To see the other types of publications on this topic, follow the link: Ubiquitous computing. Computers.

Dissertations / Theses on the topic 'Ubiquitous computing. Computers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Ubiquitous computing. Computers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Schmidt, Albrecht. "Ubiquitous computing : computing in context." Thesis, Lancaster University, 2003. http://eprints.lancs.ac.uk/12221/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tennent, Paul R. "Augmented analyses : supporting the study of ubiquitous computing systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5307/.

Full text
Abstract:
Ubiquitous computing is becoming an increasingly prevalent part of our everyday lives. The reliance of society upon such devices as mobile phones, coupled with the increasing complexity of those devices is an example of how our everyday human-human interaction is affected by this phenomenon. Social scientists studying human-human interaction must now take into account the effects of these technologies not just on the interaction itself, but also on the approach required to study it. User evaluation is a challenging topic in ubiquitous computing. It is generally considered to be difficult, certainly more so than in previous computational settings. Heterogeneity in design, distributed and mobile users, invisible sensing systems and so on, all add up to render traditional methods of observation and evaluation insufficient to construct a complete view of interactional activity. These challenges necessitate the development of new observational technologies. This thesis explores some of those challenges and demonstrates that system logs, with suitable methods of synchronising, filtering and visualising them for use in conjunction with more traditional observational approaches such as video, can be used to overcome many of these issues. Through a review of both the literature of the field, and the state of the art of computer aided qualitative data analysis software (CAQDAS), a series of guidelines are constructed showing what would be required of a software toolkit to meet the challenges of studying ubiquitous computing systems. It outlines the design and implementation of two such software packages, \textit{Replayer} and \textit{Digital Replay System}, which approach the problem from different angles, the former being focussed on visualising and exploring the data in system logs and the latter focussing on supporting the methods used by social scientists to perform qualitative analyses. The thesis shows through case studies how this technique can be applied to add significant value to the qualitative analysis of ubiquitous computing systems: how the coordination of system logs and other media can help us find information in the data that would otherwise be inaccessible; an ability to perform studies in locations/settings that would otherwise be impossible, or at least very difficult; and how creating accessible qualitative data analysis tools allows people to study particular settings or technologies who could not have studied them before. This software aims to demonstrate the direction in which other CAQDAS packages may have to move in order to support the study of the characteristics of human-computer and human-human interaction in a world increasingly reliant upon ubiquitous computing technology.
APA, Harvard, Vancouver, ISO, and other styles
3

Chalmers, Kevin. "Investigating communicating sequential processes for Java to support ubiquitous computing." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/3507.

Full text
Abstract:
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via computational elements. These elements are designed to augment and support our lives, thus allowing us to perform our tasks and goals. The main facet of Ubiquitous Computing is that computational devices are embedded in the environment, and interact with users and themselves to provide novel and unique applications. Ubiquitous Computing requires an underlying architecture that helps to promote and control the dynamic properties and structures that the applications require. In this thesis, the Networking package of Communicating Sequential Processes for Java (JCSP) is examined to analyse its suitability as the underlying architecture for Ubiquitous Computing. The reason to use JCSP Networking as a case study is that one of the proposed models for Ubiquitous Computing, the π-Calculus, has the potential to have its abstractions implemented within JCSP Networking. This thesis examines some of the underlying properties of JCSP Networking and examines them within the context of Ubiquitous Computing. There is also an examination into the possibility of implementing the mobility constructs of the π-Calculus and similar mobility models within JCSP Networking. It has been found that some of the inherent properties of Java and JCSP Networking do cause limitations, and hence a generalisation of the architecture has been made that should provide greater suitability of the ideas behind JCSP Networking to support Ubiquitous Computing. The generalisation has resulted in the creation of a verified communication protocol that can be applied to any Communicating Process Architecture.
APA, Harvard, Vancouver, ISO, and other styles
4

Warshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.

Full text
Abstract:
Ubiquitous computing aims to make computing widely available, easy to use, and completely transparent to the user. Umbilical Cord is intended to be the first step in researching ubiquitous computing at CSUSB. It implements a model scalable network with a client-server architecture that features consistent user interaction and global access to user data. It is based on the Linux operating system which can be leveraged for future research due to the open nature of its source code. It also features a scalable network swap.
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dhomeja, Lachhman Das. "Supporting policy-based contextual reconfiguration and adaptation in ubiquitous computing." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6933/.

