Academic literature on the topic 'LT. Mobile devices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LT. Mobile devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "LT. Mobile devices"

1

Sharma, Rajul, and Margam Madhusudhan. "Use of Mobile Devices by Library and Information Science Students in Central Universities of Uttar Pradesh." DESIDOC Journal of Library & Information Technology 37, no. 4 (June 30, 2017): 293. http://dx.doi.org/10.14429/djlit.37.4.11505.

Full text
Abstract:
<p>This paper provides an insight of actual use of mobile devices by into LIS students’ in everyday life and their perceptions regarding the usefulness and effectiveness of mobile phones for academic purpose in Central universities in Uttar Pradesh state, India. The findings of the study reveal that most of the respondents use mobile devices daily for more than 3 hours. Smart phone is the most used mobile device. Respondents use productivity tools on their mobile device for creating documents. Gmail app, Whatsapp, google app, adobe reader and PDF viewer are the most frequently used mobile apps. Most of the respondents access Library Website through their mobile device and only 1.96% are accessing e-books from their mobile device. Major barriers found are: use of mobile devices for academic learning in the poor network coverage, high charging data plans, slow load time and lack of Internet speed. The findings of the study will not only guide LIS students in effective use of mobile devices for academic purposes, but will also help mobile manufactures, university authorities, librarians in exploring mobile devices adoption and usage <br />among the respondents.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Pan, Z. A., and J. X. Zhu. "Context Awareness on Mobile Devices." Applied Mechanics and Materials 743 (March 2015): 742–47. http://dx.doi.org/10.4028/www.scientific.net/amm.743.742.

Full text
Abstract:
Context aware computing is important for applications to provide smarter and safer<br />service to mobile users, especially when users’ context changing rapidly or regularly. In this paper,<br />we propose a context aware model for mobile devices based on audio and location. The information<br />can easily obtained from sensors, e.g., microphones and GPS. Thus, exploiting the MFCC features<br />and the location, a Bayes Net is trained and built and will be used for context classifying in the<br />real-time classification. The results of experiments implemented on Android 4.0 platform<br />demonstrate promising performance, which indicates that the model is able to support real<br />applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Shwu-Ing, and Rou Jyun Chen. "The Influence of the Frequency of the Internet Use on the Behavioral Relationship Model of the Mobile Device-Based Shopping." International Journal of Business and Management 11, no. 6 (May 25, 2016): 32. http://dx.doi.org/10.5539/ijbm.v11n6p32.

Full text
Abstract:
<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p> With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
4

Ahuja, Sanjay P., and Jesus Zambrano. "Mobile Cloud Computing: Offloading Mobile Processing to the Cloud." Computer and Information Science 9, no. 1 (January 31, 2016): 90. http://dx.doi.org/10.5539/cis.v9n1p90.

Full text
Abstract:
<p class="zhengwen">The current proliferation of mobile systems, such as smart phones and tablets, has let to their adoption as the primary computing platforms for many users. This trend suggests that designers will continue to aim towards the convergence of functionality on a single mobile device (such as phone + mp3 player + camera + Web browser + GPS + mobile apps + sensors). However, this conjunction penalizes the mobile system both with respect to computational resources such as processor speed, memory consumption, disk capacity, and in weight, size, ergonomics and the component most important to users, battery life. Therefore, energy consumption and response time are major concerns when executing complex algorithms on mobile devices because they require significant resources to solve intricate problems.</p><p>Offloading mobile processing is an excellent solution to augment mobile capabilities by migrating computation to powerful infrastructures. Current cloud computing environments for performing complex and data intensive computation remotely are likely to be an excellent solution for offloading computation and data processing from mobile devices restricted by reduced resources. This research uses cloud computing as processing platform for intensive-computation workloads while measuring energy consumption and response times on a Samsung Galaxy S5 Android mobile phone running Android 4.1OS.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

A. Adeniji, Kehinde, Nazmat T. Surajudeen-Bakinde, Olusegun O. Omitola, and Adedayo Ajibade. "Validation of android-based mobile application for retrieving network signal level." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (January 1, 2021): 296. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp296-304.

Full text
Abstract:
<p><span>In recent years, the evolvement of mobile devices which perform sophisticated functions have been on the rise. Mobile applications which solved engineering challenges are now available due to the high computational capabilities, large random access memory and storage location of the mobile devices. An Android application called signal detect, which measures network signal strength value from 2G-4G received on an android mobile device has been developed using android app development environment called Android studio. Validation becomes necessary because different readings were obtained on smartphones with different specifications. Two validation techniques were used to validate the data obtained. To know the efficiency of the application; a field strength meter was used to compare the readings received on the mobile device with the meter. It was observed that there is a time lag on the received values of the mobile device to the field strength meter. Therefore, a moving average technique was used to correlate the two data which increased the correlation coefficient to about 0.85.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
6

Radüntz, Thea, and Beate Meffert. "User Experience of 7 Mobile Electroencephalography Devices: Comparative Study." JMIR mHealth and uHealth 7, no. 9 (September 3, 2019): e14474. http://dx.doi.org/10.2196/14474.

