To see the other types of publications on this topic, follow the link: MOBILE COMPUTING MODEL.

Dissertations / Theses on the topic 'MOBILE COMPUTING MODEL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'MOBILE COMPUTING MODEL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Brander, William. "A model for adaptive multimodal mobile notification." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/699.

Full text
Abstract:
Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
APA, Harvard, Vancouver, ISO, and other styles
2

Momin, Kaleem A. "A transaction execution model for mobile computing environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ54939.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vieira, André Fonseca dos Santos Dias. "Context-aware personalization environment for mobile computing." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8649.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Currently, we live in a world where the amount of on-line information vastly outstrips any individual’s capability to survey it. Filtering that information in order to obtain only useful and interesting information is a solution to this problem. The mobile computing area proposes to integrate computation in users’ daily activities in an unobtrusive way, in order to guarantee an improvement in their experience and quality of life. Furthermore, it is crucial to develop smaller and more intelligent devices to achieve this area’s goals, such as mobility and energy savings. This computing area reinforces the necessity to filter information towards personalization due to its humancentred paradigm. In order to attend to this personalization necessity, it is desired to have a solution that is able to learn the users preferences and needs, resulting in the generation of profiles that represent each style of interaction between a user and an application’s resources(e.g. buttons and menus). Those profiles can be obtained by using machine learning algorithms that use data derived from the user interaction with the application, combined with context data and explicit user preferences. This work proposes an environment with a generic context-aware personalization model and a machine learning module. It is provided the possibility to personalize an application, based on user profiles obtained from data, collected from implicit and explicit user interaction. Using a provided personalization API (Application Programming Interface) and other configuration modules, the environment was tested on LEY (Less energy Empowers You), a persuasive mobile-based serious game to help people understand domestic energy usage.
APA, Harvard, Vancouver, ISO, and other styles
4

Frank, Christopher E. "An Egocentric Spatial Data Model for Intelligent Mobile Geographic Information Systems." Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/FrankCE2003.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Jiajun. "Understanding consumers' acceptance of mobile payments : a theoretical model and empirical validation." Thesis, University of Portsmouth, 2007. https://researchportal.port.ac.uk/portal/en/theses/understanding-consumers-acceptance-of-mobile-payments(5b1ab076-9225-40cb-8e48-ea620ad1d512).html.

Full text
Abstract:
This research investigates consumer acceptance of mobile payments. Mobile payments offer an alternative payment method for consumers, and allow consumers to make point-of-sales payments through mobile devices, such as mobile phones and Personal Digital Assistants (PDAs). It aims to present a better understanding of mobile payments, developing a consumer acceptance model for mobile payments. Moreover, it offers a reference and a source of literature for the industry and academic researchers in this new information systems research domain. This thesis focuses on consumer acceptance of mobile payments, and explores and investigates the factors that influence consumer acceptance of mobile payments. The lack of literature and empirical research in the field of mobile payments encouraged the development of a research framework to elucidate the acceptance of mobile payments by consumers. The present research has been conducted in order to offer a more in-depth understanding of consumers’ perspectives on mobile payments. The Technology Acceptance Model (TAM) and Innovation Diffusion Theory (IDT) have been introduced into this research, offering a solid foundation for this research and the development of a research model. A mixed methods approach was adopted for the research in this thesis. The research started with a qualitative method, using a focus group to investigate potential mobile payment users concerning usage, issues and adoption via open-ended questions. This process was followed by an example of mobile payment being identified and explored to understand mobile payments: a closed-ended questionnaire was used in this part of the research study. Study two is a case study, the selected case being ZOOP mobile payments. At the time of this research, ZOOP was a successful commercial infraredbased mobile payments system. These two studies offer rich information regarding the attitude and behaviour of mobile payments users toward mobile payments, and the expectations and concerns of potential users. The data and results from study one and study two were important as background material and for reference, and they also offer a context for the interpretation of the data from study three. Therefore, through these processes, a solid foundation for this research has been established. The proposed research model has been used in study three to address the research question in conjunction with evaluating the research model. The relationships between the potential factors in the research model have also been identified. The conceptual framework presented in this research is based on two well-known theories, IDT and TAM. Study three obtained two sets of data. The first survey was for all mobile payments users around the globe, and the second survey focused on one particular mobile payments service in the UK. The second set of data is designed to confirm the result from the first set of data. This rigorous process provides a solid model of consumer acceptance of mobile payments. The data has been analysed through Structural Equation Modelling (SEM) via Linear Structural RELationships (LISREL) computer application software. The study has successfully evaluated the research model and obtained results. Moreover, the survey instruments used have also been validated in this study. This empirical research is used to improve the understanding of the phenomenon of mobile payments. Moreover, it offers insight into the attitudes and behaviour of consumers towards using mobile payments. In study one, focus group studies identified the reasons for adopting mobile payment systems, for example, a convenient service. Concerns about using the services, for instance, security, have also been identified. Furthermore, the second study surveyed ZOOP mobile payment users in South Korea: it also identified that convenience, ease of use, and a safe service would attract consumers to use the service. Both studies have provided valuable information for academics and the industry to understand why consumers would like to use mobile payments and also their concerns. The results of the study have confirmed the importance of the identified factors for consumer acceptance of mobile payments. Apart from TAM and IDT, respondents note that perceived costs, perceived trust, perceived system quality, and social influence are important to them. The results of this research study should be of interest to both academic and business communities. The research in this thesis expands the usage of the TAM model in Information Systems (IS) research, validates and extends the TAM model within the mobile payments domain, and develops a new model of mobile payment adoption. Moreover, the results are of value to the business communities interested in developing and implementing mobile payment systems. Potential service providers would benefit from an improved understanding of these aspects. The identification of important factors concerning mobile payments in this study will assist them to develop and implement their systems to ensure the full acceptance and continuous use of the systems. The research framework can also be used for future research related to mobile payments or mobile commerce.
APA, Harvard, Vancouver, ISO, and other styles
6

al, Nabhan Mohammad Mousa. "Adaptive, reliable, and accurate positioning model for location-based services." Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3963.

Full text
Abstract:
This thesis presents a new strategy in achieving highly reliable and accurate position solutions fulfilling the requirements of Location-Based Services (LBS) pedestrians’ applications. The new strategy is divided into two main parts. The first part integrates the available positioning technology within the surrounding LBS application context by introducing an adaptive LBS framework. The context can be described as a group of factors affecting the application behaviour; this includes environmental states, available resources and user preferences. The proposed adaptive framework consists of several stages, such as defining the contextual factors that have a direct effect on the positioning performance, identifying preliminary positioning performance requirements associated with different LBS application groups, and introducing an intelligent positioning services selection function. The second part of this work involves the design and development of a novel positioning model that is responsible for delivering highly reliable, accurate and precise position solutions to LBS users. This new model is based on the single frequency GPS Standard Positioning Service (SPS). Additionally, it is incorporated within the adaptive LBS framework while providing the position solutions, in which all identified contextual factors and application requirements are accounted. The positioning model operates over a client-server architecture including two main components, described as the Localisation Server (LS) and the Mobile Unit (MU). Hybrid functional approaches were developed at both components consisting of several processing procedures allowing the positioning model to operate in two position determination modes. Stand-alone mode is used if enough navigation information was available at the MU using its local positioning device (GPS/EGNOS receiver). Otherwise, server-based mode is utilised, in which the LS intervenes and starts providing the required position solutions. At the LS, multiple sources of GPS augmentation services were received using the Internet as the sole augmentation data transportation medium. The augmentation data was then processed and integrated for the purpose of guaranteeing the availability of valid and reliable information required for the provision of accurate and precise position solutions. Two main advanced position computation methods were developed at the LS, described as coordinate domain and raw domain. The positioning model was experimentally evaluated. According to the reported results, the LS through the developed position computation methods, was able to provide position samples with an accuracy of less than 2 meters, with high precision at 95% confidence level; this was achieved in urban, rural, and open space (clear satellite view) navigation environments. Additionally, the integrity of the position solutions was guaranteed in such environments during more than 90% of the navigation time, taking into consideration the identified integrity thresholds (Horizontal Alert Limits (HAL)=11 m). This positioning performance has outperformed the existing GPS/EGNOS service which was implemented at the MU in all scenarios and environments. In addition, utilising a simulation evaluation facility the developed positioning model performance was quantified with reference to a hybrid positioning service that will be offered by future Galileo Open Service (OS) along with GPS/EGNOS. Using the statistical t-test, it was concluded that there is no significant difference in terms of the position samples’ accuracy achieved from the developed positioning model and the hybrid system at a particular navigation environment described as rural area. The p-value was 0.08 and the level of significance used was 0.05. However, a significant difference in terms of the service integrity for the advantage of the hybrid system was experienced in all remaining scenarios and environments more especially the urban areas due to surrounding obstacles and conditions.
APA, Harvard, Vancouver, ISO, and other styles
7

TaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.

Full text
Abstract:
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source cloud platform to build our own cloud environment. The OpenStack cloud software met our requirements, but it was not mature enough. We have done a deep analysis of this platform, identified potential attack targets in it, and discuss impacts of a successful attack.In order to secure our environment, the National Institute of Standards and Technology (NIST) incident handling guideline has been applied to the cloud model, and corresponding actions for each phase has been performed. To complete our study, we have proposed a set of cloud specific approaches that fulfill the incident handling requirements. These approaches address challenges identified in the guideline adaptation process. Additionally, we have studied the feasibility and compatibility of each approach against our deployed environment.Additionally, we also have submitted a paper to IEEE CloudCom 2011 conference, based on my thesis. A draft version of the paper is included in Appendix A.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul, Rehman Bin Omer. "Mobile Edge Computing Clustering Algorithms for Pedestrian Mobility Scenarios." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
The purpose of this study is to provide a general framework for the latest trends of mobile network architectures. Edge computing brings the computing capability of the cloud to the edge of the network for minimizing the latency. In the D2D mode, Fog Nodes interact with each other. With the help of clustering, Fog nodes are categorized into two types: Fog Cluster Head (FCH) and Fog Cluster Member (FCM). In each cluster, FCMs offload the task towards their respective FCHs for computation. The characterization of the performance of system model taking into account the average energy consumption, average task delay, fairness, and packet loss. We provide results based on the numerical simulation performed in Matlab in order to show the difference in the performance of the network using different policies and clustering and cluster update frequencies. In this thesis, a theoretic framework is presented that aims to characterize the performance of Fog network with pedestrian mobility without priority approach and also pedestrian mobility with priority approach using clustering approach and compare the results. The simulation results show how the priority approach has the profound impact on the energy consumption, task delay, and packet loss and solve the problem of coverage constraint.
APA, Harvard, Vancouver, ISO, and other styles
9

Pather, Direshin. "A model for context awareness for mobile applications using multiple-input sources." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/2969.

Full text
Abstract:
Context-aware computing enables mobile applications to discover and benefit from valuable context information, such as user location, time of day and current activity. However, determining the users’ context throughout their daily activities is one of the main challenges of context-aware computing. With the increasing number of built-in mobile sensors and other input sources, existing context models do not effectively handle context information related to personal user context. The objective of this research was to develop an improved context-aware model to support the context awareness needs of mobile applications. An existing context-aware model was selected as the most complete model to use as a basis for the proposed model to support context awareness in mobile applications. The existing context-aware model was modified to address the shortcomings of existing models in dealing with context information related to personal user context. The proposed model supports four different context dimensions, namely Physical, User Activity, Health and User Preferences. A prototype, called CoPro was developed, based on the proposed model, to demonstrate the effectiveness of the model. Several experiments were designed and conducted to determine if CoPro was effective, reliable and capable. CoPro was considered effective as it produced low-level context as well as inferred context. The reliability of the model was confirmed by evaluating CoPro using Quality of Context (QoC) metrics such as Accuracy, Freshness, Certainty and Completeness. CoPro was also found to be capable of dealing with the limitations of the mobile computing platform such as limited processing power. The research determined that the proposed context-aware model can be used to successfully support context awareness in mobile applications. Design recommendations were proposed and future work will involve converting the CoPro prototype into middleware in the form of an API to provide easier access to context awareness support in mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Ntawanga, Felix Fred. "A context-aware model to improve usability of information presented on mobile devices." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020768.

