9 resultados para Location-based Game

em Helda - Digital Repository of University of Helsinki


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The parasitic wasps are one of the largest insect groups and their life histories are remarkably variable. Common to all parasitic wasps is that they kill their hosts, which are usually beetles, butterflies and sometimes spiders. Hosts are often at a larval or pupal stage and live in concealed conditions, such as in plant tissue. Parasitic wasps have two main ways of finding their host. 1) They can detect chemical compounds emitted by damaged plant material or released by larvae living in plant tissue, and 2) detect the larvae by sound vibrations. Even though pupae are immobile and silent, and therefore do not cause vibration, parasitoids have, however, adapted to find passive developmental stages by producing vibration themselves by knocking the substrate with their antennae, and then detecting the echoes with their legs. This echolocation allows a parasitoid to locate its potential hosts that are deeply buried in wood. This study focuses on the relationships of the subfamily Cryptinae (Hymenoptera: Ichneumonidae) and related taxa, and the evolution of host location mechanism. There are no earlier studies of the phylogeny of the Cryptinae, and the position of related taxa are unclear. According to the earlier classification, which is entirely intuitional, the Cryptinae is divided into three tribes: Cryptini, Hemigasterini and Phygadeuontini. Further, these tribes are subdiveded into numerous subtribes. This work, based on molecular characters, shows that the cryptine tribes Cryptini, Phygadeuon¬tini and Hemigasterini come out largely as monophyletic groups, thus agreeing with the earlier classification. The earlier subtribal classification had no support. In addition, it is shown that modified antennal structures are associated with host usage of wood-boring coleopteran hosts. The cryptines have a clear modification series on their antennal tips from a simply tip to a hammer-like structure. The species with strongly modified antennae belong mostly to the tribe Cryptini and they utilise wood-boring beetles as hosts. Also, field observations on insect behaviour support this result.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eighty-five new cases of conjunctival melanoma (CM) were diagnosed in Finland between 1967 and 2000. The annual crude incidence of CM was 0.51 per million inhabitants. The average age-adjusted incidence of 0.54 doubled during the study period, analogous to the increase in the incidence of cutaneous malignant melanoma during this period, suggesting a possible role for ultraviolet radiation in its pathogenesis. Nonlimbal tumors were more likely than limbal ones to recur and they were associated with decreased survival. Increasing tumor thickness and recurrence of the primary tumor were other clinical factors related to death from CM. The histopathologic specimens of 85 patients with CM melanoma were studied for cell type, mitotic count, tumor-infiltrating lymphocytes and macrophages, mean vascular density, extravascular matrix loops and networks, and mean diameter of the ten largest nucleoli (MLN). The absence of epithelioid cells, increasing mitotic count and small MLN were associated with shorter time to recurrence according to the Cox univariate regression. None of the histopathologic variables was associated with mortality from CM. Four (5%) patients had a CM limited to the cornea without evidence of a tumor other than primary acquired melanosis of the conjunctiva. Because there are no melanocytes in the cornea, the origin of these melanomas most likely is the limbal conjunctiva. All four corneally displaced CM were limited to the epithelium, and none of the patients developed metastases. An anatomic sub-classification based on my patients and world literature was developed for corneally displaced CM. In 20 patients the metastatic pattern could be determined. Ten patients had initial systemic metastases detected, nine had initial regional metastases, and in one case the two types were detected simultaneously. The patients most likely to develop either type of initial metastases were those with nonlimbal conjunctival melanoma, those with a primary tumor more than 2 mm thick, and those with a recurrent conjunctival melanoma. Approximately two thirds of the patients had limbal CM, a location associated with good prognosis. One third, however, had a primary CM originating outside the limbus. In these patients the chance of developing local recurrences as well as systemic metastases was significantly higher than in patients with limbal CM. Each recurrence accompanies an increased risk of developing metastases, and recurrences contribute to death along with increasing tumor thickness and nonlimbal tumor location. In my data, an equal number of patients with initial locoregional and systemic metastasis existed. Patients with limbal primary tumors less than 2 mm in thickness rarely experienced metastases, unless the tumor recurred. Consequently, the patients most likely to benefit from sentinel lymph node biopsy are those who have nonlimbal tumors, CM that are over 2 mm thick, or recurrent CM. The histopathology of CM differs from that of uveal melanoma. Microvascular factors did not prove to be of prognostic importance, possibly due to the fact that CM at least as often disseminates first to the regional lymph nodes, unlike uveal melanoma that almost always disseminates hematogenously.