Full text
Abstract:
Background Registration of brain activity has become increasingly popular and offers a way to identify the mental state of the user, prevent inappropriate workload, and control other devices by means of brain-computer interfaces. However, electroencephalography (EEG) is often related to user acceptance issues regarding the measuring technique. Meanwhile, emerging mobile EEG technology offers the possibility of gel-free signal acquisition and wireless signal transmission. Nonetheless, user experience research about the new devices is lacking. Objective This study aimed to evaluate user experience aspects of emerging mobile EEG devices and, in particular, to investigate wearing comfort and issues related to emotional design. Methods We considered 7 mobile EEG devices and compared them for their wearing comfort, type of electrodes, visual appearance, and subjects’ preference for daily use. A total of 24 subjects participated in our study and tested every device independently of the others. The devices were selected in a randomized order and worn on consecutive day sessions of 60-min duration. At the end of each session, subjects rated the devices by means of questionnaires. Results Results indicated a highly significant change in maximal possible wearing duration among the EEG devices (χ26=40.2, n=24; P<.001). Regarding the visual perception of devices’ headset design, results indicated a significant change in the subjects’ ratings (χ26=78.7, n=24; P<.001). Results of the subjects’ ratings regarding the practicability of the devices indicated highly significant differences among the EEG devices (χ26=83.2, n=24; P<.001). Ranking order and posthoc tests offered more insight and indicated that pin electrodes had the lowest wearing comfort, in particular, when coupled with a rigid, heavy headset. Finally, multiple linear regression for each device separately revealed that users were not willing to accept less comfort for a more attractive headset design. Conclusions The study offers a differentiated look at emerging mobile and gel-free EEG technology and the relation between user experience aspects and device preference. Our research could be seen as a precondition for the development of usable applications with wearables and contributes to consumer health informatics and health-enabling technologies. Furthermore, our results provided guidance for the technological development direction of new EEG devices related to the aspects of emotional design.
APA, Harvard, Vancouver, ISO, and other styles
7

Rohit, Bhavani, and Rengamani J. "Household Purposes in A Single Touch Via Bluetooth Using Smartphones." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (February 1, 2018): 351. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp351-353.

Full text
Abstract:
<p>Technology emerges in our environment day by day. But, still, we lag in keep on using multiple remotes for every device in our homes. Once Bluetooth came up it changes. People started using mobile phones connected to their devices to hear songs wireless and change channels using a mobile phone. A further implementation is kept on moving with multiple remotes for their usage. So, we had an idea that all our household devices may be controlled on our mobile phones via Bluetooth which is cheaper even for urban peoples. Now, all home devices with remote are IR based which doesn't work on sunlight, fluorescent bulbs due to interference. Switch over Bluetooth control reduces remotes in a sense called plastics. Mobile applications are evolved user-friendly to all the people on the day to day lives. Merge those applications to the household devices to control all household devices operated via remote such as TV, DVD, Home theatres, AC, even Table fan etc., Instead of removing IR's just interface Bluetooth chip on those household devices to control every remote device by using your smartphone. Why I am moving to Bluetooth instead of Wi-Fi. Bluetooth is cheaper, advanced to control devices in the range of 50 meters. But IR is useful to 10 meters, and once you block the signal, it will not work.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Damyanov, Ivo, and Nikolay Tsankov. "Mobile Apps in Daily Learning Activities." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 133. http://dx.doi.org/10.3991/ijim.v12i6.9659.

Full text
Abstract:
<span>The use of mobile devices is increasing in daily learning activities, providing single-person use combined with interactive learning materials, simulations, voice recognition and educational games. Mobile app stores bring to learners a large amount of mobile applications, but their value and effectiveness to support these learning activities is far from being adequately studied.</span><br /><span>In this paper, we present our recent study related to the opportunities for smart devices to be used in school education, outlining the main obstacles and challenges. The subject of the research is students' interest in the use of multimedia mobile devices for educational purposes. The aim of the study is to establish the main determinants for the complete and purposeful application of smart devices in school education.</span>
APA, Harvard, Vancouver, ISO, and other styles
9

Laguidi, Ahmed, Tarik Hachad, and Lamiae Hachad. "Mobile network connectivity analysis for device to device communication in 5G network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (February 1, 2023): 680. http://dx.doi.org/10.11591/ijece.v13i1.pp680-687.

Full text
Abstract:
<p><span>Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or out-band mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
10

D, Uma Nandhini, Udhayakumar S, Latha Tamilselvan, and Silviya Nancy J. "Client Aware Scalable Cloudlet to Augment Edge Computing with Mobile Cloud Migration Service." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (July 31, 2020): 165. http://dx.doi.org/10.3991/ijim.v14i12.14407.

Full text
Abstract:
<p class="0abstract">Computing with mobile is still in its infancy due to its limitations of computational power, battery lifetime and storage capacity. These limitations hinder the growth of mobile computing, which in-turn affects the growth of computationally intensive applications developed for the mobile devices. So in-order to help execute complex applications within the mobile device, mobile cloud computing (MCC) emerged as a feasible solution. The job of offloading the task to the cloud data center for storage and execution from the mobile seems to gain popularity, however, issues related to network bandwidth, loss of mobile data connectivity, and connection setup does not augment well to extend the benefits offered by MCC. Cloudlet servers filled this gab by assisting the mobile cloud environment as an edge device, offering compute power to the connected devices with high speed wireless LAN connectivity. Implementation constraints of cloudlet faces severe challenges in-terms of its storage, network sharing, and VM provisioning. Moreover, the number of connected devices of the cloudlet and its load conditions vary drastically leading to unexpected bottleneck, in which case the availability to server becomes an issue. Therefore, a scalable cloudlet, Client Aware Scalable Cloudlet (CASC) is proposed with linear regression analysis, predicting the knowledge of expected load conditions for provisioning new virtual machines and to perform resource migration.</p>
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "LT. Mobile devices"

1

Grigaravičius, Gytis. "Kriptografinių algoritmų įtaka energijos suvartojimui mobiliuose įrenginiuose." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130821_140343-63913.