Full text
Abstract:
In order for pervasive computing systems to be able to perform tasks which support us in everyday life without requiring attention from the users of the environment, they need to adapt themselves in response to context. This makes context-awareness in general, and context-aware adaptation in particular, an essential requirement for pervasive computing systems. Two of the features of context-awareness are: contextual reconfiguration and contextual adaptation in which applications adapt their behaviour in response to context. We combine both these features of context-awareness to provide a broad scope of adaptation and put forward a system, called Policy-Based Contextual Reconfiguration and Adaptation (PCRA) that provides runtime support for both. The combination of both context-aware reconfiguration and context-aware adaptation provides a broad scope of adaptation and hence allows the development of diverse adaptive context-aware applications. However, another important issue is the choice of an effective means for developing, modifying and extending such applications. The main argument forming the basis of this thesis is that we advocate the use of a policy-based programming model and argue that it provides more effective means for developing, modifying and extending such applications. This thesis addresses other important surrounding issues which are associated with adaptive context-aware applications. These include the management of invalid bindings and the provision of seamless caching support for remote services involved in bindings for improved performance. The bindings may become invalid due to failure conditions that can arise due to network problems or migration of software components, causing bindings between the application component and remote service to become invalid. We have integrated reconfiguration support to manage bindings, and seamless caching support for remote services in PCRA. This thesis also describes the design and implementation of PCRA, which enables development of adaptive context-aware applications using policy specifications. Within PCRA, adaptive context-aware applications are modelled by specifying binding policies and adaptation policies. The use of policies within PCRA simplifies the development task because policies are expressed at a high-level of abstraction, and are expressed independently of each other. PCRA also allows the dynamic modification of applications since policies are independent units of execution and can be dynamically loaded and removed from the system. This is a powerful and useful capability as applications may evolve over time, i.e. the user needs and preferences may change, but re-starting is undesirable. We evaluate PCRA by comparing its features to other systems in the literature, and by performance measures.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Bo. "SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments." Thesis, Liverpool John Moores University, 2007. http://researchonline.ljmu.ac.uk/5813/.

Full text
Abstract:
The background of the project is based on the notion of ubiquitous computing. Ubiquitous computing was introduced as a prospective view about future usage of computers. Smaller and cheaper computer chips will enable us to embed computing ability into any appliances. Along with the convenience brought by ubiquitous computing, its inherent features also exposed its weaknesses. It makes things too easy for a malicious user to spy on others. An Intrusion Detection System (IDS) is a tool used to protect computer resources against malicious activities. Existing IDSs have several weaknesses that hinder their direct application to ubiquitous networks. These shortcomings are caused by their lack of considerations about the heterogeneity, flexibility and resource constraints of ubiquitous networks. Thus the evolution towards ubiquitous computing demands a new generation of resource-efficient IDSs to provide sufficient protections against malicious activities. SUIDS is the first intrusion detection system proposed for ubiquitous computing environments. It keeps the special requirements of ubiquitous computing in mind throughout its design and implementation. SUIDS adopts a layered and distributed system architecture, a novel user-centric design and service-oriented detection method, a new resource-sensitive scheme, including protocols and strategies, and a novel hybrid metric based algorithm. These novel methods and techniques used in SUIDS set a new direction for future research and development. As the experiment results demonstrated, SUIDS is able to provide a robust and resource-efficient protection for ubiquitous computing networks. It ensures the feasibility of intrusion detection in ubiquitous computing environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Lisa Min-yi Chen. "Display computers." Texas A&M University, 2006. http://hdl.handle.net/1969.1/3829.

Full text
Abstract:
A Display Computer (DC) is an everyday object: Display Computer = Display + Computer. The “Display” part is the standard viewing surface found on everyday objects that conveys information or art. The “Computer” is found on the same everyday object; but by its ubiquitous nature, it will be relatively unnoticeable by the DC user, as it is manufactured “in the margins”. A DC may be mobile, moving with us as part of the everyday object we are using. DCs will be ubiquitous: “effectively invisible”, available at a glance, and seamlessly integrated into the environment. A DC should be an example of Weiser’s calm technology: encalming to the user, providing peripheral awareness without information overload. A DC should provide unremarkable computing in support of our daily routines in life. The nbaCub (nightly bedtime ambient Cues utility buddy) prototype illustrates a sample application of how DCs can be useful in the everyday environment of the home of the future. Embedding a computer into a toy, such that the display is the only visible portion, can present many opportunities for seamless and nontraditional uses of computing technology for our youngest user community. A field study was conducted in the home environment of a five-year old child over ten consecutive weeks as an informal, proof of concept of what Display Computers for children can look like and be used for in the near future. The personalized nbaCub provided lightweight, ambient information during the necessary daily routines of preparing for bed (evening routine) and preparing to go to school (morning routine). To further understand the child’s progress towards learning abstract concepts of time passage and routines, a novel “test by design” activity was included. Here, the role of the subject changed to primary designer/director. Final post-testing showed the subject knew both morning and bedtime routines very well and correctly answered seven of eight questions based on abstract images of time passage. Thus, the subject was in the process of learning the more abstract concept of time passage, but was not totally comfortable with the idea at the end of the study.
APA, Harvard, Vancouver, ISO, and other styles
9

Malkani, Yasir Arfat. "A proof-of-proximity framework for device pairing in ubiquitous computing environments." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6307/.

Full text
Abstract:
Ad hoc interactions between devices over wireless networks in ubiquitous computing environments present a security problem: the generation of shared secrets to initialize secure communication over a medium that is inherently vulnerable to various attacks. However, these ad hoc scenarios also offer the potential for physical security of spaces and the use of protocols in which users must visibly demonstrate their presence and/or involvement to generate an association. As a consequence, recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user‟s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this dissertation is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. Our main contribution is the design and prototype implementation of Proof-of-Proximity framework along with a novel Co- Location protocol. Other contributions include a detailed analysis of existing device pairing schemes, a simple device discovery mechanism, a protocol selection mechanism that is used to find out the best possible scheme to demonstrate the physical proximity of the devices according to the scenario, and a usability study of eight pairing schemes and the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
10

Ku, Azir Ku Nurul Fazira. "Human factors of ubiquitous computing : ambient cueing in the digital kitchen?" Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5518/.

