863 resultados para Mobile Phone Banking
Resumo:
In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.
Resumo:
Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.
Resumo:
Cell transition data is obtained from a cellular phone that switches its current serving cell tower. The data consists of a sequence of transition events, which are pairs of cell identifiers and transition times. The focus of this thesis is applying data mining methods to such data, developing new algorithms, and extracting knowledge that will be a solid foundation on which to build location-aware applications. In addition to a thorough exploration of the features of the data, the tools and methods developed in this thesis provide solutions to three distinct research problems. First, we develop clustering algorithms that produce a reliable mapping between cell transitions and physical locations observed by users of mobile devices. The main clustering algorithm operates in online fashion, and we consider also a number of offline clustering methods for comparison. Second, we define the concept of significant locations, known as bases, and give an online algorithm for determining them. Finally, we consider the task of predicting the movement of the user, based on historical data. We develop a prediction algorithm that considers paths of movement in their entirety, instead of just the most recent movement history. All of the presented methods are evaluated with a significant body of real cell transition data, collected from about one hundred different individuals. The algorithms developed in this thesis are designed to be implemented on a mobile device, and require no extra hardware sensors or network infrastructure. By not relying on external services and keeping the user information as much as possible on the user s own personal device, we avoid privacy issues and let the users control the disclosure of their location information.
Resumo:
The Ajax approach has outgrown its origin as shorthand for "Asynchronous JavaScript + XML". Three years after its naming, Ajax has become widely adopted by web applications. Therefore, there exists a growing interest in using those applications with mobile devices. This thesis evaluates the presentational capability and measures the performance of five mobile browsers on the Apple iPhone and Nokia models N95 and N800. Performance is benchmarked through user-experienced response times as measured with a stopwatch. 12 Ajax toolkit examples and 8 production-quality applications are targeted, all except one in their real environments. In total, over 1750 observations are analyzed and included in the appendix. Communication delays are not considered; the network connection type is WLAN. Results indicate that the initial loading time of an Ajax application can often exceed 20 seconds. Content reordering may be used to partially overcome this limitation. Proper testing is the key for success: the selected browsers are capable of presenting Ajax applications if their differing implementations are overcome, perhaps using a suitable toolkit.
Resumo:
Portable music players have made it possible to listen to a personal collection of music in almost every situation, and they are often used during some activity to provide a stimulating audio environment. Studies have demonstrated the effects of music on the human body and mind, indicating that selecting music according to situation can, besides making the situation more enjoyable, also make humans perform better. For example, music can boost performance during physical exercises, alleviate stress and positively affect learning. We believe that people intuitively select different types of music for different situations. Based on this hypothesis, we propose a portable music player, AndroMedia, designed to provide personalised music recommendations using the user’s current context and listening habits together with other user’s situational listening patterns. We have developed a prototype that consists of a central server and a PDA client. The client uses Bluetooth sensors to acquire context information and logs user interaction to infer implicit user feedback. The user interface also allows the user to give explicit feedback. Large user interface elements facilitate touch-based usage in busy environments. The prototype provides the necessary framework for using the collected information together with other user’s listening history in a context- enhanced collaborative filtering algorithm to generate context-sensitive recommendations. The current implementation is limited to using traditional collaborative filtering algorithms. We outline the techniques required to create context-aware recommendations and present a survey on mobile context-aware music recommenders found in literature. As opposed to the explored systems, AndroMedia utilises other users’ listening habits when suggesting tunes, and does not require any laborious set up processes.
Resumo:
Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
This thesis aims at finding the role of deposit insurance scheme and central bank (CB) in keeping the banking system safe. The thesis also studies the factors associated with long-lasting banking crises. The first essay analyzes the effect of using explicit deposit insurance scheme (EDIS), instead of using implicit deposit insurance scheme (IDIS), on banking crises. The panel data for the period of 1980-2003 includes all countries for which the data on EDIS or IDIS exist. 70% of the countries in the sample are less developed countries (LDCs). About 55% of the countries adopting EDIS also come from LDCs. The major finding is that the using of EDIS increases the crisis probability at a strong significance level. This probability is greater if the EDIS is inefficiently designed allowing higher scope of moral hazard problem. Specifically, the probability is greater if the EDIS provides higher coverage to deposits and if it is less powerful from the legal point of view. This study also finds that the less developed a country is to handle EDIS, the higher the chance of banking crisis. Once the underdevelopment of an economy handling the EDIS is controlled, the EDIS separately is no longer a significant factor of banking crises. The second essay aims at determining whether a country s powerful CB can lessen the instability of the banking sector by minimizing the likelihood of a banking crisis. The data used include indicators of the CB s autonomy for a set of countries over the period of 1980-89. The study finds that in aggregate a more powerful CB lessens the probability of banking crisis. When the CB s authority is disentangled with respect to its responsibilities, the study finds that the longer tenure of CB s chief executive officer and the greater power of CB in assigning interest rate on government loans are necessary for reducing the probability of banking crisis. The study also finds that the probability of crisis reduces more if an autonomous CB can perform its duties in a country with stronger law and order tradition. The costs of long-lasting banking crises are high because both the depositors and the investors lose confidence in the banking system. For a rapid recovery of a crisis, the government very often undertakes one or more crisis resolution policy (CRP) measures. The third essay examines the CRP and other explanatory variables correlated with the durations of banking crises. The major finding is that the CRP measure allowing the regulation forbearance to keep the insolvent banks operative and the public debt relief program are respectively strongly and weakly significant to increase the durations of crises. Some other explanatory variables, which were found by previous studies to be related with the probability of crises to occur, are also correlated with the durations of crises.