Full text
Abstract:
Magistro baigiamaje darbe nagrinėjama plačiai naudojamų asimetrinių ir simetrinių šifrų bei maišos funkcijų įtaka mobilių įrenginių energijos suvartojimui. Darbe ištirti AES, Camellia ir Serpent simetriniai blokiniai ir RC4 simetrinis srautinis šifras. Tirti asimetriniai šifrai: RSA, DSA, ECDSA ir ElGamal bei MD5, SHA1, SHA2 ir Whirlpool maišos funkcijos. Suformuluotas ir pasiūlytas baterijos elgsenos matematinis modelis. Skirtingi kriptoalgoritmai palyginti energijos sąnaudų atžvilgiu ir atrinkti našiausi kiekvieno tipo šifrai.
Main topic of Master thesis is analysis on how widely used asymmetric and symmetric ciphers and hash functions influence energy consumption then used on mobile devices. In this paper AES, Camellia and Serpent block ciphers and RC4 stream cipher are being analyzed. There were RSA, DSA, ECDSA and ElGamal asymmetric ciphers and MD5, SHA1, SHA2 and Whirlpool hash function analyzed too. Proposed mathematical model of battery behaviour. Different ciphers were compared to each other and energy-wise best one are pointed out from each cipher type.
APA, Harvard, Vancouver, ISO, and other styles
2

Packevičius, Šarūnas. "Nuotolinis modulių testavimas mobiliesiems įrenginiams." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050525_123231-41975.

Full text
Abstract:
Software for mobile devices is becoming increasingly popular. The limited resources and limited user interface brings new issues in software development process for mobile devices. These limitations should be considered especially in design and testing phases of software development process. The software for mobile devices can not be thoroughly tested, because unit tests can not be stored in mobile device due to the lack of storage on it. Testing results can not be easily observed on small screens of mobile devices. This work depictures the influence of mobile technologies to software development process. The influence is exemplified with a project “Mobile Professor”. This work concentrates on problems encountered in software testing process for mobile devices especially in unit testing. The work presents other authors suggested solutions for earlier mentioned problems, and also suggest the new approach for performing unit testing for mobile devices, which does not suffer for these limitations of mobile devices. Existing and suggested methods are compared and evaluated experimentally.
APA, Harvard, Vancouver, ISO, and other styles
3

Masiulionytė, Vaida. "NURBS paviršiai mobiliuosiuose įrenginiuose." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20140702_195113-10074.

Full text
Abstract:
Darbe yra apžvelgiamos NURBS paviršių atvaizdavimo realizavimo problemos mobiliesiems įrenginiams. Pagrindinis darbo tikslas yra įsitikinti tokios realizacijos galimumu, bei surasti kiek įmanoma efektyvesnį būdą, išsprendžiantį mobiliųjų platformų realizacijų problemas. Dar vienas tikslas, sukurti prototipinį sprendimą, padengiantį NURBS standartą. Analizei pasirinkta M3G mobiliosios grafikos standartas, kuris šiuo metu yra labiausiai paplitęs. Realizacijų palyginimui buvo pasirinkti du algoritmai: Oslo ir tiesioginis. Atlikus veikimo analizę nustatyta, jog tiesioginis algoritmas yra efektyvesnis, kurio pagrindu buvo išbaigtas NURBS standartas, realizuojant Trimmed NURBS modelius.
In the thesis it is analyzed the problems related with NURBS rendering implementation for mobile devices. The main goal of the thesis is to make find out if such implementation is possible at all and to find most effective way to implement it. One more goal is to create a prototype implementation for NURBS standard including Trimmed NURBS. M3G mobile graphics platform was chosen for analysis, which is mostly adopted across the vendors nowadays. There was chosen two rendering algorithms for analysis purposes: Oslo and directional. During analysis it was discovered, that Directional algorithm is more effective than Oslo, and it was adapted to prototype solution – Trimmed NURBS.
APA, Harvard, Vancouver, ISO, and other styles
4

Banionis, Mindaugas. "Rijndael simetrinio šifravimo algoritmo tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_135849-39782.

Full text
Abstract:
Šiuolaikinės technologis tobulėja labai sparčiai – itin greiti dedikuoti serveriai, didelio pralaidumo interneto kanalai, leidžia vis daugiau taikomųjų programų perkelti į virtualią erdvę, vadinamą „Debesų kompiuterija“. Šioje erdvėje vykstantys procesai užtikrina, kad visi viešinami kompiuteriniai resursai, pvz., programinė ir techninė įranga bei interneto srautas būtų optimaliai paskirstytas. Tai suteikia palankias sąlygas atsirasti naujoms paslaugoms: daugialypės informacijos transliavimas, dokumentų redagavimas internete ir pan. Tokio tipo paslaugos yra paremtos „plono kliento“ architektūra, kuri ypač svarbi mobiliesiems įrenginiams. Pagrindinis šios architektūros privalumas – taikomosios programos, kurioms reikia daug skaičiavimo išteklių, gali būti vykdomos serveriuose, o rezultatai pateikiami mobiliųjų įrenginių ekranuose. Faktas, jog programos nėra vykdomos mobiliajame įrenginyje, sumažina tikimybę, jog svarbi informacija bus užkrėsta virusų, kirmėlių. Tarp daugelio egzistuojančių mobiliųjų įrenginių problemų, noriu išskirti dvi: energijos sąnaudos ir informacijos apsauga. Pirmoji problema egzistuoja dėl neadekvataus progreso tarp kompiuterinių resursų ir baterijos energijos talpos (pvz., procesoriaus sparta per kelis metus padidėja keletą kartų, tačiau baterijos energijos talpa padvigubinama tik kartą į dekadą). Antroji problema yra artymai susijusi su pirmąją. Šiandien žmonės nori dirbti įvairiose vietose, tad atsiranda grėsmė, jog mobilus įrenginys, įskaitant... [toliau žr. visą tekstą]
Nowadays technologies are being improved rapidly – extremely fast dedicated servers, high internet and network throughput, enables more and more applications to be moved to a virtual space, which is called ‘Cloud computing’. Cloud computing is responsible that all shared computer resources, like Software, Hardware and Network would be allocated for services in optimal way. This feature enables to appear new services, like media streaming, documents editing online etc. This kind of services are based on ‘Thin client’ architecture, which is especially important for mobile devices. Main feature of this architecture is that applications which require many computations, now can be executed in dedicated servers and results can be displayed in mobile device screen. Fact, that aplication is not executed in mobile device environment decreases probability that important information will be infected by viruses, worms etc. However, between many existing problems with mobile devices there are two major which should be stated in the first place: energy consumption and information security. The first issue is due to inadequate progress of computational resources and battery energy power (e.g., CPU speed, memory capacity is being increased several times within a few years, while battery power doubles only in a decade). The second issue is closely related with the first one. Today people want to work anywhere, so there is abillity that mobile devices including important information could... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
5

Neverdauskaitė, Vaida. "Asmeninių įrenginių saugaus konfigūravimo sprendimų paramos sistema." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130821_153046-89372.