Full text
Abstract:
This thesis is concerned with the uses of Ubiquitous Computing (UbiComp) in everyday domestic environments. The concept of UbiComp promises to shift computing away from the desktop into everyday objects and settings. It has the twin goals of providing ‘transparent’ technologies where the information has been thoroughly embedded into everyday activities and objects (thus making the computer invisible to the user) and also (and more importantly) of seamless integration of these technologies into the activities of their users. However, this raises the challenge of how best to support interaction with a ‘transparent’ or ‘invisible’ technology; if the technology is made visible, it will attract the user's attention to it and away from the task at hand, but if it is hidden, then how can the user cope with malfunctions or other problems in the technology? We approach the design of Human-Computer Interaction in the ubiquitous environment through the use of ambient displays, i.e. the use of subtle cueing, embedded in the environment which is intended to guide human activity. This thesis draws on the concept of stimulus-response compatibility and applies this to the design ambient display. This thesis emphasizes the need to understand the users’ perspectives and responses in any particular approach that has been proposed. Therefore, the main contributions of this thesis focus on approaches to improve human performance in the ubiquitous environment through ambient display.
APA, Harvard, Vancouver, ISO, and other styles
11

Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Spiekermann, Sarah. "User control in ubiquitous computing : design alternatives and user acceptance /." Aachen : Shaker, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017994540&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Siu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hall, Malcolm. "Contextual mobile adaptation." Thesis, Connect to e-thesis, 2008. http://theses.gla.ac.uk/240/.

Full text
Abstract:
Thesis (Ph.D.) - University of Glasgow, 2008.
Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, Department of Computing Science, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
APA, Harvard, Vancouver, ISO, and other styles
15

Schott, Thomas Jerome. "Rural Virginia Middle School Teachers\' and Students\' Perceptions on the Influence of One-to-one Computers in the Classroom." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/49552.

Full text
Abstract:
Children of the 21st century are digital learners and have various technologies at their fingertips. As a result, classrooms have evolved and school systems are equipping students and teachers with the technological tools that are believed to meet the needs of 21st century learners. However, researchers say there is still a need to examine students\' and teachers\' perceptions of, and attitudes about, technology and its use in the classroom (Maninger & Holden, 2009). There has also been a growing interest in knowing if the investment of the technology is having any positive effects in the classroom, what effect technology has on academic progress, and understanding what teachers and students think about the implementation and integration of technology in the classroom as an instructional tool.

The purpose of this study was to examine the perceptions of middle school teachers and students, in a select rural Virginia middle school, on the effect that one-to-one computing had on the frequency and type of instruction that is taking place in the core areas of English, math, science, and social studies.  The study also looked at the teachers\' and students\' perceived effect on the educational performance of individual subgroups. A quantitative analysis was done using an electronic survey, which provided information on the perceived frequency and type of educational activities using one-to-one computers and the perceived effect one-to-one computing had on the educational performance of different subgroups. Questions on the survey were developed by correlating the theoretical ideas of Bloom\'s taxonomy / Bloom\'s web 2.0 technology pyramids and then categorizing the questions so the complexity of the questions could be looked at on the range of use chart. The research found, of the students surveyed, 90% of English students, 78% of math students, 75% of science students, and 77% of social studies students found the computers to have a positive effect on their academic performance. Therefore, one major finding of this study was that students\' perceptions of the overall effect of one-to-one computers were positive.

Ed. D.
APA, Harvard, Vancouver, ISO, and other styles
16

Kocaballi, Ahmet Baki. "Weighted Granular Best Matching Algorithm For Context-aware Computing Systems." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605825/index.pdf.

Full text
Abstract:
Weighted granular best matching algorithm is proposed for the operation of context matching in context-aware computing systems. New algorithm deals with the subjective, fuzzy and multidimensional characteristics of contextual information by using weights and a granular structure for contextual information. The proposal is applied on a case: CAPRA &ndash
Context-Aware Personal Reminder Agent tool to show the applicability of the new context matching algorithm. The obtained outputs showed that proposed algorithm produces the results which are more sensitive to the user&rsquo
s intention, more adaptive to the characteristics of the contextual information and applicable to a current Context-aware system.
APA, Harvard, Vancouver, ISO, and other styles
17

Pinkerton, Michael David. "Ubiquitous computing : extending access to mobile data." Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Song, Xiang. "Seamless mobility in ubiquitous computing environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24671.

Full text
Abstract:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Ramachandran, Umakishore; Committee Member: Ahamad, Mustaque; Committee Member: Edwards, Keith; Committee Member: Liu, Ling; Committee Member: Suh, Sang-bum
APA, Harvard, Vancouver, ISO, and other styles
19

Müller-Tomfelde, Christian. "Soundswork - akustische Repräsentationen für die Mensch-Computer-Interaktion in kooperativen und hybriden Arbeitsumgebungen." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Yong. "Service discovery in an open ubiquitous computing environment." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3386698.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Sciences, 2009.
Title from PDF t.p. (viewed on Jul 22, 2010). Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7673. Adviser: Kay Connelly.
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.