Full text
Abstract:
Online information access on mobile devices is increasing as a result of the growth in the use of Internet-enabled handheld (or pocket-size) devices. The combined influence of recent enabling technologies such as Web 2.0, mobile app stores and improved wireless networks have driven the increase in online applications that allow users to access various types of information on mobile devices regardless of time and location. Examples of such applications (usually shortened to app) include: social media, such as FacebookTM App and TwitterTM App, banking applications such as (Standard Bank South Africa)TM Mobile Banking App and First National Bank (FNB) BankingTM App, and news application such as news 24TM App and BBCTM News App. Online businesses involved in buying, selling and business transaction processing activities via the Internet have exploited the opportunity to extend electronic commerce (e-commerce) initiatives into mobile commerce (m-commerce). Online businesses that interact with end user customers implement business to consumer (B2C) m-commerce applications that enable customers to access and browse product catalogue information on mobile devices, anytime, anywhere. Customers accessing electronic product catalogue information on a mobile device face a number of challenges such as a long list of products presented on a small screen and a longer information download time. These challenges mainly originate from the limiting and dynamic nature of the mobile apps operating environment, for example, dynamic location, bandwidth fluctuations and, diverse and limited device features, collectively referred to as context. The goal of this research was to design and implement a context-aware model that can be incorporated into an m-commerce application in order to improve the presentation of product catalogue information on m-commerce storefronts. The motivation for selecting product catalogue is prompted by literature which indicates that improved presentation of information in m-commerce (and e-commerce) applications has a positive impact on usability of the websites. Usable m-commerce (and e-commerce) websites improve efficiency in consumer behaviour that impacts sales, profits and business growth. The context-aware model aimed at collecting context information within the user environment and utilising it to determine optimal retrieval and presentation of product catalogue in m-commerce. An integrated logical context sensor and Mathematical algorithms were implemented in the context-aware model. The integrated logical context sensor was responsible for the collection of different types of predetermined context information such as device specification or capabilities, connection bandwidth, location and time of the day as well as the user profile. The algorithms transformed the collected context information into usable formats and enabled optimal retrieval and presentation of product catalogue data on a specific mobile device. Open-source implementation tools were utilised to implement components of the model including: HTML5, PhP, JavaScript and MySQL database. The context-aware model was incorporated into an existing m-commerce application. Two user evaluation studies were conducted during the course of the research. The first evaluation was to evaluate the accuracy of information collected by the context sensor component of the model. This survey was conducted with a sample of 30 users from different countries across the world. In-between the context sensor and main evaluation surveys, a pilot study was conducted with a sample of 19 users with great experience in mobile application development and use from SAP Next Business and Technology, Africa. Finally an overall user evaluation study was conducted with a sample of 30 users from a remote area called Kgautswane in Limpopo Province, South Africa. The results obtained indicate that the context-aware model was able to determine accurate context information in real-time and effectively determine how much product information should be retrieved and how the information should be presented on a mobile device interface. Two main contributions emerged from the research, first the research contributed to the field of mobile Human Computer Interaction. During the research, techniques of evaluating and improving usability of mobile applications were demonstrated. Secondly, the research made a significant contribution to the upcoming field of context-aware computing. The research brought clarity with regard to context-aware computing which is lacking in existing, current research despite the field’s proven impact of improving usability of applications. Researchers can utilise contributions made in this research to develop further techniques and usable context-aware solutions.
APA, Harvard, Vancouver, ISO, and other styles
11

Cavdar, Davut. "A Certificate Based Authentication Control Model Using Smart Mobile Devices For Ubiquitous Computing Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613682/index.pdf.

Full text
Abstract:
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementation is developed and successful application of the model is demonstrated. Within the prototype implementation, a mobile application is developed for access requests and sensors are used as representative local resources. Sample cases applied on the prototype demonstrate applicability and feasibility of the model.
APA, Harvard, Vancouver, ISO, and other styles
12

Chinenyeze, Samuel Jaachimma. "Mango : a model-driven approach to engineering green Mobile Cloud Applications." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/976572.

Full text
Abstract:
With the resource constrained nature of mobile devices and the resource abundant offerings of the cloud, several promising optimisation techniques have been proposed by the green computing research community. Prominent techniques and unique methods have been developed to offload resource/computation intensive tasks from mobile devices to the cloud. Most of the existing offloading techniques can only be applied to legacy mobile applications as they are motivated by existing systems. Consequently, they are realised with custom runtimes which incur overhead on the application. Moreover, existing approaches which can be applied to the software development phase, are difficult to implement (based on manual process) and also fall short of overall (mobile to cloud) efficiency in software qualityattributes or awareness of full-tier (mobile to cloud) implications. To address the above issues, the thesis proposes a model-driven architecturefor integration of software quality with green optimisation in Mobile Cloud Applications (MCAs), abbreviated as Mango architecture. The core aim of the architecture is to present an approach which easily integrates software quality attributes (SQAs) with the green optimisation objective of Mobile Cloud Computing (MCC). Also, as MCA is an application domain which spans through the mobile and cloud tiers; the Mango architecture, therefore, takesinto account the specification of SQAs across the mobile and cloud tiers, for overall efficiency. Furthermore, as a model-driven architecture, models can be built for computation intensive tasks and their SQAs, which in turn drives the development – for development efficiency. Thus, a modelling framework (called Mosaic) and a full-tier test framework (called Beftigre) were proposed to automate the architecture derivation and demonstrate the efficiency of Mango approach. By use of real world scenarios/applications, Mango has been demonstrated to enhance the MCA development process while achieving overall efficiency in terms of SQAs (including mobile performance and energy usage compared to existing counterparts).
APA, Harvard, Vancouver, ISO, and other styles
13

Bou, Abdo Jacques. "Efficient and secure mobile cloud networking." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066551.

Full text
Abstract:
MCC (Mobile Cloud Computing) est un candidat très fort pour le NGN (Next Generation Network) qui permet aux utilisateurs mobiles d’avoir une mobilité étendue, une continuité de service et des performances supérieures. Les utilisateurs peuvent s’attendre à exécuter leurs travaux plus rapidement, avec une faible consommation de batterie et à des prix abordables ; mais ce n’est pas toujours le cas. Diverses applications mobiles ont été développées pour tirer parti de cette nouvelle technologie, mais chacune de ces applications possède ses propres exigences. Plusieurs MCA (Mobile Cloud Architectures) ont été proposées, mais aucune n'a été adaptée pour toutes les applications mobiles, ce qui a mené à une faible satisfaction du client. De plus, l'absence d'un modèle d'affaires (business model) valide pour motiver les investisseurs a empêché son déploiement à l'échelle de production. Cette thèse propose une nouvelle architecture de MCA (Mobile Cloud Architecture) qui positionne l'opérateur de téléphonie mobile au cœur de cette technologie avec un modèle d'affaires de recettes. Cette architecture, nommée OCMCA (Operator Centric Mobile Cloud Architecture), relie l'utilisateur d’un côté et le fournisseur de services Cloud (CSP) de l'autre côté, et héberge un cloud dans son réseau. La connexion OCMCA / utilisateur peut utiliser les canaux multiplex menant à un service beaucoup moins cher pour les utilisateurs, mais avec plus de revenus, et de réduire les embouteillages et les taux de rejet pour l'opérateur. La connexion OCMCA / CSP est basée sur la fédération, ainsi un utilisateur qui a été enregistré avec n’importe quel CSP, peut demander que son environnement soit déchargé de cloud hébergé par l'opérateur de téléphonie mobile afin de recevoir tous les services et les avantages de OCMCA.Les contributions de cette thèse sont multiples. Premièrement, nous proposons OCMCA et nous prouvons qu'il a un rendement supérieur à toutes les autres MCA (Mobile Cloud Architectures). Le modèle d'affaires (business model) de cette architecture se concentre sur la liberté de l'abonnement de l'utilisateur, l'utilisateur peut ainsi être abonné à un fournisseur de cloud et être toujours en mesure de se connecter via cette architecture à son environnement à l'aide du déchargement et de la fédération
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this new technology, but each application has its own requirements. Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. In addition to that, the absence of a valid business model to motivate investors hindered its deployment on production scale. This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator. The OCMCA/CSP connection is based on federation, thus a user who has been registered with any CSP, can request her environment to be offloaded to the mobile operator's hosted cloud in order to receive all OCMCA's services and benefits
APA, Harvard, Vancouver, ISO, and other styles
14

Souroulla, Timotheos. "Distributed Intelligence for Multi-Robot Environment : Model Compression for Mobile Devices with Constrained Computing Resources." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302151.

Full text
Abstract:
Human-Robot Collaboration (HRC), where both humans and robots work in the same environment simultaneously, is an emerging field and has increased massively during the past decade. For this collaboration to be feasible and safe, robots need to perform a proper safety analysis to avoid hazardous situations. This safety analysis procedure involves complex computer vision tasks that require a lot of processing power. Therefore, robots with constrained computing resources cannot execute these tasks without any delays, thus for executing these tasks they rely on edge infrastructures, such as remote computational resources accessible over wireless communication. In some cases though, the edge may be unavailable, or connection to it may not be possible. In such cases, robots still have to navigate themselves around the environment, while maintaining high levels of safety. This thesis project focuses on reducing the complexity and the total number of parameters of pre-trained computer vision models by using model compression techniques, such as pruning and knowledge distillation. These model compression techniques have strong theoretical and practical foundations, but work on their combination is limited, therefore it is investigated in this work. The results of this thesis project show that in the test cases, up to 90% of the total number of parameters of a computer vision model can be removed without any considerable reduction in the model’s accuracy.
Människa och robot samarbete (förkortat HRC från engelskans Human-Robot Collaboration), där både människor och robotar arbetar samtidigt i samma miljö, är ett växande forskningsområde och har ökat dramatiskt över de senaste decenniet. För att detta samarbetet ska vara möjligt och säkert behöver robotarna genomgå en ordentlig säkerhetsanalys så att farliga situationer kan undvikas. Denna säkerhetsanalys inkluderar komplexa Computer Vision uppgifter som kräver mycket processorkraft. Därför kan inte robotar med begränsad processorkraft utföra dessa beräkningar utan fördröjning, utan måste istället förlita sig på utomstående infrastruktur för att exekvera dem. Vid vissa tillfällen kan dock denna utomstående infrastruktur inte finnas på plats eller vara svår att koppla upp sig till. Även vid dessa tillfällen måste robotar fortfarande kunna navigera sig själva genom en lokal, och samtidigt upprätthålla hög grad av säkerhet. Detta projekt fokuserar på att reducera komplexiteten och det totala antalet parametrar av för-tränade Computer Vision-modeller genom att använda modellkompressionstekniker så som: Beskärning och kunskapsdestilering. Dessa modellkompressionstekniker har starka teoretiska grunder och praktiska belägg, men mängden arbeten kring deras kombinerade effekt är begränsad, därför är just det undersökt i detta arbetet. Resultaten av det här projektet visar att up till 90% av det totala antalet parametrar hos en Computer Vision-modell kan tas bort utan någon noterbar försämring av modellens säkerhet.
APA, Harvard, Vancouver, ISO, and other styles
15

Tchankue-Sielinou, Patrick. "A model for mobile, context-aware in-car communication systems to reduce driver distractions." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/4144.

Full text
Abstract:
Driver distraction remains a matter of concern throughout the world as the number of car accidents caused by distracted driving is still unacceptably high. Industry and academia are working intensively to design new techniques that will address all types of driver distraction including visual, manual, auditory and cognitive distraction. This research focuses on an existing technology, namely in-car communication systems (ICCS). ICCS allow drivers to interact with their mobile phones without touching or looking at them. Previous research suggests that ICCS have reduced visual and manual distraction. Two problems were identified in this research: existing ICCS are still expensive and only available in limited models of car. As a result of that, only a small number of drivers can obtain a car equipped with an ICCS, especially in developing countries. The second problem is that existing ICCS are not aware of the driving context, which plays a role in distracting drivers. This research project was based on the following thesis statement: A mobile, context-aware model can be designed to reduce driver distraction caused by the use of ICCS. A mobile ICCS is portable and can be used in any car, addressing the first problem. Context-awareness will be used to detect possible situations that contribute to distracting drivers and the interaction with the mobile ICCS will be adapted so as to avert calls and text messages. This will address the second problem. As the driving context is dynamic, drivers may have to deal with critical safety-related tasks while they are using an existing ICCS. The following steps were taken in order to validate the thesis statement. An investigation was conducted into the causes and consequences of driver distraction. A review of literature was conducted on context-aware techniques that could potentially be used. The design of a model was proposed, called the Multimodal Interface for Mobile Info-communication with Context (MIMIC) and a preliminary usability evaluation was conducted in order to assess the feasibility of a speech-based, mobile ICCS. Despite some problems with the speech recognition, the results were satisfying and showed that the proposed model for mobile ICCS was feasible. Experiments were conducted in order to collect data to perform supervised learning to determine the driving context. The aim was to select the most effective machine learning techniques to determine the driving context. Decision tree and instance-based algorithms were found to be the best performing algorithms. Variables such as speed, acceleration and linear acceleration were found to be the most important variables according to an analysis of the decision tree. The initial MIMIC model was updated to include several adaptation effects and the resulting model was implemented as a prototype mobile application, called MIMIC-Prototype.
APA, Harvard, Vancouver, ISO, and other styles
16

Springer, Thomas. "Ein komponentenbasiertes Meta-Modell kontextabhängiger Adaptionsgraphen für mobile und ubiquitäre Anwendungen." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2004. http://nbn-resolving.de/urn:nbn:de:swb:14-1099484077546-72815.