Full text
Abstract:
Mobilieji įrenginiai tobulėja ir pateikia vis daugiau galimybių jų vartotojams. Tokie įrenginiai naudojami tiek asmeniniais, tiek darbo tikslais, kas sukelia papildomų saugos grėsmių įmonėms. Esant tokiai situacijai, reikalingos papildomos valdymo priemonės, kurios užtikrintų asmeninių įrenginių saugos konfigūravimą, atitinkantį organizacijos saugos politiką. Organizacijos saugos politika privalo atsižvelgti į dvi pagrindines sritis: organizacijos sistemų saugumą ir mobiliojo įrenginio saugumą. Magistrinio darbo tikslas – išnagrinėti mobiliesiems įrenginiams keliamas grėsmes bei sudaryti mobiliųjų įrenginių saugios konfigūracijos paramos sistemos prototipą.
The mobile industry is evolving rapidly and new mobile devices with sophisticated capabilities are released almost every day. The technical advancements in mobile industry have resulted in increase of security threats and attacks. To provide strong security mechanism a combination of solutions need to be implemented at different levels based on enterprise mobile application security requirements. Enterprise mobile security should ensure two key components: enterprise system security and device security. The aim of this paper is to create secure configuration decision support system prototype for personal devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Miliauskas, Evaldas. "Mobilaus įrenginio ir serverio duomenų sinchronizacijos galimybių tyrimas esant nepastoviam interneto ryšiui." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090824_151955-11668.

Full text
Abstract:
Duomenų sinchronizacija yra neatsiejama šiomis dienomis, kuomet eina kalba apie paskirstytas aplikacijas, kurios veikia mobiliuose įrenginiuose. Kuomet duomenys yra sinchronizuojami mobiliajame įrenginyje, jų vartotojai yra nepriklausomi nuo duomenų serverio ir gali laisvai naudotis lokaliais duomenis atsijungę nuo tinklo. [14] Šiame darbe išnagrinėjome galimas duomenų prieigos architektūras: 1. Visuomet atsijungęs 2. Visuomet prisijungęs 3. Mišrus Taip pat aptarėme techninės realizacijos ypatumus, problemas su kuriomis susiduriama, kuriant sinchronizacijos algoritmus bei būtiną informaciją reikalingą šių algoritmų funkcionavimui (ID valdymas, pakeitimų sekimas, greita/lėta sinchronizacija ir kt.). Projektinėje dalyje buvo išnagrinėtos jau egzistuojančios sistemos architektūra, bei aprašyti reikalingi pakeitimai, tam kad būtų galima įtraukti sinchronizacijos procesą į sistemos funkcionalumą. Galiausiai detaliai išanalizavome mišrios duomenų prieigos architektūrą, jos paskirtį, privalumus ir trūkumus. Taip pat sudarėme imitacinį modelį pagal šios architektūros principus panaudodami sudėtingų sistemų formalizavimo agregatinį metodą bei atlikome jo parametrų analizę.
Distributed applications are modeled around replicating copies of the same data on many hosts in a network for a variety of reasons. For one, system designers can alleviate the single-server implosion problem and instead distribute client requests for data across many hosting servers. Second, making data locally available on a host speeds up applications because the applications do not block for network input/output as data is transmitted. In this work we have analyzed several data access architectures: 1. Always offline 2. Always online 3. Mixed architecture Also we have described technical implementation details, problems which occur developing synchronization algorithms and mandatory information which is needed for these algorithms to work correctly (ID handling, change detection, fast/slow synchronization etc.). Furthermore, we investigated existing system architecture and defined mandatory changes needed for incorporating synchronization process into system functionality. Finally, we did detail analysis of mixed data access architecture, which included real world appliance, pros and cons. After that we created a model using complex systems formalization aggregation method which was based on these architecture principles. Also we did models parameter analysis in experimental part.
APA, Harvard, Vancouver, ISO, and other styles
7

Gelvonauskis, Laurynas. "Internetinės vartotojo sąsajos mobiliesiems įrenginiams tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090306_131527-31672.