Full text
Abstract:
The need for coalition access control among individuals and organizations has increased significantly in the past years as the need for spontaneous access to information increases. However, a significant deterrent to the ability to connect in a spontaneous manner in coalition collaborative applications is the difficulty in users from different domains being able to access resources or services located and owned by other entities. Coalition access control encompasses control mechanisms dealing with access between users of two or more different organizations or enterprises. These users could be co-located or remotely located. The thesis first presents a delegation based D-TMAC model that extends traditional TMAC across organizations for formal coalition environments, and a context-based coalition access control model, which apply context information as conditions on delegation. Then the thesis proposes a Session-based Coalition Access Control Architecture (SCACA) and provides practical implementation that enables dynamic coalition access control over a communication session in a spontaneous manner. The presented system architecture and methodology leverages the IETF SIP protocol as an underlying communication mechanism in order to greatly minimize the administration overhead and rapidly adapt the dynamic nature of access control in spontaneous coalition environments. The result is that, during a spontaneous coalition communication across organizations, every endpoint can access other endpoints' resources and share its own resources to all the other endpoints as well. Moreover, these privileges will dynamically change as the status of the coalition communication changes.
APA, Harvard, Vancouver, ISO, and other styles
22

Tan, Chiu Chiang. "Secure and efficient data extraction for ubiquitous computing applications." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623571.

Full text
Abstract:
Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous computing systems are built using small, embedded devices with limited computational, storage and communication abilities. A common requirement for many ubiquitous computing applications is to utilize the data from these small devices to perform more complex tasks. For critical applications such as healthcare or medical related applications, there is a need to ensure that only authorized users have timely access to the data found in the small device. In this dissertation, we study the problem of how to securely and efficiently extract data from small devices.;Our research considers two categories of small devices that are commonly used in ubiquitous computing, battery powered sensors and battery free RFID tags. Sensors are more powerful devices equipped with storage and sensing capabilities that are limited by battery power, whereas tags are less powerful devices with limited functionalities, but have the advantage of being operable without battery power. We also consider two types of data access patterns, local and remote access. In local data access, the application will query the tag or the sensor directly for the data, while in remote access, the data is already aggregated at a remote location and the application will query the remote location for the necessary information, The difference between local and remote access is that in local access, the tag or sensor only needs to authenticate the application before releasing the data, but in remote access, the small device may have to perform additional processing to ensure that the data remains secure after being collected. In this dissertation, we present secure and efficient local data access solutions for a single RFID tag, multiple RFID tags, and a single sensor, and remote data access solutions for both RFID tag and sensor.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.

Full text
Abstract:
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
APA, Harvard, Vancouver, ISO, and other styles
24

Liljedahl, Anders. "Evaluation of Multi-Agent Platforms for Ubiquitous Computing." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4540.

Full text
Abstract:
Ubiquitous Computing can be described as the third stage in the computing history where every user is surrounded by many “computers”. This paper provides an evaluation of a number of multi-agent platforms to decide their appropriateness as an infrastructure for ubiquitous computing.
Ubiquitous Computing kan beskrivas som det 3:e steget i datorns utveckling där varje användare omges med många "datorer". Denna uppsats tillhandahåller en utvärdering av multi-agent platformar för att undersöka deras lämplighet inom Ubiquitous Computing
APA, Harvard, Vancouver, ISO, and other styles
25

Pietzowski, Andreas. "Selbstschutz in Organic- und Ubiquitous-Middleware-Systemen unter Verwendung von Computer-Immunologie." kostenfrei kostenfrei, 2008. http://d-nb.info/991492307/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Dragoi, Octavian Andrei. "The Continuum Architecture: Towards Enabling Chaotic Ubiquitous Computing." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1158.

Full text
Abstract:
Interactions in the style of the ubiquitous computing paradigm are possible today, but only in handcrafted environments within one administrative and technological realm. This thesis describes an architecture (called Continuum), a design that realises the architecture, and a proof-of-concept implementation that brings ubiquitous computing to chaotic environments. Essentially, Continuum enables an ecology at the edge of the network, between users, competing service providers from overlapping administrative domains, competing internet service providers, content providers, and software developers that want to add value to the user experience. Continuum makes the ubiquitous computing functionality orthogonal to other application logic. Existing web applications are augmented for ubiquitous computing with functionality that is dynamically compiled and injected by a middleware proxy into the web pages requested by a web browser at the user?s mobile device. This enables adaptability to environment variability, manageability without user involvement, and expansibility without changes to the mobile. The middleware manipulates self-contained software units with precise functionality (called frames), which help the user interact with contextual services in conjunction with the data to which they are attached. The middleware and frame design explicitly incorporates the possibility of discrepancies between the assumptions of ubiquitous-computing software developers and field realities: multiple administrative domains, unavailable service, unavailable software, and missing contextual information. A framework for discovery and authorisation addresses the chaos inherent to the paradigm through the notion of role assertions acquired dynamically by the user. Each assertion represents service access credentials and contains bootstrapping points for service discovery on behalf of the holding user. A proof-of-concept prototype validates the design, and implements several frames that demonstrate general functionality, including driving discovery queries over multiple service discovery protocols and making equivalences between service types, across discovery protocols.
APA, Harvard, Vancouver, ISO, and other styles
27

Baloch, Raheel Ali. "Context dependency analysis in ubiquitous computing." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714129.

