819 resultados para internet-based computations
Resumo:
This paper proposes the use of an autonomous assistant mobile robot in order to monitor the environmental conditions of a large indoor area and develop an ambient intelligence application. The mobile robot uses single high performance embedded sensors in order to collect and geo-reference environmental information such as ambient temperature, air velocity and orientation and gas concentration. The data collected with the assistant mobile robot is analyzed in order to detect unusual measurements or discrepancies and develop focused corrective ambient actions. This paper shows an example of the measurements performed in a research facility which have enabled the detection and location of an uncomfortable temperature profile inside an office of the research facility. The ambient intelligent application has been developed by performing some localized ambient measurements that have been analyzed in order to propose some ambient actuations to correct the uncomfortable temperature profile.
Resumo:
Problems in the mobile services are complex where the lack of the user analysis is not the modest issue. User centered design has increasingly become as a basis for the design of mobile services. The concept of user centered design gives end-user extensive attention at each stage of the design process. Mobile service providers want to offer experiences for users and clearly the users look for services that can provide pleasant experiences. In this thesis, the elements of user experience in mobile internet were studied as well as user experience measuring methods were researched. This study was looking for user experience measuring metrics and methods to specify new factors to measure user experience. During this thesis research project an application called CEM4Mobile was designed and implemented. CEM4Mobile is an application for observing and analysing user experience based on the user activity and behaviour. As a result of this thesis, a collection of user experience elements and measuring metrics were found. The elements and metrics were designed and implemented to CEM4Mobile product, which measures user experience. It was found out that the user experience measuring methods were based on interaction between two people but CEM4Mobile makes user observation programmatic.
Resumo:
Research into online addictions has increased substantially over the last decade, particularly amongst youth. This study adapted the Problematic Internet Entertainment Use Scale for Adolescents [PIEUSA] for use with a British population. The adapted scale was used to (i) validate the instrument for English-speaking adolescent samples, (ii) estimate the prevalence of adolescent online problem users and describe their profile, and (iii) assess the accuracy of the scale"s classification of symptomatology. A survey was administered to 1097 adolescents aged between 11 and 18 years. The results indicated that (i) reliability of the adapted scale was excellent; factor validity showed unidimensionality, and construct validity was adequate. The findings also indicated that (ii) prevalence of online problem users was 5.2% and that they were more likely to younger males that engaged in online gaming for more than two hours most days. The majority of online problem users displayed negative addictive symptoms, especially"loss of control" and"conflict". The adapted scale showed (iii) very good sensitivity, specificity, and classification accuracy, and was able to clearly differentiate between problem and non-problem users. The results suggest certain differences between adolescent and adult online problem users based in the predominance of slightly different psychological components.
Resumo:
Internet pankkipalveluiden laatuun kiinnitetään yhä enemmän huomiota. Pankkipalveluiden siirtyessä Internetiin pankit pitävät Internet pankkipalveluiden laatua yhä tärkeämpänä kilpailuelementtinä. Vuosittain tehtävät tutkimukset ja niiden tutkimustulokset Internet pankkipalveluiden laadusta kuvaavat palveluiden kehitystä ja tämänhetkistä tilannetta. Pk-yritysten saaman palvelun laadun arviointi onkin erittäin tärkeää tuottoisan asiakassegmenttinsä ansiosta. Tämän tutkielman tarkoituksena on selvittää Handelsbankenin Internet pankkipalveluiden laatu ja sen ulottuvuudet pk-yrityksille, palvelun markkinoinnin viitekehyksessä. Tutkielman teoreettinen osa perustuu Internet pankkipalveluiden laatua ja toimivuutta käsittelevään tieteelliseen kirjallisuuteen ja artikkeleihin. Empiirisessä osassa tutkitaan sitä, mistä ulottuvuuksista palvelun laatu markkinoinnin kontekstissa muodostuu ja mikä on laadun ulottuvuuksien suhde asiakastyytyväisyyteen ja kehitysmahdollisuuksiin. Empiiriseen tutkimukseen kuuluu kaksi eri osa-aluetta, haastattelututkimus sekä elektronisella kyselylomakkeella toteutettu kyselytutkimus, jossa muun muassa selvitettiin pk-yritysten käsityksiä eri laadun ulottuvuuksista sekä heidän kokemuksiaan palvelun laadusta. Tutkimusote on kvantitatiivinen ja osin myös kvalitatiivinen. Perinteisten pankkipalveluiden laadun ulottuvuuksien lisäksi tutkimuksen tuloksista havaittiin, että Internet pankkipalveluiden laadun uusia ulottuvuuksia ovat palvelualttius, yksilöllinen ja kehittyvä palvelu, palvelun luotettavuus, käytettävyys, saavutettavuus, ”rahoille vastinetta” ja turvallisuus. Tutkimustulokset osoittavat, että Internet pankkipalveluiden laadulla ja etenkin havaituilla uusilla ulottuvuuksilla on yhteys pk-yritysten asiakastyytyväisyyteen.
Resumo:
The overall goal of the study was to describe adoption of information technology (IT)-based patient education (PE) developed for patients and nurses use in psychiatric nursing. The data were collected in three phases during the period 2000-2006 in a variety of psychiatric settings in Finland. Firstly, the development process of IT-based PE for patients with schizophrenia spectrum psychosis was described. Secondly, nurses’ adoption of IT-based PE and the variables explaining adoption were demonstrated. Moreover, use of daily IT-based PE in clinical practice and factors associated with use were identified and described. And thirdly, nurses’ experiences of the IT-based PE after one year clinical use were evaluated. IT-based PE program was developed in several stages based on users’ needs and it included information and multimedia applications. Altogether, almost 500 IT-based PE sessions were carried out by the nurses on the study wards and revealed nurses’ activity in educating patients using IT to vary and depend on the hospital in which they worked. Almost 80% of all the possible IT-based PE sessions involved 93 patients and 83 nurses. Less than 2% of the IT-based PE sessions were interrupted and less than 10% suffered disturbances due to the patients or external causes. Moreover, the patients whose education took more days had poorer mental status than those whose education was carried out over a shorter period. After a year’s experience, advantages and disadvantages were described by the nurses for both patients and nurses of the IT-based PE. IT-based PE can be used even on closed acute psychiatric wards with patients with serious mental health disorders. However, technology adoption requires time, and therefore, it must fit in with clinical practice. Collaboration between users and developers is needed when developing user-centered methods in the area of mental health services. Moreover, it is important to understand factors that affect IT adoption in healthcare settings. IT-based PE is one option in interactive and co-operative health care practice between patients and nurses. Therefore the staff should begin to refer patients to established, credible and well-maintained Internet sites that provide information on common psychological problems. Even if every nurse should be trained and engaged to carry out IT-based PE, by targeting the training especially for the most active nurses aids them to support the less active ones. Adoption should also be understood from a perspective that includes aspects related to the context where it is implemented and examine how and in what circumstances it works.
Resumo:
Since the 1990’s, the Internet has played a central role in our daily lives. The Internet is an integral part of our personal, business, family, research, entertainment, academic and social life. However, there are social implications in using the Internet that are dependent on categories such as gender, age, ethnicity and cultural attributes. This social aspect can play a detrimental role in the expression of human anxiety on the Internet. An anxiety is a complex phenomenon that requires further elaboration. Thus, the aim of this thesis is to investigate human anxiety, or specifically, whether Internet anxiety can be conceptualized and measured. This thesis utilizes literature, qualitative and quantitative research methodologies, and a triangulation validation approach to conceptualize and measure the Internet anxiety phenomenon. In particular, the aim is to explore anxiety levels of Internet participants to develop and validate an Internet anxiety scale based on earlier research on Internet anxiety. The results of the dissertation present a two phase study. In Phase I, a smaller set of studies were conducted with a limited sample size. In Phase II, the research topic was investigated using 385 participants. Based on a number of studies or experiments, the state-of-the-art discovered in this thesis is creation, design, and validation of two scales, the Self-Assessment Scale (SAS) and a Modified Internet Anxiety Scale (MIAS) for measuring users’ anxieties on the Internet. The result of this dissertation is a conceptualization and measurement of various types of Internet anxiety and measurement of affective feelings of users on the Internet. As a proof-of-concept of measuring Internet anxiety, this thesis describes the author’s implementation of three sets of tools: MyAnxiety, introducing Internet anxieties types; Intelligentia, for collecting Internet anxieties types; and MyIAControl tool, implemented as a browser plug-in, for measuring affective feelings of users on the Internet. Conclusions drawn from the results show that these empirically validated scales and tools might be useful for researchers and practitioners in understanding and measuring the Internet anxiety phenomenon further.
Resumo:
With the new age of Internet of Things (IoT), object of everyday such as mobile smart devices start to be equipped with cheap sensors and low energy wireless communication capability. Nowadays mobile smart devices (phones, tablets) have become an ubiquitous device with everyone having access to at least one device. There is an opportunity to build innovative applications and services by exploiting these devices’ untapped rechargeable energy, sensing and processing capabilities. In this thesis, we propose, develop, implement and evaluate LoadIoT a peer-to-peer load balancing scheme that can distribute tasks among plethora of mobile smart devices in the IoT world. We develop and demonstrate an android-based proof of concept load-balancing application. We also present a model of the system which is used to validate the efficiency of the load balancing approach under varying application scenarios. Load balancing concepts can be apply to IoT scenario linked to smart devices. It is able to reduce the traffic send to the Cloud and the energy consumption of the devices. The data acquired from the experimental outcomes enable us to determine the feasibility and cost-effectiveness of a load balanced P2P smart phone-based applications.
Resumo:
Recent advances in Information and Communication Technology (ICT), especially those related to the Internet of Things (IoT), are facilitating smart regions. Among many services that a smart region can offer, remote health monitoring is a typical application of IoT paradigm. It offers the ability to continuously monitor and collect health-related data from a person, and transmit the data to a remote entity (for example, a healthcare service provider) for further processing and knowledge extraction. An IoT-based remote health monitoring system can be beneficial in rural areas belonging to the smart region where people have limited access to regular healthcare services. The same system can be beneficial in urban areas where hospitals can be overcrowded and where it may take substantial time to avail healthcare. However, this system may generate a large amount of data. In order to realize an efficient IoT-based remote health monitoring system, it is imperative to study the network communication needs of such a system; in particular the bandwidth requirements and the volume of generated data. The thesis studies a commercial product for remote health monitoring in Skellefteå, Sweden. Based on the results obtained via the commercial product, the thesis identified the key network-related requirements of a typical remote health monitoring system in terms of real-time event update, bandwidth requirements and data generation. Furthermore, the thesis has proposed an architecture called IReHMo - an IoT-based remote health monitoring architecture. This architecture allows users to incorporate several types of IoT devices to extend the sensing capabilities of the system. Using IReHMo, several IoT communication protocols such as HTTP, MQTT and CoAP has been evaluated and compared against each other. Results showed that CoAP is the most efficient protocol to transmit small size healthcare data to the remote servers. The combination of IReHMo and CoAP significantly reduced the required bandwidth as well as the volume of generated data (up to 56 percent) compared to the commercial product. Finally, the thesis conducted a scalability analysis, to determine the feasibility of deploying the combination of IReHMo and CoAP in large numbers in regions in north Sweden.
Resumo:
Imagine the potential implications of an organization whose business and IT processes are well aligned and are capable of reactively and proactively responding to the external and internal changes. The Philips IT Infrastructure and Operations department (I&O) is undergoing a series of transformation activities to help Philips business keeping up with the changes. I&O would serve a critical function in any business sectors; given that the I&O’s strategy switched from “design, build and run” to “specify, acquire and performance manage”, that function is amplified. In 2013, I&O’s biggest transforming programme I&O Futures engaged multiple interdisciplinary departments and programs on decommissioning legacy processes and restructuring new processes with respect to the Information Technology Internet Library (ITIL), helping I&O to achieve a common infrastructure and operating platform (CI&OP). The author joined I&O Futures in the early 2014 and contributed to the CI&OP release 1, during which a designed model Bing Box and its evaluations were conducted through the lens of six sigma’s structured define-measure-analyze-improve-control (DMAIC) improvement approach. This Bing Box model was intended to firstly combine business and IT principles, namely Lean IT, Agile, ITIL best practices, and Aspect-oriented programming (AOP) into a framework. Secondly, the author implemented the modularized optimization cycles according to the defined framework into Philips’ ITIL-based processes and, subsequently, to enhance business process performance as well as to increase efficiency of the optimization cycles. The unique of this thesis is that the Bing Box model not only provided comprehensive optimization approaches and principles for business process performance, but also integrated and standardized optimization modules for the optimization process itself. The research followed a design research guideline that seek to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts. The Chapter 2 firstly reviewed the current research on Lean Six Sigma, Agile, AOP and ITIL, aiming at identifying the broad conceptual bases for this study. In Chapter 3, we included the process of constructing the Bing Box model. The Chapter 4 described the adoption of Bing Box model: two-implementation case validated by stakeholders through observations and interviews. Chapter 5 contained the concluding remarks, the limitation of this research work and the future research areas. Chapter 6 provided the references used in this thesis.
Resumo:
IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.
Resumo:
The thesis analyzes liability of Internet news portals for third-party defamatory comments. After the case of Delfi AS v. Estonia, decided by the Grand Chamber of the European Court of Human Rights on 16 June 2015, a portal can be held liable for user-generated unlawful comments. The thesis aims at exploring consequences of the case of Delfi for Internet news portals’ business model. The model is described as a mixture of two modes of information production: traditional industrial information economy and new networked information economy. Additionally, the model has a generative comment environment. I name this model “the Delfian model”. The thesis analyzes three possible strategies which portals will likely apply in the nearest future. I will discuss these strategies from two perspectives: first, how each strategy can affect the Delfian model and, second, how changes in the model can, in their turn, affect freedom of expression. The thesis is based on the analysis of case law, legal, and law and economics literature. I follow the law and technology approach in the vein of ideas developed by Lawrence Lessig, Yochai Benkler and Jonathan Zittrain. The Delfian model is researched as an example of a local battle between industrial and networked information economy modes. The thesis concludes that this local battle is lost because the Delfian model has to be replaced with a new walled-garden model. Such a change can seriously endanger freedom of expression.
Resumo:
"Mémoire présenté à la faculté des études supérieures en vue de l'obtention du grade de maîtrise en droit (LL.M.)"
Resumo:
Ce mémoire porte sur les raisons qu’ont de jeunes adultes québécois de discuter ou non de politique sur Internet. Il s’inscrit dans le contexte général de l’avènement du Web 2.0 et dans le contexte particulier des élections canadiennes de mai 2011. Au niveau théorique, nous avons mobilisé la théorie de l’agir communicationnel du philosophe allemand Jürgen Habermas ainsi que sa conception de la sphère publique. Du point de vue méthodologique, nous avons étudié un échantillon composé de jeunes adultes québécois, hommes et femmes, âgés de 19 à 30 ans, qui habitent à Montréal et dans ses environs. Ces jeunes citoyens ont été interrogés dans le cadre de quatre focus groups. Les données recueillies ont été analysées selon une méthode d’extraction des arguments en accord avec la méthodologie de la reconstruction rationnelle. Les résultats ont permis d’exposer plusieurs raisons qu’ont avancées les jeunes adultes interrogés pour expliquer leur degré de participation à des discussions politiques sur Internet. Celles-‐ci ont été regroupées en quatre thèmes: le manque de connaissances et l’aspect public; la conscientisation et l’obtention de feedback; la réaction par rapport au contenu, la composition du réseau et la valeur de l’information; le face à face, l’anonymat et les sujets controversés. Ces résultats ont été discutés en considérant ceux obtenus par d’autres chercheurs afin de faire ressortir les apports de cette étude au domaine de la communication. La discussion a également permis d’adopter un point de vue théorique critique pour explorer ce que les résultats de ce mémoire révèlent sur l’état de la sphère publique québécoise.
Resumo:
À l’heure où l’industrie de l’enregistrement sonore connait un certain nombre de bouleversements, Internet apparait à la fois comme un responsable d’une crise du disque et comme une plate-forme de diffusion et de promotion de la musique enregistrée. C’est dans ce contexte de mutations des industries culturelles que sont les industries de la musique que les labels indépendants voient les possibilités liées à la promotion se multiplier. Notamment par le biais des sites internet que j’envisage ici comme discours encodé et diffusé. Ce mémoire explore deux sites internet officiels de labels indépendants de rap québécois à l’aide de la proposition de la présence du mythe dans le discours de promotion. S’appuyant sur la théorie de Barthes, mon analyse s’articule autour de l’étude de la signification afin de mettre en lumière la façon dont le mythe fonctionne dans le discours. En m’intéressant principalement à l’image et au texte, je mets notamment en valeur le traitement de l’artiste, de la création musicale et du label dans le discours.