Full text
Abstract:
Šiame darbe sprendžiama mobiliųjų įrenginių internetinės vartotojo sąsajos vartojamumo problema, kuri kuo toliau, tuo labiau tampa aktualesnė, kadangi vis daugiau paslaugų bei veiklos procesų yra perkeliama į mobiliąją erdvę. Vartojamumas tampa vienas iš svarbesnių veiksnių, lemiančių internetinės sistemos išlikimo bei naudojimo perspektyvas. Tačiau išlieka atviras klausimas – ar kuriant internetinę sistemą tikslinga investuoti laiką bei resursus ir greta įprastinės vartotojo sąsajos vystyti dar ir mobiliesiems įrenginiams pritaikytą sąsają. Nagrinėjama sritis yra pakankamai nauja todėl tokio pobūdžio tyrimai arba bent jau jų rezultatai dar nėra plačiai paplitę bei skelbiami. Analizės metu buvo išnagrinėti vartojamumo tyrimo metodai bei mobiliųjų įrenginių internetinės vartojo sąsajos rekomendacijos. Pasitelkus dalį išanalizuotų metodų vartojamumo požiūriu buvo ištirtos dvi eksperimentinės tos pačios sistemos vartotojo sąsajos – mobilioji bei įprastinė, naudojamos mobiliajame įrenginyje. Eksperimentui reikalingos vartotojo sąsajos buvo realizuotos sukūrus bei įdiegus „naujienų tinklaraščio“ informacinę sistemą, turinčią tiek įprastinę tiek mobiliesiems įrenginiams pritaikytas vartotojo sąsajas. Vartojamumo tyrime buvo panaudoti trys vartojamumo tyrimo metodai, kurių pagalba sistemos vartojamumas tiriamas keliais aspektais: rekomendacijų laikymasis, sistemos techninės savybės, vartotojo sąveika su sistema. Gauti rezultatai leidžia daryti išvadą, jog kuriant internetinę... [toliau žr. visą tekstą]
Mobile technologies are evolving very fast and according to specialists they will become the main tool used to access the internet in the 10 next years. So it is natural that more and mode services are served through mobile internet. As all regular applications, mobile web applications should be usable and user friendly. These aspects make a quite big influence on success of software. The main goal of this work is to make a usability research on web user interface for mobile devices. This research will show if there is a sense to make separate user interface for mobile devices when you are going to develop web system which will be also used by mobile devices users. The field of this work is web user interface for mobile devices and its usability. The object of this work is user interface usability research methodology.
APA, Harvard, Vancouver, ISO, and other styles
8

Tarasevičius, Regimantas. "Mobiliojo ryšio aparatų remonto valdymo informacinė sistema." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112421-71432.

Full text
Abstract:
Darbo analitinėje dalyje išanalizuota įmonės UAB „Mobili garantija“ remonto darbų veikla, analizei atlikti sudaryti detalūs duomenų srautų bei duomenų struktūrų modeliai. Siekiant nustatyti, ar rinkoje egzistuoja galimas problemos sprendimas, atlikta rinkoje siūlomų produktų apžvalgą. Nusprendus kurti naują remonto darbų valdymo informacinę sistemą, apibrėžti kuriamos informacinės sistemos funkciniai ir nefunkciniai reikalavimai, pasirinktos priemonės informacinės sistemos realizavimui. Projektinėje darbo dalyje panaudojimo atvejų modelis detalizuojamas veiklos diagramų schemomis. Remiantis duomenų struktūrų modeliais suprojektuotas duomenų bazės modelis, aprašytos duomenų bazės lentelių struktūros. Remiantis duomenų bazės lentelių struktūra, sudaryti vartotojo sąsajos modeliai. Pateikiamas kuriamos informacinės sistemos navigavimo planas bei langų ir formų aprašymai. Sistemos testavimo ir kokybės įvertinimo dalyje aprašomas sistemos diegimas, sudaromas sistemos įvertinimo planas. Siekiant įvertinti sistemos funkcionalumą atliekamas sistemos testavimas, kurio rezultatai pateikiami lentelėje. Taip pat pateikiami anketinės apklausos apibendrinti duomenys.
The subject of this work is computerization of repairs works management process. During the analysis of UAB "Mobili garantija" repairs management, detailed data flow and the data structure models were created. Available products offering partial solutions to the problem were overviewed and compared. Functional and non-functional requirements for the repairs management information system were defined. In the projecting section of this document, detailed activity diagrams along with a specification of a developed database model are presented. A detailed navigation plan along with specifications of each user form and report concludes this section of the document. The tests of the finished information system revealed full compliance with the specified requirements. System user survey was carried out to make more precise quality evaluations. The survey showed that users were generally satisfied with both performance and functionality of the new system. Pilot implementation of the system showed that it meets the defined requirements and can be safely used by UAB "Mobili garantija" for repairs management.
APA, Harvard, Vancouver, ISO, and other styles
9

Račkauskas, Kazys. "Automatizuoto grafinės vartotojo sąsajos mobiliuose įrenginiuose testavimo tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2007. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2007~D_20070816_143958-67513.

Full text
Abstract:
Naujuose programiniuose produktuose plačiai taikoma mobilioji įranga (mobilieji telefonai, delniniai kompiuteriai). Programinės įrangos kūrimo procese svarbią vietą užima testavimas. Dabartinių mobiliųjų įranginių apribojimai (darbo sparta, atminties kiekis, energija, ekrano dydis, platformų įvairumas) kelia naujas problemas programinės įrangos kūrimo procesui, tame tarpe ir testavimui. Testavimo proceso automatizavimas leidžia sumažinti bandymų trukmę, padidinti testavimo darbų apimtį. Programinės įrangos testavime mobiliems įrenginiams svarbu išskirti grafinės vartotojo sąsajos testavimą. Svarbi testavimo dalis – testavimas pagal specifikaciją. Šiame darbe nagrinėjamas grafinės vartotojo sąsajos automatizuotas testavimas mobiliai įrangai, nustatomi tikslai, galimi keliai jiems pasiekti bei galimas testavimo aplinkos praplėtimas testų generavimui pagal specifikaciją.
Mobile devices such as cell phones and personal digital assistance are widely used in new software products. Testing takes important place in software development process. Constraints of mobile devices (speed, amount of memory, energy, small screen, wide range of platforms) raise new problems for software development process including testing phase. Automated approach of software testing reduces testing time and increases testing range. It is important to distinguish graphic user interface as a special part of testing. The important part of testing is specification based testing. The aim of these master theses is to analyze automated testing of GUI for mobile devices, define testing tasks and enhance mobile device testing framework by providing means for test case generation from specification.
APA, Harvard, Vancouver, ISO, and other styles
10

Bakšys, Darius. "Mokymo informacijos transformavimas ir atvaizdavimas mobiliuose įtaisuose." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2007. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2007~D_20070816_144552-69517.

