926 resultados para Mobile Social Android
Desenvolupament d'interfícies d'usuari i visualització d'imatge mèdica en dispositius mòbils Android
Resumo:
Aquest treball tracta sobre la realització d’una aplicació per a dispositius Android que permeti visualitzar imatges mèdiques. Amb la col·laboració del parc Taulí de Sabadell s’han realitzat tasques de recerca de requeriments com l’elaboració d’una entrevista o la realització d’una maqueta de paper que s’ha sotmès a una avaluació heurística en un procés iteratiu. Finalment, s’ha implementat una aplicació on es poden visualitzar imatges mèdiques, fer accions sobre elles com canviar el color o fer zoom i accedir a informació del pacient.
Resumo:
We deal with a system of prisoner’s dilemma players undergoing continuous motion in a two-dimensional plane. In contrast to previous work, we introduce altruistic punishment after the game. We find punishing only a few of the cooperator-defector interactions is enough to lead the system to a cooperative state in environments where otherwise defection would take over the population. This happens even with soft nonsocial punishment (where both cooperators and defectors punish other players, a behavior observed in many human populations). For high enough mobilities or temptations to defect, low rates of social punishment can no longer avoid the breakdown of cooperation
Resumo:
Mobile technology plays an increasing role in interpersonal communication,representing a useful resource for different age cohorts. While the usage ofmobile communication by younger people has received a wide attention fromcommunication scholars, its usage by older people is less explored. Thegoal of our research project is to analyse the usage of mobile phones by theelderly in Italy. We conducted 51 semi-structured interviews in Rome and in amid-range town located in Umbria, between October 2013 and February 2014.Our study explores older users¿ motivations and usage practices, their perceptions of mobile phones, theiradoption and domestication of mobile phones, their usage skills. More specifically,our analysis focuses on: - personal characteristics - personal networks (personalnetwork composition, self-perceived social life, communication channels) -adoption of mobile telephone - consumption patterns of mobile devices - usedmobile services - location and mobility of mobile telephone - current mobilecharacteristics - attitude and opinions towards mobile technology Our preliminaryresults show major differences in users¿ behaviours and perceptions, that canbe related to age cohorts (younger olds vs older olds); socio-cultural levels;vital trajectories (in terms of professional and familiar status); and gender.
Resumo:
Increasing usage of Web Services has been result of efforts to automate Web Services discovery and interoperability. The Semantic Web Service descriptions create basis for automatic Web Service information management tasks such as discovery and interoperability. The discussion of opportunities enabled by service descriptions have arisen in recent years. The end user has been considered only as a consumer of services and information sharing occurred from one service provider to public in service distribution. The social networking has changed the nature of services. The end user cannot be seen anymore only as service consumer, because by enabling semantically rich environment and right tools, the end user will be in the future the producer of services. This study investigates the ways to provide for end users the empowerment to create service descriptions on mobile device. Special focus is given to the changed role of the end user in service creation. In addition, the Web Services technologies are presented as well as different Semantic Web Service description approaches are compared. The main focus in the study is to investigate tools and techniques to enable service description creation and semantic information management on mobile device.
Resumo:
The purpose of this thesis was to study how certificates could be used to improve security of mobile devices. In the theoretical part the usage of certificates to improve security is explained. In the practical part a concept of certificate handling middleware is introduced and implemented. This is to demonstrate what kind of functionality is needed to provide an improvement over the current situation in security with mobile devices. The certificate handling middleware is a concept that would work better if implemented directly into mobile device's core functionality. Many of the mobile devices have a certificate store to some degree and often it is not used to store other people's certificates. A certificate store combined with address book and added with possibility to add attributes to the people such as group memberships would be sufficient to satisfy the needs of many emerging sharing and social applications.
Resumo:
This study presents a review of theories of the so-called post-industrial society, and proposes that the concept of post-industrial society can be used to understand the recent developments of the World Wide Web, often described as Web 2.0 or social Web. The study combines theories ranging from post-war management science and cultural studies to software development, and tries to build a holistic view of the development of the post-industrial society, and especially the Internet. The discourse on the emergence of a post-industrial society after the World Wars has addressed the ways in which the growing importance of information, and innovations in digital communications technology, are changing our society. It is furthermore deeply connected with the discourse on the postmodern society, which emphasizes cultural fragmentation, intertextuality, and pluralism. The Internet age is characterized by increasing masses of information that are managed through various technologies. While 1990s Internet technologies often used the network as a traditional broadcasting channel with added interactivity, Web 2.0 technologies are specifically designed to utilize the network model by facilitating communication between various services and devices, and analyzing the relationships between users and objects in order to produce intelligent insight. The wide adoption of the Internet, and recently of Internet-enabled mobile devices, is furthermore continuously producing new ways of communicating, consuming, and producing. Applications of the social Web, such as social media or social networking services, are permanently changing our traditional social, cultural, and economic practices. The study first presents an overview of the post-industrial society, the Internet, and the concept of Web 2.0. Then the concept of social Web is described with an analysis of the term social media, the brief histories of the interactive Web and social networking services, and a description of the concept ―long tail‖, used to represent the masses of information available in the Web that do not receive mainstream attention. Finally, methods for retrieving and filtering information, modeling social and cultural relationships, and communicating with customers, are presented.
Resumo:
This research is an analysis of the value and content of local service offerings that enable longer periods of living at home for elderly people. Mobile health care and new distribution services have provided an interesting solution in this context. The research aim to shed light on the research question, ‘How do we bundle services based on different customer needs?’ A research process consisting of three main phases was applied for this purpose. During this process, elderly customers were segmented, the importance of services was rated and service offerings were defined. Value creation and service offering provides theoretical framework for the research. The target group is South Karelia’s 60 to 90-year old individuals and the data has been acquired via a postal questionnaire. Research has been conducted as exploratory research utilizing the methods of quantitative and social network analysis. The main results of the report are identified customer segments and service packages that fits to the segments’ needs. The results indicate the needs of customers and the results are additionally analysed from the producer’s point of view. In addition to the empirical results, the used theory framework has been developed further in order for the service-related theories to be seen from the customer’s point of view and not just from the producer’s point of view.
Resumo:
Tässä työssä esiteltiin Android laitteisto- ja sovellusalustana sekä kuvattiin, kuinka Android-pelisovelluksen käyttöliittymä voidaan pitää yhtenäisenä eri näyttölaitteilla skaalauskertoimien ja ankkuroinnin avulla. Toisena osiona työtä käsiteltiin yksinkertaisia tapoja, joilla pelisovelluksien suorituskykyä voidaan parantaa. Näistä tarkempiin mittauksiin valittiin matalatarkkuuksinen piirtopuskuri ja näkymättömissä olevien kappaleiden piilotus. Mittauksissa valitut menetelmät vaikuttivat demosovelluksen suorituskykyyn huomattavasti. Tässä työssä rajauduttiin Android-ohjelmointiin Java-kielellä ilman ulkoisia kirjastoja, jolloin työn tuloksia voi helposti hyödyntää mahdollisimman monessa eri käyttökohteessa.
Resumo:
Battery consumption in mobile applications development is a very important aspect and has to be considered by all the developers in their applications. This study will present an analysis of different relevant concepts and parameters that may have impact on energy consumption of Windows Phone applications. This operating system was chosen because there is limited research even though there are related studies for Android an iOS operating systems. Furthermore, another reason is the increasing number of Windows Phone users. The objective of this research is to categorise the energy consumption parameters (e.g. use of one thread or several thread for the same output). The result for each group of experiment will be analyzed and a rule will be derived. The set of derived rules will serve as a guide for developers who intend to develop energy efficient Windows Phone applications. For each experiment, one application is created for each concept and the results are presented in two ways: a table and a chart. The table presents the duration of the experiment, the battery consumed by the experiment, the expected battery lifetime and the energy consumption, while the charts display the energy distribution based on the main threads: UI thread, application thread and network thread.
Resumo:
The purpose of this research was to study the marketing of mobile applications. The main objective was to find out what are the most efficient ways of marketing to increase the sales for a mobile application within a highly competitive marketplace. The marketplaces, app stores, are studied from the perspective of size, ease of entry, competition and customers and their purchasing process. The study also includes research on what are some of the main marketing methods used in mobile app marketing in general. The study consists of two parts, theoretical and empirical research. Theoretical research was done by studying past scientific research on the chosen subjects. As the subject is very new, the research was also extended to other publications from the field of mobile technology. The empirical part was done through interviews and empirical experiments with a case-company, which were used to answer the main objective of this study. These experiments showed that the chosen methods of mobile app marketing, app store optimization, localization and selected social media marketing activities, created the most sales when used together. Positive results were seen also when the activities were conducted by themselves, but together they were able to push the case company to their all time best results. However the key to succeeding and hitting high positions in the app store rankings would most likely require creating a solid marketing strategy, trying out other marketing activities alongside the ones used here, without forgetting to stay on top of mobile technology trends.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
The aim of this study was to explore adherence to treatment among people with psychotic disorders through the development of user-centered mobile technology (mHealth) intervention. More specifically, this study investigates treatment adherence as well as mHealth intervention and the factors related to its possible usability. The data were collected from 2010 to 2013. First, patients’ and professionals’ perceptions of adherence management and restrictive factors of adherence were described (n = 61). Second, objectives and methods of the intervention were defined based on focus group interviews and previously used methods. Third, views of patients and professionals about barriers and requirements of the intervention were described (n = 61). Fourth, mHealth intervention was evaluated based on a literature review (n = 2) and patients preferences regarding the intervention (n = 562). Adherence management required support in everyday activities, social networks and maintaining a positive outlook. The factors restricting adherence were related to illness, behavior and the environment. The objective of the intervention was to support the intention to follow the treatment guidelines and recommendations with mHealth technology. The barriers and requirements for the use of the mHealth were related to technology, organizational issues and the users themselves. During the course of the intervention, 33 (6%) out of 562 participants wanted to edit the content, timing or amount of the mHealth tool, and 23 (4%) quit the intervention or study before its conclusion. According to the review, mHealth interventions were ineffective in promoting adherence. Prior to the intervention, participants perceived that adherence could be supported, and the use of mHealth as a part of treatment was seen as an acceptable and efficient method for doing so. In conclusion, the use of mHealth may be feasible among people with psychotic disorders. However, clear evidence for its effectiveness in regards to adherence is still currently inconclusive.
Resumo:
Human-Centered Design (HCD) is a well-recognized approach to the design of interactive computing systems that supports everyday and professional lives of people. To that end, the HCD approach put central emphasis on the explicit understanding of users and context of use by involving users throughout the entire design and development process. With mobile computing, the diversity of users as well as the variety in the spatial, temporal, and social settings of the context of use has notably expanded, which affect the effort of interaction designers to understand users and context of use. The emergence of the mobile apps era in 2008 as a result of structural changes in the mobile industry and the profound enhanced capabilities of mobile devices, further intensify the embeddedness of technology in the daily life of people and the challenges that interaction designers face to cost-efficiently understand users and context of use. Supporting interaction designers in this challenge requires understanding of their existing practice, rationality, and work environment. The main objective of this dissertation is to contribute to interaction design theories by generating understanding on the HCD practice of mobile systems in the mobile apps era, as well as to explain the rationality of interaction designers in attending to users and context of use. To achieve that, a literature study is carried out, followed by a mixed-methods research that combines multiple qualitative interview studies and a quantitative questionnaire study. The dissertation contributes new insights regarding the evolving HCD practice at an important time of transition from stationary computing to mobile computing. Firstly, a gap is identified between interaction design as practiced in research and in the industry regarding the involvement of users in context; whereas the utilization of field evaluations, i.e. in real-life environments, has become more common in academic projects, interaction designers in the industry still rely, by large, on lab evaluations. Secondly, the findings indicate on new aspects that can explain this gap and the rationality of interaction designers in the industry in attending to users and context; essentially, the professional-client relationship was found to inhibit the involvement of users, while the mental distance between practitioners and users as well as the perceived innovativeness of the designed system are suggested in explaining the inclination to study users in situ. Thirdly, the research contributes the first explanatory model on the relation between the organizational context and HCD; essentially, innovation-focused organizational strategies greatly affect the cost-effective usage of data on users and context of use. Last, the findings suggest a change in the nature of HCD in the mobile apps era, at least with universal consumer systems; evidently, the central attention on the explicit understanding of users and context of use shifts from an early requirements phase and continual activities during design and development to follow-up activities. That is, the main effort to understand users is by collecting data on their actual usage of the system, either before or after the system is deployed. The findings inform both researchers and practitioners in interaction design. In particular, the dissertation suggest on action research as a useful approach to support interaction designers and further inform theories on interaction design. With regard to the interaction design practice, the dissertation highlights strategies that encourage a more cost-effective user- and context-informed interaction design process. With the continual embeddedness of computing into people’s life, e.g. with wearable devices and connected car systems, the dissertation provides a timely and valuable view on the evolving humancentered design.
Resumo:
Mémoire numérisé par la Division de la gestion de documents et des archives de l'Université de Montréal.
Resumo:
A summary of white papers on Android, IOS, Symbian and Series 40 Mobile Operating Systems