Managing and controlling one's data is increasingly difficult. In this thesis, we adopt the viewpoint that the user should be given the means to gather and integrate her data, under her full control. In that direction, we designed a system that integrates and enriches the data of a user from multiple heterogeneous sources of personal information into an RDF knowledge base. The system is open-source and implements a novel, extensible framework that facilitates the integration of new data sources and the development of new modules for deriving knowledge. We first show how user activity can be inferred from smartphone sensor data. We introduce a time-based clustering algorithm to extract stay points from location history data. Using data from additional mobile phone sensors, geographic information from OpenStreetMap, and public transportation schedules, we introduce a transportation mode recognition algorithm to derive the different modes and routes taken by the user when traveling. The algorithm derives the itinerary followed by the user by finding the most likely sequence in a linear-chain conditional random field whose feature functions are based on the output of a neural network. We also show how the system can integrate information from the user's email messages, calendars, address books, social network services, and location history into a coherent whole. To do so, it uses entity resolution to find the set of avatars used by each real-world contact and performs spatiotemporal alignment to connect each stay point with the event it corresponds to in the user's calendar. Finally, we show that such a system can also be used for multi-device and multi-system synchronization and allow knowledge to be pushed to the sources. We present extensive experiments.
156

Přehrávač hudby pro Android s výběrem skladem dle kontextu zařízení / Android Music Player with the Song Selection by a Device Context

Chmelařová, Gabriela January 2021 (has links)
Tato práce pojednává o vytvoření mobilní aplikace zvažující kontext zařízení, která vybírá a doporučuje hudební skladby dle aktuálního stavu kontextu zařízení. Kontext je získáván na základě naměřených hodnot, které jsou získány z vestavěných senzorů mobilního zařízení a z ostatních systémových hodnot zařízení. Výběr konkrétní skladby je poté založen na výstupu modelu strojového učení, který klasifikuje kontext na základě aktuálních získaných dat a následně zvolí skladbu připadající k danému kontextu.
157

The Spillable Environment: Expanding a Handheld Device's Screen Real Estate and Interactive Capabilities

Clement, Jeffrey S. 07 August 2007 (has links) (PDF)
Handheld devices have a limited amount of screen real estate. If a handheld device could take advantage of larger screens, it would create a more powerful user interface and environment. As time progresses, Moore's law predicts that the computational power of handheld devices will increase dramatically in the future, promoting the interaction with a larger screen. Users can then use their peripheral vision to recognize spatial relationships between objects and solve problems more easily with this integrated system. In the spillable environment, the handheld device uses a DiamondTouch Table, a large, touch-sensitive horizontal table, to enhance the viewing environment. When the user moves the handheld device on the DiamondTouch, the orientation of the application changes accordingly. A user can let another person see the application by rotating the handheld device in that person's direction. A user could conveniently use this system in a public area. In a business meeting, a user can easily show documents and presentations to other users around the DiamondTouch table. In an academic setting, a tutor could easily explain a concept to a student. A user could effortlessly do all of this while having all of his/her information on the handheld device. A wide range of applications could be used in these types of settings.
158

Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

Holmquist, Robin January 2023 (has links)
Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. Modern society relies heavily on information technology (IT), and this has introduced a significant threat to society and companies in the form of hackers whether they be state-sponsored, political activists, or part of organized crime. This has introduced the need for companies and organizations that strive to make devices more secure, as well as standards that can be used for evaluating how secure a device is. Common Criteria (CC) is an internationally recognized set of guidelines and standards that can be used for security evaluation. There is a growing demand for enhanced efficiency in the field of security evaluation, especially considering the move to agile methodologies in information and communication technology (ICT) product development. Historically, security evaluation has been tailored to each individual product. The current trends in the certification and global ICT evaluation industry indicate a move in the direction of a greater reliance on predefined test cases. In this thesis, I describe how I designed, developed, and evaluated a toolkit that automates the evaluation of Android devices concerning a selection of security requirements that concern Bluetooth from the Mobile Device Fundamentals Protection Profile in CC. This involved a literature study, examination of the Bluetooth Core Specification, software development, and evaluation of the toolkit. My results from evaluating the toolkit found that it only reports non-compliance with a security requirement if the target of evaluation (TOE) is non-compliant. Additionally, every time the toolkit reported compliance with a security requirement, manual evaluation verified that the TOE truly complied with the security requirement. Finally, during the development phase, I discovered a vulnerability that had not been discovered during manual evaluation. It has been confirmed by the developer to be a vulnerability and a patch is currently being developed. My evaluation indicates that the toolkit I have developed is reliable and that it could therefore be used in the security industry. By finding a vulnerability by using automation, I have shown that automation could potentially be a useful approach for vulnerability research. Similarly to fuzzing, automation can be used to expose a system to behavior that it does not expect and therefore potentially reveal vulnerabilities. / Bluetooth är en teknologi som har implementerats i över 5 miljarder enheter och har därför stor inverkan. Det är den dominerande teknologin för trädlös kommunikation med kort räckvidd. Det moderna samhället är starkt beroende av informationsteknologi (IT), och detta har introducerat ett betydande hot mot samhället och företag i form av hackare oavsett om de är statligt sponsrade, politiska aktivister, eller en del av organiserad brottslighet. Detta har introducerat ett behov av företag och organisationer som strävar efter att göra enheter säkrare, såväl som standarder som kan användas för att utvärdera hur säker en enhet är. Common Criteria (CC) är en internationellt erkänd uppsättning riktlinjer och standarder som kan användas för säkerhetsutvärdering. Det finns en växande efterfrågan på ökad effektivitet inom området för säkerhetsutvärdering, särskilt med tanke på övergången till agila metoder för produktutveckling inom information- och kommunikations-teknologi. Historiskt sett har säkerhetsutvärdering skräddarsytts för varje enskild produkt. De nuvarande trenderna i certifieringsindustrin och globala ICT-utvärderingsindustrin indikerar en förflyttning i riktning mot ett mer frekvent användande av fördefinierade testfall. I denna uppsats beskriver jag hur jag designade, utvecklade och utvärderade ett verktyg som automatiserar utvärderingen av Android-enheter gällande ett urval av säkerhetskrav som rör Bluetooth från Mobile Device Fundamentals Protection Profile i CC. Detta innebar en litteraturstudie, granskning av Bluetooth Core Specification, mjukvaruutveckling och utvärdering av verktyget. Mina resultat från utvärderingen av verktyget visade att den bara rapporterar bristande efterlevnad med ett säkerhetskrav om målet för utvärdering (TOE) inte efterlever säkerhetskravet i fråga. Dessutom, varje gång verktyget rapporterade överensstämmelse med ett säkerhetskrav, verifierade manuell utvärdering att TOE:n verkligen efterlevde säkerhetskravet i fråga. Slutligen, under utvecklingsfasen upptäckte jag en sårbarhet som inte upptäckts under manuell utvärdering. Sårbarhet har bekräftats av utvecklaren och en patch håller på att utvecklas. Min utvärdering visar att det verktyg som jag har utvecklat är tillförlitlig och att den därför skulle kunna användas i säkerhetsbranschen. Genom att hitta en sårbarhet genom automatisering har jag visat att automatisering skulle kunna vara en användbar metod för sårbarhetsforskning. På samma sätt som fuzzing kan automatisering används för att utsätta ett system för beteenden som det inte förväntar sig och därför potentiellt avslöja sårbarheter.
159