Full text
Abstract:
Gegenwärtige Infrastrukturen für verteilte Dienste und Anwendungen, insbesondere das Internet, entwickeln sich zunehmend zu mobilen verteilten Systemen. Durch die Integration drahtloser Netze, mobiler bzw. dedizierter Endgeräte und nicht zuletzt durch die Mobilität der Benutzer steigt die Heterogenität und Dynamik der Systeme hinsichtlich der eingesetzten Endgeräte, Kommunikationstechnologien sowie Benutzeranforderungen und Anwendungssituationen. Diese Eigenschaften sind mobilen Systemen inhärent und bleiben trotz der fortschreitenden Entwicklung der Technologien bestehen. Daraus resultieren spezifische Anforderungen an Anwendungen und Dienste, denen insbesondere die Softwareentwicklung Rechnung tragen muss. In der vorliegenden Arbeit wird die Adaptivität von Softwaresystemen als wesentlicher Lösungsansatz für mobile verteilte Infrastrukturen thematisiert. Dazu werden wesentliche Mechanismen zur Adaption sowie der Überschneidungsbereich von Adaptionsmechanismen, "Context-Awareness" und Softwareentwicklung untersucht. Ziel ist es, Erkenntnisse über Basismechanismen und Grundprinzipien der Adaption zu gewinnen und diese zur systematischen Entwicklung adaptiver Anwendungen auszunutzen. Aus der Analyse des State-of-the-Art werden als erstes wichtiges Ergebnis der Arbeit wesentliche Basismechanismen zur Adaption identifiziert, umfassend klassifiziert und hinsichtlich eines Einsatzes in mobilen verteilten Infrastrukturen bewertet. Auf dieser Grundlage wird ein Meta-Modell zur systematischen Entwicklung adaptiver Anwendungen erarbeitet. Dieses erlaubt die Beschreibung adaptiver Anwendungen durch die Komposition von Basismechanismen zur Struktur- und Parameteradaption. Die Steuerung der Adaption durch Kontext und Meta-Informationen kann explizit beschrieben werden. Das Meta-Modell kann Entwickler beim Entwurf adaptiver Anwendungen unterstützen, stellt aber auch einen Ausgangspunkt für deren Analyse und Validierung sowie zur Kodegenerierung dar. Durch die explizite Beschreibung der verwendeten Adaptionsmechanismen und deren Abhängigkeiten von Kontext können Anwendungsmodelle außerdem zur Dokumentation verwendet werden. Im Rahmen der Validierung konnte die Integrierbarkeit der Basismechanismen und die flexible Anwendbarkeit des Modells zur systematischen Entwicklung adaptiver Anwendungen nachgewiesen werden.
APA, Harvard, Vancouver, ISO, and other styles
17

Santos, Rodríguez Patrícia. "Computing-Based Testing: conceptual model, implementations and experiments extending IMS QTI." Doctoral thesis, Universitat Pompeu Fabra, 2011. http://hdl.handle.net/10803/69962.

Full text
Abstract:
The use of objective tests in Technology Enhanced Learning (TEL) is based on the application of computers to support automatic assessment. Current research in this domain is mainly focused on the design of new question-items, being IMS Question and Test Interoperability (QTI) the recognized de-facto standard. This thesis claims that the domain can be extended with the design of advanced test-scenarios that integrate new interactive contexts for the visualization of question-items and tests, and that consider different types of devices and technologies that enable diverse activity settings. In this context, the dissertation proposes to term the domain as Computing-Based Testing (CBT) instead of Computer- Based Testing because it captures better the new technological support possibilities for testing. Advanced CBT scenarios can increase teachers’ choices in the design of more appropriate tests for their subject areas, enabling the assessment of higher-order skills. With the aim of modelling an advanced CBT domain that extends the current possibilities of QTI and related work, this thesis provides a set of contributions around three objectives. The first objective deals with proposing a Conceptual Model for the CBT domain considering three main dimensions: the Question-item, the Test and the Activity. To tackle this objective, the thesis presents, on the one hand, a framework to assist in the categorization and design of advanced CBT scenarios and, on the other hand, two models that suggest elements for technologically representing the Test and Question-item dimensions. The models are platform-independent models (PIM) that extend QTI in order to support advanced CBT. Besides, the use of patterns is proposed to complement the modelling of the domain. The second objective seeks to show the relevance, value and applicability of the CBT Conceptual Model through exemplary challenging scenarios and case studies in authentic settings. To this end, the dissertation evaluates the design and implementation of a set of CBT systems and experiments. All the experiments use the proposed CBT Conceptual Model for designing an advanced CBT scenario. For each case the CBT-PIMs serve as the basis for developing a particular CBT-PSM and system. The evaluation results show that the implementations foster educational benefits, enable the assessment of higher-order skills and enhance the students’ motivation. Finally, the third objective is devoted to propose extension paths for QTI. The collection of models proposed in the thesis suggests different extension directions for QTI so as to enable the implementation of advanced questions, tests and activities. The proposed systems and scenarios also represent reference implementation and good practices of the proposed extension paths.
El uso de test de corrección automática, en el Aprendizaje Apoyado por Tecnologías de la Información y las Comunicaciones, se basa en el uso de ordenadores. Las propuestas actuales se centran en el diseño de nuevas preguntas, siendo IMS Question and Test Interoperability (QTI) el estándar de-facto. La tesis propone que este dominio puede ser extendido con el diseño de escenarios de test avanzados que integren nuevos contextos de interacción para la visualización de preguntas y tests, y que consideren la aplicación de diversos dispositivos tecnológicos para permitir diversos tipos de actividades. En este contexto se propone usar el término inglés Computing-Based Testing (CBT) para referirse al dominio, en vez de usar el término Computer-Based Testing, enfatizando el papel de la tecnología para la evaluación basada en test. Los escenarios CBT avanzados pueden aumentar la posibilidad de que los profesores puedan diseñar test más adecuados para sus asignaturas, permitiendo la evaluación de habilidades de alto nivel. Con el reto principal de modelar el dominio del CBT extendiendo las posibilidades actuales de QTI y las aproximaciones actuales, esta tesis proporciona un conjunto de contribuciones relacionadas con tres objetivos. El primer objetivo de la tesis es proponer un Modelo Conceptual definiendo y relacionando tres dimensiones: Pregunta, Test y Actividad. Por una parte, se propone un marco como guía en la categorización y diseño de escenarios CBT. Además, se proponen dos modelos que indican los elementos para la representación tecnológica de preguntas y test. Estos modelos son independientes de plataforma (PIM) que extienden QTI formulando los elementos que permiten implementar escenarios CBT avanzados. Además, se propone el uso de patrones como complemento en el modelado del dominio. El segundo objetivo trata de mostrar la relevancia y aplicabilidad de las contribuciones a través de escenarios y casos de estudio representativos en contextos reales. Para ello, se evalúa el diseño e implementación de un conjunto de experimentos y sistemas. En todos los experimentos se utiliza el Modelo Conceptual para diseñar escenarios CBT avanzados. Para cada caso los CBT-PIMs sirven como base para desarrollar modelos específicos de plataforma (CBT-PSMs) y sistemas asociados. La evaluación muestra que las implementaciones resultantes tienen beneficios educativos positivos, permitiendo la evaluación de habilidades de alto nivel y mejorando la motivación de los estudiantes. Finalmente, el tercer objetivo se centra en proponer vías de extensión para QTI. La colección de modelos propuestos sugiere diferentes direcciones de extensión de QTI para la implementación de preguntas, tests y actividades avanzados. Los escenarios y sistemas llevados a cabo representan implementaciones de referencia y buenas prácticas para las vías de extensión propuestas.
APA, Harvard, Vancouver, ISO, and other styles
18

Rehana, Jinat. "Model Driven Development of Web Application with SPACE Method and Tool-suit." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10905.

Full text
Abstract:
Enterprise level software development using traditional software engineeringapproaches with third-generation programming languages is becoming morechallenging and cumbersome task with the increased complexity of products,shortened development cycles and heightened expectations of quality. MDD(Model Driven Development) has been counting as an exciting and magicaldevelopment approach in the software industry from several years. The ideabehind MDD is the separation of business logic of a system from its implementationdetails expressing problem domain using models. This separation andmodeling of problem domain simplify the process of system design as well asincrease the longevity of products as new technologies can be adopted easily.With appropriate tool support, MDD shortens the software development lifecycle drastically by automating a significant portion of development steps.MDA (Model Driven Architecture) is a framework launched by OMG (ObjectManagement Group) to support MDD. SPACE is an engineering methodfor rapid creation of services, developed at NTNU (Norwegian University ofScience and Technology) which follows MDA framework. Arctis and Ramsesare tool suits, also developed at NTNU to support SPACE method. Severalsolutions have been developed on Arctis tool suit covering several domainslike mobile services, embedded systems, home automation, trust managementand web services.This thesis presents a case study on the web application domain with Arctis,where the underlying technologies are AJAX (asynchronous JavaScriptand XML), GWT (Google Web Toolkit) framework and Java Servlet. Inorder to do that, this thesis contributes building up some reusable buildingblocks with Arctis tool suit. This thesis also describes a use case scenario touse those building blocks. This thesis work tries to implement the specifiedsystem and evaluates the resulting work.
APA, Harvard, Vancouver, ISO, and other styles
19

Francke, Errol Roland. "A study of development agency as an augmenter in the commercialisation of the mobile applications development SME sector in the Western Cape through business model innovation in response to disruptive innovation." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2740.

Full text
Abstract:
Thesis (DTech (Information Technology))--Cape Peninsula University of Technology, 2018.
The central thesis of this study is that a multi-factorial strategy model can be evolved to enable development agency to be an augmenter in the commercialisation of the mobile applications development SME sector through business model innovation in response to disruptive innovation. The concept of augmentation in the context of this study acknowledges that disruptive innovation is ubiquitous and that development agencies can help these SMEs to succeed through business model innovation. This can be achieved through the implementation of a multi-factorial strategy model. A multi-factorial strategy model in this context is regarded as a method or plan having stemmed or stemming from a number of different causes or influences detailing the logic and the key considerations on the path to defining an organisation’s strategy. The development agency can utilise it to determine the state of the business and what the appropriate response should be, by way of business model innovation in response to disruptive innovation. This study rests on three tenets, namely, the uncovering of the dimensions of business model innovation; the nature of disruption; and finally, the potential role of the development agency in supporting SMEs in the technology sector. The mobile application (app) economy has presented business potential for SMEs and this sector of the economy can be facilitated by development agencies. Governments make use of development agencies to assist, develop and support growth within a region through the provision of resources and assistance, usually from state organisations. The enterprise development strategy should ensure the viability of the business idea, which should lead to the creation of new business value. The fieldwork for this critical realist study consisted of five phases. Phase 1 involved interviews with academics from the four higher education institutions in the Western Cape; Phase 2 involved an interview with mobile application development SMEs; Phase 3 comprised a focused interview consisting of members from industry and the development agency; Phase 4 involved interviews with entrepreneurs within the innovation and technology sector; and Phase 5 involved interviews with development agencies supporting the development of SMEs. Despite their potential, mobile app development businesses in the Western Cape face difficulties in commercialising their applications. The study suggested that research is warranted around the establishment of a multi-factorial strategy model which could provide a strategy for enhanced commercialisation of mobile app development. This model would have to address a number of concerns, depending on the propensity of the business towards mobile app development. Research into what adjustments to the current business models of these businesses are required to enter into mobile app development was also recommended. The findings and interpretations of this critical realist study revealed a structured real world of the landscape of mobile application development in the Western Cape, South Africa, by identifying its key constructs. It then revealed that knowledge is socially produced by identifying the salient imperatives that inform the role of the development agent with respect to business model innovation and disruptive innovation. By means of critical discourse analysis of the views expressed by the respondents, it revealed the emancipation agenda of mobile application development in the Western Cape, South Africa. In doing so it also ultimately uncovered the generative mechanisms in understanding, amongst others, what the critical performance underpinnings are. It is recommended that the SME sector implement business model innovation to respond to disruptive innovation, defined as “emerging technology whose arrival in the marketplace signifies the eventual displacement of the dominant technology in that sector” (Ganguly, Nilchiani & Farr, 2010, p. 35). The proliferation of disruptive innovation has led to technological innovation and such innovation will impact on SMEs in South Africa. The concept of business model innovation suggests that SMEs should move to a progressive interdependent modality where they participate through their shared strengths. The collaboration with other mobile app development SMEs would allow for their independent weaknesses to be moderated. Through business model innovation, mobile app development SMEs should be able to respond to the disruptive innovation and ensure success and sustainability. The antidote to disruption should be progressive management by way of business model innovation. In this sense then, the antidote to disruptive innovation is a management response that should be understood across the sector in which the study is undertaken.
APA, Harvard, Vancouver, ISO, and other styles
20

Allam, Sean. "A model to measure the maturuty of smartphone security at software consultancies." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/281.

Full text
Abstract:
Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
APA, Harvard, Vancouver, ISO, and other styles
21

Chowdhury, Mohammad Jabed Morshed. "Modeling Security Risks at the System Design Stage : Alignment of Mal Activity Diagrams and SecureUML to the ISSRM Domain Model." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18336.

Full text
Abstract:
Security engineering is one of the important concerns during system development. It should be addressed throughout the whole system development process; however in many cases it is often dealt only during system development and maintenance. There are several security modeling languages (e.g, Misuse case, Secure Tropos) that help dealing with security risk management at the requirements stage. In this thesis, we are focusing on the modeling languages (e.g. Mal activity diagrams and SecureUML) that are used to design the system. More specifically we investigate how these languages support information systems security risks management (ISSRM). The outcome of this work is an alignment table between the Mal activity diagrams and SecureUML language constructs to the ISSRM domain model concepts. We ground our analysis and validate the received results on the number of illustrative examples. We hope that our results will help developers to understand how they can consider security risks at the system design stage. In addition we open the way for the interoperability between different modeling languages that are analysed using the same conceptual background, thus, potentially leading to the transformation between these modeling approaches.
APA, Harvard, Vancouver, ISO, and other styles
22

Mayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.

Full text
Abstract:
Data-centric security is significant in understanding, assessing and mitigating the various risks and impacts of sharing information outside corporate boundaries. Information generally leaves corporate boundaries through mobile devices. Mobile devices continue to evolve as multi-functional tools for everyday life, surpassing their initial intended use. This added capability and increasingly extensive use of mobile devices does not come without a degree of risk - hence the need to guard and protect information as it exists beyond the corporate boundaries and throughout its lifecycle. Literature on existing models crafted to protect data, rather than infrastructure in which the data resides, is reviewed. Technologies that organisations have implemented to adopt the data-centric model are studied. A utopian model that takes into account the shortcomings of existing technologies and deficiencies of common theories is proposed. Two sets of qualitative studies are reported; the first is a preliminary online survey to assess the ubiquity of mobile devices and extent of technology adoption towards implementation of data-centric model; and the second comprises of a focus survey and expert interviews pertaining on technologies that organisations have implemented to adopt the data-centric model. The latter study revealed insufficient data at the time of writing for the results to be statistically significant; however; indicative trends supported the assertions documented in the literature review. The question that this research answers is whether or not current technology implementations designed to mitigate risks from mobile devices, actually address business requirements. This research question, answered through these two sets qualitative studies, discovered inconsistencies between the technology implementations and business requirements. The thesis concludes by proposing a realistic model, based on the outcome of the qualitative study, which bridges the gap between the technology implementations and business requirements. Future work which could perhaps be conducted in light of the findings and the comments from this research is also considered.
APA, Harvard, Vancouver, ISO, and other styles
23

Singh, Akash. "An intelligent user interface model for contact centre operations." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/d1011399.

Full text
Abstract:
Contact Centres (CCs) are at the forefront of interaction between an organisation and its customers. Currently, 17 percent of all inbound calls are not resolved on the first call by the first agent attending to that call. This is due to the inability of the contact centre agents (CCAs) to diagnose customer queries and find adequate solutions in an effective and efficient manner. The aim of this research is to develop an intelligent user interface (IUI) model to support and improve CC operations. A literature review of existing IUI architectures, modelbased design and existing CC software together with a field study of CCs has resulted in the design of an IUI model for CCs. The proposed IUI model is described in terms of its architecture, component-level design and interface design. An IUI prototype has been developed as a proof of concept of the proposed IUI model. The IUI prototype was evaluated in order to determine to what extent it supports problem identification and query resolution. User testing, incorporating the use of eye tracking and a post-test questionnaire, was used in order to determine the usability and usefulness of the prototype. The results of this evaluation show that the users were highly satisfied with the task support and query resolution assistance provided by the IUI prototype. This research resulted in the design of an IUI model for the domain of CCs. This model can be used to assist the development of CC applications incorporating IUIs. Use of the proposed IUI model is expected to support and enhance the effectiveness and efficiency of CC operations. Further research is needed to conduct a longitudinal study to determine the impact of IUIs in the CC domain.
APA, Harvard, Vancouver, ISO, and other styles
24

Dumont, Cyril. "Système d'agents mobiles pour les architectures de calculs auto-adaptatifs." Thesis, Paris Est, 2014. http://www.theses.fr/2014PEST1016/document.

Full text
Abstract:
Ce travail appartient au domaine de la simulation numérique sur des plates-formes d'exécution distribuées hétérogènes telles que des grilles de calcul. Ce type de plate-forme se caractérise par des possibles changements de condition d'exécution et par une probabilité importante de défaillance de certains composants. Une application qui s'exécute dans un tel environnement se doit d'être adaptable à son contexte d'exécution et tolérante aux pannes. Face à la complexité croissante de la mise en place de cas de calcul sur des grilles de calcul, nous proposons une plateforme logicielle pour la résolution de cas de calcul numérique dans un environnement distribué hétérogène. Nos travaux apportent une solution qui se base sur un système d'agents mobiles, ce qui permet à une application de s'adapter au changement de son environnement d'exécution. Dans un premier temps, nous utilisons le langage pi calcul d'ordre supérieur pour spécifier une « ferme de travailleurs » capable de participer à la résolution de tout type de cas de calcul. Ensuite, nous énonçons des propriétés qui caractérisent le bon fonctionnement de ce système avec une logique temporelle TCTL. Pour cela, nous souhaitons modéliser notre système à l'aide d'automates temporisés à partir des termes définis par la spécification formelle en pi calcul. Dans ce but, nous définissons une transformation de termes écrits en pi calcul en automates temporisés. Les propriétés sont alors vérifiées avec l'outil UppAal. Pour valider ce travail de modélisation, nous avons réalisé le framework MCA (pour Mobile Computing Architecture). Celui-ci propose un ensemble d'outils facilitant la mise en place de composants sur un environnement distribué hétérogène dans le but d'effectuer la résolution de cas de calcul. La librairie avec laquelle sont développés ces composants, qu'ils soient mobiles ou non, est implantée en Java et se base les technologies Jini et JavaSpaces. Enfin, nous réalisons l'évaluation du framework MCA en procédant à la résolution de trois cas de calcul différents. Chacune de ces expériences, réalisées sur une grappe de 20 noeuds, nous permet de montrer les caractéristiques essentielles de notre framework : une simplicité de programmation, un faible surcoût en temps d'exécution sans l'activation de la tolérance aux pannes et une tolérance aux pannes efficace
This work belongs to the domain of numerical simulation on heterogeneous distributed platforms such as grids. This type of platform is characterized by possible changes in execution conditions and a significant probability of some components failure. An application running in such an environment must be adaptable to its execution context and fault tolerant. Facing the growing complexity of implementing computation cases on grid computing, we propose a software platform which solves numerical computation cases in a distributed heterogeneous environment. Our work provides a solution based on a mobile agent system, which allows an application to adapt to change in its execution environment. At first, we use the higher-order pi calculus language to specify a « farm of workers » able to take part in solving any type of computation case. Then we set the properties that characterize the system's correct execution with a temporal logic TCTL. In order to do this, we perform a temporal modeling system based on terms defined by the formal specification in pi calculus. To achieve this transformation, we define a translation of terms written in pi calculus into timed automata. The properties are verified with the UppAal tool. To validate this modeling work, we develop the MCA (for Mobile Computing Architecture) framework. It offers a set of tools which facilitate the implementation of distributed heterogeneous components in order to solve computation cases. These components, mobile or not, are developed with a library written in Java and which uses Jini and JavaSpaces technologies. Finally, our framework is evaluated through the resolution of three different computation cases. Each of these experiments, performed on a 20 node cluster allow us to highlight our framework's main characteristics : programming simplicity, low overhead in execution time without the fault tolerance activation and efficient fault tolerance
APA, Harvard, Vancouver, ISO, and other styles
25

González, Barrameda José Andrés. "Novel Application Models and Efficient Algorithms for Offloading to Clouds." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36469.

Full text
Abstract:
The application offloading problem for Mobile Cloud Computing aims at improving the mobile user experience by leveraging the resources of the cloud. The execution of the mobile application is offloaded to the cloud, saving energy at the mobile device or speeding up the execution of the application. We improve the accuracy and performance of application offloading solutions in three main directions. First, we propose a novel fine-grained application model that supports complex module dependencies such as sequential, conditional and parallel module executions. The model also allows for multiple offloading decisions that are tailored towards the current application, network, or user contexts. As a result, the model is more precise in capturing the structure of the application and supports more complex offloading solutions. Second, we propose three cost models, namely, average-based, statistics-based and interval-based cost models, defined for the proposed application model. The average-based approach models each module cost by the expected cost value, and the expected cost of the entire application is estimated considering each of the three module dependencies. The novel statistics-based cost model employs Cumulative Distribution Function (CDFs) to represent the costs of the modules and of the mobile application, which is estimated considering the cost and dependencies of the modules. This cost model opens the doors for new statistics-based optimization functions and constraints whereas the state of the art only support optimizations based on the average running cost of the application. Furthermore, this cost model can be used to perform statistical analysis of the performance of the application in different scenarios such as varying network data rates. The last cost model, the interval-based, represents the module costs via intervals in order to addresses the cost uncertainty while having lower requirements and computational complexity than the statistics-based model. The cost of the application is estimated as an expected maximum cost via a linear optimization function. Finally, we present offloading decision algorithms for each cost model. For the average-based model, we present a fast optimal dynamic programming algorithm. For the statistics-based model, we present another fast optimal dynamic programming algorithm for the scenario where the optimization function meets specific properties. Finally, for the interval-based cost model, we present a robust formulation that solves a linear number of linear optimization problems. Our evaluations verify the accuracy of the models and show higher cost savings for our solutions when compared to the state of the art.
APA, Harvard, Vancouver, ISO, and other styles
26

Valmorbida, Willian. "U-LIBRARY: um modelo para suporte a bibliotecas ubíquas." Universidade do Vale do Rio dos Sinos, 2014. http://www.repositorio.jesuita.org.br/handle/UNISINOS/4712.

Full text
Abstract:
Submitted by William Justo Figueiro (williamjf) on 2015-08-11T21:29:58Z No. of bitstreams: 1 14e.pdf: 8222008 bytes, checksum: 697438651854944fb3da69be7e4417ac (MD5)
Made available in DSpace on 2015-08-11T21:29:58Z (GMT). No. of bitstreams: 1 14e.pdf: 8222008 bytes, checksum: 697438651854944fb3da69be7e4417ac (MD5) Previous issue date: 2014
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A computação ubíqua visa tornar as tarefas que dependem da computação transparente aos usuários, permitindo assim, a disponibilização de recursos e serviços a qualquer momento e em qualquer lugar. Serviços de bibliotecas encontram-se intimamente relacionados ao uso de tecnologias da computação, sendo que alguns modelos foram propostos com vistas a fornecer suporte ubíquo a bibliotecas. No entanto, tais modelos não apresentam alguns aspectos que permitem oferecer recursos diferenciados aos usuários, tais como suporte ao bibliotecário, utilização de históricos de atividades de usuários e integração com sistemas de disponibilização de informação mantidos por terceiros. Desta forma, esta dissertação propõe um modelo computacional para suporte a bibliotecas ubíquas, denominado U-Library. O ULibrary disponibiliza recursos e serviços a usuários de bibliotecas com vistas a fornecer apoio ao desenvolvimento de suas tarefas diárias, no que tange a recuperação, o acesso e a manutenção de recursos e serviços de uma biblioteca. Este trabalho discute características presentes em trabalhos relacionados, descreve o modelo U-Library e apresenta aspectos de implementação e avaliação do modelo através de um protótipo. A avaliação do modelo ocorreu utilizando dados reais da Biblioteca do Centro Universitário Univates, no apoio de tarefas diárias de um grupo de voluntários.
Ubiquitous computing aims to make tasks that depend on computing transparent to the users, thus providing resources and services anytime and anywhere. Library services are closely related to the use of computing technologies. Some models have been proposed in order to provide ubiquitous support to libraries. However, such models do not present some aspects that allow to offer differentiated resources to the users, such as librarian support, use of user activity history and integration with systems providing information maintained by third parties. Therefore, this paper proposes a computational model to support ubiquitous library, called U-Library. The U-Library provides resources and services to library users in order to provide support for the development of their daily tasks, regarding the recovery, access and maintenance of resources and services of a library. This dissertation discusses features present in related work, describes the model U-Library and presents aspects of implementation and evaluation of the model through a prototype. The model evaluation has occurred using real data from Library of Centro Universitário Univates, in support to daily tasks of a volunteers group.
APA, Harvard, Vancouver, ISO, and other styles
27

Tufekcioglu, Refik. "Communication models in mobile computing systems and mobile agents." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378775.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2000.
Thesis advisor(s): Michael, James B. "March 2000." Includes bibliographical references (p. 131-137). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
28

Pierre, Allyn Grey de Almeida Lima. "Transações reconfiguráveis para o ambiente móvel." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275807.