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since the emergence of service marketing, the focus of service research has evolved. Currently the focus of research is shifting towards value co-created by the customer. Consequently, value creation is increasingly less fixed to a specific time or location controlled by the service provider. However, present service management models, although acknowledging customer participation and accessibility, have not considered the role of the empowered customer who may perform the service at various locations and time frames. The present study expands this scope and provides a framework for exploring customer perceived value from a temporal and spatial perspective. The framework is used to understand and analyse customer perceived value and to explore customer value profiles. It is proposed that customer perceived value can be conceptualised as a function of technical, functional, temporal and spatial value dimensions. These dimensions are suggested to have value-increasing and value-decreasing facets. This conceptualisation is empirically explored in an online banking context and it is shown that time and location are more important value dimensions relative to the technical and functional dimensions. The findings demonstrate that time and location are important not only in terms of having the possibility to choose when and where the service is performed. Customers also value an efficient and optimised use of time and a private and customised service location. The study demonstrates that time and location are not external elements that form the service context, but service value dimensions, in addition to the technical and functional dimensions. This thesis contributes to existing service management research through its framework for understanding temporal and spatial dimensions of perceived value. Practical implications of the study are that time and location need to be considered as service design elements in order to differentiate the service from other services and create additional value for customers. Also, because of increased customer control and the importance of time and location, it is increasingly relevant for service providers to provide a facilitating arena for customers to create value, rather than trying to control the value creation process. Kristina Heinonen is associated with CERS, the Center for Relationship Marketing and Service Management at the Swedish School of Economics and Business Administration

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Housepits have a remarkably short research history as compared to Fennoscandian archaeological research on the Stone Age in general. The current understanding of the numbers and the distribution of Stone Age housepits in the Nordic countries has, for the most part, been shaped by archaeological studies carried out over the last twenty to thirty years. The main subjects of this research are Neolithic housepits, which are archaeological remains of semi-subterranean pithouses. This dissertation consists of five peer-reviewed articles and a synthesis paper. The articles deal with the development of housepits as seen in the data gathered from Finland (the Lake Saimaa area and south-eastern Finland) and Russia (the Karelian Isthmus). This synthesis expands the discussion of the changes observed in the Papers to include Fennoscandian housepit research as a whole. Certain changes in the size, shape, environmental location, and clustering of housepits extended into various cultures and ecological zones in northern Fennoscandia. Previously, the evolution of housepits has been interpreted to have been caused by the adaptation of Neolithic societies to prevailing environmental circumstances or to re-organization following contacts with the agrarian Corded Ware/Battle Axe Cultures spreading to North. This dissertation argues for two waves of change in the pithouse building tradition. Both waves brought with them certain changes in the pithouses themselves and in the practices of locating the dwellings in the environment/landscape. The changes in housepits do not go hand in hand with other changes in material culture, nor are the changes restricted to certain ecological environments. Based on current information, it appears that the changes relate primarily to the spread of new concepts of housing and possibly to new technology, as opposed to representing merely a local response to environmental factors. This development commenced already before the birth of the Corded Ware/Battle Axe Cultures. Therefore, the changes are argued to have resulted from the spreading of new ideas through the same networks that actively distributed commodities, exotic goods, and raw materials over vast areas between the southern Baltic Sea, the north-west Russian forest zone, and Fennoscandia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern smart phones often come with a significant amount of computational power and an integrated digital camera making them an ideal platform for intelligents assistants. This work is restricted to retail environments, where users could be provided with for example navigational in- structions to desired products or information about special offers within their close proximity. This kind of applications usually require information about the user's current location in the domain environment, which in our case corresponds to a retail store. We propose a vision based positioning approach that recognizes products the user's mobile phone's camera is currently pointing at. The products are related to locations within the store, which enables us to locate the user by pointing the mobile phone's camera to a group of products. The first step of our method is to extract meaningful features from digital images. We use the Scale- Invariant Feature Transform SIFT algorithm, which extracts features that are highly distinctive in the sense that they can be correctly matched against a large database of features from many images. We collect a comprehensive set of images from all meaningful locations within our domain and extract the SIFT features from each of these images. As the SIFT features are of high dimensionality and thus comparing individual features is infeasible, we apply the Bags of Keypoints method which creates a generic representation, visual category, from all features extracted from images taken from a specific location. A category for an unseen image can be deduced by extracting the corresponding SIFT features and by choosing the category that best fits the extracted features. We have applied the proposed method within a Finnish supermarket. We consider grocery shelves as categories which is a sufficient level of accuracy to help users navigate or to provide useful information about nearby products. We achieve a 40% accuracy which is quite low for commercial applications while significantly outperforming the random guess baseline. Our results suggest that the accuracy of the classification could be increased with a deeper analysis on the domain and by combining existing positioning methods with ours.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A local algorithm with local horizon r is a distributed algorithm that runs in r synchronous communication rounds; here r is a constant that does not depend on the size of the network. As a consequence, the output of a node in a local algorithm only depends on the input within r hops from the node. We give tight bounds on the local horizon for a class of local algorithms for combinatorial problems on unit-disk graphs (UDGs). Most of our bounds are due to a refined analysis of existing approaches, while others are obtained by suggesting new algorithms. The algorithms we consider are based on network decompositions guided by a rectangular tiling of the plane. The algorithms are applied to matching, independent set, graph colouring, vertex cover, and dominating set. We also study local algorithms on quasi-UDGs, which are a popular generalisation of UDGs, aimed at more realistic modelling of communication between the network nodes. Analysing the local algorithms on quasi-UDGs allows one to assume that the nodes know their coordinates only approximately, up to an additive error. Despite the localisation error, the quality of the solution to problems on quasi-UDGs remains the same as for the case of UDGs with perfect location awareness. We analyse the increase in the local horizon that comes along with moving from UDGs to quasi-UDGs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thunderstorm is a dangerous electrical phenomena in the atmosphere. Thundercloud is formed when thermal energy is transported rapidly upwards in convective updraughts. Electrification occurs in the collisions of cloud particles in the strong updraught. When the amount of charge in the cloud is large enough, electrical breakdown, better known as a flash, occurs. Lightning location is nowadays an essential tool for the detection of severe weather. Located flashes indicate in real time the movement of hazardous areas and the intensity of lightning activity. Also, an estimate for the flash peak current can be determined. The observations can be used in damage surveys. The most simple way to represent lightning data is to plot the locations on a map, but the data can be processed in more complex end-products and exploited in data fusion. Lightning data serves as an important tool also in the research of lightning-related phenomena, such as Transient Luminous Events. Most of the global thunderstorms occur in areas with plenty of heat, moisture and tropospheric instability, for example in the tropical land areas. In higher latitudes like in Finland, the thunderstorm season is practically restricted to the summer season. Particular feature of the high-latitude climatology is the large annual variation, which regards also thunderstorms. Knowing the performance of any measuring device is important because it affects the accuracy of the end-products. In lightning location systems, the detection efficiency means the ratio between located and actually occurred flashes. Because in practice it is impossible to know the true number of actually occurred flashes, the detection efficiency has to be esimated with theoretical methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study aims at identifying the existing and potential resources, as well as recognizing the hinderances, for community-based ecotourism development in the Taita Hills in south-eastern Kenya. The indigenous mountain rain forests on the hills are rich in biodiversity, but severely degraded because of encroachment caused by the dynamics of increased population, socio-politics and economics. The research problems are based on the hypothesis that there is no tourism in the Taita Hills generating income for the local economy and high population density combined with poverty creates a need for alternative employment opportunities as well as for sustainable ways of forest resource management. The data for this study was gathered during two field trips in Kenya, in January-February 2004 and 2005, as a part of the Taita Project within the Department of Geography at the University of Helsinki. The qualitative methods used consist of RRA and PRA techniques, in-depth interviews, a structured questionnaire and literature analysis as well as attendance on excursions and a workshop with conservation experts and officials. Four case areas in the Taita Hills are studied. The study concludes that alternative livelihoods are needed among the Taita Hills´ rural population and community-based ecotourism is seen as a way of bringing financial benefits for households as well as reviving the fading cultural traditions and indigenous knowledge about forest use. The governmental policies, district level development plans and some NGOs support ecotourism development. The Forest Act 2005 forms base for local participation in forest management. The unique natural features, the welcoming Taita-culture and the location in the coastal tourism circle favour Taita Hills. However, this kind of development has its risks, such as too rapid change of sorest usage level and the exposure of communities to an ecotourism treadmill process. The costbenefit ration of marketing for hard ecotourists is generally low and the tourism infrastructure needs upgrading in the Taita Hills. More tight collaboration is important between the different level stakeholders working for conservation and development. Community-based ecotourism in Taita Hills, when carefully planned and managed, could be one opportunity for Kenya to diversify its tourism product supply and for forestadjacent communities to gain tangible benefits on a sustainable basis from forests.