968 resultados para Android registro elettronico mobile scuola istruzione docenti genitori
Resumo:
This chapter surveys the landscape of mobile dating and hookup apps—understood as media technologies, as businesses, and as sites of social practice. It situates the discussion within the broader contexts of technologically mediated dating and digital sexual cultures. By outlining a number of methodological approaches and data sources that can be used in the study of dating and hookup apps, it equips the reader with tools and approaches for investigating hookup app culture in ways that go beyond “media panics” – the familiar combination of moral panics and media effects which is so prevalent in discussions of sexuality in digital media.
Resumo:
Background Diabetic foot ulcers (DFU) are a leading cause of diabetes-related hospitalisation and can be costly to manage without access to appropriate expert care. Within Queensland and indeed across many parts of Australia, there is an inequality in accessing specialist services for individuals with DFU. Recent National Health and Medical Research Council (NHMRC) diabetic foot guidelines recommend remote expert consultation with digital imaging should be made available to people with DFU to improve their clinical outcomes. Telemedicine appears to show promise in improving access to diabetic foot specialist services; however diabetic foot telemedicine models to date have relied upon videoconferencing, store and forward technology and/or customised appliances to obtain digital imagery which all require either expensive infrastructure or a timed reply to the request for advice. Whilst mobile phone advice services have been used with success in general diabetes management and telehealth services have improved diabetic foot outcomes, the rapid emergence in the use of mobile phones has established a need to review the role that various forms of telemedicine play in the management of DFU. The aim of this paper is to review traditional telemedicine modalities that have been used in the management of DFU and to compare that to new and innovative technology that are emerging. Process Studies investigating the management of DFU using various forms of telemedicine interventions will be included in this review. They include the use of videoconferencing technology, hand held digital still photography purpose built imaging devices and mobile phone imagery. Electronic databases (Pubmed, Medline and CINAHL) will be searched using broad MeSH terms and keywords that cover the intended area of interest. Findings It is anticipated that the results of this narrative review will provide delegates of the 2015 Australasian Podiatry Conference an insight into the types of emerging innovative diagnostic telemedicine technologies in the management of DFU against the backdrop of traditional and evidence based modalities. It is anticipated that the findings will drive further research in the area of mobile phone imagery and innovation in the management of DFU.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
Biological systems present remarkable adaptation, reliability, and robustness in various environments, even under hostility. Most of them are controlled by the individuals in a distributed and self-organized way. These biological mechanisms provide useful resources for designing the dynamical and adaptive routing schemes of wireless mobile sensor networks, in which the individual nodes should ideally operate without central control. This paper investigates crucial biologically inspired mechanisms and the associated techniques for resolving routing in wireless sensor networks, including Ant-based and genetic approaches. Furthermore, the principal contributions of this paper are as follows. We present a mathematical theory of the biological computations in the context of sensor networks; we further present a generalized routing framework in sensor networks by diffusing different modes of biological computations using Ant-based and genetic approaches; finally, an overview of several emerging research directions are addressed within the new biologically computational framework.
Resumo:
Mobile applications are being increasingly deployed on a massive scale in various mobile sensor grid database systems. With limited resources from the mobile devices, how to process the huge number of queries from mobile users with distributed sensor grid databases becomes a critical problem for such mobile systems. While the fundamental semantic cache technique has been investigated for query optimization in sensor grid database systems, the problem is still difficult due to the fact that more realistic multi-dimensional constraints have not been considered in existing methods. To solve the problem, a new semantic cache scheme is presented in this paper for location-dependent data queries in distributed sensor grid database systems. It considers multi-dimensional constraints or factors in a unified cost model architecture, determines the parameters of the cost model in the scheme by using the concept of Nash equilibrium from game theory, and makes semantic cache decisions from the established cost model. The scenarios of three factors of semantic, time and locations are investigated as special cases, which improve existing methods. Experiments are conducted to demonstrate the semantic cache scheme presented in this paper for distributed sensor grid database systems.
Resumo:
Next generation wireless systems employ Orthogonal frequency division multiplexing (OFDM) physical layer owing to the high data rate transmissions that are possible without increase in bandwidth. While TCP performance has been extensively studied for interaction with link layer ARQ, little attention has been given to the interaction of TCP with MAC layer. In this work, we explore cross-layer interactions in an OFDM based wireless system, specifically focusing on channel-aware resource allocation strategies at the MAC layer and its impact on TCP congestion control. Both efficiency and fairness oriented MAC resource allocation strategies were designed for evaluating the performance of TCP. The former schemes try to exploit the channel diversity to maximize the system throughput, while the latter schemes try to provide a fair resource allocation over sufficiently long time duration. From a TCP goodput standpoint, we show that the class of MAC algorithms that incorporate a fairness metric and consider the backlog outperform the channel diversity exploiting schemes.
Resumo:
In this paper we focus on the challenging problem of place categorization and semantic mapping on a robot with-out environment-specific training. Motivated by their ongoing success in various visual recognition tasks, we build our system upon a state-of-the-art convolutional network. We overcome its closed-set limitations by complementing the network with a series of one-vs-all classifiers that can learn to recognize new semantic classes online. Prior domain knowledge is incorporated by embedding the classification system into a Bayesian filter framework that also ensures temporal coherence. We evaluate the classification accuracy of the system on a robot that maps a variety of places on our campus in real-time. We show how semantic information can boost robotic object detection performance and how the semantic map can be used to modulate the robot’s behaviour during navigation tasks. The system is made available to the community as a ROS module.
Resumo:
An ad hoc network is composed of mobile nodes without any infrastructure. Recent trends in applications of mobile ad hoc networks rely on increased group oriented services. Hence multicast support is critical for ad hoc networks. We also need to provide service differentiation schemes for different group of users. An efficient application layer multicast (APPMULTICAST) solution suitable for low mobility applications in MANET environment has been proposed in [10]. In this paper, we present an improved application layer multicast solution suitable for medium mobility applications in MANET environment. We define multicast groups with low priority and high priority and incorporate a two level service differentiation scheme. We use network layer support to build the overlay topology closer to the actual network topology. We try to maximize Packet Delivery Ratio. Through simulations we show that the control overhead for our algorithm is within acceptable limit and it achieves acceptable Packet Delivery Ratio for medium mobility applications.
Resumo:
The paper explores the effect of customer satisfaction with online supporting services on loyalty to providers of an offline core service. Supporting services are provided to customers before, during, or after the purchase of a tangible or intangible core product, and have the purpose of enhancing or facilitating the use of this product. The internet has the potential to dominate all other marketing channels when it comes to the interactive and personalised communication that is considered quintessential for supporting services. Our study shows that the quality of online supporting services powerfully affects satisfaction with the provider and customer loyalty through its effect on online value and enjoyment. Managerial implications are provided.
Resumo:
The thesis is positioned in the services marketing field. Previous mobile service research has identified perceived value or relative advantage as a stable predictor of use of services. However, a more detailed view of what customers value in mobile services is needed for marketing diverse types of mobile content and attracting committed customers. The direct relationships between multidimensional value and loyalty constructs have received limited attention in the previous literature, although a multidimensional view is needed for differentiating services. This thesis studies how perceived value of mobile service use affects customer commitment, repurchase intentions, word-of-mouth and willingness to pay. The doctoral thesis consists of three journal articles and one working paper. The four papers have different sub-aims and comprise individual empirical studies. Mixed methods including both personal interviews and survey data collected from end-users of different types of mobile content services are used. The conceptual mobile perceived value model that results from the first explorative empirical study supports a six- dimensional value view. The six dimensions are further categorized into two higher order constructs: content-related perceived value (emotional, social, convenience and monetary value) and context-related (epistemic and conditional value) perceived value. Structural equation modeling is used in the other three studies to validate this framework by analyzing the relationships between context- and content-related value, and how the individual perceived value dimensions affect commitment and behavioral outcomes. Analyzing the direct relationships revealed differences in the effect of perceived value dimensions between information and entertainment mobile service user groups, between effects on commitment, repurchase intentions and word-of-mouth intentions, as well as between effects on commitment to the provider and to the mobile channel as such. This thesis contributes to earlier perceived value literature by structuring the value dimensions into two groups. Most importantly, the thesis contributes to the value and loyalty literature by increasing understanding of how the different dimensions of perceived value directly affect commitment and post-purchase intentions. The results have implications for further theory development in the electronic services field using multidimensional latent constructs, and practical implications for enhancing commitment to content provider and for differentiated marketing strategies in the mobile field. The general conclusion of this thesis is that differentiated value-based marketing of mobile services is essential for attracting committed customers who will use the same providers’ content also in the future. Minna Pihlström is associated with the Centre for Relationship Marketing and Service Management (CERS) at Hanken.
Resumo:
This paper proposes and compares four methods of binarzing text images captured using a camera mounted on a cell phone. The advantages and disadvantages(image clarity and computational complexity) of each method over the others are demonstrated through binarized results. The images are of VGA or lower resolution.
Resumo:
We present the theoretical foundations for the multiple rendezvous problem involving design of local control strategies that enable groups of visibility-limited mobile agents to split into subgroups, exhibit simultaneous taxis behavior towards, and eventually rendezvous at, multiple unknown locations of interest. The theoretical results are proved under certain restricted set of assumptions. The algorithm used to solve the above problem is based on a glowworm swarm optimization (GSO) technique, developed earlier, that finds multiple optima of multimodal objective functions. The significant difference between our work and most earlier approaches to agreement problems is the use of a virtual local-decision domain by the agents in order to compute their movements. The range of the virtual domain is adaptive in nature and is bounded above by the maximum sensor/visibility range of the agent. We introduce a new decision domain update rule that enhances the rate of convergence by a factor of approximately two. We use some illustrative simulations to support the algorithmic correctness and theoretical findings of the paper.
Resumo:
In this paper, the behaviour of a group of autonomous mobile agents under cyclic pursuit is studied. Cyclic pursuit is a simple distributed control law, in which the agent i pursues agent i + 1 modulo n.. The equations of motion are linear, with no kinematic constraints on motion. Behaviourally, the agents are identical, but may have different controller gains. We generalize existing results in the literature and show that by selecting these gains, the behavior of the agents can be controlled. They can be made to converge at a point or be directed to move in a straight line. The invariance of the point of convergence with the sequence of pursuit is also shown.