930 resultados para Mobile Business Application
Resumo:
Knowledge processes are critical to outsourced software projects. According to outsourcing research, outsourced software projects succeed if they manage to integrate the client’s business knowledge and the vendor’s technical knowledge. In this paper, we submit that this view may not be wrong, but incomplete in a significant part of outsourced software work, which is software maintenance. Data from six software-maintenance outsourcing transitions indicate that more important than business or technical knowledge can be application knowledge, which vendor engineers acquire over time during practice. Application knowledge was the dominant knowledge during knowledge transfer activities and its acquisition enabled vendor staff to solve maintenance tasks. We discuss implications for widespread assumptions in outsourcing research.
Resumo:
This paper deals with “The Enchanted Journey,” which is a daily event tour booked by Bollywood-film fans. During the tour, the participants visit original sites of famous Bollywood films at various locations in Switzerland; moreover, the tour includes stops for lunch and shopping. Each day, up to five buses operate the tour. For operational reasons, however, two or more buses cannot stay at the same location simultaneously. Further operative constraints include time windows for all activities and precedence constraints between some activities. The planning problem is how to compute a feasible schedule for each bus. We implement a two-step hierarchical approach. In the first step, we minimize the total waiting time; in the second step, we minimize the total travel time of all buses. We present a basic formulation of this problem as a mixed-integer linear program. We enhance this basic formulation by symmetry-breaking constraints, which reduces the search space without loss of generality. We report on computational results obtained with the Gurobi Solver. Our numerical results show that all relevant problem instances can be solved using the basic formulation within reasonable CPU time, and that the symmetry-breaking constraints reduce that CPU time considerably.
Resumo:
With the current growth of mobile devices usage, mobile net- works struggle to deliver content with an acceptable Quality of Experience. In this paper, we propose the integration of Information Centric Networking into 3GPP Long Term Evolution mobile networks, allowing its inherent caching feature to be explored in close proximity to the end users by deploying components inside the evolved Node B. Apart from the advantages brought by Information-Centric Networking’s content requesting paradigm, its inherent caching features enable lower latencies to access content and reduce traffic at the core network. Results show that the impact on the evolved Node B performance is low and ad- vantages coming from Information-Centric Networking are considerable. Thus, mobile network operators reduce operational costs and users end up with a higher perceived network quality even in peak utilization periods.
Resumo:
Indoor localization systems become more interesting for researchers because of the attractiveness of business cases in various application fields. A WiFi-based passive localization system can provide user location information to third-party providers of positioning services. However, indoor localization techniques are prone to multipath and Non-Line Of Sight (NLOS) propagation, which lead to significant performance degradation. To overcome these problems, we provide a passive localization system for WiFi targets with several improved algorithms for localization. Through Software Defined Radio (SDR) techniques, we extract Channel Impulse Response (CIR) information at the physical layer. CIR is later adopted to mitigate the multipath fading problem. We propose to use a Nonlinear Regression (NLR) method to relate the filtered power information to propagation distances, which significantly improves the ranging accuracy compared to the commonly used log-distance path loss model. To mitigate the influence of ranging errors, a new trilateration algorithm is designed as well by combining Weighted Centroid and Constrained Weighted Least Square (WC-CWLS) algorithms. Experiment results show that our algorithm is robust against ranging errors and outperforms the linear least square algorithm and weighted centroid algorithm.
Resumo:
This paper deals with the difference between risk and insecurity from an anthropological perspective using a critical New Institutionalist approach. Risk refers to the ability to reduce undesirable outcomes, based on a range of information actors have on possible outcomes; insecurity refers to the lack of this information. With regard to the neo-liberal setting of a resource rich area in Zambia, Central Africa, local actors – men and women – face risk and insecurity in market constellations between rural and urban areas. They attempt to cope with risk using technical means and diversification of livelihood strategies. But as common-pool resources have been transformed from common property institutions to open access, also leading to unpredictability of competitors and partners in “free” markets, actors rely on magic options to reduce insecurity and transform it into risk-assessing strategies as an adaptation to modern times. Keywords: Risk, insecurity, institutional change, neo-liberal market, common pool resources, livelihood strategies, magic, Zambia.
Resumo:
Mobile pastoralists provide major contributions to the gross domestic product in Chad, but little information is available regarding their demography. The Lake Chad area population is increasing, resulting in competition for scarce land and water resources. For the first time, the density of people and animals from mobile and sedentary populations was assessed using randomly defined sampling areas. Four sampling rounds were conducted over two years in the same areas to show population density dynamics. We identified 42 villages of sedentary communities in the sampling zones; 11 (in 2010) and 16 (in 2011) mobile pastoralist camps at the beginning of the dry season and 34 (in 2011) and 30 (in 2012) camps at the end of the dry season. A mean of 64.0 people per km2 (95% confidence interval, 20.3-107.8) were estimated to live in sedentary villages. In the mobile communities, we found 5.9 people per km2 at the beginning and 17.5 people per km2 at the end of the dry season. We recorded per km2 on average 21.0 cattle and 31.6 small ruminants in the sedentary villages and 66.1 cattle and 102.5 small ruminants in the mobile communities, which amounts to a mean of 86.6 tropical livestock units during the dry season. These numbers exceed, by up to five times, the published carrying capacities for similar Sahelian zones. Our results underline the need for a new institutional framework. Improved land use management must equally consider the needs of mobile communities and sedentary populations.
Resumo:
The objective of this article is to demonstrate the feasibility of on-demand creation of cloud-based elastic mobile core networks, along with their lifecycle management. For this purpose the article describes the key elements to realize the architectural vision of EPC as a Service, an implementation option of the Evolved Packet Core, as specified by 3GPP, which can be deployed in cloud environments. To meet several challenging requirements associated with the implementation of EPC over a cloud infrastructure and providing it “as a Service,” this article presents a number of different options, each with different characteristics, advantages, and disadvantages. A thorough analysis comparing the different implementation options is also presented.
Resumo:
When determining risk related to natural hazard processes, many studies neglect the investigations of the damage potential or are limited to the assessment of immobile values like buildings. However, persons as well as mobile values form an essential part of the damage potential. Knowledge of the maximum number of exposed persons in an endangered area is of great importance for elaborating evacuation plans and immediate measures in case of catastrophes. In addition, motor vehicles can also be highly damaged, as was shown by the analysis of avalanche events. With the removal of mobile values in time as a preventive measure this kind of damage can be minimised. This study presents a method for recording the maximum number of exposed persons and monetarily assessing motor vehicles in the municipality of Galt¨ur (Tyrol, Austria). Moreover, general developments of the damage potential due to significant socio-economic changes since the mid-twentieth century are pointed out in the study area. The present situation of the maximum number of persons and mobile values in the official avalanche hazard zones of the municipality is described in detail. Information on the number of persons is derived of census data, tourism and employment statistics. During the winter months, a significant increase overlaid by strong short-term fluctuation in the number of persons can be noted. These changes result from a higher demand of tourism related manpower as well as from varying occupancy rates. The number of motor vehicles in endangered areas is closely associated to the number of exposed persons. The potential number of motor vehicles is investigated by means of mapping, statistics on the stock of motor vehicles and the density distribution. Diurnal and seasonal fluctuations of the investigated damage potential are pointed out. The recording of the number of persons and mobile values in endangered areas is vital for any disaster management.
Resumo:
In this work, we will give a detailed tutorial instruction about how to use the Mobile Multi-Media Wireless Sensor Networks (M3WSN) simulation framework. The M3WSN framework has been published as a scientific paper in the 6th International Workshop on OMNeT++ (2013) [1]. M3WSN framework enables the multimedia transmission of real video se- quence. Therefore, a set of multimedia algorithms, protocols, and services can be evaluated by using QoE metrics. Moreover, key video-related information, such as frame types, GoP length and intra-frame dependency can be used for creating new assessment and optimization solutions. To support mobility, M3WSN utilizes different mobility traces to enable the understanding of how the network behaves under mobile situations. This tutorial will cover how to install and configure the M3WSN framework, setting and running the experiments, creating mobility and video traces, and how to evaluate the performance of different protocols. The tutorial will be given in an environment of Ubuntu 12.04 LTS and OMNeT++ 4.2.
Resumo:
Two of the main issues in wireless industrial Internet of Things applications are interoperability and network lifetime. In this work we extend a semantic interoperability platform and introduce an application-layer sleepy nodes protocol that can leverage on information stored in semantic repositories. We propose an integration platform for managing the sleep states and an application layer protocol based upon the Constraint Application Layer protocol. We evaluate our system on windowing based task allocation strategies, aiming for lower overall energy consumption that results in higher network lifetime.
Resumo:
We present a real-world problem that arises in security threat detection applications. The problem consists of deploying mobile detectors on moving units that follow predefined routes. Examples of such units are buses, coaches, and trolleys. Due to a limited budget not all available units can be equipped with a detector. The goal is to equip a subset of units such that the utility of the resulting coverage is maximized. Existing methods for detector deployment are designed to place detectors in fixed locations and are therefore not applicable to the problem considered here. We formulate the planning problem as a binary linear program and present a coverage heuristic for generating effective deployments in short CPU time. The heuristic has theoretical performance guarantees for important special cases of the problem. The effectiveness of the coverage heuristic is demonstrated in a computational analysis based on 28 instances that we derived from real-world data.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.