Full text
Abstract:
Darbe plačiau gvildenamas vienas iš galimų mobilaus mokymosi informacijos gavimo būdų – tai elektroninio mokymosi informacijos transformavimas ir adaptavimas mobiliuose įtaisuose, atsižvelgiant į juos įtakojančius apribojimus. Apibrėžiami transformavimo aspektai, galinčios kilti problemos, pateikiami jų sprendimo būdai – naudojamas DRESS metodas bei šakų-ribų algoritmas. Darbe atliktas žiniatinklio puslapių kūrimo rankiniu ir automatiniu būdų palyginimas, rodantis kad antrasis būdas leidžia sutaupyti laiko, nereikia mokytis naujos programavimo kalbos, informacijos nereikia naujai suvedinėti į mokymosi. Darbas apibendrinamas pateikiant užsienio tyrinėtojų atlikto informacijos apdorojimo glaustumo (thumbails) ir DRESS metodai rezultatus. Pabaigoje sukurtas magistrinio projekto dalies transformavimo modulis, atsižvelgiant į išnagrinėtus transformavimo žingsnius.
In this work is speaking about learning information transformation and adaptation for mobile device, define transformation aspect, problems, which can be, giving solution way – is using DRESS method and branch-bound algorithm. In work is giving web page creation by manual and automatic way comparison. Automatic learning information transformation way let for us save time, escape new programming language studying, information don‘t want bring into learning server – it can be receive from e.learning server. The work is summarize giving information adaptation result, where is comparing thumbails and DRESS method and which make foreign researcher. In finally, giving project transformation model, which was creared by transformations steps.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "LT. Mobile devices"

1

Adeyeye, Michael O., Adebola G. Musa, and Adele Botha. "Problem With Multi-Video Format M-Learning Applications." In Student Engagement and Participation, 1400–1439. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2584-4.ch070.

Full text
Abstract:
The browser war is far from over, and the HTML5 <video> tag has not improved video access despite its promises to work without specifying a plug-in. This chapter discusses m-learning with respect to video. It outlines the m-learning paradigm in conjunction with the technical aspects of video display in browsers, when varying media formats are used. The <video> tag used in this work renders videos from two sources with different MIME types. Feeds from the video sources, namely YouTube and UCT Matterhorn, are pulled by a Website that acts as a content aggregator. The content aggregator presents the various user-generated contents and lectures from the two repositories to both lecturers and students as a single source. By leveraging on HTML5, CSS3, and JavaScript, the application should render uniform video display and gather comments among various students, who use various personal mobile devices. Results show that a uniform display cannot be achieved when developing an application for personal mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Adeyeye, Michael O., Adebola G. Musa, and Adele Botha. "Problem with Multi-Video Format M-Learning Applications." In E-Learning 2.0 Technologies and Web Applications in Higher Education, 294–330. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4876-0.ch015.

Full text
Abstract:
The browser war is far from over, and the HTML5 &lt;video&gt; tag has not improved video access despite its promises to work without specifying a plug-in. This chapter discusses m-learning with respect to video. It outlines the m-learning paradigm in conjunction with the technical aspects of video display in browsers, when varying media formats are used. The &lt;video&gt; tag used in this work renders videos from two sources with different MIME types. Feeds from the video sources, namely YouTube and UCT Matterhorn, are pulled by a Website that acts as a content aggregator. The content aggregator presents the various user-generated contents and lectures from the two repositories to both lecturers and students as a single source. By leveraging on HTML5, CSS3, and JavaScript, the application should render uniform video display and gather comments among various students, who use various personal mobile devices. Results show that a uniform display cannot be achieved when developing an application for personal mobile devices.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "LT. Mobile devices"

1

Haslbeck, Matthias, Thomas Hertle, and Thomas Braml. "Application of mobile devices for the rapid assessment of masonry arch bridges – worked example and benchmarking." In IABSE Congress, Ghent 2021: Structural Engineering for Future Societal Needs. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2021. http://dx.doi.org/10.2749/ghent.2021.0793.

Full text
Abstract:
<p>Reassessment of masonry arches necessitates feasible methods for analysing the static behaviour of the persisting structure and an applicable way how to calculate the remaining load bearing capacity. Especially when a quick assessment of a structure is necessary, easily measurable characteristics, such as geometric properties have to be used. In this paper, the existing Application BRASSCO-NG is extended for masonry arch bridges by implementing the methodology described in paper [16] of this conference proceedings. Embedded into a worked example, the application of the tool is explained in detail from the first reconnaissance to the interpretation of the results. A subsequent benchmark evaluation to the static calculation and the empirical MEXE methodology compares the outcome to the techniques currently used in military and civil engineering. Even though the tool is mainly aimed for military application, the basic structure can easily be adopted for civil use, e.g. the rapid assessment of a structure after a natural disaster.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Haslbeck, Matthias, Thomas Hertle, and Thomas Braml. "Application of mobile devices for the rapid assessment of masonry arch bridges – worked example and benchmarking." In IABSE Congress, Ghent 2021: Structural Engineering for Future Societal Needs. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2021. http://dx.doi.org/10.2749/ghent.2021.0793.

Full text
Abstract:
<p>Reassessment of masonry arches necessitates feasible methods for analysing the static behaviour of the persisting structure and an applicable way how to calculate the remaining load bearing capacity. Especially when a quick assessment of a structure is necessary, easily measurable characteristics, such as geometric properties have to be used. In this paper, the existing Application BRASSCO-NG is extended for masonry arch bridges by implementing the methodology described in paper [16] of this conference proceedings. Embedded into a worked example, the application of the tool is explained in detail from the first reconnaissance to the interpretation of the results. A subsequent benchmark evaluation to the static calculation and the empirical MEXE methodology compares the outcome to the techniques currently used in military and civil engineering. Even though the tool is mainly aimed for military application, the basic structure can easily be adopted for civil use, e.g. the rapid assessment of a structure after a natural disaster.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Haslbeck, Matthias, Hendrik Vallée, and Thomas Braml. "Elaboration of a rapid assessment method for masonry arches." In IABSE Congress, Ghent 2021: Structural Engineering for Future Societal Needs. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2021. http://dx.doi.org/10.2749/ghent.2021.0783.