Full text
Abstract:
Orientador: Maria Beatriz Felgar de Toledo
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-16T08:41:15Z (GMT). No. of bitstreams: 1 Pierre_AllynGreydeAlmeidaLima_M.pdf: 1760009 bytes, checksum: 4af51767131cfa3c30ee8f7ea8830949 (MD5) Previous issue date: 2009
Resumo: Dentre as tecnologias emergentes, a computação móvel tem a sua posição de destaque. Os dispositivos móveis estão mais presentes na vida das pessoas e contendo aplicações mais sofisticadas e semelhantes às executadas em computadores pessoais. Num mundo globalizado, onde o tempo é escasso e valioso, os dispositivos móveis mantêm as pessoas em contato com informações e atividades que elas desejam enquanto elas estão em movimento. Um exemplo recente é aumento do uso da internet em celulares, permitindo que os usuários acessem diversos tipos de aplicações, tendo grande parte delas interação com bancos de dados. Apesar de atrativa, a computação móvel traz desafios ao desenvolvedor, pois ele deve considerar os recursos limitados tais como largura de banda, conectividade e o alto custo da obtenção de dados. Nesse contexto, as transações representam um importante papel de garantir que o dinamismo do ambiente da computação móvel não comprometa a confiabilidade das aplicações. Porém, algumas aplicações não podem ser implementadas considerando o modelo de transações tradicional, pois elas têm um tempo mais longo de duração do que aquelas convencionalmente modeladas. Sendo assim, as configurações de uma transação realizadas no início de sua execução podem deixar de ser adequadas no decorrer da sua execução, devido às mudanças no ambiente. Diversos modelos de transações têm sido apresentados na literatura para atender a esse ambiente. Apesar de muitas idéias interessantes e relevantes, alguns modelos não permitem que a adaptação diante da variação dos recursos seja realizada durante a execução de uma transação e quando permitem, eles realizam grandes reconfigurações arquiteturais. Motivada por essas questões, essa dissertação propõe transações reconfiguráveis, isto é, a configuração dinâmica de mecanismos transacionais antes do início da transação e a reconfiguração de propriedades transacionais durante sua execução. Para que a reconfiguração dinâmica fosse realizada, um modelo de componentes chamado OpenCOM foi utilizado na arquitetura proposta, por este ser reflexivo, leve e independente de plataforma. O nível de isolamento é a propriedade transacional que poderá ser reconfigurada durante a transação e o controle de concorrência é o mecanismo que garantirá o isolamento entre as transações e poderá ser configurado antes do início da transação. A configuração do controle de concorrência é uma contribuição inovadora dessa dissertação, pois em muitos trabalhos existentes não é possível a configuração desse mecanismo transacional. A fim de validar a arquitetura proposta, um protótipo de um sistema de vendas foi desenvolvido. Através dessa implementação foi possível analisar os impactos da reconfiguração durante uma transação
Abstract: Among the emerging technologies, mobile computing has its position of prominence. Mobile devices are more present in people's lives and with more sophisticated applications similar to those implemented in personal computers. In a globalized world where time is scarce and of great importance, mobile devices keep people in touch with information and activities they want while they are moving. A recent example is the increasing use of the Internet on mobile phones allowing users to access various types of applications and much of them interacting with databases. Although attractive, the mobile computing brings challenges to the developer because he must consider the limited resources such as bandwidth, connectivity and the high cost of obtaining data. In this context, the transactions represent an important role to ensure that the dynamic environment of mobile computing does not compromise the reliability of applications. However some applications cannot be implemented given the traditional transactions models because they have a longer duration than those conventionally shaped. Therefore the settings of a transaction carried out before its execution may not be appropriate during the execution due to changes in the environment. Various transactions models have been reported in the literature to serve this environment. Although having many interesting and relevant ideas, some models do not allow the adaptation in the face of change of resources during the execution of a transaction and when this is allowed, they require many transactional reconfigurations. Motivated by these issues, this dissertation proposes reconfigurable transactions that are the dynamic configuration of transactional mechanisms before the beginning of the transaction and the reconfiguration of transactional properties during its execution. For dynamic reconfiguration, a component model called OpenCOM has been used in the proposed architecture because it is reflective, lightweight and platform-independent. The isolation level is the property that may be reconfigured during the transaction and the concurrency control is the mechanism that ensures the isolation between the transactions and it can be configured before the beginning of transaction. The configuration of concurrency control is an original contribution of this dissertation because many works do not allow the configuration of this transactional mechanism. In order to validate the proposed architecture, a prototype of a sales system has been developed. Through this implementation it was possible to analyze the impacts of the reconfiguration during a transaction
Mestrado
Sistemas Distribuidos
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
29

Nguyen, Anh-Dung. "Contributions to modeling, structural analysis, and routing performance in dynamic networks." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/9725/1/nguyen.pdf.

Full text
Abstract:
This thesis contributes to the modeling, understanding and efficient communication in dynamic networks populating the periphery of the Internet. By dynamic networks, we refer to networks that can be modeled by dynamic graphs in which nodes and links change temporally. In the first part of the thesis, we propose a new mobility model - STEPS - which captures a wide spectrum of human mobility behavior. STEPS implements two fundamental principles of human mobility: preferential attachment and attractor. We show that this simple parametric model is able to capture the salient statistical properties of human mobility such as the distribution of inter-contact/contact time. In the second part, using STEPS, we analyze the fundamental behavioral and structural properties of opportunistic networks. We redefine in the context of dynamic networks the concept of small world structure and show how such a structure can emerge. In particular, we show that highly dynamic nodes can play the role of bridges between disconnected components, helping to significantly reduce the length of network path and contribute to the emergence of small-world phenomenon in dynamic networks. We propose a way to model this phenomenon in STEPS. From a regular dynamic network in which nodes limit their mobility to their respective preferential areas. We rewire this network by gradually injecting highly nomadic nodes moving between different areas. We show that when the ratio of such nomadic nodes is around 10%, the network has small world structure with a high degree of clustering and a low characteristic path length. The third contribution of this thesis is the study of the impact of disorder and contact irregularity on the communication capacity of a dynamic network. We analyze the degree of disorder of real opportunistic networks and show that if used correctly, it can significantly improve routing performances. We then introduce a model to capture the degree of disorder in a dynamic network. We propose two simple and efficient algorithms that exploit the temporal structure of a dynamic network to deliver messages with a good tradeoff between resource usage and performance. The simulation and analytical results show that this type of algorithm is more efficient than conventional approaches. We also highlight also the network structure for which this type of algorithm achieves its optimum performance. Based on this theoretical result, we propose a new efficient routing protocol for content centric opportunistic networks. In this protocol, nodes maintain, through their opportunistic contacts, an utility function that summarizes their spatio-temporal proximity to other nodes. As a result, routing in this context consists in following the steepest slopes of the gradient field leading to the destination node. This property leads to a simple and effective algorithm routing that can be used both in the context of IP networks and content centric networks. The simulation results show that this protocol outperforms traditional routing protocols already defined for opportunistic networks. The last contribution of this thesis is to highlight the potential application of dynamic networks in the context of "mobile cloud computing." Using the particle optimization techniques, we show that mobility can significantly increase the processing capacity of dynamic networks. In addition, we show that the dynamic structure of the network has a strong impact on its processing capacity.
APA, Harvard, Vancouver, ISO, and other styles
30

Springer, Thomas. "Ein komponentenbasiertes Meta-Modell kontextabhängiger Adaptionsgraphen für mobile und ubiquitäre Anwendungen." [S.l. : s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=973118237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Orrego, Rodrigo Barbosa Sousa. "CORE-MM: um modelo de crowdsourcing para cidades inteligentes baseado em gamificação." Universidade do Vale do Rio dos Sinos, 2017. http://www.repositorio.jesuita.org.br/handle/UNISINOS/6813.

Full text
Abstract:
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2017-12-05T13:53:52Z No. of bitstreams: 1 Rodrigo Barbosa Sousa Orrego_.pdf: 1535012 bytes, checksum: b6e744cff7702628ea69ae095d198122 (MD5)
Made available in DSpace on 2017-12-05T13:53:52Z (GMT). No. of bitstreams: 1 Rodrigo Barbosa Sousa Orrego_.pdf: 1535012 bytes, checksum: b6e744cff7702628ea69ae095d198122 (MD5) Previous issue date: 2017-07-31
Nenhuma
O surgimento de cidades que utilizam conceitos de tecnologia de ponta em várias áreas tem sido possibilitado graças aos progressos no desenvolvimento de sistemas de tecnologia da informação e comunicação. Avanços nas tecnologias de comunicação wireless e da tecnológica da informação e comunicação em geral oferecem oportunidades para a criação de um modelo de crowdsourcing, para registrar e atualizar recursos de uma cidade, baseado em gamificação para cidades inteligentes, objetivando ampliar a independência das pessoas que necessitam dos recursos das cidades e melhorar a qualidade de vida dos cidadãos. Esta dissertação aborda o problema do gerenciamento de recursos para cidades inteligentes utilizando crowdsourcing combinada com gamificação. Foi proposto um modelo, chamado CORE-MM, que permite a utilização de técnicas de crowdsourcing para que o gerenciamento de recursos das cidades seja feito pelos próprios cidadãos interessados, sem depender obrigatoriamente de uma organização ou da administração pública, e técnicas de gamificação para que este comportamento de participação neste processo de gerenciamento de recursos seja incentivado. O CORE-MM propõe o uso de crowdsourcing integrado com gamificação, para gerenciar recursos de uma cidade inteligente, com dois objetivos interdependentes: o de motivar a utilização do sistema pelos usuários, e também o de incentivar sua participação no compartilhamento e gerenciamento de informações. O nome CORE-MM significa COllaborative REsource Management Model, que em português significa Modelo de Gerenciamento Colaborativo de Recursos.
The emergence of cities that use state-of-the-art technology concepts in various areas has been made possible by advances in the development of information and communication technology systems. Advances in wireless communication technologies and information and communication technologies in general offer opportunities for creating a crowdsourcing model, based on gamification for smart cities, to manage cities resources, aiming to broaden the independence of the people that need the cities resources and improve the quality of life of citizens. This study addresses the problem of resource management for smart cities using crowdsourcing combined with gamification. A model called CORE-MM has been proposed by this study, which allows the use of crowdsourcing techniques so that the management of cities resources is done by the citizens themselves, without necessarily having to rely on an organization or public administration, and techniques of gamification to encourage this behavior of participation in this resource management process. CORE-MM proposes the use of crowdsourcing integrated with gamification to manage the resources of an intelligent city, with two interdependent objectives: to motivate the use of the system by the users, and also to encourage their participation in the sharing and management of information. The name CORE-MM stands for COllaborative REsource Management Model.
APA, Harvard, Vancouver, ISO, and other styles
32

Nguyen, Anh Dung. "Contributions to Modeling, Structural Analysis, and Routing Performance in Dynamic Networks." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2013. http://tel.archives-ouvertes.fr/tel-00908502.