Full text
Abstract:
To provide users with personalized adaptive services only using the accessible computing resources in a cloud environment, context aware applications need to assimilate both the accessed and derived context, i.e. a combination of more than one sensed data and information in the environment. Context data dependency, dependency that arises between the context data producer and consumer, may get introduced in a system due to numerous reasons. But as the number of context dependencies for a service increases, the more complex the system becomes to manage. The thesis addresses issues of how to identify context dependencies, represent such context dependencies and then reduce them in a system. In the first part of the thesis, we present two efficient approaches to determine context dependency relations among various services in ubiquitous computing environment to help better analyse the pervasive services. One approach is based on graph theory, and we have used the topological sort to determine the context dependencies. The second approach is based on solving constraint networks which determines whether an entity is affected when the state of a certain other entity has its state changed, i.e. determining the dynamic nature of context dependency. In the second part of the thesis, we present a mode for representation of context dependencies within a system. Our model that represents context dependencies is based on set theory and first-order predicate logic. The context dependency representation model also represents alternative sources for context acquisition that can be utilized in a case in which the preferred context producers are not available to service the desired context to the relevant context consumer any more. Further, we try to reduce the context dependencies by presenting the idea of profile context, which is based on the proposal of an open framework for context acquisition, management and distribution. This heuristic approach is based on the idea of utilizing mobile nodes in an ad hoc overlay network with more resources than the context producer itself to store various contextual information under the banner of profile context, and further, provide profile context instead of each context individually based on the queries the nodes receive from the context consumers. Bringing together the context information and context updates from various sources, support for context aware decisions can be implemented efficiently in a mobile environment by addressing the issues of context dependency using profile context
APA, Harvard, Vancouver, ISO, and other styles
28

Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jayabharath, Kumar Suri. "Sensor systems for positioning and identification in ubiquitous computing." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5767.

Full text
Abstract:

Technologies for position sensing and identification are important to have in ubiquitous computing environments. These technologies can be used to track users, devices, and artefacts in the physical milieu, for example, locating the position of a cellular phone in av physical environment. The aim of this thesis was to survey and classify available technologies for location sensing and identification.

We have made a literature study on both commercial and research-oriented systems and technologies for use in indoor and outdoor environments. We compared the characteristics of the underlying sensing technologies with respect to physical size, sensing method, cost, and accuracy. We conclude the thesis with a set of recommendations to developers and discuss the requirements on future sensing technologies and their use in mobile devices and environments.

APA, Harvard, Vancouver, ISO, and other styles
30

Elahi, Haroon. "Cooperation and Integration:Do we need them in Ubiquitous Computing Design?" Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5659.

Full text
Abstract:
This thesis takes in to account mainly the cooperative design and human factors from ubiquitous computing design perspective. Areas such as role of cooperative design in ubiquitous computing perspective, the changing attributes of society and the associated issues, the changing shape of public service delivery and need for a change in methodology in ubiquitous computing projects have been discussed. The overall approach is taking advantage of Suchman’s idea of ‘design as an artful integration of different social as well as technical aspects'. The advantage of the technique has been taken by bringing together social and societal aspects, agenda of governments from IT perspective, human factors and purely designs methodology to frame up in which we need to re-assess ubiquitous computing design methodology. The thesis work comprises literature review, and a case study to pick up on the role of cooperative and participatory design. The probe was specifically in the context of ubiquitous computing design requirements and ubiquitous computing vision
26 Helsingorsgatan 16 444 Kista Phone: 0046 73 632 3670
APA, Harvard, Vancouver, ISO, and other styles
31

Benedicto, Kathryn Flores 1977. "Regions : a scalable infrastructure for scoped service location in ubiquitous computing." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80038.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (leaves 108-109).
by Kathryn Flores Benedicto.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
32

Heckmann, Dominikus. "Ubiquitous user modeling /." Berlin : Akad. Verl.-Ges. Aka, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2860787&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Grimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Krishna, Renan. "Constructing runtime models with bigraphs to address ubiquitous computing service composition volatility." Thesis, University of Sussex, 2015. http://sro.sussex.ac.uk/id/eprint/54282/.

Full text
Abstract:
In this thesis, we explore the appropriateness of the language abstractions provided by Bigraphs to construct a model at runtime to tackle the problem of volatility in a service composition running on a mobile device. Our contributions to knowledge are as follows: 1) We have shown that Bigraphs (Milner, 2009) are suitable for expressing models at runtime. 2) We have offered Bigraph language abstractions as an appropriate solution to some of the research problems posed by the models at runtime community (Aßmann et al., 2012). 3) We have discussed the general lessons learnt from using Bigraphs for a practical application such as a model at runtime. 4) We have discussed the general lessons learnt from our experiences of designing models at runtime. 5) We have implemented the model at runtime using the BPL Tool (ITU, 2011) and have experimentally studied the response times of our Bigraphical model. We have suggested appropriate enhancements for the tool based on our experiences. We present techniques to parameterize the reaction rules so that the matching algorithm of the BPL Tool returns a single match giving us the ability to dynamically program the model at runtime. We also show how to query the Bigraph structure.
APA, Harvard, Vancouver, ISO, and other styles
35

O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ingmarsson, Magnus. "Modelling User Tasks and Intentions for Service Discovery in Ubiquitous Computing." Licentiate thesis, Linköping University, Linköping University, MDA - Human Computer Interfaces, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8319.