Full text
Abstract:
<p>Reassessment of masonry arches necessitates feasible methods for analysing the static behaviour of the persisting structure. In this paper, a method is presented that gives an approximation of the load bearing capacity using only very few geometrical dimensions. Unlike other commercial software kits, the methodology is not tailored to do an exact structural analysis using as-built drawings and documentations, but it is made for a rapid classification of civil engineering structures in the field. Characteristics of the proposed methodology are the analysis using thrust lines and the minimized time consumption for the exploration of the structural properties, which makes the approach the first choice for rapid classification tasks within the German Armed Forces. The application that will be delivered as an App for tablets and other mobile devices shall be used for rapid classification of masonry arches with regard to the crossing of military vehicles, but can easily be adapted for civil applications. For a worked example on the presented methodology, see [25].</p><p><br clear="none"/></p>
APA, Harvard, Vancouver, ISO, and other styles
4

Haslbeck, Matthias, Hendrik Vallée, and Thomas Braml. "Elaboration of a rapid assessment method for masonry arches." In IABSE Congress, Ghent 2021: Structural Engineering for Future Societal Needs. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2021. http://dx.doi.org/10.2749/ghent.2021.0783.

Full text
Abstract:
<p>Reassessment of masonry arches necessitates feasible methods for analysing the static behaviour of the persisting structure. In this paper, a method is presented that gives an approximation of the load bearing capacity using only very few geometrical dimensions. Unlike other commercial software kits, the methodology is not tailored to do an exact structural analysis using as-built drawings and documentations, but it is made for a rapid classification of civil engineering structures in the field. Characteristics of the proposed methodology are the analysis using thrust lines and the minimized time consumption for the exploration of the structural properties, which makes the approach the first choice for rapid classification tasks within the German Armed Forces. The application that will be delivered as an App for tablets and other mobile devices shall be used for rapid classification of masonry arches with regard to the crossing of military vehicles, but can easily be adapted for civil applications. For a worked example on the presented methodology, see [25].</p><p><br clear="none"/></p>
APA, Harvard, Vancouver, ISO, and other styles
5

Schroeder, W. Andreas, Thomas S. Stark, Arthur L. Smir, and George C. Valley. "Hot Carrier Enhancement of Dember Photorefractive Space-Charge Fields in Zincblende Semiconductors." In Photorefractive Materials, Effects, and Devices II. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/pmed.1991.mc5.

Full text
Abstract:
We use a novel, nondegenerate, polarization-sensitive, transient-grating technique1 to monitor the picosecond dynamics of the photorefractive effect in undoped CdTe and InP:Fe at 960 nm. The technique circumvents the limited temporal resolution of the two-beam coupling geometry by using a time-delayed third probe pulse (with a duration of <5 psec) to read the gratings written in the semiconductor. The technique also exploits the crystal symmetry of zincblende semiconductors by using an optically induced anisotropy in the crystal index of refraction2 to separate the photorefractive gratings from the stronger, co-existing instantaneous bound-electronic and freecarrier gratings. In both semiconductors, the photorefractive effect is associated with the Dember field between mobile electron-hole pairs, in contrast to the more conventional photorefractive space-charge field connected with the separation of a mobile carriers species from a stationary, but oppositely charged, mid-gap state. In the undoped CdTe sample, which possesses no optically-active mid-gap levels, the electron-hole pairs are produced by two-photon absorption of 1.3 eV photons across the 1.44 eV band-gap of the semiconductor. The resultant ~1 eV excess carrier energy, which allows hot carrier transport to dominate the initial formation of the space-charge field, causes up to an order of magnitude enhancement in the photorefractive effect on picosecond timescales. After the carriers have cooled and the initial overshoot in the space-charge field has decayed, the photorefractive effect is observed to decay as the Dember field is destroyed by ambipolar diffusion of the electron-hole pairs across the grating period. In InP:Fe on the other hand, the electron-hole pairs are produced predominantly by direct single-photon band-to-band absorption into the band-tail of the semiconductor (band-gap ~1.35 eV), since the iron dopant only dominates the linear absorption at longer wavelengths. This means that the carriers are generated with little excess energy. Consequently, no hot carrier enhancement of the photorefractive effect was observed, and once formed, the Dember space-charge field decayed directly by ambipolar diffusion.
APA, Harvard, Vancouver, ISO, and other styles
6

Mahe´, C., F. Lamadie, Ph Girones, and C. Le Goaller. "Recent Progress in Low-Level Gamma Imaging." In The 11th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2007. http://dx.doi.org/10.1115/icem2007-7046.

Full text
Abstract:
The CEA’s Aladin gamma imaging system has been operated successfully for several years in nuclear plants and during decommissioning projects with additional tools such as gamma spectrometry detectors and dose rate probes. The radiological information supplied by these devices is becoming increasingly useful for establishing robust and optimized decommissioning scenarios. Recent technical improvements allow this gamma imaging system to be operated in low-level applications and with shorter acquisition times suitable for decommissioning projects. The compact portable system can be used in places inaccessible to operators. It is quick and easy to implement, notably for onsite component characterization. Feasibility trials and in situ measurements were recently carried out under low-level conditions, mainly on waste packages and glove boxes for decommissioning projects. This paper describes recent low-level in situ applications. These characterization campaigns mainly concerned gamma emitters with γ energy < 700 keV. In many cases, the localization of hot spots by gamma camera was confirmed by additional measurements such as dose rate mapping and gamma spectrometry measurements. These complementary techniques associated with advanced calculation codes (MCNP, Mercure 6.2, Visiplan and Siren) offer a mobile and compact tool for specific assessment of waste packages and glove boxes.
APA, Harvard, Vancouver, ISO, and other styles
7

Wild, Karl J., Torsten Schmiedel, and John K. Schueller. "<i>Measuring the Sharpness of Knives in Agricultural Machinery with a Mobile Device</i>." In 2018 Detroit, Michigan July 29 - August 1, 2018. St. Joseph, MI: American Society of Agricultural and Biological Engineers, 2018. http://dx.doi.org/10.13031/aim.201801602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yinon, Lital, Nickolas J. Themelis, and V. Faye McNeill. "Ultrafine Particles From WTE and Other Combustion Sources." In 18th Annual North American Waste-to-Energy Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/nawtec18-3581.

