Spelling suggestions: "subject:"amobile communication"" "subject:"0mobile communication""
711 |
Understanding Generation Y : an investigation of how Hilton College can use technology for communicationWyngaard, Richard Clive January 2013 (has links)
Background to the academic research. Hilton College is an all boys private school in the Kwa-Zulu Natal Midlands. Since the beginning of 2012 boys have been permitted to carry their phones during the school day, (Thomson, 2012). Wireless internet access was also extended across the campus to allow boys and staff to bring their own devices to class and have access to the internet (Machlachlan, 2012). In the past, communication between staff and boys was either verbal or through the use of a daily notice, called the Daily Routine Order (DRO). The DRO is placed at the dining room tables each day and boys are expected to check for any notices that may pertain to them. These notices are emailed to a secretary who prints them out and places them in the dining room each day at lunch. 2. Objectives to the research. This research sought to establish whether current communication methods were effective or whether the prevalence of mobile phones and wireless devices had presented the school with a more effective method. It was important therefore, to investigate what devices were on campus, how those devices were used and when they were used. In addition to this, the research sought to establish communication preference among staff and boys. 3. Research Methodology. The research was conducted through the use of a qualitative survey that was conducted among both staff and boys. Staff and boys were surveyed to establish generation, device prevalence, device usage and device preference. This data was collected using an anonymous qualitative survey that was administered through the use of Google docs in the school labs. 187 Boys in 3 grades 8 and 9 participated in the survey along with 18 staff members. The data was then analysed and compared to data from similar research that had been conducted elsewhere in the world. Because of significant age differences between boys and staff it was critical to establish whether device usage among staff and boys was tied to their generation. Of particular interest were the device behaviours associated with the Millennial generation, who were born between 1982-2002 (Strauss 2005:10). This generational ‘benchmark’ allowed the researcher to compare the Hilton College cohort to those whose device behaviours and usage had occurred and been discussed in generational research elsewhere. It also allowed for certain assumptions to be made about staff and boys based on their generational profile. 4. Findings It was found that staff and boys exhibited communication traits that were consistent with their generation and consistent with other research in this field. It was also found that staff and boys preferred mobile and digital forms of communication over verbal announcements and the DRO system. For this reason, it was recommended that the Hilton College establish a system that took advantage of technology to improve on communication. Various recommendations were given by the researcher that took advantage of current technologies. These included the use of SMS, Instant Messaging, Social Networks and email. It was also recommended that the school consider prescribing devices that allow for communication between staff and boys.
|
712 |
A mobile toolkit and customised location server for the creation of cross-referencing location-based servicesNdakunda, Shange-Ishiwa Tangeni January 2013 (has links)
Although there are several Software Development kits and Application Programming Interfaces for client-side location-based services development, they mostly involve the creation of self-referencing location-based services. Self-referencing location-based services include services such as geocoding, reverse geocoding, route management and navigation which focus on satisfying the location-based requirements of a single mobile device. There is a lack of open-source Software Development Kits for the development of client-side location-based services that are cross-referencing. Cross-referencing location-based services are designed for the sharing of location information amongst different entities on a given network. This project was undertaken to assemble, through incremental prototyping, a client-side Java Micro Edition location-based services Software Development Kit and a Mobicents location server to aid mobile network operators and developers alike in the quick creation of the transport and privacy protection of cross-referencing location-based applications on Session Initiation Protocol bearer networks. The privacy of the location information is protected using geolocation policies. Developers do not need to have an understanding of Session Initiation Protocol event signaling specifications or of the XML Configuration Access Protocol to use the tools that we put together. The developed tools are later consolidated using two sample applications, the friend-finder and child-tracker services. Developer guidelines are also provided, to aid in using the provided tools.
|
713 |
Microstrip Antennas On Electromagnetic Band Gap Substrates For Mobile ApplicationsSudha, T 04 1900 (has links) (PDF)
No description available.
|
714 |
Contribuições e avaliações das arquiteturas para as VPNs convergentes com escalabilidade, segurança e qualidade de serviço / Contributions and assessments for converging VPN architectures with scalability, security and quality of serviceBoava, Adão 18 August 2018 (has links)
Orientador: Yuzo Iano / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-18T15:52:00Z (GMT). No. of bitstreams: 1
Boava_Adao_D.pdf: 10725757 bytes, checksum: b362a8b8e87465a0da12692a4fe7633f (MD5)
Previous issue date: 2011 / Resumo: Os próximos anos prometem ser os das tecnologias das redes de nova geração para as operadoras de telecomunicações, fornecedores de equipamentos e usuários, com ênfase na integração das redes móveis sem fio, como 3G e 4G, com as redes fixas tradicionais, integração essa chamada às vezes de convergência das redes. Como consequência da convergência, vive-se um momento em que várias operadoras de telecomunicações fixas e móveis começaram a oferecer alguns serviços básicos de banda larga e os fornecedores de equipamentos iniciaram o processo de homologação de tais serviços, sendo que basicamente o único serviço disponível pelas operadoras que utilizam as redes de banda larga móveis e fixa é o acesso à internet. Esta tese apresenta alternativas para integrar as redes fixas com as redes móveis das operadoras a fim de oferecer serviços de VPNs (Virtual Private Network) fixo - móveis para aplicações que exijam mobilidade, baixo custo, qualidade de serviço, conectividade e segurança com alta escalabilidade. Para oferecer a mobilidade, são apresentadas as principais soluções de acesso banda larga para a formação de MVPN (Mobile Virtual Private Network). Essas são analisadas e avaliadas a fim de mostrar suas deficiências para utilização em acessos das VPNs. A qualidade de serviço, conectividade, segurança e escalabilidade serão alcançadas com a implementação do protocolo MPLS (Multi-Protocol Label Switching) no núcleo da rede. A implementação do MPLS no núcleo da rede consolida o transporte para as diversas tecnologias de acesso sem fio e com fio, reduzindo os custos operacionais das operadoras e tornando a redes mais escaláveis e confiáveis, preparando, assim, a operadora para as redes de acesso de quarta geração (4G). A partir dos requisitos das aplicações que irão trafegar na VPN, são propostas novas contribuições para as VPNs fixo - móveis para que estas atendam a esses requisitos com alta escalabilidade, mobilidade, segurança, conectividade e qualidade de serviço para o usuário e a operadora. Para validar as novas contribuições propostas, foi implementado um ambiente de teste para avaliar a conectividade e isolamento das VPNs e a qualidade de serviço. Duas propostas para resolver o problema de escalabilidade das VPNs são apresentadas, uma baseada em lista de controle de acesso ACL (Access Control List) e outra baseada em firewall. Também é apresentada uma proposta de IPSec (IP Security Protocol) sobre MPLS para resolver o problema de erros de configuração quando cometidos pelas operadoras de telecom / Abstract: The following years will be dominated by next generation network technology for telecommunication providers, equipment suppliers and users who emphasize the integration of mobile wireless networks such as 3G and 4G with traditional fixed networks - an integration often dubbed as network convergence. As a consequence of convergence, it is possible to observe that various fixed and mobile telecommunication providers are beginning to offer basic broadband services and equipment suppliers have initiated corresponding homologation processes, in which the only service made available by providers that utilize mobile and fixed broadband networks is internet access. This thesis presents alternatives to integrate the fixed and mobile network of providers so as to offer MVPN (Mobile Virtual Private Network) and fixed services for application that require mobility, low cost, quality of service, connectivity and security with high scalability. The main solutions for broadband access for MVPN formation are presented to offer mobility. These solutions are analyzed and assessed in order to show their deficiencies for the utilization in VPN accessing. Quality of service, connectivity, security and scalability will be reached with the implementation of MPLS (Multi-Protocol Label Switching) in the core network. The implementation of MPLS in the core network