Full text
Abstract:

Ubiquitous computing (Ubicomp) increases in proliferation. Multiple and ever growing in numbers, computational devices are now at the users' disposal throughout the physical environment, while simultaneously being effectively invisible. Consequently, a significant challenge is service discovery. Services may for instance be physical, such as printing a document, or virtual, such as communicating information. The existing solutions, such as Bluetooth and UPnP, address part of the issue, specifically low-level physical interconnectivity. Still absent are solutions for high-level challenges, such as connecting users with appropriate services. In order to provide appropriate service offerings, service discovery in Ubicomp must take the users' context, tasks, goals, intentions, and available resources into consideration. It is possible to divide the high-level service-discovery issue into two parts; inadequate service models, and insufficient common-sense models of human activities.

This thesis contributes to service discovery in Ubicomp, by arguing that in order to meet these high-level challenges, a new layer is required. Furthermore, the thesis presents a prototype implementation of this new service-discovery architecture and model. The architecture consists of hardware, ontology-layer, and common-sense-layer. This work addresses the ontology and common-sense layers. Subsequently, implementation is divided into two parts; Oden and Magubi. Oden addresses the issue of inadequate service models through a combination of service-ontologies in concert with logical reasoning engines, and Magubi addresses the issue of insufficient common-sense models of human activities, by using common sense models in combination with rule engines. The synthesis of these two stages enables the system to reason about services, devices, and user expectations, as well as to make suitable connections to satisfy the users' overall goal.

Designing common-sense models and service ontologies for a Ubicomp environment is a non-trivial task. Despite this, we believe that if correctly done, it might be possible to reuse at least part of the knowledge in different situations. With the ability to reason about services and human activities it is possible to decide if, how, and where to present the services to the users. The solution is intended to off-load users in diverse Ubicomp environments as well as provide a more relevant service discovery.


Report code: LiU-Tek-Lic-2007:14.
APA, Harvard, Vancouver, ISO, and other styles
37

Mamykina, Lena. "Designing ubiquitous computing for reflection and learning in diabetes management." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28093.

Full text
Abstract:
Thesis (M. S.)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Elizabeth D. Mynatt; Committee Member: Abowd, Gregory; Committee Member: Bruckman, Amy; Committee Member: Dourish, Paul; Committee Member: Nersessian, Nancy.
APA, Harvard, Vancouver, ISO, and other styles
38

Lu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Curry, D. Bruce. "Developing a Wider View of Educational Technology Through Ubiquitous Computing: A Qualitative Case Study." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/475.

Full text
Abstract:
Ubiquitous computing in elementary schools is in its early phases of development. However, many signs point to the likelihood that some form of one-to-one personal computing in schools is inevitable in the near future. The research pertaining to this model of computing technology is relatively scarce, leaving schools with a knowledge void when attempting to make decisions pertaining to this paradigm. The investigation sought to help alleviate this gap in the knowledge base by providing a qualitative case study that examined an elementary school's wireless laptop program over an extended period of one and one-half years. It gathered and described basic information about this model of technology in education and helped form a database for future comparison and/or theory building related to ubiquitous computing. Additionally, the relationship between identifying/removing barriers to technology use and developing a wider view of educational computing among members of the school community was examined. The theoretical purpose of the investigation explored how participants in the program developed a wider view of educational computing, which was defined as the processes by which individuals come to understand how technology can enhance the school environment. The more basic purposes were threefold: to describe richly what occurred as this school made the transition to Ubiquitous computing, to interpret inductively the findings into a series of lessons learned from the experience, and to apply practically the findings to the future direction of the program. The qualitative inquiry into this laptop program employed an embedded single-case study design to achieve the stated purposes and made use of a variety of data-gathering strategies (interviews, observations, and document analysis), consistent with the investigator's goals. By advancing our understanding of the processes by which people come to use ubiquitous computing to empower teaching and learning, this research made a substantial contribution to knowledge and practice. Its timing relative to this paradigm's entry into schools gives it the potential to have a disproportionately significant impact on the model's development.
APA, Harvard, Vancouver, ISO, and other styles
40

Tandler, Peter. "Synchronous collaboration in the age of ubiquitous computing requirements, application models, software architecture." Saarbrücken VDM Verlag Dr. Müller, 2004. http://d-nb.info/989592812/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Lu, Heng, and 陸恒. "A software testing framework for context-aware applications in pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41758067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Fan. "Ubiquitous Scalable Graphics: An End-to-End Framework using Wavelets." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-111908-165451/.

Full text
Abstract:
Dissertation (Ph.D.)--Worcester Polytechnic Institute.
Keywords: Energy Consumption; Perceptual Error Metric; Multiresolution; Wavelets; Mobile Graphics. Includes bibliographical references (p. 109-124).
APA, Harvard, Vancouver, ISO, and other styles
43

Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Fang, Ji, and 方骥. "Development of ubiquitous manufacturing platform with event-driven smart gateway." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49799587.

Full text
Abstract:
The recent advancement in computer-integrated manufacturing related technologies (e.g. internet of things, information technology and service-oriented architecture) has prompted the need for a novel effective, efficient and economical automatic identification and data collection solution for manufacturing scenario. Accurate and timely manufacturing front line information is essential to guarantee the functions and performance of enterprise information systems (EISs) deployed, and is the basis of entire information flow in enterprise. Both researchers and commercial players have made great contributions to the fields of enterprise information systems and data capturing technologies. However, real-time data processing and on-line knowledge support to seamlessly link up the EISs and shop floor front-line operations are still open to discuss. This research discusses an overall solution for manufacturing real-time field data capturing, processing and disseminating strategy in ubiquitous manufacturing environment, named Ubiquitous Manufacturing Platform (UMP). This research discusses the design and development of UMP, which is an innovative framework to integrate Auto-ID hardware devices and software services for facilitating manufacturing shop floor production management. The proposed event-driven UMP aims to enable shop floor real-time visibility and traceability, and bridge the gap between frontline operations and management level activities (e.g. planning and scheduling). On one hand, production management objectives are fulfilled through defined and configured services, and eventually carried out at shop floor operating sites with managed Auto-ID devices. On the other hand, the generated shop floor real-time field data is captured as events, which are then processed and aggregated to leveled meaningful information to satisfy various information requirements for different roles in an enterprise. UMP is expected to improve the efficiency and effectiveness of production supervision and decision making, and to reduce the production disturbances. This research has made the following achievements and contributions. Firstly, a scalable and reconfigurable infrastructure for manufacturing real-time field data capturing, processing and disseminating, named UMP, is developed based on several core technologies to achieve seamless dual-way connectivity and interoperability among enterprise application systems, shop floor, production line and workstation levels. Secondly, an innovative information processing mechanism, namely critical event model, is designed to connect the real-time field data in manufacturing processes to implied business context information. Based on this model, real-time field data is able to be organized in various abstract levels, so as to be useful for making adaptive enterprise decisions. Thirdly, a lightweight devices middleware solution named Gateway Operating System (GOS), is designed and proposed to support UMP. GOS enables a unified system interface for manufacturing companies to deploy and manage their heterogeneous Auto-ID devices. Furthermore, it allows multiple back-end manufacturing applications to share the same Auto-ID infrastructure, and shields the application systems from the implementation detail of enabling hardware devices. Fourthly, the gateway event processing procedure is presented to implement the engine for shop floor real-time field data capturing, processing and disseminating. Based on the Auto-ID infrastructure, it combines the concept of event and software agents into workflow management to realize real-time reconfigurable ubiquitous manufacturing.
published_or_final_version
Industrial and Manufacturing Systems Engineering
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
45

Pour, Shiva Abdi Farzaneh. "User Identification Roadmap towards 2020 : A study of personal identification challenges for ubiquitous computing world." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3485.

Full text
Abstract:
This thesis is about Personal Identification challenges towards Ubiquitous Computing world as targeted in 2020. The study starts by defining the problems that how diversity of tools for personal identification as an always-foreground activity is problematic in order to become a pervasive interaction. The thesis is divided into three parts. Part one is introduction, background and related works. Part two will describe the empirical study—Triangulation— that is supported by qualitative and quantitative methods. Observation and the analysis over collected data, also the result of informal interviews will cover the qualitative part. The informal interview consists of pre-determined questions that some answers have been analyzed by graphs and the last part of interview was the open discussion that ascertain what values the interviewees counts in today’s identification designs and what challenges or improvements they believe for future of personal identification. Last part is the future works and conclusion. The result of empirical study was applied on new technologies like RFID, Mobile identification and Biometrics, to investigate whether new identification tools and techniques cover the challenges on today’s identification and what future works they might need to focus on.
This thesis starts with thinking about the problems of the today’s identification; why we need to carry dozens of different magnetic cards, bunches of keys, or memorizing many digital pins and pass code? To do the study, I observed people at shopping and traveling to find out what and how people interact with tools, what are their behaviors, experiences, or reactions when they need to approve their identity. and what problems they encounter. Informal discussion with designers was the next step of empirical study. The analysis over collected data guided us into problems in today’s identifications: ‘Foreground activity’, ‘Diversity of tools and interactions’, ‘security’, ‘trust’ and ‘being economical’. Last section of the thesis is the investigating on current designs; RFID can be good solution for pervasive identification if the security and privacy of people respected. Mobile will be an inevitable part of every design in future. However, mobile phone designers should think about diversity of interface layouts that may be a barrier for unified identification interactions. Biometrics also seems the inevitable part of future of identification. Apart from technology, social engagement and supports, especially in terms of privacy is one of the most noticeable concerns. Information forensics, and level of awareness should be specified before the benefits of pervasive identifications threaten people’s privacies.
APA, Harvard, Vancouver, ISO, and other styles
46

Caon, Maurizio. "Context-aware gestural interaction in the smart environments of the ubiquitous computing era." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/344619.

