Spelling suggestions: "subject:"amobile communication"" "subject:"0mobile communication""
671 |
The second international m-Libraries Conference, June 22-24, 2009 : conference schedule & guidebookVarious contributors 02 July 2009 (has links)
The second international m-Libraries conference schedule & guidebook features the conference program; pre-conference workshops; and, local/UBC tours, events and attractions. A listing of the various conference committees and sponsors including the names of the organizing committee chair members, the graphic artist, the conference staff, and the consultant are shown on pages 27 and 28.
|
672 |
Session abstracts and proposals : the second international m-Libraries Conference, June 22-24, 2009Various contributors 02 July 2009 (has links)
Attached is the list of 15 session abstracts and proposals from the second international m-Libraries Conference, held and sponsored on 23 & 24 June 2009, by the University of British Columbia in conjunction with Athabasca University, The Open University and Thompson Rivers University.
|
673 |
Mobiliojo ryšio aparatų remonto valdymo informacinė sistema / Mobile communication devices repair management information systemTarasevičius, Regimantas 31 August 2011 (has links)
Darbo analitinėje dalyje išanalizuota įmonės UAB „Mobili garantija“ remonto darbų veikla, analizei atlikti sudaryti detalūs duomenų srautų bei duomenų struktūrų modeliai. Siekiant nustatyti, ar rinkoje egzistuoja galimas problemos sprendimas, atlikta rinkoje siūlomų produktų apžvalgą. Nusprendus kurti naują remonto darbų valdymo informacinę sistemą, apibrėžti kuriamos informacinės sistemos funkciniai ir nefunkciniai reikalavimai, pasirinktos priemonės informacinės sistemos realizavimui. Projektinėje darbo dalyje panaudojimo atvejų modelis detalizuojamas veiklos diagramų schemomis. Remiantis duomenų struktūrų modeliais suprojektuotas duomenų bazės modelis, aprašytos duomenų bazės lentelių struktūros. Remiantis duomenų bazės lentelių struktūra, sudaryti vartotojo sąsajos modeliai. Pateikiamas kuriamos informacinės sistemos navigavimo planas bei langų ir formų aprašymai. Sistemos testavimo ir kokybės įvertinimo dalyje aprašomas sistemos diegimas, sudaromas sistemos įvertinimo planas. Siekiant įvertinti sistemos funkcionalumą atliekamas sistemos testavimas, kurio rezultatai pateikiami lentelėje. Taip pat pateikiami anketinės apklausos apibendrinti duomenys. / The subject of this work is computerization of repairs works management process. During the analysis of UAB "Mobili garantija" repairs management, detailed data flow and the data structure models were created. Available products offering partial solutions to the problem were overviewed and compared. Functional and non-functional requirements for the repairs management information system were defined. In the projecting section of this document, detailed activity diagrams along with a specification of a developed database model are presented. A detailed navigation plan along with specifications of each user form and report concludes this section of the document. The tests of the finished information system revealed full compliance with the specified requirements. System user survey was carried out to make more precise quality evaluations. The survey showed that users were generally satisfied with both performance and functionality of the new system. Pilot implementation of the system showed that it meets the defined requirements and can be safely used by UAB "Mobili garantija" for repairs management.
|
674 |
Rapid application mobilization and delivery for smartphonesTsao, Cheng-Lin 02 July 2012 (has links)
Smartphones form an emerging mobile computing platform that has hybrid characteristics borrowed from PC and feature phone environments. While maintaining great mobility and portability as feature phones, smartphones offers advanced computation capabilities and network connectivity. Although the smartphone platform can support PC-grade applications, the platform exhibits fundamentally different characteristics from the PC platform. Two important problems arise in the smartphone platform: how to mobilize applications and how to deliver them effectively. Traditional application mobilization involves significant cost in development and typically provides limited functionality of the PC version. Since the mobile applications rely on the embedded wireless interfaces of smartphones for network access, the application performance is impacted by the inferior characteristics of the wireless networks. Our first contribution is super-aggregation, a rapid application delivery protocol that in tandem uses the multiple interfaces intelligently to achieve a performance that is ``better than the sum of throughputs' achievable through each of the interfaces individually. The second contribution is MORPH, a remote computing protocol for heterogeneous devices that transforms the application views on the PC platform into smartphone-friendly views. MORPH virtualizes application views independent of the UI framework used into an abstract representation called virtual view. It allows transformation services to be easily programmed to realize a smartphone friendly view by manipulating the virtual view. The third contribution is the system design of super-aggregation and MORPH that achieve rapid application delivery and mobilization. Both solutions require only software modifications that can be easily deployed to smartphones.
|
675 |
The use of mobile phones as service-delivery devices in sign language machine translation systemMehrdad Ghaziasgar January 2010 (has links)
<p>This thesis investigates the use of mobile phones as service-delivery devices in a sign language machine translation system. Four sign language visualization methods were evaluated on mobile phones. Three of the methods were synthetic sign language visualization methods. Three factors were considered: the intelligibility of sign language, as rendered by the method / the power consumption / and the bandwidth usage associated with each method. The average intelligibility rate was 65%, with some methods achieving intelligibility rates of up to 92%. The average le size was 162 KB and, on average, the power consumption increased to 180% of the idle state, across all methods. This research forms part of the Integration of Signed and Verbal Communication: South African Sign Language Recognition and Animation (SASL) project at the University of the Western Cape and serves as an integration platform for the group's research. In order to perform this research a machine translation system that uses mobile phones as service-delivery devices was developed as well as a 3D Avatar for mobile phones. It was concluded that mobile phones are suitable service-delivery platforms for sign language machine translation systems.</p>
|
676 |
Performance analysis of signalling system No. 7 networks during signalling transfer point congestion.Chana, Amish Harkisan. January 2002 (has links)
The growth of mobile networks and the imminent deployment of third generation networks and services will require signalling networks to maintain their integrity during increased unanticipated traffic volumes. As signalling networks become larger and more complex, an analysis ofprotocol operation is necessary to determine the effectiveness of the current protocol implementation and to evaluate the applicability of the proposed enhancements. The objective of this study ,is to develop analytical models to analyse the impact of Signalling Transfer Point congestion on network performance when simple message discard schemes are used as the primary flow control mechanism, and to investigate suitable congestion and flow control mechanisms to help alleviate the congestion. Unlike previous studies, that are localised and only concentrate on the nodes around the congested entity, the models presented here examine the impact of network wide and focused overloads on the entire network. The study considers both the fixed-line and mobile network environments, and analyses the performance of the ISDN User Part and Mobile Application Part protocols. The call completion rate and location update success rate are used to measure performance, instead of message throughput, since these parameters provide a more appropriate measure of the grade-of-service and more accurately reflect the level of service provided to a customer. The steady state equilibrium models, derived here, can be used to quickly estimate the safe operating regions of a signalling network, while the transient models provide a more intuitive perspective of the traffic processes that lead to congestion . Furthermore, these models can be used to examine the network performance for different message priority schemes, routing algorithms, overload scenarios and network configurations. The performance of various congestion control mechanisms that incorporate non-linear throttling schemes is also evaluated, together with an examination of the impact of congestion on multiple user parts in a mobile network environment. Message priority schemes are found to offer little or no advantage in a fixed network environment, but in a mobile network they can be used to maintain the network's performance at an optimum level during periods of overload. Network performance is also improved if congestion controls block load-generating traffic at the initial onset of congestion and then gradually restore traffic as the performance improves . / Thesis (Ph.D.)-University of Natal, Durban, 2002.
|
677 |
A MAC protocol for wireless networks with QoS guarantees.Majoor, Richard James. January 2002 (has links)
Mobile communications are becoming integrated into society at an explosive rate. While 2nd generation (2G) systems limit the user to basic services such as voice and low-bit rate data, 3G
networks are characterized by their ability to accommodate wideband multi-media traffic with Quality of Service (QoS) guarantees. In the design of a system the Medium Access Control (MAC) layer is responsible for multiplexing heterogeneous traffic onto a common transmission link and its design is critical to the overall performance of a system. A number of MAC protocols for wireless networks have been proposed in the literature - the majority having time division multiple access (TDMA) at the MAC layer. However in 3G systems there is a trend towards the use of code division multiple access (CDMA) due to its proven advantages in a
wireless environment. Although several papers on CDMA based MAC protocols have been published, virtually none of them tackle the analysis aspect of the protocols. Those papers that do perform analyses of CDMA protocols don't often consider heterogeneous traffic, and even fewer support QoS. The thesis addresses these shortcomings by proposing a MAC protocol that
supports QoS in the form of Bit Error Rate (BER) and packet delay guarantees. The thesis begins by giving an overview of proposed wireless ATM and 3G CDMA protocols and then details how power control may be used to support BER guarantees. Various Markov based analyses are presented along with Monte-Carlo Simulations. An Equilibrium Point Analysis is then performed and the work discusses how such analyses are generally infeasible for systems supporting heterogeneous traffic. After an overview of conventional scheduling algorithms the thesis proceeds to outline a novel approach by which delay guarantees may be offered using packet dropping rates as the QoS metric. Using a stochastic source model as opposed to the conventional leaky bucket traffic regulator the thesis diverges significantly from
conventional literature. The thesis also details how to calculate the probability of QoS violation and concludes with suggestions on further research avenues. As a whole the work is unique in
its approach to analyse heterogeneous traffic and the methods it uses to construct session admission zones for QoS guarantees. / Thesis (Ph.D.)-University of Natal,Durban, 2002.