consolidates transportation for several wireless and fixed access technologies, reducing the operational costs of providers, making networks more scalable and trustworthy, thereby preparing the provider for fourth generation (4G) access networks. Based on the requirements of the applications that will travel in the VPN, new contributions are proposed for fixed-mobile VPNs so that it meets these requirements with high scalability, mobility, security, connectivity and quality of service, both for the user and the provider. To validate the proposed contributions a test environment was implemented to evaluate the connectivity and isolation of the VPNs and the quality of service. Two proposals to solve the VPN scalability problems are presented, one based on ACL (Access Control List) and the other based on firewall. An IPSec (IP Security Protocol) on MPLS proposal is also presented in order to solve configuration errors made by telecommunication providers / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
|
715 |
O efeito do telefone celular no sinal da fala : uma análise fonético-acústica com implicações para a verificação de locutor em português brasileiro / The mobile phone effect over the speech signal : an acoustic-phonetic analysis with implications for speaker verification in Brazilian PortuguesePassetti, Renata Regina, 1981- 27 August 2018 (has links)
Orientador: Plínio Almeida Barbosa / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Estudos da Linguagem / Made available in DSpace on 2018-08-27T03:40:06Z (GMT). No. of bitstreams: 1
Passetti_RenataRegina_M.pdf: 2198292 bytes, checksum: 75f3471d8eeffbfb0346d7705e4ea136 (MD5)
Previous issue date: 2015 / Resumo: Esta dissertação avalia os efeitos causados ao sinal da fala pela transmissão telefônica de linhas móveis e, com isso, busca determinar o grau de modificação fonético-acústica intralocutor causado pelo filtro de banda do canal telefônico à voz habitual e os efeitos que a transmissão telefônica exerce sobre as vogais orais do português brasileiro, pelo estudo de parâmetros acústicos que são afetados por esse tipo de transmissão. As análises investigaram quais características acústicas eram modificadas e quais permaneciam inalteradas na fala de indivíduos diante da utilização de telefones celulares quando comparadas a gravações diretas. O corpus constitui-se de gravações de 10 locutores do sexo masculino, realizadas de forma simultânea nas condições via celular e direta, pelo posicionamento de um microfone em frente aos sujeitos enquanto falavam ao celular. As vogais orais do português brasileiro foram transcritas e segmentadas e, posteriormente, foi utilizado o script ForensicDataTrecking para extração automática das seguintes classes de parâmetros: frequência dos três primeiros formantes (F1, F2 e F3), frequência fundamental (F0), ênfase espectral, frequência de base da fundamental (baseline) e duração interpicos de F0 presentes no discurso. Foram conduzidas análises acústicas com o objetivo investigar os efeitos da transmissão telefônica sobre as vogais orais do português brasileiro, sobre os locutores e no espaço vocálico dos locutores. As análises foram validadas estatisticamente. Para a análise do efeito da transmissão telefônica sobre as vogais orais do português brasileiro, os resultados revelam alterações nas frequências do primeiro e o terceiro formante de, aproximadamente, 14%, na condição telefônica. Em relação às frequências do segundo formante, os resultados da análise de dispersão mostraram que a transmissão telefônica agiu de forma a aumentar artificialmente as frequências de vogais com baixos valores de F2 e a diminuir as frequências de vogais com altos valores de F2. Dos parâmetros acústicos investigados na análise dos efeitos da transmissão telefônica sobre os locutores, apenas a baseline e a duração interpicos de F0 não apresentaram diferenças estatisticamente significativas entre as duas condições de gravação, indicando robustez aos efeitos da transmissão telefônica e podendo ser considerados como parâmetros eficazes na análise forense. Esta análise revelou, também, que a transmissão telefônica agia de maneira distinta nos sujeitos, o que permitiu que fossem agrupados a depender do parâmetro investigado. A análise do efeito telefônico no espaço vocálico dos sujeitos complementou os resultados das análises anteriores. De modo geral, observou-se um abaixamento global do espaço vocálico na gravação telefônica, influenciado pelo aumento nas frequências de F1. A diminuição dos valores de F2 para as vogais anteriores e o aumento nos valores deste formante para vogais posteriores comprimiu o espaço vocálico da maioria dos sujeitos. As modificações nas disposições das vogais têm implicações perceptuais, uma vez que o abaixamento e redução do espaço vocálico fizeram com que as vogais se situassem proximamente a regiões centrais, podendo soar como mais abertas no telefone celular / Abstract: This dissertation evaluates the effects to speech signal due to telephone transmission of mobile phones and seeks to determine the degree of intra-speaker acoustic-phonetic modification caused by the mobile phone band-pass filter to the speech signal and the telephone transmission effects over the Brazilian Portuguese oral vowels by the study of the acoustic parameters affected by this kind of transmission. The analysis investigated which are the acoustic cues which are modified and which cues remain undifferentiated in the speaker's speech by the use of a mobile phone in comparison to direct recordings. The corpus used consists of simultaneous recordings of 10 male speakers in two conditions: via mobile phone and face-to-face, by placing a microphone directly in front of the subjects. The Brazilian Portuguese oral vowels were segmented and transcribed and the ForensicDataEvaluator script was used to automatically extract the following acoustic parameters: three first formants frequencies (F1, F2 and F3), median of fundamental frequency (F0), spectral emphasis, fundamental frequency baseline and F0 inter-peaks duration. The acoustic analyses aimed at investigating the telephone transmission effects over the Brazilian Portuguese oral vowels, over the speakers and at the speakers¿ vowel space. The analyses were supported statistically. The analysis of the telephone transmission effect over the Brazilian Portuguese oral vowels showed variations of 14% in the frequencies of the first and the third formants. The analysis of the scatter plot of F2 values showed that the mobile phone band-pass filtering has an effect of shifting upwards vowels with low values of F2 and shifting downwards vowels with high values of F2. For the analysis of the telephone transmission effects over the speaker only the acoustic parameters "fundamental frequency baseline" and "F0 inter-peaks duration" did not show any difference statistically significant between the two recording conditions, demonstrating robustness to the telephone transmission effects, which make them able to be considered as powerful parameters for forensic analysis. This analysis also revealed that the telephone transmission affects the speakers in different ways, which set them into different groups of speakers depending on the parameter analyzed. The analysis of the telephone effect in the speakers¿ vowel space shed some light on the previous analyses. In general, the increase of the F1 values in the mobile phone situation caused a global downward displacement of the vowel space. The decrease of the F2 values for the front vowels and the increase of the values of this formant for back vowels reduced the area of the vowel space for the most of the subjects. The vowels rearrangement at the vowel space in the telephone situation has some perceptual implications, since the lowering and reduction of the vowel space made the vowels be placed at its center, which could result in hearing these vowels as more open over the mobile phone / Mestrado / Linguistica / Mestra em Linguística
|
716 |
Provisão de qualidade de serviço em redes integradas LTE-EPON / Quality of service provisioning in LTE-EPON integated networksAstudillo Trujillo, Carlos Alberto, 1985- 03 June 2015 (has links)
Orientadores: Nelson Luis Saldanha da Fonseca, Juliana Freitag Borin / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-27T14:47:59Z (GMT). No. of bitstreams: 1
AstudilloTrujillo_CarlosAlberto_M.pdf: 2488879 bytes, checksum: 5004b31fcfcabbbf8528fe73f484da7d (MD5)
Previous issue date: 2015 / Resumo: A crescente demanda por acesso banda larga móvel tem motivado a implantação da tecnologia long term evolution (LTE) pelas operadoras de redes móveis (MNOs), permitindo o fornecimento de novos serviços que demandam alta largura de banda e requisitos rigorosos de qualidade de serviço (QoS). Este aumento da demanda de banda passante leva à necessidade de um grande número de estações rádio base e ao aumento na quantidade de tráfego injetado no backhaul da rede móvel (MBH). Para lidar com os elevados custos do MBH, redes ópticas passivas (PONs) podem ser usadas para reduzir os custos do MBH usando sistemas fiber to anywhere (FTTx) já implantado bem como lidar com a crescente demanda por acesso banda larga à Internet por usuários móveis. Além disso, a estação rádio base LTE, também conhecida como evolved NodeB (eNB), pode ser integrada à unidade de rede óptica (ONU) das PONs em um dispositivo único, chamado ONU-eNB. A ONU-eNB compete pela largura de banda com outras ONUs em PONs, o que pode potencialmente prejudicar o fornecimento de QoS aos usuários móveis. Esta dissertação propõe um framework para provisão de QoS em redes móveis LTE que empregam backhaul baseado em redes ópticas passivas Ethernet (EPONs). Propõe também, um escalonador para redes LTE com o objetivo de prover requisitos de QoS e melhorar a vazão total. O framework introduz uma arquitetura funcional para o dispositivo integrado ONU-eNB, um esquema de mapeamento de QoS e um método para permitir que os escalonadores LTE atuais possam levar em conta informações disponíveis da rede de acesso móvel (LTE) bem com informações sobre a rede de backhaul (EPON), a fim de melhorar o desempenho total da rede, especialmente quando o enlace de backhaul está congestionado. Mostra-se como a implementação do framework proposto melhora a utilização da rede e a provisão de QoS em uma rede integrada, mesmo sob variação da carga de tráfego no backhaul e na rede LTE / Abstract: The increasing demand for mobile broadband access has motivated mobile network operators (MNOs) to deploy the long term evolution (LTE) technology, which allows the support of new services demanding large amount of bandwidth and strict QoS requirements. The growth of bandwidth demands will increase dramatically the number of base stations and the amount of traffic injected into the mobile backhaul (MBH) network. To cope with the high cost of MBH networks, passive optical networks (PONs) can be employed by using the already deployed fiber to anywhere (FTTx) systems. Moreover, the LTE base station, also known as evolved NodeB (eNB), can be integrated with the optical network unit (ONU) in a single device, called ONU-eNB, which competes for bandwidth with other ONUs in PONs. Such competition for bandwidth can jeopardize the support of mobile users¿ quality of service (QoS) requirements. This dissertation proposes a QoS provisioning framework for LTE mobile networks employing Ethernet PON (EPON)-based backhaul. It also introduces a novel LTE scheduler with the aim of supporting QoS requirements as well as high throughput. The framework includes a functional architecture for the ONU-eNB, a QoS mapping scheme and a method to allow current LTE schedulers to take into account both information available from the mobile access network (LTE) and information from the backhaul network (EPON) in order to improve the overall network performance, specially when the backhaul link is congested. It is shown how the proposed framework can improve network utilization and quality of service provisioning in an integrated network even under variations of traffic load in the backhaul and in the LTE networks / Mestrado / Ciência da Computação / Mestre em Ciência da Computação
|
717 |
Mobile order entry system based on the wireless technologyImsuksri, Sumit 01 January 2002 (has links)
The sales representatives primary duties are to attract wholesale and retail buyers and purchasing agents to their merchandise, and to address any of their client's questions or concerns. Aided by a laptop computer connected to the Internet, they can access the customer information and sell products to their customer immediately. This project, a Mobile Order Entry System using cellphones, will give sales representatives as state-of-the-art alternative in accessing anf selling products to their customers through cell phones instead of using laptop computers.
|
718 |
Selected antecedents towards the acceptance of m-payment services and the relationship with attitude and future intentionsMakokoe, Isaac 01 March 2017 (has links)
M. Tech. (Marketing, Faculty of Management Sciences), Vaal University of Technology / Keywords: Mobile payments, usefulness, ease of use, security, attitude, future intentions.
An increased reliance on mobile phones by consumers for making retail purchases has been witnessed over the years. Given the pervasive use of m-payments and the incessant diffusion of innovations in South Africa, it is important for marketers to have knowledge of the right set of factors that enhance consumers’ intent towards favouring m-payments in future encounters. This study draws from the undertones of Davis’s (1989) Technology acceptance Model (TAM). Whereas the theory alludes to the influences of both usefulness and ease of use on consumer attitudes and behaviour, this study further amplifies the salience of cosumer perceptions of security as a salient drive towards m-payment acceptance. This is because m-payments involve moneybased transactions and therefore it is important for consumers to have assurance that they operate along a secure platform. The TAM was nominated as the underlying theory in this research owing to its effectiveness when applied during the initial phases of an innovation, to avoid costly mistakes of implementing innovation attributes that do not offer the requiredset of elements for persuading consumers.
The purpose of this study was to test an integrative research model of the antecedents of mpayment acceptance using a South African sample of consumers. A quantitative study comprising a non-probability snowball sample of 474 consumers aged between 18 and 50 years was conducted in 2016, in and around the five major towns of Southern Gauteng province in South Africa. The structured questionnaire requested respondents to indicate their perceptions regarding the usefulness, ease of use and security of m-payment platforms they have utilised. In addition, the questionnaire relates to consumers’ attitude evaluations of m-payments in general, as well as their intentions to both use and recommending m-payments to others in the future.
Initially, descriptive statistics were performed on the data set, including correlation analysis and multicolinearity testing. Subsequently, structural equation modelling was applied by first, assessing the measurement model using fit indices, confirmatory factor analysis and statistical accuracy tests of reliability and validity. Specification of the measurement model led to the conclusion that the future intentions model was a five-factor structure comprising usefulness, ease of use, security, attitude and future intentions. Thereafter, the results of the structural model (Structural model A) supported the existence of a direct influence between usefulness and security with attitude, while the latter was found to have a direct influence on future intentions. Nevertheless, the relationships between ease of use and attitude was not significant and therefore, alternative hypothesis Ha3 could not be supported in this study leading to the need to specify a
vi
subsequent competing model. Under Structural model B, perceived usefulness is used as both a dependent and an independent variable since it is predicted by perceived ease of use and in turn predicts attitude towards using and behavioural intention to use simultaneously. The results of Structural model B led to the decision to accept the competing model as the ultimate model for this research since the model presents complete evidence of path weights that are greater than 0.20, interpreted as evidence for significant path outcomes.
Insights gained from this study could assist both marketing academics and practitioners to understand the perceptions of consumers towards m-payments. In this regard, if a determination is made that conducting m-payment transactions in secure and effort-free environments could enhance the effectiveness of consumers in their jobs and lives in general, then marketers could be in a better position to deliver a worthwhile innovation solution for South African consumers.
|
719 |
Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of IndividualsNegahban, Arash 08 1900 (has links)
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their computing devices, influence their protective and risky IT behaviors.
|
720 |
Counter-Knowledge: an update on Foucault in the age of mobile communicationSchneider, Ulrich Johannes 16 February 2015 (has links)
In our time, it has become easy to contribute to the general pool of knowledge: Tell somebody about events that have just happened and
think yourself useful, publish a video of a crime and make history, put up
a rumour and ruin someone’s career. My question is: Can we talk about
counter-knowledge when it comes to news-contributors who are not journalists but have mobile phones from which they can send messages and photos? I will first outline why the idea of counter-knowledge is attractive, then sketch it as defined by French philosopher Michel Foucault. My third point is about ways of writing which produce counter-knowledge, before finally asking if sending an image can have the same effect.
|
Page generated in 0.0905 seconds