Full text
Abstract:
Technology is becoming pervasive and the current interfaces are not adequate for the interaction with the smart environments of the ubiquitous computing era. Recently, researchers have started to address this issue introducing the concept of natural user interface, which is mainly based on gestural interactions. Many issues are still open in this emerging domain and, in particular, there is a lack of common guidelines for coherent implementation of gestural interfaces. This research investigates gestural interactions between humans and smart environments. It proposes a novel framework for the high-level organization of the context information. The framework is conceived to provide the support for a novel approach using functional gestures to reduce the gesture ambiguity and the number of gestures in taxonomies and improve the usability. In order to validate this framework, a proof-of-concept has been developed. A prototype has been developed by implementing a novel method for the view-invariant recognition of deictic and dynamic gestures. Tests have been conducted to assess the gesture recognition accuracy and the usability of the interfaces developed following the proposed framework. The results show that the method provides optimal gesture recognition from very different view-points whilst the usability tests have yielded high scores. Further investigation on the context information has been performed tackling the problem of user status. It is intended as human activity and a technique based on an innovative application of electromyography is proposed. The tests show that the proposed technique has achieved good activity recognition accuracy. The context is treated also as system status. In ubiquitous computing, the system can adopt different paradigms: wearable, environmental and pervasive. A novel paradigm, called synergistic paradigm, is presented combining the advantages of the wearable and environmental paradigms. Moreover, it augments the interaction possibilities of the user and ensures better gesture recognition accuracy than with the other paradigms.
APA, Harvard, Vancouver, ISO, and other styles
47

Rendo, Fernandez Jose Ignacio. "Semantic interoperability in ad-hoc computing environments." Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/3072.

Full text
Abstract:
This thesis introduces a novel approach in which multiple heterogeneous devices collaborate to provide useful applications in an ad-hoc network. This thesis proposes a smart home as a particular ubiquitous computing scenario considering all the requirements given by the literature for succeed in this kind of systems. To that end, we envision a horizontally integrated smart home built up from independent components that provide services. These components are described with enough syntactic, semantic and pragmatic knowledge to accomplish spontaneous collaboration. The objective of these collaboration is domestic use, that is, the provision of valuable services for home residents capable of supporting users in their daily activities. Moreover, for the system to be attractive for potential customers, it should offer high levels of trust and reliability, all of them not at an excessive price. To achieve this goal, this thesis proposes to study the synergies available when an ontological description of home device functionality is paired with a formal method. We propose an ad-hoc home network in which components are home devices modelled as processes represented as semantic services by means of the Web Service Ontology (OWL-S). In addition, such services are specified, verified and implemented by means of the Communicating Sequential Processes (CSP), a process algebra for describing concurrent systems. The utilisation of an ontology brings the desired levels of knowledge for a system to compose services in a ad-hoc environment. Services are composed by a goal based system in order to satisfy user needs. Such system is capable of understaning, both service representations and user context information. Furthermore, the inclusion of a formal method contributes with additional semantics to check that such compositions will be correctly implemented and executed, achieving the levels of reliability and costs reduction (costs derived form the design, development and implementation of the system) needed for a smart home to succeed.
APA, Harvard, Vancouver, ISO, and other styles
48

Jansen, Erwin. "Context-driven programming model for pervasive spaces." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cavdar, Davut. "A Certificate Based Authentication Control Model Using Smart Mobile Devices For Ubiquitous Computing Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613682/index.pdf.

Full text
Abstract:
In this thesis work, a certificate based authentication model supported by mobile devices is provided for ubiquitous computing environments. The model primarily aims to create an infrastructure for controlling and regulating access requests through mobile devices to local resources and services. The model also allows users from different domains to use local resources and services within the scope of agreements between domains. In addition to conceptual description of the model, a real prototype implementation is developed and successful application of the model is demonstrated. Within the prototype implementation, a mobile application is developed for access requests and sensors are used as representative local resources. Sample cases applied on the prototype demonstrate applicability and feasibility of the model.
APA, Harvard, Vancouver, ISO, and other styles
50

Sylverberg, Tomas. "A Framework for Mobile Paper-based Computing." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8415.

Full text
Abstract:

Military work-practice is a difficult area of research where paper-based approaches are still extended. This thesis proposes a solution which permits the digitalization of information at the same time as workpractice remains unaltered for soldiers working with maps in the field. For this purpose, a mobile interactive paper-based platform has been developed which permits the users to maintain their current work-flow. The premise of the solution parts from a system consisting of a prepared paper-map, a cellular phone, a desktop computer, and a digital pen with bluetooth connection. The underlying idea is to permit soldiers to take advantage of the information a computerized system can offer, at the same time as the overhead it incurs is minimized. On one hand this implies that the solution must be light-weight, on the other it must retain current working procedures as far as possible. The desktop computer is used to develop new paper-driven applications through the application provided in the development framework, thus allowing the tailoring of applications to the changing needs of military operations. One major component in the application suite is a symbol recognizer which is capable of recognizing symbols parting from a template which can be created in one of the applications. This component permits the digitalization of information in the battlefield by drawing on the paper-map. The proposed solution has been found to be viable, but still there is a need for further development. Furthermore, there is a need to adapt the existing hardware to the requirements of the military to make it usable in a real-world situation.

APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography