982 resultados para Capacità teorica, Capacità pratica, Blocco fisso, Blocco mobile, Qualità della circolazione, Velocità
Resumo:
Portable music players have made it possible to listen to a personal collection of music in almost every situation, and they are often used during some activity to provide a stimulating audio environment. Studies have demonstrated the effects of music on the human body and mind, indicating that selecting music according to situation can, besides making the situation more enjoyable, also make humans perform better. For example, music can boost performance during physical exercises, alleviate stress and positively affect learning. We believe that people intuitively select different types of music for different situations. Based on this hypothesis, we propose a portable music player, AndroMedia, designed to provide personalised music recommendations using the user’s current context and listening habits together with other user’s situational listening patterns. We have developed a prototype that consists of a central server and a PDA client. The client uses Bluetooth sensors to acquire context information and logs user interaction to infer implicit user feedback. The user interface also allows the user to give explicit feedback. Large user interface elements facilitate touch-based usage in busy environments. The prototype provides the necessary framework for using the collected information together with other user’s listening history in a context- enhanced collaborative filtering algorithm to generate context-sensitive recommendations. The current implementation is limited to using traditional collaborative filtering algorithms. We outline the techniques required to create context-aware recommendations and present a survey on mobile context-aware music recommenders found in literature. As opposed to the explored systems, AndroMedia utilises other users’ listening habits when suggesting tunes, and does not require any laborious set up processes.
Resumo:
Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
While mobile phones have become ubiquitous in modern society, the use of mobile phones while driving is increasing at an alarming rate despite the associated crash risks. A significant safety concern is that driving while distracted by a mobile phone is more prevalent among young drivers, a less experienced driving cohort with elevated crash risk. The objective of this study was to examine the gap acceptance behavior of distracted young drivers at roundabouts. The CARRS-Q Advanced Driving Simulator was used to test participants on a simulated gap acceptance scenario at roundabouts. Conflicting traffic from the right approach of a four-legged roundabout were programmed to have a series of vehicles having the gaps between them proportionately increased from two to six seconds. Thirty-two licensed young drivers drove the simulator under three phone conditions: baseline (no phone conversation), hands-free and handheld phone conversations. Results show that distracted drivers started responding to the gap acceptance scenario at a distance closer to the roundabout and approached the roundabout at slower speeds. They also decelerated at faster rates to reduce their speeds prior to gap acceptance compared to non-distracted drivers. Although accepted gap sizes were not significantly different across phone conditions, differences in the safety margins at various gap sizes—measured by Post Encroachment Time (PET) between the driven vehicle and the conflicting vehicle—were statistically significant across phone conditions. PETs for distracted drivers were smaller across different gap sizes, suggesting a lower safety margin taken by distracted drivers compared to non-distracted drivers. The results aid in understanding how cognitive distraction resulting from mobile phone conversations while driving influences driving behavior during gap acceptance at roundabouts.
Resumo:
Background Despite considerable effort, most smokers relapse within a few months after quitting due to cigarette craving. The widespread adoption of mobile phones presents new opportunities to provide support during attempts to quit. Objective To design and pilot a mobile app "DistractMe" to enable quitters to access and share distractions and tips to cope with cigarette cravings. Methods A qualitative study with 14 smokers who used DistractMe on their mobiles during the first weeks of their quit attempt. Based on interviews, diaries, and log data, we examined how the app supported quitting strategies. Results Three distinct techniques of coping when using DistractMe were identified: diversion, avoidance, and displacement. We further identified three forms of engagement with tips for coping: preparation, fortification, and confrontation. Overall, strategies to prevent cravings and their effects (avoidance, displacement, preparation, and fortification) were more common than immediate coping strategies (diversion and confrontation). Tips for coping were more commonly used than distractions to cope with cravings, because they helped to fortify the quit attempt and provided opportunities to connect with other users of the application. However, distractions were important to attract new users and to facilitate content sharing. Conclusions Based on the qualitative results, we recommend that mobile phone-based interventions focus on tips shared by peers and frequent content updates. Apps also require testing with larger groups of users to assess whether they can be self-sustaining.
Resumo:
This report shares findings and insights from an interview study conducted in 2009, with 34 ADF families. These families were identified in the communities of primary schools in both state and Catholic systems with high ADF family enrolments in 3 towns across 2 states, with the assistance of the DCO and their embedded Defence School Transition Aides (DSTAs). In the interviews the parents were invited to describe their history of ADF relocations, and how they managed transitions for each member in terms of school choice, child care arrangements, spouse employment, and educational transitions. Parallel interviews were conducted with 12 teachers and 6 DSTAs across the identified schools to describe how schools cater for mobile ADF families flowing through their classes. Parents were invited to tell the story of their family’s sequence of moves and how each member made the transition, then reflect more generally on what advice they’d give other mobile families. Teachers were asked to describe how they respond to the mobile families in their school community, and to illustrate some of the issues and challenges from the institutional perspective. By offering perspectives from both parents and teachers, the report hopes to facilitate a dialogue between parties to address their common goal – promoting productive continuities in education for children in mobile families.
Resumo:
There is a growing interest to autonomously collect or manipulate objects in remote or unknown environments, such as mountains, gullies, bush-land, or rough terrain. There are several limitations of conventional methods using manned or remotely controlled aircraft. The capability of small Unmanned Aerial Vehicles (UAV) used in parallel with robotic manipulators could overcome some of these limitations. By enabling the autonomous exploration of both naturally hazardous environments, or areas which are biologically, chemically, or radioactively contaminated, it is possible to collect samples and data from such environments without directly exposing personnel to such risks. This paper covers the design, integration, and initial testing of a framework for outdoor mobile manipulation UAV. The framework is designed to allow further integration and testing of complex control theories, with the capability to operate outdoors in unknown environments. The results obtained act as a reference for the effectiveness of the integrated sensors and low-level control methods used for the preliminary testing, as well as identifying the key technologies needed for the development of an outdoor capable system.
Resumo:
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications. © 2009 IEEE.
Resumo:
Mobile dating applications (‘apps’) have increased in popularity over recent years, with Tinder among the first to break into the mainstream heterosexual market. Since mobile dating intensifies the need to confirm that potential dates are not misrepresenting themselves and are safe to meet in person, Tinder’s success indicates that it has allayed these concerns regarding the authenticity of its users. This article combines Giddens’ conceptualization of authenticity, as the ability to reference a coherent biographical narrative, with Callon’s sociology of translation to investigate Tinder’s framing of authenticity within mobile dating. Applying a walkthrough method that interrogates Tinder’s technological architecture, promotional materials, and related media, this hybrid theoretical framework is used to identify how Tinder configures an actor-network that establishes its app as the solution to users’ concerns, enrols individuals in using its features in authenticity claims, and popularizes Tinder’s framing across public discourse. This network of human and non-human actors frames authenticity as being established through one’s Facebook profile and adherence to normative standards relating to age, gender, ethnicity, and socioeconomic status. However, user discourses on other social media identify and challenge negative outcomes of this framing, with normativity fostering discrimination and Facebook verification failing to prevent abusive behavior. This case study of Tinder paves the way for future investigation into user responses to its framing. Further, it demonstrates the efficacy and broader applicability of this theoretical approach for identifying both human and technological influences on the construction of authenticity with digital media.
Resumo:
This chapter surveys the landscape of mobile dating and hookup apps—understood as media technologies, as businesses, and as sites of social practice. It situates the discussion within the broader contexts of technologically mediated dating and digital sexual cultures. By outlining a number of methodological approaches and data sources that can be used in the study of dating and hookup apps, it equips the reader with tools and approaches for investigating hookup app culture in ways that go beyond “media panics” – the familiar combination of moral panics and media effects which is so prevalent in discussions of sexuality in digital media.
Resumo:
Background Diabetic foot ulcers (DFU) are a leading cause of diabetes-related hospitalisation and can be costly to manage without access to appropriate expert care. Within Queensland and indeed across many parts of Australia, there is an inequality in accessing specialist services for individuals with DFU. Recent National Health and Medical Research Council (NHMRC) diabetic foot guidelines recommend remote expert consultation with digital imaging should be made available to people with DFU to improve their clinical outcomes. Telemedicine appears to show promise in improving access to diabetic foot specialist services; however diabetic foot telemedicine models to date have relied upon videoconferencing, store and forward technology and/or customised appliances to obtain digital imagery which all require either expensive infrastructure or a timed reply to the request for advice. Whilst mobile phone advice services have been used with success in general diabetes management and telehealth services have improved diabetic foot outcomes, the rapid emergence in the use of mobile phones has established a need to review the role that various forms of telemedicine play in the management of DFU. The aim of this paper is to review traditional telemedicine modalities that have been used in the management of DFU and to compare that to new and innovative technology that are emerging. Process Studies investigating the management of DFU using various forms of telemedicine interventions will be included in this review. They include the use of videoconferencing technology, hand held digital still photography purpose built imaging devices and mobile phone imagery. Electronic databases (Pubmed, Medline and CINAHL) will be searched using broad MeSH terms and keywords that cover the intended area of interest. Findings It is anticipated that the results of this narrative review will provide delegates of the 2015 Australasian Podiatry Conference an insight into the types of emerging innovative diagnostic telemedicine technologies in the management of DFU against the backdrop of traditional and evidence based modalities. It is anticipated that the findings will drive further research in the area of mobile phone imagery and innovation in the management of DFU.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
Biological systems present remarkable adaptation, reliability, and robustness in various environments, even under hostility. Most of them are controlled by the individuals in a distributed and self-organized way. These biological mechanisms provide useful resources for designing the dynamical and adaptive routing schemes of wireless mobile sensor networks, in which the individual nodes should ideally operate without central control. This paper investigates crucial biologically inspired mechanisms and the associated techniques for resolving routing in wireless sensor networks, including Ant-based and genetic approaches. Furthermore, the principal contributions of this paper are as follows. We present a mathematical theory of the biological computations in the context of sensor networks; we further present a generalized routing framework in sensor networks by diffusing different modes of biological computations using Ant-based and genetic approaches; finally, an overview of several emerging research directions are addressed within the new biologically computational framework.
Resumo:
Mobile applications are being increasingly deployed on a massive scale in various mobile sensor grid database systems. With limited resources from the mobile devices, how to process the huge number of queries from mobile users with distributed sensor grid databases becomes a critical problem for such mobile systems. While the fundamental semantic cache technique has been investigated for query optimization in sensor grid database systems, the problem is still difficult due to the fact that more realistic multi-dimensional constraints have not been considered in existing methods. To solve the problem, a new semantic cache scheme is presented in this paper for location-dependent data queries in distributed sensor grid database systems. It considers multi-dimensional constraints or factors in a unified cost model architecture, determines the parameters of the cost model in the scheme by using the concept of Nash equilibrium from game theory, and makes semantic cache decisions from the established cost model. The scenarios of three factors of semantic, time and locations are investigated as special cases, which improve existing methods. Experiments are conducted to demonstrate the semantic cache scheme presented in this paper for distributed sensor grid database systems.