951 resultados para MOBILE COMMUNICATION
Resumo:
O objetivo principal dessa pesquisa é analisar os processos de comunicação mercadológica que utilizam os celulares como plataforma de divulgação. É intenção da pesquisa conhecer as práticas de mobile marketing realizadas no Brasil e a forma como os conteúdos desenvolvidos para celulares são utilizados na divulgação empresarial. As características dos jovens consumidores conectados, com destaque para a desenvoltura com que transitam nas novas mídias, e as formas como as empresas se comunicam com esses consumidores também fazem parte dos temas abordados neste estudo. Entrevistas em profundidade com profissionais da área foram utilizadas como metodologia para essa pesquisa qualitativa, de cunho exploratório, e os levantamentos bibliográfico e documental serviram como base para a análise das entrevistas. A pesquisa observou que no universo da comunicação móvel é fundamental desenvolver campanhas que proporcionem experiência com as marcas e ofereçam conteúdos relevantes aos consumidores. Contudo, alguns entraves tecnológicos não permitem que, até o presente momento, essas ações sejam expandidas para todos os consumidores brasileiros que possuem um celular.
Resumo:
Third Generation cellular communication systems are expected to support mixed cell architecture in which picocells, microcells and macrocells are used to achieve full coverage and increase the spectral capacity. Supporting higher numbers of mobile terminals and the use of smaller cells will result in an increase in the number of handovers, and consequently an increase in the time delays required to perform these handovers. Higher time delays will generate call interruptions and forced terminations, particularly for time sensitive applications like real-time multimedia and data services. Currently in the Global System for Mobile communications (GSM), the handover procedure is initiated and performed by the fixed part of the Public Land Mobile Network (PLMN). The mobile terminal is only capable of detecting candidate base stations suitable for the handover; it is the role of the network to interrogate a candidate base station for a free channel. Handover signalling is exchanged via the fixed network and the time delay required to perform the handover is greatly affected by the levels of teletraffic handled by the network. In this thesis, a new handover strategy is developed to reduce the total time delay for handovers in a microcellular system. The handover signalling is diverted from the fixed network to the air interface to prevent extra delays due to teletraffic congestion, and to allow the mobile terminal to exchange signalling directly with the candidate base station. The new strategy utilises Packet Reservation Multiple Access (PRMA) technique as a mechanism to transfer the control of the handover procedure from the fixed network to the mobile terminal. Simulation results are presented to show a dramatic reduction in the handover delay as compared to those obtained using fixed channel allocation and dynamic channel allocation schemes.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
Nowadays, road safety and traffic congestion are major concerns worldwide. This is why research on vehicular communication is very vital. In static scenarios vehicles behave typically like in an office network where nodes transmit without moving and with no defined position. This paper analyses the impact of context information on existing popular rate adaptation algorithms. Our simulation was done in MATLAB by observing the impact of context information on these algorithms. Simulation was performed for both static and mobile cases.Our simulations are based on IEEE 802.11p wireless standard. For static scenarios vehicles do not move and without defined positions, while for the mobile case, vehicles are mobile with uniformly selected speed and randomized positions. Network performance are analysed using context information. Our results show that in mobility when context information is used, the system performance can be improved for all three rate adaptation algorithms. That can be explained by that with range checking, when many vehicles are out of communication range, less vehicles contend for network resources, thereby increasing the network performances. © 2013 IEEE.
Resumo:
With recent expansions in technology, mobile computing continues to play a vital role in all aspects of our lives. Digital technology tools such as Web browsing, media tracking, social media, and emailing have made mobile technology more than just a means of communication but has widespread use in business and social networks. Developments in Technologies for Human-Centric Mobile Computing and Applications is a comprehensive collection of knowledge and practice in the development of technologies in human –centric mobile technology. This book focuses on the developmental aspects of mobile technology; bringing together researchers, educators, and practitioners to encourage readers to think outside of the box.
Resumo:
Due to the dynamic and mutihop nature of the Mobile Ad-hoc Network (MANET), voice communication over MANET may encounter many challenges. We set up a subjective quality evaluation model using ITU-T E-model with extension. And through simulation in NS-2, we evaluate how the following factors impact voice quality in MANET: the number of hops, the number of route breakages, the number of communication pairs and the background traffic. Using AODV as the underlying routing protocol, and with the MAC layer changed from 802.11 DCF to 802.11e EDCF, we observe that 802.11e is more suitable for implementating voice communication over MANET. © 2005 IEEE.
Resumo:
Desktop user interface design originates from the fact that users are stationary and can devote all of their visual resource to the application with which they are interacting. In contrast, users of mobile and wearable devices are typically in motion whilst using their device which means that they cannot devote all or any of their visual resource to interaction with the mobile application -- it must remain with the primary task, often for safety reasons. Additionally, such devices have limited screen real estate and traditional input and output capabilities are generally restricted. Consequently, if we are to develop effective applications for use on mobile or wearable technology, we must embrace a paradigm shift with respect to the interaction techniques we employ for communication with such devices.This paper discusses why it is necessary to embrace a paradigm shift in terms of interaction techniques for mobile technology and presents two novel multimodal interaction techniques which are effective alternatives to traditional, visual-centric interface designs on mobile devices as empirical examples of the potential to achieve this shift.
Resumo:
A student-centred approach to teaching has been conceptualized as a key driver in higher education to facilitate understanding of concepts and improve attainment. The occurrence of student study team behaviours is diagnostic of this approach to teaching. However, the extent to which team behaviours are performed outside the parameters of formal teacher-learner environments remains under-researched. This is problematic as it is unclear whether study teams are maintained outside the confines of lectures, and the extent to which they impact on individual student grades. A naturalistic observational study was carried out that utilized short message text service communication as a means to record the frequency of team behaviours within informal environments. The findings suggest the frequency of team behaviours: 1) were positively associated with student grades; 2) increased after lectures independently rated as low in employing a student-centred focus; and 3) were facilitated by students' trait emotional intelligence.
Resumo:
Mobile messaging is an integral and vital part of the mobile industry and contributes significantly to worldwide total mobile service revenues. In today’s competitive world, differentiation is a significant factor in the success of the business communication. SMS (Short Message Service) provides a powerful vehicle for service differentiation. What is missing, however, is the availability of personalized SMS messages. In particular, the exploitation of user profile information allows a selection and content delivery that meets preferences and interests for the individual. Personalization of mobile messages is important in today’s service-oriented society, and has proven to be crucial for the acceptance of services provided by the mobile telecommunication networks. In this paper we focus on user profile description and the mechanism for delivering the relevant information to the mobile user in accordance with his/her profile.
Resumo:
Mobile phones have the potential of fostering political mobilisation. There is a significant political power in mobile technology. Like the Internet, mobile phones facilitate communication and rapid access to information. Compared to the Internet, however, mobile phone diffusion has reached a larger proportion of the population in most countries, and thus the impact of this new medium is conceivably greater. There are now more mobile phones in the UK than there are people (averaging at 121 mobile phones for every 100 people). In this paper, the attempt to use modern mobile technology to handle the General Election, is discussed. The pre-election advertising, election day issues, including the election news and results as they come in, and answering questions via text message regarding the results of current and/or previous general elections are considered.