|
678 |
Multiuser demodulation for DS-CDMA systems in fading channels.Singh, Navin Runjit. January 2000 (has links)
The problems of optimal as well as suboptimal detection for CDMA
transmissions over an additive white Gaussian noise (AWGN) channel, have
been the focus of study in the recent past. However, CDMA transmissions
are frequently made over channels which exhibit fading and/or dispersion;
hence receivers need to be designed which take into account this behaviour.
In spite of the major research effort invested in multiuser demodulation
techniques, several practical as well as theoretical open problems still exist.
Some of them are considered in more detail in this thesis. The aim of the
thesis is to develop multiuser demodulation algorithms for mobile
communication systems in frequency-selective fading channels, and to
analyze their implementation complexity. The emphasis is restricted to the
uplink of an asynchronous DS-CDMA system where the users transmit in an
uncoordinated manner and are received by one centralized receiver.
The original work that is undertaken for the MScEng study is the evaluation
of a multiuser receiver structure for a frequency-selective fading channel,
where there exists a steady specular path and two fading paths.
Furthermore, the effect of using selection diversity is investigated by
examining the bit error rate, asymptotic multi user efficiency and near-far
resistance of the proposed detector structure. These results are confirmed
both analytically and by simulation in the thesis. An investigation is also
conducted into the application of neural networks to the problem of
multiuser detection in code division multiple access systems. The neural
network will be used as a classifier in an adaptive receiver which
incorporates an extended Kalman filter for joint amplitude and delay
estimation. Finally, some open problems for future research will be pointed
out in the thesis.
Keywords: AWGN channel , DS-CDMA system, frequency-selective,
multi user demodulation, asymptotic multiuser efficiency, near-far resistance,
neural network, Kalman filter. / Thesis (M.Sc.Eng.)-University of Natal, Durban, 2000.
|
679 |
Distributed power control in ad hoc networks.Pate, Neil Robert. January 2003 (has links)
Abstract available in digital copy. / Thesis (M.Sc.Eng.)-University of Natal, Durban, 2003.
|
680 |
An investigation of high school learners using MXIT, and their attitudes towards mobile security.Bhoola, Nisha. 10 October 2013 (has links)
This research encompassed an investigation of high school learners using MXiT, and
their attitudes towards mobile security guidelines. The research was conducted across
thirteen schools in the Pinetown, ILembe and Umlazi districts of KwaZulu-Natal.
The literature review has shown that the majority of security guidelines and their
successful use depend on education and awareness of what these security measures
are. Secure use of mobile social networking sites such as MXiT are best regulated by
parental awareness and monitoring of children‟s online habits. This needs parents to
be abreast of technology, its uses and benefits, the associated dangers, as well as how
to encourage and monitor usage.
The research was conducted by administering questionnaires to grades 8 to 11
inclusive in the three districts of KwaZulu-Natal. Out of the 1300 questionnaires
handed out to learners, a total of 856 completed questionnaires (66%) were received
and analysed.
It was found from the study that 89,5% of under age users that participated in this
research are using MXiT. Users are also not fully aware of the security features when
using MXiT. It has also been found that African respondents as compared with non-
African respondents are less aware of the possible dangers in using MXiT, less aware
that criminals can use fake IDs and pretend to be someone they are not, and less aware
that people can get addicted to MXiT. Learners are aware of the dangers that can be
associated with MXiT; however they are prepared to talk to strangers and meet new
people online, thus exposing themselves to these dangers.
In conclusion, there is scope to improve the security measures for MXiT users, and
there is a need to improve the levels of education around using these security features. / Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.
|
Page generated in 0.1185 seconds