54 resultados para mobile business intelligence (mobile BI)


Relevância:

50.00% 50.00%

Publicador:

Resumo:

Giving robots the ability to autonomously move around in various real-world environments has been a major goal of AI (artificial intelligence) for quite some time. To this end it is vital for robots to be able to perceive their surroundings in 3D; they must be able to estimate the range of obstacles in their path.

Animals navigate through various uncontrolled environments with seemingly little effort. Flying insects, especially, are quite adept at manoeuvring in complex, unpredictable and possibly hostile and hazardous environments.

In this paper it is shown that very simple motion cues, inspired by the visual navigation of flying insects, can be used to provide a mobile robot with the ability to successfully traverse a corridor environment. Equipping an autonomous mobile robot with the ability to successfully navigate real-word environments (in real-time) constitutes a major challenge for AI and robotics. It is in this area that insect based navigation has something to offer.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Existing business models require RFID tag to transfer its ownership during its life cycle. As a result, a RFID tags might have many owners during its life cycle. However, the transfer of ownership should ensure that previous owners have no information about current owner's data. Physical ownership does not ensure digital ownership transfer given the wireless nature of communication with RFID tags. Most of the proposed protocol in this nature is implacable to address aU existing RFID tag ownership transfer scenarios. Moreover, they have many security concerns and vulnerabilities. In this paper, we have investigated and discussed all existing business cases and their transfer scenarios. To cover all ownership transfer scenarios, we have presented an ownership transfer protocol. The proposed protocol has used modified DiffieHellman algorithm to perform ownership request validation and authentication of involved parties. Performance comparison shows that our protocol is practical to implement passive low-cost RFID tags, securely performs tag ownership transfer and can be used for all existing ownership transfer scenarios.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The development of mobile devices has occurred with unprecedented pace since the late nineties, and the increase of generic services has proliferated in most developed countries, driven by the expanding technological capabilities and performance of mobile platforms. This dissertation investigates how consumer objectives, orientation and behavior can aid in explaining the adoption and use of a new type of mobile devices: "app phones". This dissertation focuses its effort on two focal influences of adoption and use; social influences and competing forces. Through a qualitative case study and field study this dissertation explores early adoption and use of iPhones. The case study is a one-shot cross-sectional case study that investigates five individuals, related through the same social network, and their decision to adopt an iPhone prior to its release in Denmark. This adoption decision engenders high switching costs as adopters lack references to imitate and need skills to unlock and jailbreak their iPhones to make them work on Danish networks. The specific purpose of the case study is to explore how social influences impact mobile users' early adoption decisions, as it is well known in the literature that people with similar characteristics, tastes, and beliefs often associate in the same social networks and, hence, influence each other. The field study is cross-sectional with multiple snapshots and explores fifteen individuals part of the same university study, who recieves an iPhone for a period of seven months short after its release in Denmark. The specific purpose of the field study is to explore how competing forces of iPhone usage influence assimilation, i.e. the degree to which the iPhone is used, over time. The dissertation is reported through four articles and is directed at both academic researchers and practitioners. The study emphasizes the importance of social influences and competing forces in the investigation of adoption and use of certain mobile devices.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Although mobile tablets such as iPads are being used by many managers, there has been a relative dearth of research on the managerial use of the mobile technology. This exploratory study aims toidentify and understand the factors influencing the use of mobile tablets by managers. Semi-structured interviews were conducted with a panel of seven managers who had incorporated mobile tablets into their work routine. The study has found that the mobile tablet is a suitable device for managerial tasks due to these nine main factors: non-routineness, collaborative nature, time-critical, informationcentric, mobility, user friendliness of the interface, reliability, connectivity, and autonomy. Thisexploratory study fills in the research gap and provides a basis to help managers establish a business case for or against mobile tablets adoption.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Pervasive computing is a user-centric mobile computing paradigm, in which tasks should be migrated over different platforms in a shadow-like way when users move around. In this paper, we propose a context-sensitive task migration model that recovers program states and rebinds resources for task migrations based on context semantics through inserting resource description and state description sections in source programs. Based on our model, we design and develop a task migration framework xMozart which extends the Mozart platform in terms of context awareness. Our approach can recover task states and rebind resources in the context-aware way, as well as support multi- modality I/O interactions. The extensive experiments demonstrate that our approach can migrate tasks by resuming them from the last broken points like shadows moving along with the users.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

In this paper, a target tracking controller based on spiking neural network is proposed for autonomous robots. This controller encodes the preprocessed environmental and target information provided by CCD cameras, encoders and ultrasonic sensors into spike trains, which are integrated by a three-layer spiking neural network (SNN). The outputs of SNN are generated based on the competition between the forward/backward neuron pair corresponding to each motor, with the weights evolved by the Hebbian learning. The application to target tracking of a mobile robot in unknown environment verifies the validity of the proposed controller.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Diabetes is one of the leading chronic diseases affecting the lives of millions globally and early detection and treatment of this disease can serve to improve the quality of life for patients as well as suspend further health complications arising from diabetes. Continuous Glucose Monitors (CGM) and Insulin Pumps (IP) have been widely deployed to monitor the sugar levels in the blood stream and inject appropriate amounts of insulin to compensate for the underperforming pancreas functions of the patients’ bodies and thereby may provide appropriate treatment solutions for many diabetic sufferers. With the invention and deployment of Smartphones, the quality and performance associated with treating diabetes has reached new heights, however the privacy and security of mobilebased diabetic systems remain in ongoing challenges. This paper aims to focus on the privacy and security challenges of Mobile-Health (mHealth)-based Diabetic solutions.