Full text
Abstract:
Cette thèse apporte des contributions à la modélisation, compréhension ainsi qu'à la communication efficace d'information dans les réseaux dynamiques peuplant la périphérie de l'Internet. Par réseaux dynamiques, nous signifions les réseaux pouvant être modélisés par des graphes dynamiques dans lesquels noeuds et liens évoluent temporellement. Dans la première partie de la thèse, nous proposons un nouveau modèle de mobilité - STEPS - qui permet de capturer un large spectre de comportement de mobilité humains. STEPS mets en oeuvre deux principes fondamentaux de la mobilité humaine : l'attachement préférentiel à une zone de prédilection et l'attraction vers une zone de prédilection. Nous proposons une modélisation markovienne de ce modèle de mobilité. Nous montrons que ce simple modèle paramétrique est capable de capturer les caractéristiques statistiques saillantes de la mobilité humaine comme la distribution des temps d'inter-contacts et de contacts. Dans la deuxième partie, en utilisant STEPS, nous analysons les propriétés comportementales et structurelles fondamentales des réseaux opportunistes. Nous redéfinissons dans le contexte des réseaux dynamiques la notion de structure petit monde et montrons comment une telle structure peut émerger. En particulier, nous montrons que les noeuds fortement dynamiques peuvent jouer le rôle de ponts entre les composants déconnectés, aident à réduire significativement la longueur du chemin caractéristique du réseau et contribuent à l'émergence du phénomène petit-monde dans les réseaux dynamiques. Nous proposons une façon de modéliser ce phénomène sous STEPS. À partir d'un réseau dynamique régulier dans lequel les noeuds limitent leur mobilité à leurs zones préférentielles respectives. Nous recablons ce réseau en injectant progressivement des noeuds nomades se déplaçant entre plusieurs zones. Nous montrons que le pourcentage de tels nœuds nomades est de 10%, le réseau possède une structure petit monde avec un fort taux de clusterisation et un faible longueur du chemin caractéristique. La troisième contribution de cette thèse porte sur l'étude de l'impact du désordre et de l'irrégularité des contacts sur la capacité de communication d'un réseau dynamique. Nous analysons le degré de désordre de réseaux opportunistes réels et montrons que si exploité correctement, celui-ci peut améliorer significativement les performances du routage. Nous introduisons ensuite un modèle permettant de capturer le niveau de désordre d'un réseau dynamique. Nous proposons deux algorithmes simples et efficaces qui exploitent la structure temporelle d'un réseau dynamique pour délivrer les messages avec un bon compromis entre l'usage des ressources et les performances. Les résultats de simulations et analytiques montrent que ce type d'algorithme est plus performant que les approches classiques. Nous mettons également en évidence aussi la structure de réseau pour laquelle ce type d'algorithme atteint ses performances optimum. Basé sur ce résultat théorique nous proposons un nouveau protocole de routage efficace pour les réseaux opportunistes centré sur le contenu. Dans ce protocole, les noeuds maintiennent, via leurs contacts opportunistes, une fonction d'utilité qui résume leur proximité spatio-temporelle par rapport aux autres noeuds. En conséquence, router dans un tel contexte se résume à suivre le gradient de plus grande pente conduisant vers le noeud destination. Cette propriété induit un algorithme de routage simple et efficace qui peut être utilisé aussi bien dans un contexte d'adressage IP que de réseau centré sur les contenus. Les résultats de simulation montrent que ce protocole superforme les protocoles de routage classiques déjà définis pour les réseaux opportunistes. La dernière contribution de cette thèse consiste à mettre en évidence une application potentielle des réseaux dynamiques dans le contexte du " mobile cloud computing ". En utilisant les techniques d'optimisation particulaires, nous montrons que la mobilité peut augmenter considérablement la capacité de calcul des réseaux dynamiques. De plus, nous montrons que la structure dynamique du réseau a un fort impact sur sa capacité de calcul.
APA, Harvard, Vancouver, ISO, and other styles
33

Mariano, Santino Michael Enzo. "Användarengagemang i urban informatics : En studie om hur engagemang kan utvärderas i mobilteknologi för offentliga platser." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18735.

Full text
Abstract:
Urban Informatics är ett forskningsvetenskapligt fält som berör sig med att försöka förstå människors upplevelse av offentliga platser när teknologi är inblandat. Då det är många faktorer som påverkar människors upplevelser av platser finns det utmaningar i Urban Informatics-processer. Det visas på förståelse inom Urban Informatics på ett behov av en designvetenskaplig process som ett svar på de utmaningar som kan uppstå. User Experience Design är ett designvetenskapligt forskningsfält där processer ämnar bibehålla ett användarcentrerat perspektiv under arbetets gång. Att ta bort fokuset från datakunskapen som krävs för teknologi och istället titta på engagemang tillåter oss att se teknologi som artefakter som kan upplevas. Olika engagemangsmodeller har gjorts tidigare där vissa har ett teknologiskt fokus på engagemang eller ett urbant fokus på engagemang. Det visar att det är viktigt att undersöka hur en sammanfattad modell kan se ut för att förklara interrelationen i människors engagemang till platser och mobilteknologi. Detta kan bidra till att minska bryggan till de forskningsfält som undersöker människor, teknologi och platser. Resultatet av studien blev en engagemangsmodell på hur ett engagemangstillfälle kan se ut med dess olika engagemangstillstånd som kan uppnås i plats och/eller mobilteknologi.
Urban Informatics is a research field that involves itself with understanding the interrelation of people, places and technology. Due to its many factors that affect people’s experiences of places when technology is involved it faces several challenges. It is understood within the field of Urban Informatics that there is a need for a research-based process based on design thinking to face these challenges. User Experience Design is a research field focuses on user-centered design processes. When the focus is removed from computing and shifted to engagement, technology can be seen as artefacts that can be experienced. Different engagement models have been made in the past where they focus either on technology or places. It shows the importance to explore how a engagement model can be interpreted and suited to explain the interrelation of peoples engagement to places using technology. The findings may contribute to lessening the gap of the research fields involved in understanding people and their engagement to places and technology. The result of this study resulted in a proposed engagement model in how different conditions of mobile engagement and place engagement may appear in one engagement session.
APA, Harvard, Vancouver, ISO, and other styles
34

Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.

Full text
Abstract:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
APA, Harvard, Vancouver, ISO, and other styles
35

Huang, Raymond. "A comparative study of mobile internet deployment models in New Zealand a thesis submitted to Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS), June 2007." Click here to access this resource online, 2007. http://repositoryaut.lconz.ac.nz/theses/1362/.

Full text
Abstract:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2007.
Primary supervisor: Krassie Petrova. Includes bibliographical references. Also held in print (185 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 004.6 HUA)
APA, Harvard, Vancouver, ISO, and other styles
36

Koukoumpsetsos, Kyriakos. "MoDeS : a mobile-agent system for improving availability and data-traffic on pervasive computing." Thesis, University of Surrey, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fouquet, François. "Kevoree : Model@Runtime pour le développement continu de systèmes adaptatifs distribués hétérogènes." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00831018.

Full text
Abstract:
La complexité croissante des systèmes d'information modernes a motivé l'apparition de nouveaux paradigmes (objets, composants, services, etc), permettant de mieux appréhender et maîtriser la masse critique de leurs fonctionnalités. Ces systèmes sont construits de façon modulaire et adaptable afin de minimiser les temps d'arrêts dus aux évolutions ou à la maintenance de ceux-ci. Afin de garantir des propriétés non fonctionnelles (par ex. maintien du temps de réponse malgré un nombre croissant de requêtes), ces systèmes sont également amenés à être distribués sur différentes ressources de calcul (grilles). Outre l'apport en puissance de calcul, la distribution peut également intervenir pour distribuer une tâche sur des nœuds aux propriétés spécifiques. C'est le cas dans le cas des terminaux mobiles proches des utilisateurs ou encore des objets et capteurs connectés proches physiquement du contexte de mesure. L'adaptation d'un système et de ses ressources nécessite cependant une connaissance de son état courant afin d'adapter son architecture et sa topologie aux nouveaux besoins. Un nouvel état doit ensuite être propagé à l'ensemble des nœuds de calcul. Le maintien de la cohérence et le partage de cet état est rendu particulièrement difficile à cause des connexions sporadiques inhérentes à la distribution, pouvant amener des sous-systèmes à diverger. En réponse à ces défi scientifiques, cette thèse propose une abstraction de conception et de déploiement pour systèmes distribués dynamiquement adaptables, grâce au principe du Model@Runtime. Cette approche propose la construction d'une couche de réflexion distribuée qui permet la manipulation abstraite de systèmes répartis sur des nœuds hétérogènes. En outre, cette contribution introduit dans la modélisation des systèmes adaptables la notion de cohérence variable, permettant ainsi de capturer la divergence des nœuds de calcul dans leur propre conception. Cette couche de réflexion, désormais cohérente "à terme", permet d'envisager la construction de systèmes adaptatifs hétérogènes, regroupant des nœuds mobiles et embarqués dont la connectivité peut être intermittente. Cette contribution a été concrétisée par un projet nommé ''Kevoree'' dont la validation démontre l'applicabilité de l'approche proposée pour des cas d'usages aussi hétérogènes qu'un réseau de capteurs ou une flotte de terminaux mobiles.
APA, Harvard, Vancouver, ISO, and other styles
38

Chong, Ming Ki. "Usable Authentication for Mobile Banking." Thesis, University of Cape Town, 2009. http://pubs.cs.uct.ac.za/archive/00000520/.

Full text
Abstract:
Mobile banking is attractive because it allows people to do banking anytime, anywhere. One of the requirements of performing a mobile banking transaction is that users are required to login before use. The current mobile banking login method is PIN authentication; however, results from other research studies have found that there are usability concerns of using PINs. To overcome some of the concerns, researchers have suggested the use graphical passwords. In this research, we argue that another alternative input technique can be utilized. We explore a novel password input approach, called gesture passwords, of using 3-dimensional discrete gesture motions as password elements. As a result, three systems (PINs, graphical passwords and gesture passwords) were compared. This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN authenticator were evaluated with users. User experience and password retention were evaluated to determine the usability and users’ acceptance of each system. Experiments were conducted to evaluate the above. Results from the experiments show that users were able to use all of the testing systems; however, the results reveal that users are more proficient and preferred to use PINs for mobile banking authentication than the other two systems.
APA, Harvard, Vancouver, ISO, and other styles
39

Leština, Petr. "Cloud Computing pro datová úložiště s využitím mobilních zařízení." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-260403.

Full text
Abstract:
This thesis deals with the use of Cloud Computing for data storages using mobile devices. It includes theoretical and practical aspects of the problem. The first section describes the theoretical principles of Cloud Computing. Another practical part deals with the comparison of selected cloud-based applications for non-commercial use and compatible with the operating system Android. Tests are executed using a specific mobile device. Finally, follow the recommendations for users.
APA, Harvard, Vancouver, ISO, and other styles
40

COSTA, Igor de Oliveira. "Modelos par análise de disponibilidade em uma plataforma de mobile backend as a service." Universidade Federal de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/15952.

Full text
Abstract:
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-03-15T13:05:35Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Disserta__o_Igor_Costa__Copy_(1).pdf: 11507063 bytes, checksum: f631fc6dd87314e89ea560a118301875 (MD5)
Made available in DSpace on 2016-03-15T13:05:35Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Disserta__o_Igor_Costa__Copy_(1).pdf: 11507063 bytes, checksum: f631fc6dd87314e89ea560a118301875 (MD5) Previous issue date: 2015-08-31
As limitações da computação móvel abrem caminhos para utilizar recursos de computação em nuvem voltadas à dispositivos móveis, sendo este o principal objetivo da Mobile Cloud Computing (MCC). Questões como armazenamento e processamento podem afetar a disponibilidade de um serviço no dispositivo móvel, assim, para minimizar esses problemas é possível o particionamento da aplicação em frontend e backend. Os serviços de nuvem auxiliam esse processo com a utilização de ambientes Mobile Backend-as-a-Service (MBaaS), que permitem os desenvolvedores conectar o backend de suas aplicações para o armazenamento em nuvem. Uma plataforma de MBaaS oferece um serviço de sincronização completa para aplicações móveis. Uma vez que os dados armazenados no dispositivo móvel estão sincronizados com os centros de dados distribuídos, a disponibilidade do sistema no lado servidor é um atributo fundamental que requer investigação, pois sistemas computacionais tendem a falhar. As falhas podem ocorrer em hardwares, softwares e meios de conexão, acarretando assim, em prejuízos financeiros e comprometendo a credibilidade das empresas provedoras do serviço. Os administradores necessitam de mecanismos para estimar a disponibilidade de seus sistemas, podendo definir Service Level Agreement (SLA) com mais propriedade. Assim, modelos analíticos podem ser utilizados para avaliar a disponibilidade destes tipos de ambientes, bem como auxiliar a mitigar o downtime, aumentando a disponibilidade do serviço. Este trabalho propõe modelos analíticos para avaliar a disponibilidade desses ambientes. Para tanto, foi adotada uma metodologia: primeiramente definiu-se a arquitetura básica do serviço; a qual foi modelada a partir de um modelo hierárquico, composto de diagramas de blocos de confiabilidade (RBD) e cadeias de Markov de tempo contínuo (CTMC) e validado através de um testbed de injeção de falhas e reparos em um ambiente real. Baseado no modelo de serviço proposto, foi efetuada a análise de sensibilidade, que identificou o sistema como componente crítico. A partir disto, foram sugeridos modelos hierárquicos que representem o ambiente de nuvem, e com base neste ambiente, através da técnica de análise de sensibilidade, foram propostas quatro arquiteturas, sendo estas avaliados em termos de disponibilidade e downtime anual. Os resultados demonstram que a implementação de um processo de recuperação automática sobre o componente de software, Java Virtual Machine, reduz o downtime anual na arquitetura básica em cerca de 10%, bem como é possível observar que no ambiente de nuvem utilizando o mecanismo de redundância warm-standby nos nós e no frontend apresenta efetiva melhora na disponibilidade. Desta forma, a presente pesquisa pode orientar os administradores de sistemas MBaaS no planejamento de suas políticas de manutenção.
The mobile computer restrictions propose new ways to use cloud computing resources aimed at mobile devices, this is the Mobile Cloud Computing (MCC) primary goal. Issues such as storage and processing can impact the service availability on the mobile device. With the reducing purpose, these questions are its possible divide the application into two pieces, frontend, and backend. The cloud services assist this process with the Mobile Backend-as-a- Service (MBaaS) use. This tool allows the developers connect yours application backend to cloud storage. The MBaaS OpenMobster platform offers complete synchronization service to mobile applications. Since the data stored on mobile was synchronized distributed data center, the server’s system availability is an essential attribute and request attention, because computer systems will sometimes fail. The failures can happen on components variety as hardware, software and connections, causing financial losses and reliability compromising of the companies, which offer this services. The administrators need tools to project the system availability, with this they can define the SLA with more assurance. Analytic models can be used to availability evaluate in this environment and mitigate the downtime risk, this improves the service availability. This work primary goal is proposed analytic models to availability evaluated in these environments. It was adopted a methodology as follow: First, define the base service architecture. It was modeled by use a hierarchical model, using a reliability block diagram (RBD) and continuous-time Markov chain (CTMC). The validation considers a fault injection testbed and repairs on real environment. Considering the model proposed, it was done sensitivity analysis, these results present the system as a critical component. This analysis was proposed hierarchical models to represents cloud environment. On these sensibility analysis, a background was offered four scenarios. The scenarios were evaluated to determine the availability and annual downtime. The results show that the an automatic recovery implementation process on the software component, Java Virtual Machine, decrease the annual downtime on base architecture to 10%. The results present the availability improvement when adopted redundancy strategy as warm standby on a cloud environment. This way, the work can guide the MBaaS system administrators in planning their maintenance policies.
APA, Harvard, Vancouver, ISO, and other styles
41

Milicic, Gregory J. "An analysis of tactical mesh networking hardware requirements for airborne mobile modes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FMilicic.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2005.
Thesis Advisor(s): Alexander Bordetsky. Includes bibliographical references (p. 39-40). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
42

Marinho, Fabiana Gomes. "PRECISE - Um processo de verificaÃÃo formal para modelos de caracterÃsticas de aplicaÃÃes mÃveis e sensÃveis ao contexto." Universidade Federal do CearÃ, 2012. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=8478.

