761 resultados para Mobile devices


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Trabalho de projecto apresentado à Escola Superior de Comunicação Social como parte dos requisitos para obtenção de grau de mestre em Publicidade e Marketing.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Concepts like E-learning and M-learning are changing the traditional learning place. No longer restricted to well-defined physical places, education on Automation and other Engineering areas is entering the so-called ubiquitous learning place, where even the more practical knowledge (acquired at lab classes) is now moving into, due to emergent concepts such as Remote Experimentation or Mobile Experimentation. While Remote Experimentation is traditionally regarded as the remote access to real-world experiments through a simple web browser running on a PC connected to the Internet, Mobile Experimentation may be seen as the access to those same (or others) experiments, through mobile devices, used in M-learning contexts. These two distinct client types (PCs versus mobile devices) pose specific requirements for the remote lab infrastructure, namely the ability to tune the experiment interface according to the characteristics (e.g. display size) of the accessing device. This paper addresses those requirements, namely by proposing a new architecture for the remote lab infrastructure able to accommodate both Remote and Mobile Experimentation scenarios.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In recent years, mobile learning has emerged as an educational approach to decrease the limitation of learning location and adapt the teaching-learning process to all type of students. However, the large number and variety of Web-enabled devices poses challenges for Web content creators who want to automatic get the delivery context and adapt the content to mobile devices. In this paper we study several approaches to adapt the learning content to mobile phones. We present an architecture for deliver uniform m-Learning content to students in a higher School. The system development is organized in two phases: firstly enabling the educational content to mobile devices and then adapting it to all the heterogeneous mobile platforms. With this approach, Web authors will not need to create specialized pages for each kind of device, since the content is automatically transformed to adapt to any mobile device capabilities from WAP to XHTML MP-compliant devices.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In recent years, mobile learning has emerged as an educational approach to decrease the limitation of learning location and adapt the teaching-learning process to all type of students. However, the large number and variety of Web-enabled devices poses challenges for Web content creators who want to automatic get the delivery context and adapt the content to mobile devices. This paper studies several approaches to adapt the learning content to mobile phones. It presents an architecture for deliver uniform m-Learning content to students in a higher School. The system development is organized in two phases: firstly enabling the educational content to mobile devices and then adapting it to all the heterogeneous mobile platforms. With this approach, Web authors will not need to create specialized pages for each kind of device, since the content is automatically transformed to adapt to any mobile device capabilities from WAP to XHTML MP-compliant devices.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Relatório de estágio apresentado à Escola Superior de Comunicação Social como parte dos requisitos para obtenção de grau de mestre em Audiovisual e Multimédia.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper describes the process and problems that had to be faced during the elaboration of a digital interactive narrative for the Instory project (http://img.di.fct.unl.pt/InStory/) implanted in «Quinta da Regaleira», Sintra, Portugal, and classified as World Heritage by Unesco. It also explores some of the practical and theoretical issues in what regards the literary terminology and strategies involved.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing. One of the key issues in mobile cloud computing is the end to end delay in servicing a request. Data caching is one of the techniques widely used in wired and wireless networks to improve data access efficiency. In this paper we explore the possibility of a cooperative caching approach to enhance data access efficiency in mobile cloud computing. The proposed approach is based on cloudlets, one of the architecture designed for mobile cloud computing.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

gvSIG Mobile, la versión de gvSIG para dispositivos móviles presenta su nueva versión que incluye las esperadas funcionalidades de creación de nuevas entidades geográficas y utilización de formularios personalizados para edición de datos, además de nuevos formatos de datos vectoriales (GML, KML, GPX) y sistemas de referencia. Funcionalidades que se suman a las capacidades de visor de cartografía (ECW, SHP, WMS) y sistema de localización mediante GPS que ya posee. gvSIG Mobile está siendo desarrollado por Prodevelop, la Universitat de València e Iver para la Conselleria d’Infraestructures i Transport de la Generalitat Valenciana y se distribuye con una licencia GPL

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment with a user-centric approach. Mobile devices have been chosen because they provide mobility, personal use and high computational complexity. The inherent user-centricity also allows the user to personally manage the ID information and to display only what is required. The chosen path to develop the protocol is to migrate the existing eCert technologies implemented by the Learning Societies Laboratory in Southampton. By comparing this protocol with the analysis of the eID problem domain, a new solution has been derived which is compatible with both systems without loss of features.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Mobile internet represents a major new trend in communication technologies use and consumption, but few evidence exists that confirms claims of novelty and social change in association with this technology use. This paper characterizes the use of mobile internet in a southern European country and associated patterns of use, focusing both on users’ profiles, forms of access, motivations to use and most popular activities undertaken via this technology, from a diffusion of innovations and social adoption of technologies perspectives, and tries to compare mobile it with fixed access to the internet in order to validate possible transformations that point to new social configurations. We seek to understand the way stakeholders perceive and characterize the European context of mobile internet. The depicted study involved a qualitative stage consisting of a set of interviews with mobile communications industry representatives and market research community in the country. These interviews were analysed in Nvivo, leading to the following eleven main categories that are explored throughout the paper: smartphones in Europe, mobile internet in Europe, users profiles, obstacles to the spread, forms of access, forms of use, motivations to use mobile internet, limitations of smartphones, apps, digital divide VS digital union and predictions for the future, as well as several subcategories forming a tree categorization. According to the data collected, mobile phones’ sales are decreasing in Europe and worldwide but on the other hand smartphones are having an exponential growth which leads to the democratization of internet access via mobile devices. As a consequence of this, it is believed that mobile internet access will soon exceed the fixed one. Mobile internet users are multiplatform, they exploit all the possibilities of mobility and they are spending less time on computers. The main obstacles to the spread of mobile internet are the high prices of price plans and there is still a lack of information and knowledge regarding the service. Mobile internet users are developing new online surfing behaviours based on apps and less in browsers and social networks represent a very high share of internet traffic through mobile phones. With mobility, “dead time” is turning into useful time and users are more likely to be available to try new services and analyze products. Innovative services concerning geolocation, consumerism, share and relationships are growing and it is necessary to highlight that mobile internet allows calling and texting, which can turn telecommunications companies into the role of Dump Pipes. This exploratory design raises questions in relation with mobile internet access and its social consequences, and provides interesting indicative research results relevant for future research in this area.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Mobile devices are attractive media for directly communicating with consumers who have become busier and more difficult to reach. While SMS (short message service) advertising has received some attention in the literature, Bluetooth-enabled advertising is still unexplored. This research aims to investigate younger consumers’ acceptance of Bluetooth-delivered advertising. Although the majority of the respondents were willing to accept this form of advertising, they needed both to be in control of the frequency with which they receive messages and also to be reassured that the medium could ensure privacy and security. The research further indicated that peers influence the acceptance of Bluetooth-driven advertising.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld devices. Wireless communication among these devices using Bluetooth and WiFi technologies has opened the door wide for collaborative mining among the mobile devices within the same range that are running data mining techniques targeting the same application. This paper proposes a new architecture that we have prototyped for realizing the significant applications in this area. We have proposed using mobile software agents in this application for several reasons. Most importantly the autonomic intelligent behaviour of the agent technology has been the driving force for using it in this application. Other efficiency reasons are discussed in details in this paper. Experimental results showing the feasibility of the proposed architecture are presented and discussed.