Full text
Abstract:
The size of combustion generated particles ranges from a few nanometers up to 1 micron, whereas the size of naturally occurring PM such as pollens, plant fragments, and sea salt is generally larger than 1 micron. Particles generated by photochemical processes in the atmosphere are generally smaller than 1 micron. Ultrafine particles (UFP), also called “nanoparticles”, are <0.1 micron and in recent yearshave attracted attention due to potential adverse health effects associated with them. The contribution of UFP to the total PM mass is very small. However, they dominate the total number of particles in urban aerosols. Their sources are both mobile and stationary combustion sources and also gas-to-particle conversions. In coal and waste combustion systems, UFP are hypothesized to be generated mainly by nucleation of metal vapors. Coal naturally contains a vast range of inorganic elements among which are heavy metals. Sources of heavy metals in MSW include batteries, electronic devices, light bulbs, house dust and paint chips, food containers, used motor oils, plastics, yard wastes and some papers. The input of these metals into WTE facilities can be controlled by better source-separation of metal-containing materials. In 2007 almost 50% of the approximately 4.16 billion MWh generated in the United States was produced by coal power plants whereas only 0.3% was generated by the WTE industry. A preliminary study has shown that in terms of contribution to UHF in the atmosphere, MSW combustion has a minor effect in comparison to coal-fired power plants in the U.S. This paper will report on the results of this investigation.
APA, Harvard, Vancouver, ISO, and other styles
9

Märtin, Christian, Jürgen Engel, and Christian Herdin. "A Model-based Environment for building and running Situation-aware Interactive Applications." In 8th International Conference on Human Interaction and Emerging Technologies. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002754.

Full text
Abstract:
Situation-aware software systems open unique perspectives for improved goal achievement characteristics for both users and software suppliers. Such interactive systems give users individualized user experience, provide runtime-adaptive user in-terfaces, allow for situation-dependent task planning capabilities and can trigger ser-vice activations when the situational context changes.Situation-awareness is an evolution of the concept of context-aware computing that was first proposed for distributed mobile computing in [7]. In addition to software responsiveness when dynamically migrating applications to other devices and loca-tions, the notion of context then also included aspects related to the interacting people and the environment.The term situation-awareness was first established in psychology and the cognitive sciences. It was used for describing support systems for human operators in complex situations. By defining situation-dependent requirements correct and smooth interac-tive task accomplishment could be facilitated [3], [4]. For such systems, considering the changes of the interactive context over time plays an important role. The complete cognitive process of perception of the users is dependent on contextual information encountered during the interactive processing of tasks. To capture the individual requirements of a situation, Chang in [1] has suggested that a situation specification must cover the user’s operational environment E, the user’s social behavior B, by interpreting his or her actions, and a hidden context M that includes the user’s mental states and emotions. A situation Sit at a given time t can thus be defined as Sit = &lt;M, B, E&gt;t. A user’s intention for using a specific soft-ware service for reaching a goal can then be formulated as a temporal sequence (Sit1, Sit2, …, Sitn), where Sit1 is the situation that triggers the usage of a service or a task execution and Sitn is the goal-satisfying situation.This model provides a good starting point for the construction of situation-aware applications. However, for recognizing and evaluating situations, the hidden context M, i.e., the user’s emotions, intentions and cognitive load must be made visible and exploitable. Adaptive situation-aware software systems need cognitive and analytic capabilities to interpret the multitude of available emotional and bio-physical signals as well as application and contextual meta-data to being able to infer a goal-reaching set of adaptations.Rather than providing situation-awareness separately for each developed applica-tion, we present an integrated model-based environment for building and running dynamically adaptive situation-aware applications. Therefore, we follow a combined approach by linking the PaMGIS (Pattern-Based Modeling and Generation of Inter-active Systems) MBUID-framework [2] and its domain and user interface models with SitAdapt, a high-resolution observation platform with an integrated user-centric adap-tation component [5]. SitAdapt offers functionality for visual emotion recognition, eye- and gaze-tracking, pulse-rate-tracking, EEG-signal recording, as well as various other bio-physical signal monitoring capabilities. For integrating the necessary rea-soning capabilities, we have introduced situation rules that have access to both, the observed raw-situations, and the modeling resources of the MBUID.We have tested the SitAdapt system with different e-commerce web-applications, e.g., an existing beauty products shopping portal that was enhanced with situation-awareness capabilities and runtime adaptivity [6]. In this environment we also con-ducted two user studies for evaluating the monitoring features and adaptive power of the system with respect to functionality and user experience.In this paper we will discuss the exemplary construction process and runtime-operation of an adaptive situation-aware web-application for travel-booking. We will demonstrate the different steps of the building process that derive application structure and functionality from the task and domain models of the application and apply vari-ous HCI-patterns as well as design and layout models for generating the interactive parts of the source code. We then will describe the observation process that records individual situation profiles during interactive sessions. We will finally discuss the adaptation process that creates a priori adaptations based on the parsing of user and environment models and dynamic runtime-adaptations that are triggered by situation rules fired when a user-specific situation profile encounters conditions that were speci-fied in the situation-rule model of the application. We will conclude the paper with a discussion of ethical and privacy issues arising when confronting users with such powerful monitoring systems. We will also give a short outlook on assessing situation-rule performance and optimizing the rules by implementing a reinforcement learning-component in the future.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography