506 resultados para Mobile Computing


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Diversity techniques have long been used to combat the channel fading in wireless communications systems. Recently cooperative communications has attracted lot of attention due to many benefits it offers. Thus cooperative routing protocols with diversity transmission can be developed to exploit the random nature of the wireless channels to improve the network efficiency by selecting multiple cooperative nodes to forward data. In this paper we analyze and evaluate the performance of a novel routing protocol with multiple cooperative nodes which share multiple channels. Multiple shared channels cooperative (MSCC) routing protocol achieves diversity advantage by using cooperative transmission. It unites clustering hierarchy with a bandwidth reuse scheme to mitigate the co-channel interference. Theoretical analysis of average packet reception rate and network throughput of the MSCC protocol are presented and compared with simulated results.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The use of mobile devices such as smart phones and tablets in classrooms has been met with mixed sentiments. Some instructors and teachers see them as a distraction and regularly ban their usage. Others who see their potential to enhance learning have started to explore ways to integrate them into their teaching in an attempt to improve student engagement. In this paper we report on a pilot study that forms part of a university-wide project reconceptualising its approach to the student evaluation of learning and teaching. In a progressive decision to embrace mobile technology, the university decided to trial a smart phone app designed for students to check-in to class and leave feedback on the spot. Our preliminary findings from trialling the app indicate that the application establishes a more immediate feedback loop between students and teachers. However, the app’s impact depends on how feedback is shared with students and how the teaching team responds.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper illustrates a field research performed with a team of experts involved in the evaluation of Trippple, a system aimed at supporting the different phases of a tourist trip, in order to provide feedback and insights, both on the functionalities already implemented (that at the time of evaluation were available only as early and very unstable prototypes), and on the functionalities still to be implemented. We show how the involvement of professionals helped to focus on challenging aspects, instead of less important, cosmetic, issues and resulted profitable in terms of early feedback, issues spotted, and improvements suggested

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Modern mobile computing devices are versatile, but bring the burden of constant settings adjustment according to the current conditions of the environment. While until today, this task has to be accomplished by the human user, the variety of sensors usually deployed in such a handset provides enough data for autonomous self-configuration by a learning, adaptive system. However, this data is not fully available at certain points in time, or can contain false values. Handling potentially incomplete sensor data to detect context changes without a semantic layer represents a scientific challenge which we address with our approach. A novel machine learning technique is presented - the Missing-Values-SOM - which solves this problem by predicting setting adjustments based on context information. Our method is centered around a self-organizing map, extending it to provide a means of handling missing values. We demonstrate the performance of our approach on mobile context snapshots, as well as on classical machine learning datasets.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

While substantial research on intelligent transportation systems has focused on the development of novel wireless communication technologies and protocols, relatively little work has sought to fully exploit proximity-based wireless technologies that passengers actually carry with them today. This paper presents the real-world deployment of a system that exploits public transit bus passengers’ Bluetooth-capable devices to capture and reconstruct micro- and macro-passenger behavior. We present supporting evidence that approximately 12% of passengers already carry Bluetooth-enabled devices and that the data collected on these passengers captures with almost 80 % accuracy the daily fluctuation of actual passengers flows. The paper makes three contributions in terms of understanding passenger behavior: We verify that the length of passenger trips is exponentially bounded, the frequency of passenger trips follows a power law distribution, and the microstructure of the network of passenger movements is polycentric.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The social cost of road injury and fatalities is still unacceptable. The driver is often mainly responsible for road crashes, therefore changing the driver behaviour is one of the most important and most challenging priority in road transport. This paper presents three innovative visions that articulate the potential of using Vehicle to Vehicle (V2V) communication for supporting the exchange of social information amongst drivers. We argue that there could be tremendous benefits in socialising cars to influence human driving behaviours for the better and that this aspect is still relevant in the age of looming autonomous cars. Our visions provide theoretical grounding how V2V infrastructure and emerging human–machine interfaces (HMI) could persuade drivers to: (i) adopt better (e.g. greener) driving practices, (ii) reduce drivers aggressiveness towards pro-social driving behaviours, and (iii) reduce risk-taking behaviour in young, particularly male, adults. The visions present simple but powerful concepts that reveal ‘good’ aspects of the driver behaviour to other drivers and make them contagious. The use of self-efficacy, social norms, gamification theories and social cues could then increase the likelihood of a widespread adoption of such ‘good’ driving behaviours.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Background Advances in cancer diagnosis and treatment have significantly improved survival rates, through their subsequent health needs are often not adequately addressed by current health services. National Health and Medical Research Council (NHMRC) Partnerships Project awarded a national collaborative project to develop, trial and evaluate clinical benefits and cost effectiveness of an e-health enabled structured health promotion intervention - The Women’s Wellness after Cancer Program (WWACP). The aim of this e-health enabled multimodal intervention is to improve health related quality of life in women previously treated for target cancers. Aim The WWACP is a 12-week web based, interactive, holistic program. Primary outcomes for this project are to promote a positive change in health-related quality of life (HRQoL) and reduction in Body Mass Index (BMI) in the women undertaking WWACP compared to women who receive usual care. Secondary outcomes include managing other side effects of cancer treatment through evidence-based nutrition and exercise practices, dealing with stress, sleep, menopause and sexuality issues. Methods The single-blinded multi-center randomized controlled trial recruited a toatl of 330 women within 24 months of completion of chemotherapy and /or radiotherapy. Women were randomly assigned to either a usual care or intervention group. Women provided with the intervention were provided with an interactive iBook and journal, web interface, and three virtual consultations by experienced cancer nurses. A variety of methods were utilized, to enable positive self- efficacy and lifestyle changes. These include online coaching with a registered nurse trained in the intervention, plus written educational and health promotional information. The program has been delivered through the e-health enabled interfaces, which enables virtual delivery via desktop and mobile computing devices. Importantly this enables accessibility for rural and regional women in Australia who are frequently geographically disadvantaged in terms of health care provision. Results Research focusing on alternative methods of delivering post treatment / or survivorship care in cancer utilizing web based interfaces is limited, but emerging evidence suggests that Internet interventions can increase psychological and physical wellbeing in cancer patients. The WWACP trial aims to establish the effectiveness of delivery of the program in terms of positive patient outcomes and cost effective, flexibility. The trial will be completed in September and results will be presented at the conference. Conclusions Women after acute hematological, breast and gynecological cancer treatments demonstrate good cancer survival rates and face residual health problems which are amenable to behavioral interventions. The conclusion of active treatment is a key 'teachable moment' in which sustainable positive lifestyle change can be achieved if patients receive education and psychological support which targets key treatment related health problems and known chronic disease risk factors.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impact their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Web applications such as blogs, wikis, video and photo sharing sites, and social networking systems have been termed ‘Web 2.0’ to highlight an arguably more open, collaborative, personalisable, and therefore more participatory internet experience than what had previously been possible. Giving rise to a culture of participation, an increasing number of these social applications are now available on mobile phones where they take advantage of device-specific features such as sensors, location and context awareness. This international volume of book chapters will make a contribution towards exploring and better understanding the opportunities and challenges provided by tools, interfaces, methods and practices of social and mobile technology that enable participation and engagement. It brings together an international group of academics and practitioners from a diverse range of disciplines such as computing and engineering, social sciences, digital media and human-computer interaction to critically examine a range of applications of social and mobile technology, such as social networking, mobile interaction, wikis, twitter, blogging, virtual worlds, shared displays and urban sceens, and their impact to foster community activism, civic engagement and cultural citizenship.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The increasing capability of mobile devices and social networks to gather contextual and social data has led to increased interest in context-aware computing for mobile applications. This paper explores ways of reconciling two different viewpoints of context, representational and interactional, that have arisen respectively from technical and social science perspectives on context-aware computing. Through a case study in agile ridesharing, the importance of dynamic context control, historical context and broader context is discussed. We build upon earlier work that has sought to address the divide by further explicating the problem in the mobile context and expanding on the design approaches.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper explores how game authoring tools can teach processes that transform everyday places into engaging learning spaces. It discusses the motivation inherent in playing games and creating games for others, and how this stimulates an iterative process of creation and reflection and evokes a natural desire to engage in learning. The use of MiLK at the Adelaide Botanic Gardens is offered as a case in point. MiLK is an authoring tool that allows students and teachers to create and share SMS games for mobile phones. A group of South Australian high school students used MiLK to play a game, create their own games and play each other’s games during a day at the gardens. This paper details the learning processes involved in these activities and how the students, without prompting, reflected on their learning, conducted peer assessment, and engaged in a two-way discussion with their teacher about new technologies and their implications for learning. The paper concludes with a discussion of the needs and requirements of 21st century learners and how MiLK can support constructivist and connectivist teaching methods that engage learners and will produce an appropriately skilled future workforce.