37,602 research outputs found

    First experiences with Personal Networks as an enabling platform for service providers

    Get PDF
    By developing demonstrators and performing small-scale user trials, we found various opportunities and pitfalls for deploying personal networks (PNs) on a commercial basis. The demonstrators were created using as many as possible legacy devices and proven technologies. They deal with applications in the health sector, home services, tourism, and the transportation sector. This paper describes the various architectures and our experiences with the end users and the technology. We conclude that context awareness, service discovery, and content management are very important in PNs and that a personal network provider role is necessary to realize these functions under the assumptions we made. The PNPay Travel demonstrator suggests that PN service platforms provide an opportunity to develop true trans-sector services

    High frequency band communication application in Malaysia

    Get PDF
    High frequency (HF) radio frequencies are between 3 and 30 MHz.[1] Also known as the decameter band or decameter wave as the wavelengths range from one to ten decameters. Shortwave (2.310 - 25.820 MHz)[1] overlaps and is slightly lower than HF. Since the ionosphere often reflects HF radio waves quite well (a phenomenon known as skywave), this range is extensively used for medium and long range terrestrial radio communication. However, suitability of this portion of the spectrum for such communication varies greatly with a complex combination of factors[1]: ‱ Sunlight/darkness at site of transmission and reception ‱ Transmitter/receiver proximity to terminator ‱ Season ‱ Sunspot cycle ‱ Solar activity ‱ Polar aurora ‱ Maximum usable frequency ‱ Lowest usable high frequency ‱ Frequency of operation within the HF rang

    Services surround you:physical-virtual linkage with contextual bookmarks

    Get PDF
    Our daily life is pervaded by digital information and devices, not least the common mobile phone. However, a seamless connection between our physical world, such as a movie trailer on a screen in the main rail station and its digital counterparts, such as an online ticket service, remains difficult. In this paper, we present contextual bookmarks that enable users to capture information of interest with a mobile camera phone. Depending on the user’s context, the snapshot is mapped to a digital service such as ordering tickets for a movie theater close by or a link to the upcoming movie’s Web page

    Security and Online learning: to protect or prohibit

    Get PDF
    The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users while allowing sensitive data to be released to unacceptable recipients. This chapter presents findings concerned with usability for two security issues: authentication mechanisms and privacy. Usability issues such as memorability, feedback, guidance, context of use and concepts of information ownership are reviewed within various environments. This chapter also reviews the roots of these usability difficulties in the culture clash between the non-user-oriented perspective of security and the information exchange culture of the education domain. Finally an account is provided of how future systems can be developed which maintain security and yet are still usable

    Responsibility and non-repudiation in resource-constrained Internet of Things scenarios

    Get PDF
    The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment

    The Evolution of First Person Vision Methods: A Survey

    Full text link
    The emergence of new wearable technologies such as action cameras and smart-glasses has increased the interest of computer vision scientists in the First Person perspective. Nowadays, this field is attracting attention and investments of companies aiming to develop commercial devices with First Person Vision recording capabilities. Due to this interest, an increasing demand of methods to process these videos, possibly in real-time, is expected. Current approaches present a particular combinations of different image features and quantitative methods to accomplish specific objectives like object detection, activity recognition, user machine interaction and so on. This paper summarizes the evolution of the state of the art in First Person Vision video analysis between 1997 and 2014, highlighting, among others, most commonly used features, methods, challenges and opportunities within the field.Comment: First Person Vision, Egocentric Vision, Wearable Devices, Smart Glasses, Computer Vision, Video Analytics, Human-machine Interactio

    Germany's broadband networks - innovation on hold

    Get PDF
    The market for information and communication technologies is changing rapidly. Products and applications that used to be completely separate are becoming almost interchangeable. Sweeping change lies ahead in voice and data telephony: the fixed-line telephone network faces new competition from innovative technologies. In this report we concentrate on analysing the economic potential of TV-cable and powerline networks as internet-access media, and discuss the prospects for the communications market. Besides looking into the technological developments, we examine the market relevance of existing ownership and competitive structures.ICT, cable, Germany, Broadband

    Faculty Excellence

    Get PDF
    Each year, the University of New Hampshire selects a small number of its outstanding faculty for special recognition of their achievements in teaching, scholarship and service. Awards for Excellence in Teaching are given in each college and school, and university-wide awards recognize public service, research, teaching and engagement. This booklet details the year\u27s award winners\u27 accomplishments in short profiles with photographs and text
    • 

    corecore