Spelling suggestions: "subject:"symbiodinium""
21 |
End-to-end monitoring of mobile services / Övervakning av mobila tjänsterHolmström, Maria January 2003 (has links)
The growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests. This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process. The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services. The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.
|
22 |
Flexible User Interface - FLUSIConrad, Jan January 2006 (has links)
<p>The cellular phone network has been increasing rapidly during the last years. For many people the mobile phone has become an every day gadget with a wide performance and functional range. The usage of technologies like GPRS, HSCSD, EDGE and UMTS as well as the bandwidth of networks and consequently the connectivity of the phones has also increased persistently. Coming along with that, three technologies, which are ubiquitous or pervasive computing, mobile and wireless networks and location-based technologies, are making rapid progress.</p><p>The aim of this thesis is to offer an architecture for a location-based user interface in the intersection of the three technologies mentioned above. The system should work with a minimum of special hardware requirement. Not to overload the user with information, the user interface should be adaptable, context-aware and location-based. The context-data should remain extendible and adaptable.</p>
|
23 |
Flexible User Interface - FLUSIConrad, Jan January 2006 (has links)
The cellular phone network has been increasing rapidly during the last years. For many people the mobile phone has become an every day gadget with a wide performance and functional range. The usage of technologies like GPRS, HSCSD, EDGE and UMTS as well as the bandwidth of networks and consequently the connectivity of the phones has also increased persistently. Coming along with that, three technologies, which are ubiquitous or pervasive computing, mobile and wireless networks and location-based technologies, are making rapid progress. The aim of this thesis is to offer an architecture for a location-based user interface in the intersection of the three technologies mentioned above. The system should work with a minimum of special hardware requirement. Not to overload the user with information, the user interface should be adaptable, context-aware and location-based. The context-data should remain extendible and adaptable.
|
24 |
Achieving Security in Messaging and Personal Content in Symbian PhonesEnany, Ahmed January 2007 (has links)
This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algorithm to secure the mobile content. Due to some of the disadvantages imposed by the Identity Based Cryptography, we recommended using it along with the RSA algorithm. The proposed schemes were implemented in java and tested on an actual device, Nokia N70. In addition, we measured the time required by each of the algorithms we used to encrypt/decrypt a certain number of bytes. We found that the time taken by RSA and Blowfish algorithms will not be noticeable by the user. However, since the implementation of the Identity Based Cryptography we used was not meant to run on mobile devices, we encountered a noticeable delay whenever encrypting/decrypting the data using this algorithm. Securing the SMS messages will make it to be considered as one of the proposed means that could be used to conduct m-commerce. In addition, securing the MMS messages and the mobile content will increase the usability and the reliability of the mobile phones especially to the users on the move. / Phone: +46735731360
|
25 |
Implementation of a manycast protocol for intermittently connected mobile ad hoc networks in disaster areasVergara Alonso, Ekhiotz Jon January 2010 (has links)
Nowadays, the use of mobile phones and other wireless devices has become an indispensable part of daily life. However, the focus of wireless communication is on infrastructure-based networks, making them prone to service outage if for any reason the infrastructure is overloaded or there is no network coverage. This is the case in a disaster area, where the infrastructure that supports the communication may be destroyed or could become useless. Different approaches to complement the exchange of information in these scenarios are emerging as research results. This thesis concerns Random-Walk Gossip (RWG), which is a protocol to disseminate information in disaster areas. RWG is a many-cast protocol for intermittently connected mobile ad hoc networks. The more people can communicate, the more chances of success there are. Therefore, it is useful to investigate the possibility of implementing such protocols on commodity devices. Since Symbian is currently the most widespread mobile phone operating system, this master's thesis presents the implementation of the protocol in that platform. The protocol is also implemented in Linux and Mac OS X in order to provide heterogeneity. Finally, some aspects of the performance of the protocol in different devices are analyzed, studying the CPU load, memory consumption, radio range, energy consumption and response time of different devices using the protocol. The studies show that the use of the RWG protocol in both laptops and handheld devices is viable.
|
26 |
Chatovací systém pro mobilní telefony / Chat system for mobile phonesStarosta, Michal January 2012 (has links)
The aim of this master’s thesis is design and implementation local chat system for mobile devices and smartphones. System contains main server, witch covers communication with application for smartphones and web server, witch covers communications with browsers and presentation application, witch goal is to presenting chat to area. Smartphone ap- plication is crated for Android, iOS, Windows Mobile and Symbian operating systems. Wifi network is used for communication and message sending and signal coverage area defines local chat. Messages are shown dynamically and it’s possible send them as user status to Facebook social network.
|
27 |
Víceuživatelská mapová aplikace pro mobilní zařízení / Multiuser Mapping Application for Mobile DeviceUtěkal, Jan January 2012 (has links)
This thesis presents design and implementation of multiuser mapping application for mobile device. The aim is to create a coordination system intended primarily for controlling mobile units of the Police of the Czech Republic. First, the existing solutions with similar focus are described. Subsequently, the most suitable communication, mapping and database technologies are selected. The next part of this work describes the system design and its implementation. Effectiveness of the system is verified in a series of tests, which deal with the power and data consumption. The thesis concludes with possible extensions of the program and ways of future development.
|
28 |
Short Message ServiceVulnerability Analysis : An attempt to attack the Serial Line on Symbian Smartphone In Orderto Inject Arbitrary SMSIlaghi, Mahya January 2011 (has links)
Short Message Service (SMS) is a permanently available service on mobile phone networks. In addition to text messages, it supports binary messages to provide various services to mobile phones. SMS security has a strong relationship to the security of mobile phones. Due to the open functionality of mobile phone networks, SMS can be exposed to dierent kind of attacks. To cope with the increasing demand for secure SMS, it is crucial to perform a vulnerability analysis of SMS-implementations to nd out potential security vulnerabilities that smartphones may be exposed to. Conducting vulnerability analyses of SMS is dicult, as one would need to send a large amount of SMS through the mobile phone network in order to conduct such analyses. However, if the need for a mobile phone network is removed from the vulnerability analysis, the diculties of performing it can be considerably reduced. Collin Mulliner and Challie Miller (2009) presented a testing platform (without the engagement of a mobile phone network) for this purpose in three popular mobile phone operating systems: the iPhone, Android and Windows Mobile. They claimed that their testing platform could be ported to other smartphone operating systems (OS). Since the Symbian operating system is one of the most popular smartphone platforms, this thesis focuses on how to port this testing platform to the Symbian OS for vulnerability analysis of SMS-implementations. The research methodology behind this study was an experimental research method, conducted by presenting a hypothesis and developing an artifact to test it. This research produced a key finding: that it is not feasible to implement this vulnerability analysis for SMS-implementations on the Symbian OS, when considering the prerequisites that Collin Mulliner and Charlie Miller dened in their work. They claimed that, if there is an application level access to the serial line for the modem or the ability to add or remove the arbitrary driver, then it is feasible to port their testing framework to other operating systems. This research discovers that neither of these conditions exists in the Symbian OS.
|
29 |
Developing a Mobile Extension Application : OptiCaller Application and Provisioning SystemSun, Tao January 2009 (has links)
Today companies (especially large companies whose employees make a lot of international business trips) often have very large telephone bills. While international roaming technically works with GSM, the cost of phone calls from one country to another are often much higher than calls within a country. Despite political pressure to reduce the costs of roaming within the European Union, the cost of phone calls from one country to another are often quite expensive. A cost-saving solution is eagerly desired by many firms. OptiCall Solutions AB has designed an integrated system called the Dial over Data (DoD) solution. In this scheme, a caller sends a data request to the DoD server instead of directly making a call to the party that they wish to speak with. The DoD solution uses an Internet Protocol Private Branch Exchange (IP-PBX) to make two Session Initiation Protocol (SIP) calls, one to the caller and another to the callee, then bridges these two calls. To realize cost savings, the cost of these two calls and the cost of the infrastructure necessary to make the two calls and to bridge them must be lower than the cost of the direct call. Call Through is a service for making cheap international calls which is provided by many telecommunications companies. Instead of making a direct call to the party the caller wants to speak with, the caller makes a call to the local call-through service access number. The caller dials the actual callee’s number after the call is established. The service provider then makes a call to the callee and bridges the two calls. The caller only needs to pay for a local call and the service subscription fee, rather than the expensive international call fee. This can greatly reduce the costs for user who need to make a lot international calls. Today, many companies use such a call-through service in order to reduce the total cost of their employees’ calls. Additionally, the Mobile Extension (MEX) is a concept which gives mobile users the ability to use their mobile phone in the same manner as their fixed office phone, for example, by providing services such as setting presence and transferring a call. In addition, the user should experience a consistent interface, for example the calling number displayed for the callee should always be a number that the callee could use to return the call. In this thesis project, a mobile extension application called ‘OptiCaller’ based on the Symbian OS was developed and evaluated. This application is part of the DoD solution and provides client side functionality. Furthermore, it supports making call-through calls and using the MEX functions. Additionally, it is designed and implemented in a flexible way so that it can work with a variety of different PBX solutions. A provisioning system called ‘OptiCaller Provisioning System’ was also designed and evaluated. This provisioning system was tailored for the ‘OptiCaller’. It provides administrators a platform to manage the OptiCaller application on the end-users’ mobile phones. / Idag har företag (i synnerhet stora företag vars anställda gör en hel del internationella affärsresor) ofta mycket stora telefonräkningar. Även om internationell roaming fungerar tekniskt i GSM så är kostnaden för telefonsamtal från ett land till ett annat ofta mycket högre än samtal inom ett land. Trots politiska påtryckningar för att minska roamingkostnaderna inom EU, så är kostnader för telefonsamtal från ett land till ett annat ofta ganska dyra. En lösning som kan minska dessa kostnader välkomnas av många företag. OptiCall Solutions AB har utvecklat ett integrerat system som kallas Dial över Data (DoD). I detta system skickas först en samtalsbegäran från en klient till en server istället för att klienten direkt ringer ett samtal till den som de vill tala med. DoD systemet använder Internet Protocol Private Branch Exchange (IP-PBX) för att göra två Session Initiation Protocol (SIP) samtal, en till den som ringer och en den uppringda parten. Sedan kopplas dessa två samtal ihop. Värt att beakta är att kostnaden för denna infrastruktur samt att producera två samtal i stället för ett bör vara lägre än kostnaden för ett direkt samtal. Samtalskort är en tjänst för att göra billiga internationella samtal vilket erbjuds av flera telekommunikationsföretag. Istället för att göra ett direkt samtal till den som den uppringande vill tala med, gör först ett samtal till den lokala call-service noden. Med hjälp av en transparent klient så behöver användaren inte själv ringa call-service noden utan det sker helt automatik. Väl besvarat av call-service noden så kopplas samtalet till den destination användaren vill ringa till. Den som ringer behöver bara betala för ett lokalsamtal och tjänstens prenumerationsavgift. Detta kan kraftigt minska kostnaderna för användare som gör en hel del utlandssamtal. Idag är det även många företag som tillhandahåller en sådan funktion till sina anställda för att minska den totala kostnaden för deras samtal. Mobile Extension (MEX) är ett begrepp som ger mobila användare möjlighet att använda sin mobiltelefon på samma sätt som sina fasta kontorstelefon, till exempel genom att tillhandahålla tjänster såsom inställningen närvarostatus och koppling ett samtal. Användaren bör uppleva ett konsekvent gränssnitt, till exempel att det uppringande numret som visas alltid bör kunna användas för att ringa tillbaka till den som ringt. I detta examensarbete har en så kallad mobil anknytning tillämpning "OptiCaller", baserad på Symbian OS, utvecklats och utvärderats. Denna applikation är en del av DoD lösningen och ger funktionalitet på klientsidan. Den har även stöd för samtalskortfunktioner och MEX funktioner. Den är dessutom utformad på ett flexibelt sätt så att den kan arbeta med en rad olika PBX lösningar. Ett system för provisionering anpassat för OptiCaller kallat ”OptiCaller Provisioning System" har också framtagits och utvärderats. Det ger administratören en plattform för att administrera OptiCaller klienter i en större skala och hanterar såväl installation samt inställningar av OptiCaller klienter på mobiltelefoner.
|
30 |
Šifrování SMS pro mobilní komunikaci / SMS Encryption for Mobile CommunicationLisoněk, David January 2008 (has links)
This thesis deals with encryption of short text message (SMS) in mobile communication. Introduction is dedicated to overview of the parts of GSM radiotelephone nets and SMS messages transfer . Next chapter is reserved for description of cryptographic methods especially symetric and asymetric encryptografic aproaches. A design of a SMS messages encryption and decryption techniques is in next. For SMS encryption and sign, there is used the asymetric cypher RSA. Encryption use OAEP padding schema. The public key is saved in certificate. The Symbian OS has been choosen as a suitable platform for programming of mobile devices.
|
Page generated in 0.0815 seconds