14 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
em Universidade do Minho
Resumo:
Dissertação de mestrado em Design e Comunicação de Moda
Resumo:
This paper presents a mobile information system denominated as Vehicle-to-Anything Application (V2Anything App), and explains its conceptual aspects. This application is aimed at giving relevant information to Full Electric Vehicle (FEV) drivers, by supporting the integration of several sources of data in a mobile application, thus contributing to the deployment of the electric mobility process. The V2Anything App provides recommendations to the drivers about the FEV range autonomy, location of battery charging stations, information of the electricity market, and also a route planner taking into account public transportations and car or bike sharing systems. The main contributions of this application are related with the creation of an Information and Communication Technology (ICT) platform, recommender systems, data integration systems, driver profile, and personalized range prediction. Thus, it is possible to deliver relevant information to the FEV drivers related with the electric mobility process, electricity market, public transportation, and the FEV performance.
Resumo:
Dissertação de mestrado integrado em Engenharia de Telecomunicações e Informática
Resumo:
Dissertação de mestrado integrado em Engenharia Biomédica (área de especialização em Eletrónica Médica)
Resumo:
Forming suitable learning groups is one of the factors that determine the efficiency of collaborative learning activities. However, only a few studies were carried out to address this problem in the mobile learning environments. In this paper, we propose a new approach for an automatic, customized, and dynamic group formation in Mobile Computer Supported Collaborative Learning (MCSCL) contexts. The proposed solution is based on the combination of three types of grouping criteria: learner’s personal characteristics, learner’s behaviours, and context information. The instructors can freely select the type, the number, and the weight of grouping criteria, together with other settings such as the number, the size, and the type of learning groups (homogeneous or heterogeneous). Apart from a grouping mechanism, the proposed approach represents a flexible tool to control each learner, and to manage the learning processes from the beginning to the end of collaborative learning activities. In order to evaluate the quality of the implemented group formation algorithm, we compare its Average Intra-cluster Distance (AID) with the one of a random group formation method. The results show a higher effectiveness of the proposed algorithm in forming homogenous and heterogeneous groups compared to the random method.
Resumo:
Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
Cultural heritage has arousing the interest of the general public (e.g. tourists), resulting in the increasing number of visitations to archaeological sites. However, many buildings and monuments are severely damaged or completely destroyed, which doesn’t allow to get a full experience of “travelling in time”. Over the years, several Augmented Reality (AR) approaches were proposed to overcome these issues by providing three-dimensional visualization of reconstructed ancient structures in situ. However, most of these systems were made available through heavy and expensive technological bundles. Alternatively, MixAR intends to be a lightweight and cost-effective Mixed Reality system which aims to provide the visualization of virtual ancient buildings reconstructions in situ, properly superimposed and aligned with real-world ruins. This paper proposes and compares different AR mobile units setups to be used in the MixAR system, with low-cost and lightweight requirements in mind, providing different levels of immersion. It was propounded four different mobile units, based on: a laptop computer, a single-board computer (SBC), a tablet and a smartphone, which underwent a set of tests to evaluate their performances. The results show that mobile units based on laptop computer and SBC reached a good overall performance while mobile units based on tablet and smartphone did not meet such a satisfactory result even though they are acceptable for the intended use.
Resumo:
Archeology and related areas have a special interest on cultural heritage sites since they provide valuable information about past civilizations. However, the ancient buildings present in these sites are commonly found in an advanced state of degradation which difficult the professional/expert analysis. Virtual reconstructions of such buildings aim to provide a digital insight of how these historical places could have been in ancient times. Moreover, the visualization of such models has been explored by some Augmented Reality (AR) systems capable of providing support to experts. Their compelling and appealing environments have also been applied to promote the social and cultural participation of general public. The existing AR solutions regarding this thematic rarely explore the potential of realism, due to the following lacks: the exploration of mixed environments is usually only supported for indoors or outdoors, not both in the same system; the adaptation of the illumination conditions to the reconstructed structures is rarely addressed causing a decrease of credibility. MixAR [1] is a system concerned with those challenges, aiming to provide the visualization of virtual buildings augmented upon real ruins, allowing soft transitions among its interiors and exteriors and using relighting techniques for a faithful interior illumination, while the user freely moves in a given cultural heritage site, carrying a mobile unit. Regarding the focus of this paper, we intend to report the current state of MixAR mobile unit prototype, which allows visualizing virtual buildings – properly aligned with real-world structures – based on user's location, during outdoor navigation. In order to evaluate the prototype performance, a set of tests were made using virtual models with different complexities.
Resumo:
Dissertação de Mestrado em Engenharia Informática
Resumo:
This study presents the results of preliminary test on the interaction between fingertip and touch screen. The objective of this study is to identify the fingertip posture when interacting with touch screen devices. Ten participants, 7 males and 3 females, participated in this study. The participants were asked to touch targets on the mobile devices screen by tapping them sequentially and connecting them. The participants performed the tasks in a sitting posture. A tablet with 10 inches screen and a mobile phone with 4 inches screen were used in the study. The results showed that all participants dominantly used their thumb to interact with the mobile phone in single and two hands postures. The common thumb posture adopted by the participants is the combination of the 60° pitch and 0° roll angles. While for interaction with tablet in various postures observed in the study, the participants commonly used their index fingers in the combination of 60° pitch and 0° roll angles. This study also observed the participant with long finger nails touched targets on the mobile devices screen by using her index or middle fingers very low pitch.
Resumo:
An increasing number of m-Health applications are being developed benefiting health service delivery. In this paper, a new methodology based on the principle of calm computing applied to diagnostic and therapeutic procedure reporting is proposed. A mobile application was designed for the physicians of one of the Portuguese major hospitals, which takes advantage of a multi-agent interoperability platform, the Agency for the Integration, Diffusion and Archive (AIDA). This application allows the visualization of inpatients and outpatients medical reports in a quicker and safer manner, in addition to offer a remote access to information. This project shows the advantages in the use of mobile software in a medical environment but the first step is always to build or use an interoperability platform, flexible, adaptable and pervasive. The platform offers a comprehensive set of services that restricts the development of mobile software almost exclusively to the mobile user interface design. The technology was tested and assessed in a real context by intensivists.
Resumo:
Dissertação de mestrado integrado em Engenharia de Telecomunicações e Informática
Simultaneous detection of cyclopiazonic acid and aflatoxin B1 by HPLC in methanol/water mobile phase
Resumo:
A simple procedure for the simultaneous detection of cyclopiazonic acid (CPA) and aflatoxin B1 from fungal extracts is presented, using a methanol and water mobile phase and fluorescence detection. This methodology has been tested with standard solutions of both mycotoxins CPA and Aflatoxin B1 and with methanolic extracts of Aspergillus section Flavi strains, previously characterized for their mycotoxin production profile. Previously available methodology required the use of two different chromatographic runs for these mycotoxins, with distinct columns and detectors (fluorescence detection with a post-column photochemical derivatization (PHRED) for aflatoxin B1 and UV detection for CPA). The proposed method detects both mycotoxins in a single run. Data from these assays will be presented and discussed.