Full text
Abstract:
Conselho Nacional de Desenvolvimento CientÃfico e TecnolÃgico
As LPSs, alÃm do seu uso em aplicaÃÃes tradicionais, tÃm sido utilizadas no desenvolvimento de aplicaÃÃes que executam em dispositivos mÃveis e sÃo capazes de se adaptarem sempre que mudarem os elementos do contexto em que estÃo inseridas. Essas aplicaÃÃes, ao sofrerem alteraÃÃes devido a mudanÃas no seu ambiente de execuÃÃo, podem sofrer adaptaÃÃes inconsistentes e, consequentemente, comprometer o comportamento esperado. Por esse motivo, à essencial a criaÃÃo de um processo de verificaÃÃo que consiga checar a corretude e a consistÃncia dessas LPSS, bem como checar a corretude tanto dos produtos derivados como dos produtos adaptados dessas LPSs. Sendo assim, nesta tese de doutorado à proposto o PRECISE - um Processo de VerificaÃÃo Formal para Modelos de CaracterÃsticas de AplicaÃÃes MÃveis e SensÃveis ao Contexto. O PRECISE auxilia na identificaÃÃo de defeitos na modelagem da variabilidade de uma LPS para aplicaÃÃes mÃveis e sensÃveis ao contexto e, assim, minimiza problemas que ocorreriam durante a execuÃÃo dos produtos gerados a partir dessa LPS. à importante ressaltar que o PRECISE à definido com base em uma especificaÃÃo formal e em um conjunto de propriedades de boa formaÃÃo elaborados usando LÃgica de Primeira Ordem. Essa especificaÃÃo à um prÃ-requisito para a realizaÃÃo de uma modelagem da variabilidade sem ambiguidades. Para avaliar o PRECISE, uma validaÃÃo à realizada a partir da especificaÃÃo formal e das propriedades de boa formaÃÃo definidas no processo. Essa validaÃÃo tem como objetivo mostrar que o PRECISE consegue identificar defeitos, anomalias e inconsistÃncias existentes em um modelo de variabilidades de uma LPS para aplicaÃÃes mÃveis e sensÃveis ao contexto. Nessa validaÃÃo, cinco tÃcnicas diferentes sÃo utilizadas: Perfil UML, OCL, LÃgica Proposicional, Prolog e SimulaÃÃo. AlÃm de minimizar os defeitos e inconsistÃncias dos modelos de variabilidades das LPSs, o PRECISE ainda se beneficia da generalidade e flexibilidade intrÃnsecas à notaÃÃo formal usada na sua especificaÃÃo.
SPLc have been used to develop different types of applications, including the ones that run on mobile devices and are able to adapt when the context elements in which they are located change. These applications can change due to variations in their execution environment and inconsistent adaptations can occur, compromising the expected behavior. Then there is a need for creating a verification process to check the correctness and consistency of these SPLs as well as to check the correctness of both derived products and adapted products from these SPLs. Thus, this work proposes PRECISE - A Formal Verification Process for Feature Models of Mobile and Context-Aware Applications. PRECISE helps to identify defects in the variability modeling of an SPL for mobile and context-aware applications, minimizing problems that can take place during the execution of products generated from this SPL. It is worth noting that PRECISE is defined based on a formal specification and a set of well-formedness properties developed using First-Order Logic, which are prerequisites for the achievement of an unambiguous variability modeling. To evaluate PRECISE, a validation is performed from the formal specification and well-formedness properties defined in the process. This validation intends to show that PRECISE is able to identify defects, anomalies and inconsistencies in a variability model of an SPL for mobile and context-aware applications. In this validation, five different techniques are used: UML Profile, OCL, Propositional Logic, Prolog and Simulation. While minimizing the defects and inconsistencies in the variability models of an SPL, PRECISE still benefits from the generality and flexibility intrinsic to the formal notation used in its specification.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhou, Junyang. "Enhanced signal propagation models and algorithm selector for providing location estimation services within cellular radio networks." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Rolim, Cícero Raupp. "HLS: um modelo para suporte à sistemas de localização no holoparadigma." Universidade do Vale do Rio do Sinos, 2007. http://www.repositorio.jesuita.org.br/handle/UNISINOS/2237.

Full text
Abstract:
Made available in DSpace on 2015-03-05T13:58:26Z (GMT). No. of bitstreams: 0 Previous issue date: 15
Nenhuma
O crescimento do poder computacional dos dispositivos portáteis como PDAs, handhelds e notebooks é uma realidade na última década. Paralelamente, as redes sem fio (por exemplo Wi-Fi e bluetooth), tiveram um crescimento vinculado a estes equipamentos, facilitando a comunicação e troca de informações entre os mesmos. Nesse escopo surgiu a computação ubíqua. No escopo da computação ubíqua, as aplicações devem ser sensíveis à rede, recursos, localização física e contexto, ou seja, podem ter seu comportamento alterado durante sua execução, devido à mobilidade constante dos dispositivos móveis. Neste cenário o Holoparadigma apresenta-se como uma proposta de solução para a manipulação das questões associadas à mobilidade, já que possui um modelo de programação intuitivo, tornando possível a modelagem de ambientes utilizando as suas abstrações. Este trabalho apresenta o HLS, um modelo para desenvolvimento de aplicações sensíveis à localização utilizando o ambiente do Holoparadigma. O HLS é um modelo que inclui um
APA, Harvard, Vancouver, ISO, and other styles
45

Costa, Humberto Jorge de Moura. "Um modelo de arquitetura para o turismo ubíquo utilizando dispositivos móveis." Universidade do Vale do Rio dos Sinos, 2013. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3856.

Full text
Abstract:
Submitted by Nara Lays Domingues Viana Oliveira (naradv) on 2015-06-15T13:39:55Z No. of bitstreams: 1 0000061A.pdf: 7791263 bytes, checksum: a599d040f1f3a02351f70b58600f4bc8 (MD5)
Made available in DSpace on 2015-06-15T13:39:55Z (GMT). No. of bitstreams: 1 0000061A.pdf: 7791263 bytes, checksum: a599d040f1f3a02351f70b58600f4bc8 (MD5) Previous issue date: 2013-03
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
UNISINOS - Universidade do Vale do Rio dos Sinos
O uso de dispositivos móveis para auxilio em tarefas de trabalho e lazer tem crescido vertiginosamente ao longo dos anos. Na área de turismo, os benefícios que estes dispositivos podem trazer são significativos, tendo em vista a mobilidade associada ao acesso instantâneo e atualizado de informações turísticas. Uma das aplicações mais relevantes para a esta área são os guias de turismo eletrônico, podendo fornecer informações essenciais ao turista para que ele possa aproveitar melhor a sua viagem. Estes guias, em geral, oferecem informações como onde dormir, comer e passear. Entretanto, estas informações, muitas vezes, são fornecidas apenas com base na localização do turista, não considerando recursos como sugestões de visita a determinados pontos turísticos, de acordo com inferências realizadas com base em informações personalizadas obtidas das preferências do turista e das características do ambiente onde ele se encontra. Tendo em vista os benefícios que isto pode trazer ao turista, o objetivo deste trabalho é propor um modelo de arquitetura de software, para dispositivos móveis, que utilize os conceitos de turismo ubíquo para incrementar a qualidade da experiência de turismo. A proposta considera as características individuais, como necessidades e restrições de cada turista, em conjunto com as características de contexto do ambiente turístico. A arquitetura proposta, que é chamada de UbiTour, emprega diversos conceitos da computação ubíqua, como sensibilidade ao contexto, transparência ao usuário, serviços baseados em localização, perfis, restrições, para que o turista possa, entre outras atividades, consultar quais são os pontos de interesse turísticos mais indicados para o seu perfil em um determinado contexto. Além disso, é proposta a definição de uma ontologia para o turismo ubíquo com base nesta arquitetura e foram feitas avaliações da arquitetura para assegurar a eficiência do modelo. Essas avaliações foram realizadas através do desenvolvimento de um protótipo para iOS (iPhones e iPads) focado no itinerário turístico Caminhos de Pedra, localizado em Bento Gonçalves no Rio Grande do Sul. Foram aplicadas três avaliações nesse protótipo: baseada em cenários, da ontologia e de usabilidade. Como resultados, verificou-se que o modelo de turismo ubíquo auxilia as pessoas a terem uma melhor experiência de turismo.
The use of mobile devices to use in work and leisure has grown dramatically over the years. In the tourism area, the benefits that these devices can bring are significant, considering the mobility associated with instant access and updated tourist information. One of the most relevant applications in this area are the Electronic Tour Guides (ETGs). They can provide essential information to tourists to make better use of their trip. These guides usually provide information such as where to sleep, eat and sightseeing. However, this information often are provided based on the location of the tourist, not considering resource suggestions as visiting certain attractions, according to inferences made based on information obtained from the custom preferences of the tourist and the characteristics of the environment where they are. Given the benefits that this knowledge can bring to the tourist, the aim of this work is to propose a model of software architecture, for mobile devices, that uses the concepts of ubiquitous tourism to enhance the quality of tourism experience. The proposal suggests the individual characteristics, such requirements and constraints of each tourist, together with the characteristics of the touristic environmental context. The proposed architecture, which is called UbiTour, employs several concepts of ubiquitous computing, such as context awareness, transparency to the user, location-based services, profiles, restrictions, so that the tourist can, among other activities, see what Points of Interest (POIs) are best suited to their profile in a given context. Furthermore, we proposed an ontology for ubiquitous tourism based on the proposed architecture. Besides, we conducted evaluations of UbiTour to assess the efficiency of the proposed model. We performed these evaluations using a prototype developed for iOS (iPhones and iPads). This application focused on the Caminhos de Pedra tourist itinerary, located in Bento Gonçalves, Rio Grande do Sul state, in Brazil. We applied three evaluations to this prototype: based on scenarios, focusing on the ontology, and a usability assessment. As a result, it was found that the proposed model for ubiquitous tourism helps people to have a better tourism experience.
APA, Harvard, Vancouver, ISO, and other styles
46

Roehrs, Alex. "4iPay: modelo para sistemas de pagamento móvel em comércio ubíquo." Universidade do Vale do Rio dos Sinos, 2012. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3140.

