47 resultados para Mobile App Design
Resumo:
This thesis describes the design and implementation of a graphical application on a mobile device to teleoperate a mobile robot. The department of information technology in Lappeenranta University conducts research in robotics, and the main motivation was to extend the available teleoperation applications for mobile devices. The challenge was to port existing robot software library onto an embedded device platform, then develop a suitable user interface application that provides sufficient functionality to perform teleoperation tasks over a wireless communication network. This thesis involved investigating previous teleoperation applications and conducted similar experiments to test and evaluate the designed application for functional activity and measure performance on a mobile device which have been identified and achieved. The implemented solution offered good results for navigation purposes particularly for teleoperating a visible robot and suggests solutions for exploration when no environment map for the operator is present.
Resumo:
This thesis discusses the design and implementation of a real-time musical pair improvisation scenario for mobile devices. In the scenario transferring musical information over a network connection was required. The suitability of available wireless communication technologies was evaluated and communication was analyzed and designed on multiple layers of TCP/IP protocol stack. Also an application layer protocol was designed and implemented for the scenario. The implementation was integrated into a mobile musical software for children using available software components and libraries although the used platform lead to hardware and software constraints. Software limitations were taken into account in design. The results show that real-time musical improvisation can be implemented with wireless communication and mobile technology. The results also show that link layer had the most significant effect on real-time communication in the scenario.
Resumo:
The forthcoming media revolution of exchanging paper documents to digital media in construction engineering requires new tools to be developed. The basis of this bachelor’s thesis was to explore the preliminary possibilities of exporting imagery from a Building Information Modelling –software to a mobile phone on a construction yard. This was done by producing a Web Service which uses the design software’s Application Programming Interface to interact with a structures model in order to produce the requested imagery. While mobile phones were found lacking as client devices, because of limited processing power and small displays, the implementation showed that the Tekla Structures API can be used to automatically produce various types of imagery. Web Services can be used to transfer this data to the client. Before further development the needs of the contractor, benefits for the building master and inspector and the full potential of the BIM-software need to be mapped out with surveys.
Resumo:
In recent years, the worldwide distribution of smartphone devices has been growing rapidly. Mobile technologies are evolving fast, a situation which provides new possibilities for mobile learning applications. Along with new delivery methods, this development enables new concepts for learning. This study focuses on the effectiveness and experience of a mobile learning video promoting the key features of a specific device. Through relevant learning theories, mobile technologies and empirical findings, the thesis presents the key elements for a mobile learning video that are essential for effective learning. This study also explores how previous experience with mobile services and knowledge of a mobile handset relate to final learning results. Moreover, this study discusses the optimal delivery mechanisms for a mobile video. The target group for the study consists of twenty employees of a Sanoma Company. The main findings show that the individual experience of learning and the actual learning results may differ and that the design for certain video elements, such as sound and the presentation of technical features, can have an impact on the experience and effectiveness of a mobile learning video. Moreover, a video delivery method based on cloud technologies and HTML5 is suggested to be used in parallel with standalone applications.
Resumo:
Personalised ubiquitous services have rapidly proliferated due technological advancements in sensing, ubiquitous and mobile computing. Evolving societal trends, business and the economic potential of Personal Information (PI) have overlapped the service niches. At the same time, the societal thirst for more personalised services has increased and are met by soliciting deeper and more privacy invasive PI from customers. Consequentially, reinforcing traditional privacy challenges and unearthed new risks that render classical safeguards ine ective. The absence of solutions to criticise personalised ubiquitous services from privacy perspectives, aggravates the situation. This thesis presents a solution permitting users' PI, stored in their mobile terminals to be disclosed to services in privacy preserving manner for personalisation needs. The approach termed, Mobile Electronic Personality Version 2 (ME2.0), is compared to alternative mechanisms. Within ME2.0, PI handling vulnerabilities of ubiquitous services are identi ed and sensitised on their practices and privacy implications. Vulnerability where PI may leak through covert solicits, excessive acquisitions and legitimate data re-purposing to erode users privacy are also considered. In this thesis, the design, components, internal structures, architectures, scenarios and evaluations of ME2.0 are detailed. The design addresses implications and challenges leveraged by mobile terminals. ME2.0 components and internal structures discusses the functions related to how PI pieces are stored and handled by terminals and services. The architecture focusses on di erent components and their exchanges with services. Scenarios where ME2.0 is used are presented from di erent environment views, before evaluating for performance, privacy and usability.
Resumo:
RFID-tekniikka on radiotaajuudella toimivaa etätunnistusta, jossa hyödynnetään RFID-tunnisteiksi kutsuttuja tageja, sekä RFID-lukijoita. RFID-tekniikan käyttökohteet ovat erittäin laajat. Tässä kandidaatintyössä tutkitaan RFID-tekniikan hyödyntämismahdollisuuksia teollisuuden huoltopalvelusuhteessa. Työ keskittyy huollettavien laitteiden etätunnistamiseen mobiileja RFID-lukijoita hyödyntäen. Laitteiden tiedot noudetaan olemassa olevasta tietokannasta web-käyttöliittymän kautta. Koska laitteet koostuvat pääosin metallista, joudutaan tunnistetyyppien valintaa pohtimaan tarkasti. Metallipinnat sekä nesteet vaikuttavat erittäin negatiivisesti useiden tunnisteiden lukuetäisyyteen. Työssä keskitytään vaadittavan järjestelmän suunnittelemiseen aikaisempia tutkimuksia hyödyntäen, mutta itse järjestelmän toteutus ei kuulu tähän kandidaatintyöhön. Lopussa järjestelmän alustava suunnitelma esitellään.
Resumo:
This doctoral thesis presents a study on the design of tooth-coil permanent magnet synchronous machines. The electromagnetic properties of concentrated non-overlapping winding permanent magnet synchronous machines, or simply tooth-coil permanent magnet synchronous machines (TC-PMSMs), are studied in details. It is shown that current linkage harmonics play the deterministic role in the behavior of this type of machines. Important contributions are presented as regards of calculation of parameters of TC-PMSMs,particularly the estimation of inductances. The current linkage harmonics essentially define the air-gap harmonic leakage inductance, rotor losses and localized temporal inductance variation. It is proven by FEM analysis that inductance variation caused by the local temporal harmonic saturation results in considerable torque ripple, and can influence on sensorless control capabilities. Example case studies an integrated application of TC-IPMSMs in hybrid off-highway working vehicles. A methodology for increasing the efficiency of working vehicles is introduced. It comprises several approaches – hybridization, working operations optimization, component optimization and integration. As a result of component optimization and integration, a novel integrated electro-hydraulic energy converter (IEHEC) for off-highway working vehicles is designed. The IEHEC can considerably increase the operational efficiency of a hybrid working vehicle. The energy converter consists of an axial-piston hydraulic machine and an integrated TCIPMSM being built on the same shaft. The compact assembly of the electrical and hydraulic machines enhances the ability to find applications for such a device in the mobile environment of working vehicles.Usage of hydraulic fluid, typically used in working actuators, enables direct-immersion oil cooling of designed electrical machine, and further increases the torque- and power- densities of the whole device.
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Mobile applications market shows one of the highest growth rates for the market of intellectual products. The market is attractive to investors, despite the fact that the major companies of this industry already firmly consolidated its position. Experts predict the growth of the market for mobile applications with the development of mobile technologies in general. To demonstrate the explosive growth of the market and the scale of its impact, it is worth recalling the mobile game Angry Birds, which was able to achieve a huge reach and formed a full-fledged media brand, comparable to the film industry brands. The reasons why some games become popular and others not, are important for understanding the driving factors of the games industry. The Master’s Thesis explores the factors for mobile games applications popularity and ranking and propose recommendations for mobile games app store optimization of app representation. It discovers particular features of mobile games applications and releases’ influence on their popularity. Also the study assumes usage of such business models as The Business Model Canvas by Osterwalder and The Lean Startup Methodology by Ries, and describes the best practices of mobile application development process and market positioning. Moreover, the Master’s Thesis gives examples of multiple case studies about successful mobile apps developers.
Resumo:
The recent emergence of a new generation of mobile application marketplaces has changed the business in the mobile ecosystems. The marketplaces have gathered over a million applications by hundreds of thousands of application developers and publishers. Thus, software ecosystems—consisting of developers, consumers and the orchestrator—have emerged as a part of the mobile ecosystem. This dissertation addresses the new challenges faced by mobile application developers in the new ecosystems through empirical methods. By using the theories of two-sided markets and business ecosystems as the basis, the thesis assesses monetization and value creation in the market as well as the impact of electronic Word-of-Mouth (eWOM) and developer multihoming— i. e. contributing for more than one platform—in the ecosystems. The data for the study was collected with web crawling from the three biggest marketplaces: Apple App Store, Google Play and Windows Phone Store. The dissertation consists of six individual articles. The results of the studies show a gap in monetization among the studied applications, while a majority of applications are produced by small or micro-enterprises. The study finds only weak support for the impact of eWOM on the sales of an application in the studied ecosystem. Finally, the study reveals a clear difference in the multi-homing rates between the top application developers and the rest. This has, as discussed in the thesis, an impact on the future market analyses—it seems that the smart device market can sustain several parallel application marketplaces.
Resumo:
Science has revolutionized the human life. The advance progress in science and research is making human life easier and more comfortable. The new and emerging technology of micro drone is penetrating and widening the scientific research. This thesis is a part of work in which a unique work is carried out, although related research paper and journal are available. Design and development of automatic charging station for a ready to fly quadcopter is rare and unusual work. The work is carried out as an standard engineering process that include requirements gathering, creating the required document (this thesis is a part of required document as well), selection of suitable hardware, configuring the hardware, generate the code for software, uploading code to the microcontroller, troubleshooting and rectification, finalized prototype and testing. Thesis describe how mechatronics engineering is useful in generating a customized and unique project. At the starting phase of this project (before purchasing a ready to fly quadcopter) every single aspect of this work was known. The only unknown alternatives was a battery and charger. Several task was achieved including design and development of automatic charging station, accurate landing and telecast a live video on additional screen. At starting it was decided that quadcopter should follow the mobile robot, during study it was concluded there is no such quadcopter available in market to auto follow a robot indoor. This works starts with a market survey and comparing the different brands of quadcopter that meets all the requirements and specifications of the mobile robot assembly. Selection of quadcopter is a result of discussion and meeting with the team members, supervisor, professor and project manage.
Resumo:
The vast majority of our contemporary society owns a mobile phone, which has resulted in a dramatic rise in the amount of networked computers in recent years. Security issues in the computers have followed the same trend and nearly everyone is now affected by such issues. How could the situation be improved? For software engineers, an obvious answer is to build computer software with security in mind. A problem with building software with security is how to define secure software or how to measure security. This thesis divides the problem into three research questions. First, how can we measure the security of software? Second, what types of tools are available for measuring security? And finally, what do these tools reveal about the security of software? Measuring tools of these kind are commonly called metrics. This thesis is focused on the perspective of software engineers in the software design phase. Focus on the design phase means that code level semantics or programming language specifics are not discussed in this work. Organizational policy, management issues or software development process are also out of the scope. The first two research problems were studied using a literature review while the third was studied using a case study research. The target of the case study was a Java based email server called Apache James, which had details from its changelog and security issues available and the source code was accessible. The research revealed that there is a consensus in the terminology on software security. Security verification activities are commonly divided into evaluation and assurance. The focus of this work was in assurance, which means to verify one’s own work. There are 34 metrics available for security measurements, of which five are evaluation metrics and 29 are assurance metrics. We found, however, that the general quality of these metrics was not good. Only three metrics in the design category passed the inspection criteria and could be used in the case study. The metrics claim to give quantitative information on the security of the software, but in practice they were limited to evaluating different versions of the same software. Apart from being relative, the metrics were unable to detect security issues or point out problems in the design. Furthermore, interpreting the metrics’ results was difficult. In conclusion, the general state of the software security metrics leaves a lot to be desired. The metrics studied had both theoretical and practical issues, and are not suitable for daily engineering workflows. The metrics studied provided a basis for further research, since they pointed out areas where the security metrics were necessary to improve whether verification of security from the design was desired.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Työn tarkoituksena on antaa Etelä-Karjalan sosiaali- ja terveyspiirin (Eksote) Hyvis –palvelun nettiportaalille muutosehdoituksia koskien nettisivujen ulkoasua, käytettävyyteen liittyviä seikkoja sekä ideoita brändinrakentamiseen verrattuna maailmalta löytyneisiin palkittuihin terveysalan sivustoihin. Työn tavoitteena on löytää mahdollisimman hyvä ohjenuora nettisivujen toiminnallisiin ja ulkoisiin tapoihin sekä käytänteihin, joiden ansiosta brändille voidaan luoda lisäarvoa nettisivujen välityksellä. Työn tuloksina tuli esiin sivujen kategorioinnin tärkeys, jolla voidaan selkeyttää sivujen rakennetta sekä se helpottaa sivuilla navigointia ja tiedonhakua. Kuvien käyttäminen linkkien ja tekstien yhteydessä oli tulosten mukaan suotavaa. Jokainen tarkasteltava sivu sisälsi responsiivisuuden sekä mobiili- ja tablettioptimoinnin, joten se oli yksi tärkeimmistä tutkimuksessa saaduista tuloksista. Sosiaalinen media oli myös kovasti käytössä jokaisen tutkittavan sivun kohdalla.
Resumo:
The User Experience (UX) designers are undoubtedly aware of how many UX design methods currently exist and that sometimes it becomes a problem to choose an appropriate one. What are all of methods that designers have in their “arsenal”? When can they use them? This thesis presents the research on the design methods in the contemporary context of User Experience (UX) and Innovations by using a survey approach. The study is limited to cover the domain of consumer mobile services development and provider companies around the world. The study follows 2 clear objectives: (1) to understand what design methods are currently used in that context and to what extent they are used (2) to identify at what stage according to the UX design thinking process for creating innovations they are placed. The study contributes to the research in the field of UX design and Innovations and extends the knowledge in that field together with communities’ (UXPA, SIGCHI, SIGSOFT) members’ cooperation. The research is vital due to lack of information on design practices and their application in the chosen context.