506 resultados para Mobile Computing
Resumo:
Tridiagonal diagonally dominant linear systems arise in many scientific and engineering applications. The standard Thomas algorithm for solving such systems is inherently serial forming a bottleneck in computation. Algorithms such as cyclic reduction and SPIKE reduce a single large tridiagonal system into multiple small independent systems which can be solved in parallel. We have developed portable cyclic reduction and SPIKE algorithm OpenCL implementations with the intent to target a range of co-processors in a heterogeneous computing environment including Field Programmable Gate Arrays (FPGAs), Graphics Processing Units (GPUs) and other multi-core processors. In this paper, we evaluate these designs in the context of solver performance, resource efficiency and numerical accuracy.
Resumo:
This article presents the attitudinal response of rural villagers in Papua New Guinea to mobile telephony, based on a threshold study made during the early stages of its adoption. The research indicates that the introduction of mobile telecommunications has generally been viewed positively, with mobile phones affording social interaction with loved ones. Nonetheless, negative concerns have been strongly felt, notably financial costs and anxiety about mobile phones aiding in the coordination of extramarital liaisons and criminal activities. The communities investigated previously had scant access to modern communication technologies, some still using traditional means such as wooden slit drums, known locally as garamuts. The expansion of mobile network coverage has introduced into communal village life the capability to communicate dyadically and privately at a distance. Investigation into the adoption of mobile phones thus promotes understanding about traditional means of communication and notions of public and private interactions.
Resumo:
Cities and urban spaces around the world are changing rapidly from their origins in the industrialising world to a post-industrial, hard wired landscape. A further embellishment is the advent of mobile media technologies supported by both existing and new communications and computing technology which claim to put the urban dweller at the heart of a new, informed and ‘liberated’ seat of participatory urban governance. This networked, sensor enabled society permits flows of information in a multitude of directions ostensibly empowering the citizenry through ‘smart’ installations such as ‘talking bus stops’ detailing services, delays, transport interconnections and even weather conditions along desired routes. However, while there is considerable potential for creative and transformative kinds of citizen participation, there is also the momentum for ‘function-creep’, whereby vast amounts of data are garnered in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces into governable and predictable arenas of consumption. This article considers questions around the possibilities for retaining and revitalising forms of urban citizenship, set in the context of Marshall’s original premise of civil, social and political citizenship(s) in the middle of the last century, following World War Two and the coming of the modern welfare state.
Resumo:
The rapid change of technological trends in the marketplace has increased the difficulty for social marketers to reach consumers using traditional marketing channels (Della et al., 2008). Traditionally, social marketing interventions have typically used more conventional supporting products and services such as water counters for water conservation or condoms for sex safety. However, recently social marketers are witnessing the diminishing effectiveness of more traditional social products and services in encouraging the uptake and maintenance of behaviour. In light of the technological trends in the marketplace and diminishing effect of previous social products and services (Lefebvre, 2009), social marketers have been encouraged to look to alternate means of delivering valuable offerings...
Resumo:
This research studied distributed computing of all-to-all comparison problems with big data sets. The thesis formalised the problem, and developed a high-performance and scalable computing framework with a programming model, data distribution strategies and task scheduling policies to solve the problem. The study considered storage usage, data locality and load balancing for performance improvement in solving the problem. The research outcomes can be applied in bioinformatics, biometrics and data mining and other domains in which all-to-all comparisons are a typical computing pattern.
Resumo:
The voice of a traditional communication drum can be heard over great distances. Yet now in Papua New Guinea (PNG) it is hearing, by phone, the voice of a loved one who has moved far away from home for work, marriage or studies that brings the greatest delight. As recently as 2007, most areas of this Pacific island nation had no form of telephony available. Apart from radio, modern communication forms have been restricted predominantly to the urban areas where only a small percentage of the people reside. Landline telephones, television, Internet, facsimile machines and so on have never reached the majority of the inhabited areas...
Resumo:
There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.
Resumo:
The concept of cloud computing services (CCS) is appealing to small and medium enterprises (SMEs). However, while there is a significant push by various authorities on SMEs to adopt the CCS, knowledge of the key considerations to adopt the CCS is very limited. We use the technology-organization-environment (TOE) framework to suggest that a strategic and incremental intent, understanding the organizational structure and culture, understanding the external factors, and consideration of the human resource capacity can contribute to sustainable business value from CCS. Using survey data, we find evidence of a positive association between these considerations and the CCS-related business objectives. We also find evidence of positive association between the CCS-related business objectives and CCS-related financial objectives. The results suggest that the proposed considerations can ensure sustainable business value from the CCS. This study provides guidance to SMEs on a path to adopting the CCS with the intention of a long-term commitment and achieving sustainable business value from these services.
Resumo:
There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organizations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.
Resumo:
While mobile phones have become ubiquitous in modern society, the use of mobile phones while driving is increasing at an alarming rate despite the associated crash risks. A significant safety concern is that driving while distracted by a mobile phone is more prevalent among young drivers, a less experienced driving cohort with elevated crash risk. The objective of this study was to examine the gap acceptance behavior of distracted young drivers at roundabouts. The CARRS-Q Advanced Driving Simulator was used to test participants on a simulated gap acceptance scenario at roundabouts. Conflicting traffic from the right approach of a four-legged roundabout were programmed to have a series of vehicles having the gaps between them proportionately increased from two to six seconds. Thirty-two licensed young drivers drove the simulator under three phone conditions: baseline (no phone conversation), hands-free and handheld phone conversations. Results show that distracted drivers started responding to the gap acceptance scenario at a distance closer to the roundabout and approached the roundabout at slower speeds. They also decelerated at faster rates to reduce their speeds prior to gap acceptance compared to non-distracted drivers. Although accepted gap sizes were not significantly different across phone conditions, differences in the safety margins at various gap sizes—measured by Post Encroachment Time (PET) between the driven vehicle and the conflicting vehicle—were statistically significant across phone conditions. PETs for distracted drivers were smaller across different gap sizes, suggesting a lower safety margin taken by distracted drivers compared to non-distracted drivers. The results aid in understanding how cognitive distraction resulting from mobile phone conversations while driving influences driving behavior during gap acceptance at roundabouts.
Resumo:
Stochastic volatility models are of fundamental importance to the pricing of derivatives. One of the most commonly used models of stochastic volatility is the Heston Model in which the price and volatility of an asset evolve as a pair of coupled stochastic differential equations. The computation of asset prices and volatilities involves the simulation of many sample trajectories with conditioning. The problem is treated using the method of particle filtering. While the simulation of a shower of particles is computationally expensive, each particle behaves independently making such simulations ideal for massively parallel heterogeneous computing platforms. In this paper, we present our portable Opencl implementation of the Heston model and discuss its performance and efficiency characteristics on a range of architectures including Intel cpus, Nvidia gpus, and Intel Many-Integrated-Core (mic) accelerators.
Resumo:
Background Despite considerable effort, most smokers relapse within a few months after quitting due to cigarette craving. The widespread adoption of mobile phones presents new opportunities to provide support during attempts to quit. Objective To design and pilot a mobile app "DistractMe" to enable quitters to access and share distractions and tips to cope with cigarette cravings. Methods A qualitative study with 14 smokers who used DistractMe on their mobiles during the first weeks of their quit attempt. Based on interviews, diaries, and log data, we examined how the app supported quitting strategies. Results Three distinct techniques of coping when using DistractMe were identified: diversion, avoidance, and displacement. We further identified three forms of engagement with tips for coping: preparation, fortification, and confrontation. Overall, strategies to prevent cravings and their effects (avoidance, displacement, preparation, and fortification) were more common than immediate coping strategies (diversion and confrontation). Tips for coping were more commonly used than distractions to cope with cravings, because they helped to fortify the quit attempt and provided opportunities to connect with other users of the application. However, distractions were important to attract new users and to facilitate content sharing. Conclusions Based on the qualitative results, we recommend that mobile phone-based interventions focus on tips shared by peers and frequent content updates. Apps also require testing with larger groups of users to assess whether they can be self-sustaining.
Resumo:
Robotic vision is limited by line of sight and onboard camera capabilities. Robots can acquire video or images from remote cameras, but processing additional data has a computational burden. This paper applies the Distributed Robotic Vision Service, DRVS, to robot path planning using data outside line-of-sight of the robot. DRVS implements a distributed visual object detection service to distributes the computation to remote camera nodes with processing capabilities. Robots request task-specific object detection from DRVS by specifying a geographic region of interest and object type. The remote camera nodes perform the visual processing and send the high-level object information to the robot. Additionally, DRVS relieves robots of sensor discovery by dynamically distributing object detection requests to remote camera nodes. Tested over two different indoor path planning tasks DRVS showed dramatic reduction in mobile robot compute load and wireless network utilization.
Resumo:
This report shares findings and insights from an interview study conducted in 2009, with 34 ADF families. These families were identified in the communities of primary schools in both state and Catholic systems with high ADF family enrolments in 3 towns across 2 states, with the assistance of the DCO and their embedded Defence School Transition Aides (DSTAs). In the interviews the parents were invited to describe their history of ADF relocations, and how they managed transitions for each member in terms of school choice, child care arrangements, spouse employment, and educational transitions. Parallel interviews were conducted with 12 teachers and 6 DSTAs across the identified schools to describe how schools cater for mobile ADF families flowing through their classes. Parents were invited to tell the story of their family’s sequence of moves and how each member made the transition, then reflect more generally on what advice they’d give other mobile families. Teachers were asked to describe how they respond to the mobile families in their school community, and to illustrate some of the issues and challenges from the institutional perspective. By offering perspectives from both parents and teachers, the report hopes to facilitate a dialogue between parties to address their common goal – promoting productive continuities in education for children in mobile families.
Resumo:
There is a growing interest to autonomously collect or manipulate objects in remote or unknown environments, such as mountains, gullies, bush-land, or rough terrain. There are several limitations of conventional methods using manned or remotely controlled aircraft. The capability of small Unmanned Aerial Vehicles (UAV) used in parallel with robotic manipulators could overcome some of these limitations. By enabling the autonomous exploration of both naturally hazardous environments, or areas which are biologically, chemically, or radioactively contaminated, it is possible to collect samples and data from such environments without directly exposing personnel to such risks. This paper covers the design, integration, and initial testing of a framework for outdoor mobile manipulation UAV. The framework is designed to allow further integration and testing of complex control theories, with the capability to operate outdoors in unknown environments. The results obtained act as a reference for the effectiveness of the integrated sensors and low-level control methods used for the preliminary testing, as well as identifying the key technologies needed for the development of an outdoor capable system.