Resumo:
This report shares findings and insights from an interview study conducted in 2009, with 34 ADF families. These families were identified in the communities of primary schools in both state and Catholic systems with high ADF family enrolments in 3 towns across 2 states, with the assistance of the DCO and their embedded Defence School Transition Aides (DSTAs). In the interviews the parents were invited to describe their history of ADF relocations, and how they managed transitions for each member in terms of school choice, child care arrangements, spouse employment, and educational transitions. Parallel interviews were conducted with 12 teachers and 6 DSTAs across the identified schools to describe how schools cater for mobile ADF families flowing through their classes. Parents were invited to tell the story of their family’s sequence of moves and how each member made the transition, then reflect more generally on what advice they’d give other mobile families. Teachers were asked to describe how they respond to the mobile families in their school community, and to illustrate some of the issues and challenges from the institutional perspective. By offering perspectives from both parents and teachers, the report hopes to facilitate a dialogue between parties to address their common goal – promoting productive continuities in education for children in mobile families.
Resumo:
There is a growing interest to autonomously collect or manipulate objects in remote or unknown environments, such as mountains, gullies, bush-land, or rough terrain. There are several limitations of conventional methods using manned or remotely controlled aircraft. The capability of small Unmanned Aerial Vehicles (UAV) used in parallel with robotic manipulators could overcome some of these limitations. By enabling the autonomous exploration of both naturally hazardous environments, or areas which are biologically, chemically, or radioactively contaminated, it is possible to collect samples and data from such environments without directly exposing personnel to such risks. This paper covers the design, integration, and initial testing of a framework for outdoor mobile manipulation UAV. The framework is designed to allow further integration and testing of complex control theories, with the capability to operate outdoors in unknown environments. The results obtained act as a reference for the effectiveness of the integrated sensors and low-level control methods used for the preliminary testing, as well as identifying the key technologies needed for the development of an outdoor capable system.
Resumo:
A collaborative, performative and relational experience for two people, woven together by a custom digital phone App. Two walkers, who have never met, simultaneously use a phone App to record a personalised walk around their locality, crafting a series of special moments and surprises for each other. The App then allows participants to continue their two walks, but now directed by what the other person has just created for them. Finally, at the end of the experience they can then choose whether they would like to actually meet in person. Based loosely on the idea of a date, each participant is initially asked to give a little bit of personal information, and then actually speak volumes about themselves through how they choose to care for their 'date's future experience. After walking in parallel universes, but never far away from each other, both daters can ultimately choose to then meet in person -- if what they have experienced tells them that maybe "We Are The One".
Resumo:
Corporate executives require relevant and intelligent business information in real-time to take strategic decisions. They require the freedom to access this information anywhere and anytime. There is a need to extend this functionality beyond the office and on the fingertips of the decision makers. Mobile Business Intelligence Tool (MBIT) aims to provide these features in a flexible and cost-efficient manner. This paper describes the detailed architecture of MBIT to overcome the limitations of existing mobile business intelligence tools. Further, a detailed implementation framework is presented to realize the design. This research highlights the benefits of using service oriented architecture to design flexible and platform independent mobile business applications. © 2009 IEEE.
Resumo:
Mobile dating applications (‘apps’) have increased in popularity over recent years, with Tinder among the first to break into the mainstream heterosexual market. Since mobile dating intensifies the need to confirm that potential dates are not misrepresenting themselves and are safe to meet in person, Tinder’s success indicates that it has allayed these concerns regarding the authenticity of its users. This article combines Giddens’ conceptualization of authenticity, as the ability to reference a coherent biographical narrative, with Callon’s sociology of translation to investigate Tinder’s framing of authenticity within mobile dating. Applying a walkthrough method that interrogates Tinder’s technological architecture, promotional materials, and related media, this hybrid theoretical framework is used to identify how Tinder configures an actor-network that establishes its app as the solution to users’ concerns, enrols individuals in using its features in authenticity claims, and popularizes Tinder’s framing across public discourse. This network of human and non-human actors frames authenticity as being established through one’s Facebook profile and adherence to normative standards relating to age, gender, ethnicity, and socioeconomic status. However, user discourses on other social media identify and challenge negative outcomes of this framing, with normativity fostering discrimination and Facebook verification failing to prevent abusive behavior. This case study of Tinder paves the way for future investigation into user responses to its framing. Further, it demonstrates the efficacy and broader applicability of this theoretical approach for identifying both human and technological influences on the construction of authenticity with digital media.
Resumo:
This chapter surveys the landscape of mobile dating and hookup apps—understood as media technologies, as businesses, and as sites of social practice. It situates the discussion within the broader contexts of technologically mediated dating and digital sexual cultures. By outlining a number of methodological approaches and data sources that can be used in the study of dating and hookup apps, it equips the reader with tools and approaches for investigating hookup app culture in ways that go beyond “media panics” – the familiar combination of moral panics and media effects which is so prevalent in discussions of sexuality in digital media.