96 resultados para cross-platform iOS Android Mobile-development Ionic-Framework Ionic performance-test
Resumo:
Mobile robots are capable of performing spatial displacement motions in different environments. This motions can be calculated based on sensorial data (autonomous robot) or given by an operator (tele operated robot). This thesis is focused on the latter providing the control architecture which bridges the tele operator and the robot’s locomotion system and end effectors. Such a task might prove overwhelming in cases where the robot comprises a wide variety of sensors and actuators hence a relatively new option was selected: Robot Operating System (ROS). The control system of a new robot will be sketched and tested in a simulation model using ROS together with Gazebo in order to determine the viability of such a system. The simulated model will be based on the projected shape and main features of the real machine. A stability analysis will be performed first theoretically and afterwards using the developed model. This thesis concluded that both the physical properties and the control architecture are feasible and stable settling up the ground for further work with the same robot.
Resumo:
The overall objective of the thesis is to design a robot chassis frame which is a bearing structure of a vehicle supporting all mechanical components and providing structure and stability. Various techniques and scientific principles were used to design a chassis frame.Design principles were applied throughout the process. By using Solid-Works software,virtual models was made for chassis frame. Chassis frame of overall dimension 1597* 800*950 mm3 was designed. Center of mass lieson 1/3 of the length from front wheel at height 338mm in the symmetry plane. Overall weight of the chassis frame is 80.12kg. Manufacturing drawing is also provided. Additionally,structural analysis was done in FEMAP which gives the busting result for chassis design by taking into consideration stress and deflection on different kind of loading resembling real life case. On the basis of simulated result, selected material was verified. Resulting design is expected to perform its intended function without failure. As a suggestion for further research, additional fatigue analysis and proper dynamic analysis can be conducted to make the study more robust.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
The aim of this study was to explore adherence to treatment among people with psychotic disorders through the development of user-centered mobile technology (mHealth) intervention. More specifically, this study investigates treatment adherence as well as mHealth intervention and the factors related to its possible usability. The data were collected from 2010 to 2013. First, patients’ and professionals’ perceptions of adherence management and restrictive factors of adherence were described (n = 61). Second, objectives and methods of the intervention were defined based on focus group interviews and previously used methods. Third, views of patients and professionals about barriers and requirements of the intervention were described (n = 61). Fourth, mHealth intervention was evaluated based on a literature review (n = 2) and patients preferences regarding the intervention (n = 562). Adherence management required support in everyday activities, social networks and maintaining a positive outlook. The factors restricting adherence were related to illness, behavior and the environment. The objective of the intervention was to support the intention to follow the treatment guidelines and recommendations with mHealth technology. The barriers and requirements for the use of the mHealth were related to technology, organizational issues and the users themselves. During the course of the intervention, 33 (6%) out of 562 participants wanted to edit the content, timing or amount of the mHealth tool, and 23 (4%) quit the intervention or study before its conclusion. According to the review, mHealth interventions were ineffective in promoting adherence. Prior to the intervention, participants perceived that adherence could be supported, and the use of mHealth as a part of treatment was seen as an acceptable and efficient method for doing so. In conclusion, the use of mHealth may be feasible among people with psychotic disorders. However, clear evidence for its effectiveness in regards to adherence is still currently inconclusive.