981 resultados para Beacon Localizzazione Advertising Mobile Test
Resumo:
Linux -käyttöjärjestelmä on laajasti käytössä palvelin- ja työpöytätietokoneissa. Linux on lisäämässä suosiotaan kuitenkin myös sulautetuissa laitteissa, kuten PDA:issa, kännyköissä sekä erilaisissateollisuusjärjestelmissä. Näytön koko, suorituskyky ja käytettävyys asettavat omia erityisiä tarpeitaan laitteiden graafiselle käyttöliittymälle. Linux -käyttöjärjestelmälle on olemassa useita käyttöliittymäkirjastoja, joista GTK+ on yksi yleisimmin käytetyistä. Tämä diplomityö esittelee sulautetun Linux -käyttöjärjestelmän ja GTK+ käyttöliittymäkirjaston, selvittäen miten hyvin ne soveltuvat mobiileihin päätelaitteisiin. Yksi suurimmista esteistä työpöytäkäyttöön suunnattujen teknologioiden, kuten GTK+, muokkaamisessa mobiileihin päätelaitteisiin on suorituskyky. Osana tätä työtä kehitettiin GtkPerf -niminen työkalu, jolla GTK+:n suorituskykyä eri alustoilla pystytään helposti mittaamaan ja havaitsemaan mahdollisia pullonkauloja. Tämän työn johtopäätöksenä on, että pienillä muokkailuilla ja optimoinneilla GTK+ soveltuu myös mobiileihin päätelaitteisiin. Ensimmäinen kaupallisesti saatavilla oleva GTK+ -pohjainen päätelaite, Nokia 770 Internet Tablet, on tästä osoituksena.
Resumo:
Main goal of this thesis was to implement a localization system which uses sonars and WLAN intensity maps to localize an indoor mobile robot. A probabilistic localization method, Monte Carlo Localization is used in localization. Also the theory behind probabilistic localization is explained. Two main problems in mobile robotics, path tracking and global localization, are solved in this thesis. Implemented system can achieve acceptable performance in path tracking. Global localization using WLAN received signal strength information is shown to provide good results, which can be used to localize the robot accurately, but also some bad results, which are no use when trying to localize the robot to the correct place. Main goal of solving ambiguity in office like environment is achieved in many test cases.
Resumo:
Mobiilimarkkinoinnin markkinat ovat vasta rakentumassa ja suurin osa alan toimijoista etenkin Suomessa yrittää vielä löytää rooliaan. Sen sijaan Japanissa sisällöntuotantoliiketoiminta matkapuhelimille kukoistaa ja mobiilimarkkinointi on jo saavuttanut merkittävän aseman mobiili-internetin palvelutarjonnassa. Toisin kuin Suomessa, jossa mobiilimarkkinat ovat vielä lastenkengissä, Japanissa myös mobiilimarkkinoinnin arvoketju on vähitellen muotoutumassa.Tämän tutkimuksen tavoitteena oli antaa käsitys Japanin mobiilimarkkinoinnin dynamiikasta ja luoda viitekehys operaattorin tulevalle roolille mobiilimarkkinoinnin markkinoiden rakentamisessa. Tutkimus on deskriptiivinen ja aineisto on kerätty alan kirjallisuudesta sekä haastattelemalla tärkeitä mobiilimarkkinoiden toimijoita Japanissa. Japanissa operaattoreilla (NTT DoCoMo, J-Phone ja KDDI) on erittäin vahva asema mobiili-internetin ja mobiilimarkkinoinnin markkinoilla. Ne hallitsevat asiakasrajapintaa, päättävät mobiiliverkon ja matkapuhelimien ominaisuuksista sekä siitä, ketkä sisällöntuottajista pääsevät osaksi heidän laskutusjärjestelmäänsä. Markkinoinnissa operaattoreilla ei ole yhtä näkyvää roolia. Omistussuhteiden kautta ne kuitenkin vaikuttavat lähes koko arvoketjuun. Operaattorit ovat yhdessä Japanin suurimpien mainostoimistojen kanssa luoneet tytäryhtiöitä, jotka hoitavat mainonnan operaattorin mobiiliportaalissa. Japanissa operaattori on ottanut hallitsevan roolin mobiilimarkkinoiden rakentamisessa. Tiivis yhteistyö eri toimijoiden, kuten matkapuhelinvalmistajien, sisällöntuottajien ja mainostoimistojen kanssa, on mahdollistanut kokonaisvaltaisen palvelupaketin tarjoamisen. Palvelupaketti sisältää käyttäjäystävällisen liittymän mobiili-internetiin sekä edulliset puhelimet. Juuri tiivis yhteistyö onkin ollut yksi tärkeimmistä menestystekijöistä Japanin markkinoita rakennettaessa. Mobiilimarkkinoita rakennettaessa operaattorilla on merkittävä rooli markkinoiden muodostajana ja sisällön kokoojana. Operaattorien tulee varautua roskapostin vastaiseen taisteluun, jos sähköpostia annetaan lähettää suoraan matkapuhelimeen. On erityisen tärkeää varmistaa, ettei käyttäjien tarvitse kärsiä roskapostista, muuten suoramarkkinoinnin mahdollisuus matkapuhelimeen menetetään. Ainoastaan aktiivisella edistämisellä ja osallistumisella mobiili-internetin sisällöntuotanto- ja markkinointiliiketoimintaan operaattori voi vahvistaa markkina-asemaansa ja varmistaa osuutensa tulevista markkinoista.
Resumo:
Diplomityö käsittelee ISO:n yhdenmukaisuustestin menetelmien sekä ISO-9646:n kehysten soveltamista Mobile IPv6 protokollan testauksessa. Mobile IPv6 protokollaa tarkastellaan määrittelyjen pohjalta, myös testien tärkeyttä ja tulosten johtamista käsitellään. Työssä käsitellän MSC:n (Message Sequence Charts) käyttöä testaustyössä mahdolliset edut huomioiden. TTCN kieli, testausmenetelmät ja OpenTTCN testauskone käsitellään. Testin kohteena olevien yhdyskäytävän ja palvelimen määrittelyt kuvataan. Osia abstract test suite :sta (ATS) esitellään esimerkin antamiseksi todellisesta sovelluksesta ja sen yhteydestä tehtyyn dokumenttiin.
Resumo:
This thesis evaluates methods for obtaining high performance in applications running on the mobile Java platform. Based on the evaluated methods, an optimization was done to a Java extension API running on top the Symbian operating system. The API provides location-based services for mobile Java applications. As a part of this thesis, the JNI implementation in Symbian OS was also benchmarked. A benchmarking tool was implemented in the analysis phase in order to implement extensive performance test set. Based on the benchmark results, it was noted that the landmarks implementation of the API was performing very slowly with large amounts of data. The existing implementation proved to be very inconvenient for optimization because the early implementers did not take performance and design issues into consideration. A completely new architecture was implemented for the API in order to provide scalable landmark initialization and data extraction by using lazy initialization methods. Additionally, runtime memory consumption was also an important part of the optimization. The improvement proved to be very efficient based on the measurements after the optimization. Most of the common API use cases performed extremely well compared to the old implementation. Performance optimization is an important quality attribute of any piece of software especially in embedded mobile devices. Typically, projects get into trouble with performance because there are no clear performance targets and knowledge how to achieve them. Well-known guidelines and performance models help to achieve good overall performance in Java applications and programming interfaces.
Resumo:
Fixed Mobile Convergence is the recent buzz in the field of telecommunication technology. Unlicensed Mobile Access (UMA) technology is a realistic implementation of Fixed Mobile Convergence. UMA involves communication between different types of networks. Handover is a very important issue in UMA. The study is an analysis of theoretical handover mechanism and practical test results. It includes a new proposal for handover performance test in UMA. It also provides an overview of basic handover operation on different scenarios in UMA. The practical test involves an experiment on handover performance test using network analyzers. The new proposal provides a different approach for an experimental setting on handover performance test without using network analyzers. The approach is not be implemented because of some technical problem in a network equipment in UMA. The analysis of the test results reveals that time of handover between UMA and Global System for Mobile Communication (GSM) network is similar to time of handover between inter base station controller (BSC) handover in GSM networks. The new approach is simple and provides measurement at the end point communicating entities. The study gives a general understanding of handover operation, an analysis of handover performance in UMA and specifically provides a new approach useful for further study of handover in different real world environments and scenarios.
Resumo:
Integrated in a wide research assessing destabilizing and triggering factors to model cliff dynamic along the Dieppe's shoreline in High Normandy, this study aims at testing boat-based mobile LiDAR capabilities by scanning 3D point clouds of the unstable coastal cliffs. Two acquisition campaigns were performed in September 2012 and September 2013, scanning (1) a 30-km-long shoreline and (2) the same test cliffs in different environmental conditions and device settings. The potentials of collected data for 3D modelling, change detection and landslide monitoring were afterward assessed. By scanning during favourable meteorological and marine conditions and close to the coast, mobile LiDAR devices are able to quickly scan a long shoreline with median point spacing up to 10cm. The acquired data are then sufficiently detailed to map geomorphological features smaller than 0.5m2. Furthermore, our capability to detect rockfalls and erosion deposits (>m3) is confirmed, since using the classical approach of computing differences between sequential acquisitions reveals many cliff collapses between Pourville and Quiberville and only sparse changes between Dieppe and Belleville-sur-Mer. These different change rates result from different rockfall susceptibilities. Finally, we also confirmed the capability of the boat-based mobile LiDAR technique to monitor single large changes, characterizing the Dieppe landslide geometry with two main active scarps, retrogression up to 40m and about 100,000m3 of eroded materials.
Resumo:
A simple liquid chromatographic method was optimized for the quantitative determination of terbinafine in pharmaceutical hydroalcoholic solutions and tablets, and was also employed for a tablet dissolution test. The analysis was carried out using a RP-C18 (250 mm × 4.6 mm, 5 μm) Vertical® column, UV-Vis detection at 254 nm, and a methanol-water (95:5, v/v) mobile phase at a flow-rate of 1.2 mL min-1. Method validation investigated parameters such as linearity, precision, accuracy, robustness and specificity, which gave results within the acceptable range. The tablets dissolution was quite fast: 80% of the drug was dissolved within 15 min.
Resumo:
This thesis describes the design and implementation of a graphical application on a mobile device to teleoperate a mobile robot. The department of information technology in Lappeenranta University conducts research in robotics, and the main motivation was to extend the available teleoperation applications for mobile devices. The challenge was to port existing robot software library onto an embedded device platform, then develop a suitable user interface application that provides sufficient functionality to perform teleoperation tasks over a wireless communication network. This thesis involved investigating previous teleoperation applications and conducted similar experiments to test and evaluate the designed application for functional activity and measure performance on a mobile device which have been identified and achieved. The implemented solution offered good results for navigation purposes particularly for teleoperating a visible robot and suggests solutions for exploration when no environment map for the operator is present.
Resumo:
The dissertation seeks to explore how to improve users‘ adoption of mobile learning in current education systems. Considering the difference between basic and tertiary education in China, the research consists of two separate but interrelated parts, which focus on the use of mobile learning in basic and tertiary education contexts, respectively. In the dissertation, two adoption frameworks are developed based on previous studies. The frameworks are then evaluated using different technologies. Concerning mobile learning use in basic education settings, case study methodology is utilized. A leading provider of mobile learning services and products in China, Noah Ltd., is investigated. Multiple sources of evidence are collected to test the framework. Regarding mobile learning adoption in tertiary education contexts, survey research methodology is utilized. Based on 209 useful responses, the framework is evaluated using structural equation modelling technology. Four proposed determinants of intention to use are evaluated, which are perceived ease of use, perceived near-term usefulness, perceived ong-term usefulness and personal innovativeness. The dissertation provides a number of new insights for both researchers and practitioners. In particular, the dissertation specifies a practical solution to deal with the disruptive effects of mobile learning in basic education, which keeps the use of mobile learning away from the schools across such as European countries. A list of new and innovative mobile learning technologies is systematically introduced as well. Further, the research identifies several key factors driving mobile learning adoption in tertiary education settings. In theory, the dissertation suggests that since the technology acceptance model is initiated in work-oriented innovations by testing employees, it is not necessarily the best model for studying educational innovations. The results also suggest that perceived longterm usefulness for educational systems should be as important as perceived usefulness for utilitarian systems, and perceived enjoyment for hedonic systems. A classification based on the nature of systems purpose (utilitarian, hedonic or educational) would contribute to a better understanding of the essence of IT innovation adoption.
Resumo:
Commercially available haptic interfaces are usable for many purposes. However, as generic devices they are not the most suitable for the control of heavy duty mobile working machines like mining machines, container handling equipment and excavators. Alternative mechanical constructions for a haptic controller are presented and analysed. A virtual reality environment (VRE) was built to test the proposed haptic controller mechanisms. Verification of an electric motor emulating a hydraulic pump in the electro-hydraulic system of a mobile working machine is carried out. A real-time simulator using multi-body-dynamics based software with hardware-in-loop (HIL) setup was used for the tests. Recommendations for further development of a haptic controller and emulator electric motor are given.
Resumo:
Virtual environments and real-time simulators (VERS) are becoming more and more important tools in research and development (R&D) process of non-road mobile machinery (NRMM). The virtual prototyping techniques enable faster and more cost-efficient development of machines compared to use of real life prototypes. High energy efficiency has become an important topic in the world of NRMM because of environmental and economic demands. The objective of this thesis is to develop VERS based methods for research and development of NRMM. A process using VERS for assessing effects of human operators on the life-cycle efficiency of NRMM was developed. Human in the loop simulations are ran using an underground mining loader to study the developed process. The simulations were ran in the virtual environment of the Laboratory of Intelligent Machines of Lappeenranta University of Technology. A physically adequate real-time simulation model of NRMM was shown to be reliable and cost effective in testing of hardware components by the means of hardware-in-the-loop (HIL) simulations. A control interface connecting integrated electro-hydraulic energy converter (IEHEC) with virtual simulation model of log crane was developed. IEHEC consists of a hydraulic pump-motor and an integrated electrical permanent magnet synchronous motorgenerator. The results show that state of the art real-time NRMM simulators are capable to solve factors related to energy consumption and productivity of the NRMM. A significant variation between the test drivers is found. The results show that VERS can be used for assessing human effects on the life-cycle efficiency of NRMM. HIL simulation responses compared to that achieved with conventional simulation method demonstrate the advances and drawbacks of various possible interfaces between the simulator and hardware part of the system under study. Novel ideas for arranging the interface are successfully tested and compared with the more traditional one. The proposed process for assessing the effects of operators on the life-cycle efficiency will be applied for wider group of operators in the future. Driving styles of the operators can be analysed statistically from sufficient large result data. The statistical analysis can find the most life-cycle efficient driving style for the specific environment and machinery. The proposed control interface for HIL simulation need to be further studied. The robustness and the adaptation of the interface in different situations must be verified. The future work will also include studying the suitability of the IEHEC for different working machines using the proposed HIL simulation method.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Celebrity endorsement has increased in popularity over the past decades and companies are willing to spend increasingly excessive amounts of money into it. Even though multiple studies support celebrity endorsement, further research on its impact on advertising effectiveness is called for. Fur-ther, the role of consumers’ product class involvement in advertising needs to be further studied. The purpose of this study is to explore if consumers’ product class involvement and exposure to celebrity endorsers affect consumers brand recall. Supported by earlier studies, brand recall was used as a measure for advertising effectiveness in this study. In general, a psychological approach was chosen for building the theoretical framework. Concept of classical conditioning was presented in order to understand why people act how they do. Balanced theory and meaning transfer model were presented in order to study how celebrities can be used effectively in advertising context. Further, the importance of product class involvement in advertising effectiveness was evaluated. Hypotheses were formulated based on a literature review of the existing research. Because of the versatility of the research design, a mixed methods approach for this study was adopted. Empirical part of the study was conducted in three stages. First, a pre-test was conducted in order to choose suitable product endorsers for the advertisement stimuli used in the experiment. Second, an eye-tracking experiment with 30 test subjects was conducted in order to study how people view advertisements and whether the familiarity of the product endorser and consumers’ product class involvement affects brand recall. For the experiment, a fictional brand was created in order to avoid bias on brand recall. Third, qualitative interviews for 15 test subjects were conducted in the post-experiment stage in order to gain deeper understating of the phenomenon and to make sense of the findings from the experiment. Findings from this study support celebrity endorsement by suggesting that a famous spokesperson does not steal attention from brand information more than a non-celebrity product endorser. As a result, the use of a celebrity endorser did not decrease brand recall. Results support earlier research as consumer’ higher product class involvement resulted in a better brand recall. Findings from the interviews suggest that consumers have positive perceptions of celebrity endorsement in general. However, the celebrity–brand congruence is a crucial factor when creating attitudes towards the advertisement. Future research ideas were presented based on the limitations and results of this study
Resumo:
One of the major applications of underwater acoustic sensor networks (UWASN) is ocean environment monitoring. Employing data mules is an energy efficient way of data collection from the underwater sensor nodes in such a network. A data mule node such as an autonomous underwater vehicle (AUV) periodically visits the stationary nodes to download data. By conserving the power required for data transmission over long distances to a remote data sink, this approach extends the network life time. In this paper we propose a new MAC protocol to support a single mobile data mule node to collect the data sensed by the sensor nodes in periodic runs through the network. In this approach, the nodes need to perform only short distance, single hop transmission to the data mule. The protocol design discussed in this paper is motivated to support such an application. The proposed protocol is a hybrid protocol, which employs a combination of schedule based access among the stationary nodes along with handshake based access to support mobile data mules. The new protocol, RMAC-M is developed as an extension to the energy efficient MAC protocol R-MAC by extending the slot time of R-MAC to include a contention part for a hand shake based data transfer. The mobile node makes use of a beacon to signal its presence to all the nearby nodes, which can then hand-shake with the mobile node for data transfer. Simulation results show that the new protocol provides efficient support for a mobile data mule node while preserving the advantages of R-MAC such as energy efficiency and fairness.