956 resultados para SLAM RGB-D SlamDunk Android 3D mobile
Resumo:
Desarrollo de aplicación en dispositivos Android que permite a taxistas y clientes ponerse en contacto y acordar el establecimiento y finalización de una carrera. Todo ello usando las características de estos dispositivos móviles: localización por GPS, visualización de mapas y rutas, y envío y recepción de mensajes instantáneos.
Resumo:
Proyecto que plantea dar una solución alternativa a las soluciones tecnológicas existentes de car sharing. Para ello se ha desarrollado una aplicación en plataforma Android que permite poner en contacto a pasajeros y conductores.
Resumo:
Projecte per recuperar les dades d'una estació meteorològica i desenvolupar una sèrie d'aplicacions i serveis en diferents tecnologies per consultar l'evolució d'aquestes dades en temps real.
Resumo:
El objetivo del trabajo es desarrollar una aplicación real para Android.
Resumo:
This paper introduces a qualitative case study on mobile communication among the older population (60+ years old) conducted in Great Los Angeles (CA, USA) in autumn 2011. Methodology, fieldwork and preliminary results are discussed.Before, country-level data is presented to better understand the specific characteristics of the studied individuals. The section focus is on demographics and on acceptance and use of information and communication technologies (ICT).Preliminary results show that within the sample under study (20 individuals) there is a high number of mobile phone users (15) while among non-mobile users (5), three of them decide to stop using this technology. A majority of mobile phone adopters describe a very limited use of the device for everyday life communications. Finally,while Internet is really popular within the sample (14 users), just 3 individuals go online through their mobile telephone.
Resumo:
This paper explores the distinctive characteristics of mobile telephone use among the elderly population using the most recent European country-level data on individual use of mobile telephony and advanced mobile services, Eurostat 2008. Through a cluster analysis of mobile phone use data across 30 countries, it is possible to confirm that mobile telephone occupies a peripheral position for the elderly in Europe.
Resumo:
We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.
Resumo:
JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
Durante los últimos años el Institut Català d’Arquelogia Clàssica, el Museu d’Història de Tarragona, contando con la colaboración de la Generalitat de Catalunya, han desarrallado el proyecto Planimetría Arqueológica de Tárraco, destinado a la elaboración de una planta arqueológica global en la cual se recogieran intervenciones y noticias referentes a los hallazgos arqueológicos existentes. Este trabajo fue publicado utilizando como plataforma de trabajo un SIG construido para tal fin (Macias et al. 2007). Sin embargo, un problema de difícil solución arqueológica venía dado por las transformaciones urbanísticas de la ciudad, sufridas en su mayor parte a lo largo de los siglos XIX y XX. Éstas habían provocado la pérdida irremediable de gran parte de la elevación que acogiera la ciudad romana, cambiando substancialmente su aspecto original. Ante esta situación y como proyecto paralelo a la realización de la Planimetría Arqueológica de Tarragona se plantearon formas de cubrir este vacío. Se presenta en esta comunicación una propuesta metodológica para la reconstrucción de los grandes «vacíos topográficos » originados por la evolución urbanística de Tarragona mediante la obtención e integración en un SIG de diversos tipos de información documental. En estas zonas rebajadas no resulta posible la obtención de información estratigráfica y arqueológica, por lo que es imprescindible la definición de vías metodológicas alternativas basadas en la extrapolación de datos extraídos de la cartografía histórica, panorámicas del XVI o fotografías tomadas en los siglos XIX y XX. Esta técnica permite aplicar los resultados obtenidos en los nuevos análisis interpretativos, complementando así la interpretación arqueológica de la topografía urbana de la ciudad romana. A partir de esta información, y aplicando funciones y técnicas de interpolación propias de un GIS, se propone aquí un modelo de relieve de la ciudad de Tarraco.