The technology and operational readiness of students for mobile learning at a South African Higher Education Institution

Naicker, Nalindren Kistasamy 10 1900 (has links)
Recent accessibility drives and price wars between the major South African (SA) cell phone companies suggest that the landscape for the adoption of mobile learning (m-learning) at the Higher Education Institution (HEI) level may be changing. As such, there is a need to gauge the current mobile readiness of students for m-learning. Mobile technology readiness refers to the extent to which students have access to mobile devices (not only handsets), and can afford data bundles that meet or exceed the requirements of a base set of currently available m-learning applications (Naicker and Van der Merwe 2012). Mobile operational readiness refers to students’ awareness of, attitude towards, support and training that is required for m-learning. This study conducted an assessment of the technology and operational readiness of students at a SA HEI. An in-depth literature survey was undertaken to delineate technology and operational readiness of students for m-learning. For technology readiness, an investigation was conducted on m- learning applications that are currently available and the technology requirements of these mobile applications. This was undertaken to determine the extent that the current student mobile handset profile match these requirements. The literature review also included a search for mobile opeeratratiioonnaall ffaactorctorss ssuuchch aass ssttuuddeennttss’’ aawwaarenerenessss ooff aanndd aattttiittuuddee ttoowwaarrddss mm--lleaearrnininngg as well as m-learning support and training that students require. The philosophical underpinning of this study was based on Activity Theory. The strategy of inquiry employed was a case study approach. Data was collected from students at the Durban University of Technology, a resident based SA HEI. A mixed methods data collection strategy was employed. The researcher used a field survey questionnaire as the primary research instrument to assess mobile technology and operational readiness. Focus group interviews were used as a secondary data gathering tool to triangulate and strengthen the results. The results were presented using descriptive and inferential statistics and were analyzed using the lens of activity theory. In terms of technology readiness, despite a high level of ownership and reasonable compliance with application requirements, data costs remain prohibitive. In assessing operational readiness, despite a positive attitude, the majority of the students require awareness, ongoing support and training. Several recommendations based on the findings are offered. For example, one of the findings showed that mobile connectivity affordability was low amongst students and it is recommended that the HEI work around exorbitant connectivity costs by combining m-learning technologies to form meaningful m-learning approaches at a minimum v cost. Another finding showed low awareness of m-learning at the HEI. A recommendation advanced to combat this finding is for the HEI to encourage and support dialogue among key stakeholders. This study concludes that any m-learning endeavour to implement m-learning at this HEI is bound to fail as only a small percentage of students are aware of m-learning and can afford data bundles to implement m-learning in its true sense. As an implication of this study to other HEI’s, the researcher suggests that regular mobile readiness surveys be conducted. / Science and Technology Education / M. A. (Information Systems)
160

Využití navigace pro distribuci místně závislých informací / Navigation for Location Based Information Distribution

Ziegler, Zdeněk Unknown Date (has links)
This master's project deals with location based systems and their application in information distribution. The work discuss kinds of getting actual location. Then it focuses on problems of developing applications and description of Microsoft technologies for mobile devices. Based on obtained theoretical information we present design, implementation and testing of our own location based system.

Page generated in 0.0317 seconds