Full text
Abstract:
Submitted by Mariana Dornelles Vargas (marianadv) on 2015-03-25T13:57:02Z No. of bitstreams: 1 4iPay.pdf: 3380679 bytes, checksum: 49edaff25098492ab3c46fcf4aad082b (MD5)
Made available in DSpace on 2015-03-25T13:57:02Z (GMT). No. of bitstreams: 1 4iPay.pdf: 3380679 bytes, checksum: 49edaff25098492ab3c46fcf4aad082b (MD5) Previous issue date: 2012
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Este trabalho tem por objetivo apresentar um modelo de arquitetura e usabilidade para um sistema de pagamento móvel (Mobile Payment System), considerando as premissas de independência de dispositivo, de localização, de operadora de telefonia móvel e de administradora financeira para suprir as necessidades de efetivar pagamentos e recebimentos de qualquer natureza em ambientes de comércio ubíquo (Ubiquitous Commerce). O trabalho inicialmente descreve a motivação, os objetivos e os conceitos fundamentais sobre os quais se baseia a proposta do modelo. A seguir são elencados os principais trabalhos relacionados e uma análise comparativa detalhada é realizada, derivando as características mais importantes a serem consideradas no modelo proposto. Em seguida, é proposto um modelo de pagamento móvel, denominado 4iPay, onde são detalhados os objetivos, arquitetura, recursos e a proposta técnico-científica de comércio eletrônico em ambientes ubíquos. Na proposição do modelo foi considerada a convergência dos trabalhos relacionados analisados no que tange à ubiquidade, unicidade, universalidade e unissonância. Assim, o modelo 4iPay pretende reunir as melhores características, inovando e melhorando em alguns aspectos relevantes ao comércio ubíquo de fato. O modelo proposto visa propor uma solução diferenciada em termos de arquitetura, modelo de negócio, usabilidade, baixo consumo de banda e alto desempenho nas transações de pagamento e recebimento, em relação às propostas atuais, levando em consideração, nas transações comerciais eletrônicas móveis, questões como independência de dispositivo, localização física, segurança e confiabilidade, além de outras características expostas ao longo do trabalho, como otimização no uso de protocolos de comunicação e flexibilidade na utilização de conexões locais ou remotas. Também são descritos cenários efetivos de uso de onde e como o modelo 4iPay pode ser aplicado. Para tanto é apresentado o protótipo desenvolvido para avaliar o modelo. Por fim, são apresentados os resultados obtidos na avaliação dos cenários, nas avaliações de desempenho da aplicação e na pesquisa de campo de aceitação do modelo proposto.
This work aims at presenting a usability and architectural model for a mobile payment system. In our model, we assume independence of devices, of location, of mobile operator, and of administrator, to allow all kinds of payment in ubiquitous environments (Ubiquitous Commerce). In this work, we begin describing motivation, goals, and fundamental concepts, in which the proposed model is based. Next, we present related works and a detailed comparative analysis of those projects, deriving the most important features. Later, we propose a model of mobile payment, called 4iPay, based on those features. We detail the 4iPay model, architecture, features, and the technical-scientific proposal of an electronic commerce system in ubiquitous environments. We consider, in the proposed model, the convergence of various related works in terms of ubiquity, unity, universality, and unison. Thus, 4iPay aims at bringing together the best features, innovating and improving in some aspects. In the model, we propose a distinguished solution in terms of architecture, business model, usability, low bandwidth consumption and high performance in payment and receipt transactions. We also consider issues such as device independence, physical location, security and reliability, and other features related to mobile electronic commerce transactions, such as optimizing communications protocols usage and flexibility in local or remote connections. We also present the effective use in scenarios of where and how 4iPay can be applied. For this purpose we present the prototype developed to evaluate the model. Finally, we present the scenarios assessment results, the application performance evaluation and the proposed model acceptance survey.
APA, Harvard, Vancouver, ISO, and other styles
47

Guimarães, Eliane Gomes. "Um modelo de componentes para aplicações telematicas e ubiquas." [s.n.], 2004. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261275.

Full text
Abstract:
Orientador: Mauricio Ferreira Magalhães
Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-04T04:09:19Z (GMT). No. of bitstreams: 1 Guimaraes_ElianeGomes_D.pdf: 1203376 bytes, checksum: 8baa98d5b0b9753d8a292e0c940b5f41 (MD5) Previous issue date: 2004
Resumo: Esta tese descreve CM-tel, um modelo de componentes para aplicações telemáticas e ubíquas. CM-tel é neutro em termos de tecnologia, sendo especificado por meio da linguagem UML (Unified Modeling Language). Componentes CM-tel são capazes de executar em plataformas destinadas tanto a computadores tradicionais quanto a dispositivos com limitado poder computacional tais como dispositivos móveis. CM-tel define os três tipos de interfaces prescritas pelo Modelo de Referência para Processamento Distribuído Aberto (RM-ODP), as interfaces operacional, de sinal e de fluxo contínuo. Interfaces de fluxo contínuo são fundamentais para o desenvolvimento de aplicações telemáticas. A arquitetura do contêiner CM-tel integra componentes e agentes móveis em um único ambiente computacional. Esta integração permite que aplicações implementem suas funcionalidades combinando componentes e agentes móveis. Esta tese propõe ainda uma arquitetura para plataformas de software que suportam o modelo CM-tel. A arquitetura utiliza XSLT (XML Stylesheet Language Transformation) para transformação de modelos e geração de código. Uma plataforma baseada na tecnologia CORBA (Common Object Request Broker Architecture) e uma aplicação na área de laboratórios virtuais foram implementadas com a finalidade de avaliar o modelo CM-tel
Abstract: This thesis describes CM-tel, a component model for telematic and ubiquitous applications. CMtel is neutral in terms technology and is specified through the Unified Modeling Language (UML). CM-tel components can execute on platforms targeted to both conventional computers and devices with limited computing power such as mobile devices. CM-tel defines the three types of interfaces prescribed by the Reference Model for Open Distributed Processing (RM-ODP), the operational, signal, and stream interfaces. Stream interfaces are central to the development of telematic applications. The CM-tel container architecture integrates both components and mobile agents into a single computing environment. This integration allows applications to implement their functionalities by combining components and mobile agents. This thesis also proposes an architecture for software platforms supportting the CM-tel component model. The architecture relies on XSLT (XML Stylesheet Language Transformation) for model transformation and code generation. A platform based on the CORBA (Common Object Request Broker Architecture) technology and an application in the field of virtual laboratories were implemented in order to assess the CM-tel component model
Doutorado
Engenharia de Computação
Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
48

Rabello, Junior Solon Andrade. "CoolEdu: um modelo multiagente para colaboração em ambientes descentralizados de educação ubíqua." Universidade do Vale do Rio do Sinos, 2010. http://www.repositorio.jesuita.org.br/handle/UNISINOS/2286.

Full text
Abstract:
Made available in DSpace on 2015-03-05T14:01:22Z (GMT). No. of bitstreams: 0 Previous issue date: 19
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
O uso crescente de dispositivos móveis e a ampla difusão de redes sem fio vêm estimulando as pesquisas relacionadas com computação móvel e ubíqua. Neste contexto, a educação vem sendo considerada uma das principais áreas de aplicação. O acompanhamento da mobilidade do aprendiz, através de sistemas de localização e o suporte à ciência de contexto, possibilitam a descoberta de novas oportunidades educacionais. Atualmente existem diversas propostas para a organização de ambientes de educação ubíqua, embora a maioria utilize uma arquitetura centralizada. Essa abordagem, apesar de trazer benefícios como a facilidade de acesso aos dados dos aprendizes, tem desvantagens intrínsecas ao seu modelo, como a preocupação com a escalabilidade e a separação física entre o aprendiz e os seus dados de perfil. Como alternativa às abordagens centralizadas, este trabalho propõe um modelo de colaboração para ambientes descentralizados, que, baseado no modelo sócio-interacionista e na abordagem de agentes, auxilia no processo de a
The recent use of mobile devices and the widespread adoption of wireless computer networks have stimulated mobile and ubiquitous computing research. In this context, education is being considered one of the main application areas. The ability to accurately track the learner’s position through a location system and the context awareness support allow the discovery of new pedagogical opportunities. Nowadays, there are several approaches to the organization of ubiquitous computing environments, even if the majority of them employ a centralized architecture. This approach brings some benefits, like easing the access to the learner profiles, but it also has some disadvantages intrinsic to the model, like scalability concerns and the physical separation between the learners and their profile data. This work proposes a collaboration model created for decentralized environments, capable of improving the learning process through the stimulus to the interaction between learners. This approach is modeled using agents, e
APA, Harvard, Vancouver, ISO, and other styles
49

Désiré, Nguessan. "Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-21012010-171918/.

Full text
Abstract:
Este trabalho explora a gerência de segurança e cooperação de aplicações em sistemas distribuídos móveis. Neste contexto, é feito um estudo sobre os diferentes middlewares para ambientes móveis (mobile middleware): suas capacidades de enfrentar os desafios da mobilidade e da segurança. As análises do estudo mostram que esses middlewares devem possuir características que lhes permitem uma melhor adaptação às necessidades das aplicações e à natureza dos ambientes móveis. Os middlewares existentes pouco abordam a questão da segurança. A segurança ainda é um problema complexo que deve ser gerido em todos os níveis de um sistema distribuído móvel, incluindo novos mecanismos. Com base nessa análise, foi desenvolvido um modelo de gerência de segurança que implementa um mecanismo de autenticação mútua, confidencialidade, detecção de intruso e controle de acesso em ambientes móveis. O objetivo é garantir a confiabilidade, a disponibilidade de serviços e a privacidade do usuário através da tecnologia PET - Privacy-Enhancing Tecnologies. A idéia é fundamentada em agentes interceptadores e autoridades de segurança que distribuem tíquetes de segurança e controlam o acesso a recursos e espaços de tuple do ambiente. O estudo de caso apresentou resultados satisfatórios que permitem julgar a pertinência do modelo proposto. O modelo será integrado a um sistema de e-saúde.
The work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a study of different mobile middleware is made. The study examines their capacities to face the challenges of mobility and security issues. The analysis shows that the existing middleware has very few approaches on security problems; security is still a complex issue to be managed in all the levels of mobile distributed system including new mechanisms. Based on this analysis, a security management model is developed that implements a mechanism for mutual authentication, confidentiality, intrusion detection, access control of mobile agents in mobile environments, ensures services availability and user privacy, through technology PET (Privacy-Enhancing Technologies). The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC.
APA, Harvard, Vancouver, ISO, and other styles
50

Oliveira, George Almeida de. "Um modelo para gerenciamento de históricos de contextos fisiológicos." Universidade do Vale do Rio dos Sinos, 2016. http://www.repositorio.jesuita.org.br/handle/UNISINOS/5438.

Full text
Abstract:
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2016-07-14T12:32:09Z No. of bitstreams: 1 George Almeida De Oliveira_.pdf: 1203626 bytes, checksum: 54258ab2dd96b3f2309b53d61fd0ce0f (MD5)
Made available in DSpace on 2016-07-14T12:32:09Z (GMT). No. of bitstreams: 1 George Almeida De Oliveira_.pdf: 1203626 bytes, checksum: 54258ab2dd96b3f2309b53d61fd0ce0f (MD5) Previous issue date: 2016-03-21
Nenhuma
Com a popularização no mercado de consumo de wearables, ou dispositivos vestíveis, a computação móvel e ubíqua vem se tornando presente em diversas áreas como educação, comércio e entretenimento. Na área da saúde estes dispositivos têm um importante papel, pois contam com sensores para captura de sinais fisiológicos, como por exemplo, medir a temperatura corporal e batimentos cardíacos do usuário. Em muitos casos não há qualquer padronização ou comunicação entre os diferentes sistemas de cuidados ubíquos que administram os dados fisiológicos do usuário. Esse trabalho apresenta uma proposta para gerenciamento de históricos de contextos fisiológicos através de um modelo denominado GECONFI. O modelo suporta a coleta de dados através de aplicações que utilizam dispositivos e sensores de monitoramento, também define uma ontologia para o domínio de contextos fisiológicos. Esse trabalho apresenta o uso de três aplicações integradas ao GECONFI que permitiram avaliar e testar os serviços disponibilizados pelo modelo. A primeira aplicação chamada SiCuide foi aplicada com treze pacientes e um enfermeiro, que apresentaram pareceres positivos em relação a sua utilidade para o monitoramento fisiológico dos usuários. Os outros dois sistemas denominados FitBurn e Heart-Control foram aplicados em um cenário baseado em sensibilidade a contexto permitindo o acesso compartilhado de uma mesma trilha. Os resultados obtidos mostraram a viabilidade para que outros sistemas realizem a administração de históricos contextuais de maneira genérica através do modelo proposto.
With the popularization in wearables market, or wearable devices, the mobile and ubiquitous computing is becoming present in areas such as education, commerce and entertainment. In healthcare these devices have an important role, as have sensors for capturing physiological signals, such as measuring the body temperature and heart rate of the user. In many cases there´s no standardization or communication between different Ubiquitous care systems that manage the physiological user data. This work presents a proposal for historical contexts of physiological management through a model called GECONFI. The model supports data collection through applications that use devices and monitoring sensors, defines an ontology for the domain of physiological contexts. This work presents the use of three integrated applications to GECONFI, that allowed evaluate and test the services provided by the model. The first application called SiCuide was applied with thirteen patients and a nurse, who showed positive opinions regarding its usefulness for physiological monitoring of users. The other two systems called FitBurn and Heart-Control were applied in a scenario based on sensitivity to context allowing shared access to the same track. The results showed the feasibility for other systems to perform the administration of contextual historical generically through the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography