89 resultados para Mobile applications (apps)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Teleoperated mobile robotics offer potential use in a variety of different real-world applications including hazardous materials handling, urban search and rescue and explosive ordnance handling and disposal. Recent research discusses the use of Haptic technology in increasing task immersion and teleoperator performance. This work investigates the utility of low-cost, ungrounded tactile haptic interfaces in mobile robotic teleoperation. In order to achieve the desired implementation using only tactile sensation presents distinct challenges. Innovative haptic control methodologies providing the teleoperator with intuitive motion control and task-relevant haptic augmentation are presented within this paper.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The field of electronic noses and gas sensing has been developing rapidly since the introduction of the silicon based sensors. There are numerous systems that can detect and indicate the level of a specific gas. We introduce here a system that is low power, small and cheap enough to be used in mobile robotic platforms while still being accurate and reliable enough for confident use. The design is based around a small circuit board mounted in a plastic case with holes to allow the sensors to protrude through the top and allow the natural flow of gas evenly across them. The main control board consists of a microcontroller PCB with surface mount components for low cost and power consumption. The firmware of the device is based on an algorithm that uses an Artificial Neural Network (ANN) which receives input from an array of gas sensors. The various sensors feeding the ANN allow the microcontroller to determine the gas type and quantity. The Testing of the device involves the training of the ANN with a number of different target gases to determine the weightings for the ANN. Accuracy and reliability of the ANN is validated through testing in a specific gas filled environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigates journalism students’ usage of mobile phone technology when they begin their university studies and considers the implications of these baseline data for journalism education. This paper reports on the findings of three consecutive annual surveys of first year journalism students about their use of the applications available on their mobile phones. The surveys confirm that as well as using their phones to text and call, many are making video calls and most have shot photos and videos on their phones by the time they arrive at university. Many are using their phones to send or publish these images. More than half of the students now go online on their mobile phones. This evidence will inform journalism educators seeking to update their teaching practices and curricula.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) are deployed in numerous mission critical applications in which the network needs to remain active for as long as possible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering stationary WSNs with low resources. In this paper, we determine the additional resources required in implementing these protocols in a mobile WSN.

We present recovery protocols on TinyOS motes for a low-resourced, mobile deployment. We describe the issues we encountered in the implementation. We present times, RAM and ROM needed to run the recovery protocols and compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost increase.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many technological innovations have occurred within the past decade that have revolutionized the banking industry. The most important has been the Internet and the emergence of mobile-commerce (m-commerce). The aim of this paper is to investigate how Wireless Application Protocol (WAP) banking is being implemented with younger adopters. A conceptual model is developed based on the behavioral intentions younger adopters have on WAP banking that is tested through a survey instrument. Social cognitive theory underpins the conceptual model and helps to explain some of the findings from the study. Suggestions for future research are also espoused.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We introduce an architecture for low-cost mobile Health (mHealth) applications that run on health-workers’ existing devices. Moreover, we envision extending the phone’s capabilities with an external to attach “sensor” modules, such as pulse oximeter, ECG and phonocardiogram. Our design principles are frugality and simplicity. We propose a comprehensive solution to aid health-workers in their daily tasks, at a low-cost and high penetration rate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

3-alkylpyrrole to the fabric surface. Direct applications of a conductive paint to the textile surface eliminate the exposure of the substrate to damaging oxidizing agents which allow the coating of more sensitive and delicate substrates. All textiles produced are tested for abrasion resistance and conductivity. For alkyl polypyrrole coated fabrics, the optimum carbon chain lengths are between n=10 and n=14, which result in optimum values of conductivity and solubility. The darkness of the tone is inversely related to the surface resistivity of the resulting conductive fabric. Therefore, deep black coatings have low resistivity whereas light gray coatings on a white fabric surface have higher surface resistivity. Longer alkyl chains result in higher surface resistivity in fabrics. The conductive coating of poly(3-decanylpyrrole) on the textile surface has a better abrasion resistance compared to that of an unsubstituted polypyrrole coating.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The usability of applications designed and developed for mobile devices integral user experience, particularly for current touch-screen mobile devices. This conceptual paper provides a profile of the ways in which mobile device usability evaluation methods are being adapted to better reflect technological. With an increasing capacity for greater user interactivity through a range of tasks and in a variety of contexts, the importance and impact of mobile device context-of-use components is of particular interest to researchers. This requires a need for a shift in evaluation method paradigms with a particular focus on methods involving the user, as part of the overall development process. Having a better understanding of the context-of-use may contribute to improvements in mobile device usability and the overall user experience.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since its establishment, the Android applications market has been infected by a proliferation of malicious applications. Recent studies show that rogue developers are injecting malware into legitimate market applications which are then installed on open source sites for consumer uptake. Often, applications are infected several times. In this paper, we investigate the behavior of malicious Android applications, we present a simple and effective way to safely execute and analyze them. As part of this analysis, we use the Android application sandbox Droidbox to generate behavioral graphs for each sample and these provide the basis of the development of patterns to aid in identifying it. As a result, we are able to determine if family names have been correctly assigned by current anti-virus vendors. Our results indicate that the traditional anti-virus mechanisms are not able to correctly identify malicious Android applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent developments in sensor networks and cloud computing saw the emergence of a new platform called sensor-clouds. While the proposition of such a platform is to virtualise the management of physical sensor devices, we are seeing novel applications been created based on a new class of social sensors. Social sensors are effectively a human-device combination that sends torrent of data as a result of social interactions and social events. The data generated appear in different formats such as photographs, videos and short text messages. Unlike other sensor devices, social sensors operate on the control of individuals via their mobile devices such as a phone or a laptop. And unlike other sensors that generate data at a constant rate or format, social sensors generate data that are spurious and varied, often in response to events as individual as a dinner outing, or a news announcement of interests to the public. This collective presence of social data creates opportunities for novel applications never experienced before. This paper discusses such applications as a result of utilising social sensors within a sensor-cloud environment. Consequently, the associated research problems are also presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Computer haptics has so far been performed on a personal computer (PC). Off the shelf haptic devices provide only PC interfaces and software drivers for control and communication. The new wave of high capable tablet PCs and high end smart phones introduced new platforms for haptic applications. The major problem was to communicate wirelessly to provide user convenience and support mobility which is an essential feature for these platforms. In this paper we provide a wireless layered communication protocol and a hardware setup that enables off the shelf haptic devices to communicate wirelessly with a mobile device. The layers in the protocol enable the change of any hardware components without affecting the data flow. However, the adoption of the wireless interface instead of the wired one comes with the price of speed. Haptic refresh loops require a relatively high refresh rate of 1000 Hz compared to graphics loop which require between 30 and 60 only. An interpolation algorithm was demonstrated to compensate the latency and secure a stable user experience. The introduced setup was tested against portable environments and the users could perform similar functionalities to what are available on a wired setup to a PC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile phone sensing is an emerging area of interest for researchers as smart phones are becoming the core communication device in people's everyday lives. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community healthcare, sensor augmented gaming, virtual reality and smart transportation systems. More and more organizations and people are discovering how mobile phones can be used for social impact, including how to use mobile technology for environmental protection, sensing, and to leverage just-in-time information to make our movements and actions more environmentally friendly. In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Most teacher education programs have online applications. Increasingly teacher education programs are expanding their distance education applications with mobile learning, or m-learning. Although related to online learning, m-learning focuses on the learning opportunities offered by mobile technologies. Mobile learning is a big step towards providing flexible teacher education; it has brought about a new forum for learning, decreased limitations of learning location, and provided learners with choices about how and when they access learning materials. Universities are finding themselves grappling with how best to utilize mobile technologies for learning, while staying within their educational missions and resources. In this paper the mobile devices used in higher education and the current status of mobile technologies as learning tools at universities are described. The background of approaches and methods which are currently in use are also discussed, plus universities and teacher readiness for this transformation are also reviewed. Affordances and constraints are considered.