22 resultados para Mobile applications


Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is well known that interference of the human body affects the performance of the antennas in mobile phone handsets. In this contribution, we investigate the use of miniaturized metallodielectric electromagnetic band gap (MEBG) structures embedded in the case of a mobile handset as a means of decoupling the antenna from the user's hand. The closely coupled MEBG concept is employed to achieve miniaturization of the order of 15:1. Full wave dispersion relations for planar closely coupled MEBG arrays are presented and are validated experimentally. The performance of a prototype handset with an embedded conformal MEBG is assessed experimentally and is compared to a similar prototype without the MEBG. Reduction in the detuning of the antenna because of the human hand by virtue of the MEBG is demonstrated. Moreover, the efficiency of the handset when loaded with a human hand model is shown to improve when the MEBG is in place. The improvements are attributed to the decoupling of the antenna from the user's hand, which is achieved by means of suppressing the fields in the locality of the hand.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This research presents a fast algorithm for projected support vector machines (PSVM) by selecting a basis vector set (BVS) for the kernel-induced feature space, the training points are projected onto the subspace spanned by the selected BVS. A standard linear support vector machine (SVM) is then produced in the subspace with the projected training points. As the dimension of the subspace is determined by the size of the selected basis vector set, the size of the produced SVM expansion can be specified. A two-stage algorithm is derived which selects and refines the basis vector set achieving a locally optimal model. The model expansion coefficients and bias are updated recursively for increase and decrease in the basis set and support vector set. The condition for a point to be classed as outside the current basis vector and selected as a new basis vector is derived and embedded in the recursive procedure. This guarantees the linear independence of the produced basis set. The proposed algorithm is tested and compared with an existing sparse primal SVM (SpSVM) and a standard SVM (LibSVM) on seven public benchmark classification problems. Our new algorithm is designed for use in the application area of human activity recognition using smart devices and embedded sensors where their sometimes limited memory and processing resources must be exploited to the full and the more robust and accurate the classification the more satisfied the user. Experimental results demonstrate the effectiveness and efficiency of the proposed algorithm. This work builds upon a previously published algorithm specifically created for activity recognition within mobile applications for the EU Haptimap project [1]. The algorithms detailed in this paper are more memory and resource efficient making them suitable for use with bigger data sets and more easily trained SVMs.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The widespread availability and demand for multimedia capable devices and multimedia content have fueled the need for high-speed wireless connectivity beyond the capabilities of existing commercial standards. While fiber optic data transfer links can provide multigigabit- per-second data rates, cost and deployment are often prohibitive in many applications. Wireless links, on the contrary, can provide a cost-effective fiber alternative to interconnect the outlining areas beyond the reach of the fiber rollout. With this in mind, the ever increasing demand for multi-gigabit wireless applications, fiber segment replacement mobile backhauling and aggregation, and covering the last mile have posed enormous challenges for next generation wireless technologies. In particular, the unbalanced temporal and geographical variations of spectrum usage along with the rapid proliferation of bandwidth- hungry mobile applications, such as video streaming with high definition television (HDTV) and ultra-high definition video (UHDV), have inspired millimeter-wave (mmWave) communications as a promising technology to alleviate the pressure of scarce spectrum resources for fifth generation (5G) mobile broadband.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a new architecture together with practical results for a high performance analogue retrodirective array architecture with the following significant advantages: (1) It is able to constructively combine signals on receive, as well as on transmit, a feature not seen before on this type of array, (2) It is capable of operating with real life communication received signal levels as low as -120dBm. This work opens the way for fully co-operating Retrodirective arrays for use on un-stabilized co-operating mobile platforms where maximum S/N simultaneously on receive and on retransmit is automatically guaranteed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The future convergence of voice, video and data applications on the Internet requires that next generation technology provides bandwidth and delay guarantees. Current technology trends are moving towards scalable aggregate-based systems where applications are grouped together and guarantees are provided at the aggregate level only. This solution alone is not enough for interactive video applications with sub-second delay bounds. This paper introduces a novel packet marking scheme that controls the end-to-end delay of an individual flow as it traverses a network enabled to supply aggregate- granularity Quality of Service (QoS). IPv6 Hop-by-Hop extension header fields are used to track the packet delay encountered at each network node and autonomous decisions are made on the best queuing strategy to employ. The results of network simulations are presented and it is shown that when the proposed mechanism is employed the requested delay bound is met with a 20% reduction in resource reservation and no packet loss in the network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a feature selection method for data classification, which combines a model-based variable selection technique and a fast two-stage subset selection algorithm. The relationship between a specified (and complete) set of candidate features and the class label is modelled using a non-linear full regression model which is linear-in-the-parameters. The performance of a sub-model measured by the sum of the squared-errors (SSE) is used to score the informativeness of the subset of features involved in the sub-model. The two-stage subset selection algorithm approaches a solution sub-model with the SSE being locally minimized. The features involved in the solution sub-model are selected as inputs to support vector machines (SVMs) for classification. The memory requirement of this algorithm is independent of the number of training patterns. This property makes this method suitable for applications executed in mobile devices where physical RAM memory is very limited. An application was developed for activity recognition, which implements the proposed feature selection algorithm and an SVM training procedure. Experiments are carried out with the application running on a PDA for human activity recognition using accelerometer data. A comparison with an information gain based feature selection method demonstrates the effectiveness and efficiency of the proposed algorithm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of a body-to-body network, where smart communicating devices carried or worn by a person are used to form a wireless network with devices situated on other nearby persons. New innovations in this area will see the form factor of smart devices being modified, so that they may be worn on the human body or integrated into clothing, in the process creating a new generation of smart people. Applications of body-to-body networking will extend well beyond the support of cellular and Wi-Fi networks. They will also be used in short-range covert military applications, first responder applications, team sports and used to interconnect body area networks (BAN). Security will be a major issue as routing between multiple nodes will increase the risk of unauthorized access and compromise sensitive data. This will add complexity to the medium access layer (MAC) and network management. Antennas designed to operate in body centric communications systems may be broadly categorized as on- or off-body radiators, according to their radiation pattern characteristics when mounted on the human body.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: The paper aims to analyse Bottom of the Pyramid (BoP) customers’ (e.g. Bangladeshi farmers) use and appropriation of mobile telephony and to critically identify a suitable research strategy for such investigation.

Design/methodology/approach: Concentrated ethnographic immersion was combined with both methodological and investigator triangulation during a four-month period of fieldwork conducted in Bangladeshi villages to obtain more robust findings. Concentrated immersion was required to achieve relatively speedier engagement owing to the difficulty in engaging with respondents on a long-term basis.

Findings: The farmers’ use of mobile telephony went beyond the initial adoption, as they appropriated it through social and institutional support, inventive means and/or changes in their own lifestyle. The paper argues that technology appropriation, being a result of the mutual shaping of technology, human skills and abilities and macro-environmental factors, enables users to achieve desired outcomes which may not always be the ones envisaged by the original designers.

Research limitations/implications: The paper contributes to two major areas: first, it identifies technology appropriation as an important and emerging concept in international marketing research; second, it suggests a concentrated form of ethnographic engagement for studying technology appropriation in a developing country context.

Practical implications: A good understanding of the dynamic interplay between users’ skills and abilities, social contexts and technological artefacts/applications is required in order for businesses to serve BoP customers profitably.

Originality/value: The paper presents a dynamic model of technology appropriation based on findings collected through a pragmatic approach by combining concentrated ethnographic immersion with methodological and investigator triangulation