110 resultados para mobile telefonia back-end


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research work deals with the problem of modeling and design of low level speed controller for the mobile robot PRIM. The main objective is to develop an effective educational, and research tool. On one hand, the interests in using the open mobile platform PRIM consist in integrating several highly related subjects to the automatic control theory in an educational context, by embracing the subjects of communications, signal processing, sensor fusion and hardware design, amongst others. On the other hand, the idea is to implement useful navigation strategies such that the robot can be served as a mobile multimedia information point. It is in this context, when navigation strategies are oriented to goal achievement, that a local model predictive control is attained. Hence, such studies are presented as a very interesting control strategy in order to develop the future capabilities of the system. In this context the research developed includes the visual information as a meaningful source that allows detecting the obstacle position coordinates as well as planning the free obstacle trajectory that should be reached by the robot

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El artículo presenta una parte de los resultados de una investigación realizada en 2008 donde se describen y analizan actores, contenidos y tendencias del marketing móvil en Cataluña. El marketing móvil está transformando las formas de comunicación publicitaria, ya que, al tratarse de un medio de comunicación unipersonal, directo e interactivo y gozar de una alta implantación en el mercado, hace que sea un instrumento especialmente atractivo para realizar muchos tipos de acciones de marketing. La investigación traza un primer mapa de la situación, propone una serie de categorías de análisis y futuras tendencias y sienta las bases para futuros estudios más específicos sobre marketing móvil.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Remote control systems are a very useful element to control and monitor devices quickly and easily. This paper proposes a new architecture for remote control of Android mobile devices, analyzing the different alternatives and seeking the optimal solution in each case. Although the area of remote control, in case of mobile devices, has been little explored, it may provide important advantages for testing software and hardware developments in several real devices. It can also allow an efficient management of various devices of different types, perform forensic security tasks, etc ... The main idea behind the proposed architecture was the design of a system to be used as a platform which provides the services needed to perform remote control of mobile devices. As a result of this research, a proof of concept was implemented. An Android application running a group of server programs on the device, connected to the network or USB interface, depending on availability. This servers can be controlled through a small client written in Java and runnable both on desktop and web systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Back-focal-plane interferometry is used to measure displacements of optically trapped samples with very high spatial and temporal resolution. However, the technique is closely related to a method that measures the rate of change in light momentum. It has long been known that displacements of the interference pattern at the back focal plane may be used to track the optical force directly, provided that a considerable fraction of the light is effectively monitored. Nonetheless, the practical application of this idea has been limited to counter-propagating, low-aperture beams where the accurate momentum measurements are possible. Here, we experimentally show that the connection can be extended to single-beam optical traps. In particular, we show that, in a gradient trap, the calibration product κ·β (where κ is the trap stiffness and 1/β is the position sensitivity) corresponds to the factor that converts detector signals into momentum changes; this factor is uniquely determined by three construction features of the detection instrument and does not depend, therefore, on the specific conditions of the experiment. Then, we find that force measurements obtained from back-focal-plane displacements are in practice not restricted to a linear relationship with position and hence they can be extended outside that regime. Finally, and more importantly, we show that these properties are still recognizable even when the system is not fully optimized for light collection. These results should enable a more general use of back-focal-plane interferometry whenever the ultimate goal is the measurement of the forces exerted by an optical trap.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Back-focal-plane interferometry is used to measure displacements of optically trapped samples with very high spatial and temporal resolution. However, the technique is closely related to a method that measures the rate of change in light momentum. It has long been known that displacements of the interference pattern at the back focal plane may be used to track the optical force directly, provided that a considerable fraction of the light is effectively monitored. Nonetheless, the practical application of this idea has been limited to counter-propagating, low-aperture beams where the accurate momentum measurements are possible. Here, we experimentally show that the connection can be extended to single-beam optical traps. In particular, we show that, in a gradient trap, the calibration product κ·β (where κ is the trap stiffness and 1/β is the position sensitivity) corresponds to the factor that converts detector signals into momentum changes; this factor is uniquely determined by three construction features of the detection instrument and does not depend, therefore, on the specific conditions of the experiment. Then, we find that force measurements obtained from back-focal-plane displacements are in practice not restricted to a linear relationship with position and hence they can be extended outside that regime. Finally, and more importantly, we show that these properties are still recognizable even when the system is not fully optimized for light collection. These results should enable a more general use of back-focal-plane interferometry whenever the ultimate goal is the measurement of the forces exerted by an optical trap.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A major problem with holographic optical tweezers (HOTs) is their incompatibility with laser-based position detection methods, such as back-focal-plane interferometry (BFPI). The alternatives generally used with HOTs, like high-speed video tracking, do not offer the same spatial and temporal bandwidths. This has limited the use of this technique in precise quantitative experiments. In this paper, we present an optical trap design that combines digital holography and back-focal-plane displacement detection. We show that, with a particularly simple setup, it is possible to generate a set of multiple holographic traps and an additional static non-holographic trap with orthogonal polarizations and that they can be, therefore, easily separated for measuring positions and forces with the high positional and temporal resolutions of laser-based detection. We prove that measurements from both polarizations contain less than 1% crosstalk and that traps in our setup are harmonic within the typical range. We further tested the instrument in a DNA stretching experiment and we discuss an interesting property of this configuration: the small drift of the differential signal between traps.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes preliminary results of a qualitative case study on mobile communication conducted in an elders¿ retirement home in Toronto (Ontario, Canada) in May 2012. This is part of an international research project on the relationship between mobile communications and older people.Secondary data at a Canadian level contextualizes the case study. We focus ondemographic characteristics and on adoption and use of information and communication technologies (ICTs) broken by age.Participants in the study (21 individuals) are between 75 and 98 years of age, thereforewe can consider that the gathered evidence refers to the ¿old¿ older. Mobile phoneusers in the sample describe very specific uses of the mobile phone, while non-usersreport not facing external pressures for adopting that technology. The main channel formediated communication is the landline; in consequences mobile phones ¿when used¿ constitute an extra layer of communication. Finally, when members of the personal network of the individuals live abroad they are more prone to use Internet and Skype. We are also able to find ex-users of both mobile telephony and computers/internet who stopped using these technologies because they did not find any use for them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By means of a qualitative approach I bring insights on the relationship older people (60+) have with mobile communication in a low income district of Lima (Peru). The case study I conducted in September 2013 included interviews and one focus group with 20 inhabitants of San Juan de Miraflores district. The user/non-user dichotomous classification turned out to be too narrow in this context. While some participants reported a common, bidirectional use of the device, restrictions and discontinuities played a role. Some described an asymmetric use of the mobile phone, as they used it exclusively for receiving calls, while never making outgoing calls. Others described discontinuities in ownership, which was the case when their mobile was stolen and they could not replace it immediately. My initial hypothesis is that such restrictions are related to income, skills and age.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.