首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
As the technology evolves, mobile phones and portable devices are equipped with advanced features like built-in cameras, audio/video recordings, and other applications. When a user starts utilizing such features and applications, usually a large number of files are generated, and as this number grows, it becomes a challenging task to find the requested files with limited user-interface capabilities. This article presents FARM, a framework for file annotation and retrieval on resource-limited mobile devices like mobile phones, PDAs, and other MIDP compliant devices. Once the annotation process is completed, user can easily retrieve the files on the device itself or on in a networked environment where a large number of mobile nodes are involved. The metadata for annotation is gathered from the underlying file system and stored locally, which gives this framework a two-fold gain. Firstly, this framework does not require any common repository and hence, does not require communication medium to store and retrieve metadata. Secondly, searches are performed in a distributed fashion when more than one device is searched. The proposed framework has been implemented with a full featured application, and experimental results show that files can be retrieved efficiently and accurately with annotated data.  相似文献   

2.
While mobile phones are becoming more popular, wireless communication vendors and device manufacturers are seeking new applications for their products. Access to the large corpus of Internet information is a very prominent field. However, the technical limitations of mobile devices pose many challenges. Browsing the Internet using a mobile phone is a large scientific and cultural challenge. Web content must be adapted before it can be accessed by a mobile browser. This work presents a new methodology that uses Really Simple Syndication (RSS) feeds for the adaptation of web content for use in mobile phones. This methodology is based on concrete design guidelines and supports different viewing modes. The mobile tool provided using the RSS feeds is evaluated based on user-centered evaluation and the results are presented.  相似文献   

3.
与Native应用相比,移动web应用能很好地解决目前Native操作系统割裂的问题,将为产业链各方带来全新的平等竞争机会,引导移动互联网产业链的新模式发展。本文首先介绍了HTML5移动web应用的发展概况,然后分析了基于HTML5移动web应用相关技术标准的发展情况,随后对基于HTML5的移动web应用及终端的技术实现方案进行了分析,最后对全文内容进行了总结,从HTML5移动web应用、技术标准及终端的发展趋势进行了展望。  相似文献   

4.
The e-health domain has the objective to assist and manage citizens’ health. It concerns many actors like patient, doctors, hospitals and administration. Current and forthcoming generations of application will be web based and will integrate more and more mobile devices. In such application domain, called m-health, dependability is a key notion. In addition, more and more functionalities of such systems will be implemented as services for providing qualities like adaptability and maintainability. This paper presents, through a case study, how we can analyse and design an application that controls the insulin injection and that is embedded in a mobile device belonging to an e-health Web Information System (WIS). In order to ensure the dependability of the control systems, we show how to use Coordinated Atomic Actions (CAA). CAAs provide well defined concepts for fault tolerance, error-detection and error recovery in a distributed context where competitive and cooperative concurrencies are considered. The combination of CAA and SOA at design level it is proposed, with the purpose of being able to design systems that are partially implemented using service-oriented technologies. We updated and used our implementation framework, called CAA-DRIP, which originally was not tailored for service-oriented mobile applications. Thus, in this paper, we also propose an adaptation of CAA-DRIP for mobile devices.  相似文献   

5.
Web Services是一种构建应用程序的应用实体,形成特定条件下的API;同时也是一个可互操作的分布式应用程序平台,并能在所有支持HTTP协议操作系统上实施运行。在网络中服务方提供了一个Web Services平台,该平台不仅提供相关的网络服务,而且会提供一种标准来描述它的服务;而客户可以在网络中其它任何一点调用该服务,并且可以得到足够的信息来得知如何调用。本文设计并开发一款基于Web Services技术的高考服务系统,即在移动终端开发客户端系统,并通过Web Services获取服务器提供的各种信息。在系统中采用多种算法完成模拟志愿填报、高校查询、学习计划等多种模块,并提供高考动态、工具娱乐、心理辅导等多种工具模块,能够帮助考生在高考过程中得到更好的发挥。  相似文献   

6.
Nowadays the classic web paradigms are being subjected to changes; every day millions of users around the world use their Smartphones to access web applications from anywhere. The World Wide Web it is one of the biggest repositories of information in the world, and that information is stored in internet servers and repositories, but today in the real world there are many other information sources such as electronic devices with communication capabilities: smart appliances and sensor networks. The Smartphones are equipped with communication hardware elements like the Bluetooth module, which allows the Smartphone to exchange information with nearby electronic devices. Every day more and more mobile applications are being developed for native platforms that use Bluetooth’s communication module to send and receive information from different sources. Native mobile applications use the specific platform’s APIs to manage the Bluetooth communication actions (send and receive information, search for devices, etc.), however, web applications do not have technical capabilities to manage the Smartphone’s Bluetooth communication module and thereof cannot use that kind of information. The main objective of this research work is to design a novel framework that allows classic web applications to use information from nearby electronic devices. The proposed framework must be easy to use and able to be integrated with common web technologies. Developers can use this framework to include new information sources and data exchange procedures in an easy way. The new type of information can be merged with the web to develop or improve algorithms and web applications.  相似文献   

7.
This paper introduces an approach of enhancing the tourism experience by incorporating a tool that adopts a “web-to-mobile” model into tourism websites that allows for the adaptation of personalized tourism web content to be transferred to a mobile application hosted at users’ mobile device. These applications upon installation to mobile devices allow for browsing of adapted multimedia content with no requirement for constant network connection. Furthermore so we convey the development experiences of a multiplatform mobile tourist guide aimed at producing a personalized mobile guide application used in both an online and offline modes offering services to tourists such as a personal profiling-based recommendation system, a commenting system and location-based services. This paper focuses on the design, implementation and usability case study of a Multi-Platform Tourist Guide system for the Municipal Council of Mytilene, Greece.  相似文献   

8.
The migration of application logic to the client side of modern web applications and the use of JavaScript as the main language for client‐side development have made memory leaks in JavaScript an issue for web applications. Client‐side web applications communicate with the server asynchronously, remaining on the same web page during their lifetime. Thus, even minor memory leaks can eventually lead to excessive memory usage, negatively affecting user‐perceived response time and possibly causing page crashes. To detect memory leaks and guide developers in fixing the leaks quickly and easily, this paper introduces LeakSpot, a tool that creates a run‐time heap model by modifying the application code in a browser‐agnostic way to record object allocations, accesses, and references created to objects. LeakSpot reports those allocation sites causing the leaks instead of all the leaky allocation sites. It also identifies the locations in the code where leaked objects are accumulated, for example, the locations where a reference from a data structure is created but forgotten to be removed by the developer. To facilitate debugging and fixing the leaks, for every leaked object, LeakSpot reports all the locations in the code that create a reference to the object. To confirm usefulness and efficacy of LeakSpot experimentally, we have used LeakSpot to find and fix four memory leaks in a JavaScript benchmark suite and in open‐source web applications. LeakSpot is also shown to be effective in pointing out the potential causes of three leaks in large and popular web applications. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

9.
光伏应用系统远程监测平台设计   总被引:1,自引:1,他引:0       下载免费PDF全文
随着太阳能发电技术的不断发展,光伏应用系统越多的被工业单位和个人使用;为了解决分布式离散光伏应用系统检测和管理维护的技术难题,文章阐述了一种光伏应用系统远程监测平台的设计方案;该方案在研究分析无线自组网技术和无线数据传输技术的基础上,针对光伏应用系统的分布特点,将嵌入式技术,ZigBee技术,GPRS-DTU技术以及互联网Web监测技术相结合,设计完成以数据采集节点、数据中心节点、Web服务器,以及手机客户端为主要部件的远程监测系统;并对该系统进行了实验验证;实验结果表明该系统方案能够对远程分散的光伏应用系统的运行数据进行采集,组网汇聚和远程传输;并可以通过计算机或手机等移动客户端对数据进行远程访问和控制;为分散的光伏应用系统的远程管理和维护提供了一种有效的技术方案。  相似文献   

10.
Context-awareness becomes an increasingly important concept in the development of mobile and ubiquitous systems. Applications and services, which run in these kinds of highly dynamic environments, should be aware of and adapt to their contexts. Context-aware applications improve and enrich people’s interactions with devices, computers and other people.In this paper, design and development of iConAwa, which is an intelligent context-aware multi-agent system proactively providing mobile users with context-aware information and services, is described. In iConAwa, mobile users can get information and services about nearby resources (attraction points) according to their context and also communicate with each other by exchanging messages. Context and point of interest ontologies are developed in OWL. Context and points of interest are modelled in a flexible and extensible way by the developed ontology models. Knowledge sharing and knowledge reuse are also provided by using these ontology models. iConAwa makes use of rule-based context reasoning which provides derivation of high level implicit context from low level explicit context. With this approach context reasoning is decoupled from the source code of the system. JADE agent development framework is used to develop the agents and Jena semantic web framework is used to manipulate ontologies and for rule based reasoning.  相似文献   

11.
在UP-TECH S3C2410 DVK1.1开发平台下,设计并实现了一个触摸式的嵌入式掌上娱乐系统。本系统主要包括多媒体播放器和游戏的基本功能。本系统可以播放现有的大多数的音频视频文件;设计了嵌入式游戏,增加了系统的娱乐性。使用触摸屏方便作为人机交互的平台。采用跨平台性能良好的Qt4设计了应用程序和人机界面,界面友好,汉化显示,美观,操作简便,运行流畅。整个系统模块化设计,充分考虑了软件系统自身所占的存储空间以及可扩展性,具有广阔的市场前景。  相似文献   

12.
移动边缘计算(MEC)将计算和存储资源移动到移动网络的边缘,使其能够在满足严格的延迟要求的同时在移动设备处运行要求高处理的应用。它考虑了移动计算卸载问题,其中可以调用工作流中的多个移动服务来满足其复杂需求,并决定是否卸载工作流的服务,同时考虑了组件服务之间的依赖关系,并旨在优化执行移动服务的执行时间和能耗。针对上述问题运用了基于遗传算法(GA)的卸载方法,经过设计和实施后,部分修改传统遗传算法,以满足对所述问题的特殊需求。仿真实验表明,GA算法的实验效果都优于算法Local Execution和RANDOM得到的实验结果。  相似文献   

13.
针对实验室设计的高空间分辨率且价格低廉的液漏传感器,为了实现远程通信,在原有传感系统的基础上,加入了MQTT协议进行数据的远程推送与交互,同时基于Qt的跨平台特性开发了PC端和移动端均可使用的监测软件,系统管理员可通过PC端将控制指令下发给液漏传感系统,对液漏现场进行远程操控与数据实时监测,系统维修员可通过移动端查看维修通知单及告警信息,维修完成后提交维修订单。该系统实现了对液漏监测系统的实时采集和远程监测,有较好的应用前景。  相似文献   

14.
Latency- and power-aware offloading is a promising issue in the field of mobile cloud computing today. To provide latency-aware offloading, the concept of cloudlet has evolved. However, offloading an application to the most appropriate cloudlet is still a major challenge. This paper has proposed an application-aware cloudlet selection strategy for multi-cloudlet scenario. Different cloudlets are able to process different types of applications. When a request comes from a mobile device for offloading a task, the application type is verified first. According to the application type, the most suitable cloudlet is selected among multiple cloudlets present near the mobile device. By offloading computation using the proposed strategy, the energy consumption of mobile terminals can be reduced as well as latency in application execution can be decreased. Moreover, the proposed strategy can balance the load of the system by distributing the processes to be offloaded in various cloudlets. Consequently, the probability of putting all loads on a single cloudlet can be dealt for load balancing. The proposed algorithm is implemented in the mobile cloud computing laboratory of our university. In the experimental analyses, the sorting and searching processes, numerical operations, game and web service are considered as the tasks to be offloaded to the cloudlets based on the application type. The delays involved in offloading various applications to the cloudlets located at the university laboratory, using proposed algorithm are presented. The mathematical models of total power consumption and delay for the proposed strategy are also developed in this paper.  相似文献   

15.
Vasiu  L. Mahmoud  Q.H. 《Computer》2004,37(2):104-105
The networks that connect handheld wireless devices such as cell phones and PDAs suffer from low bandwidth and a high incidence of network errors. By employing mobile agents, such devices could provide a reliable technology for message transport over wireless links. Mobile agents are inherently distributed software entities that reduce the load on the network when they move. Mobile agents can be employed in wireless handheld devices in two ways: An agent platform could be installed on the device, enabling mobile agents to run directly on it, or devices could access and use remote mobile agents running on wired networks. Each approach is viable and has its own advantages and domain-specific applications. Some high-end devices would benefit from running a mobile agent platform that lets agents run locally, but this would not be beneficial to others because of processing power and memory constraints or for security reasons.  相似文献   

16.
In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing rapidly with the increase in mobile device users. As the market share of Android OS increases, hacking of mobile devices has focused on Android devices. Although there are many security solutions for mobile devices, they are fragmentary for mobile threats; that is, they are solutions for only several threats rather than comprehensive solutions. There is hence a limit to protecting user’s and company’s data stored or used on mobile devices from various types of hacking. To address this, we propose a mobile device protection technology based on domain isolation. Virtualization technology has emerged to increase CPU utilization in server-class PCs and to run various OSs in one system. As these virtualization technologies become lightweight, they are beginning to be applied to embedded devices. In this paper, we applied this lightweight embedded virtualization technology to mobile devices to divide mobile devices into two areas. Therefore, users can have hidden area from hacker attack in addition to Android OS area which can use same as existing mobile device. There is a hardware-based mobile security solution using an secure element, but this has to be reflected in the manufacturing process of the mobile device. However, since the domain separation technology using the virtualization, proposed in this paper, is a software solution, it has an advantage that it can be applied to a device that is already in use. In addition, to protect the hidden area, application authentication/authorization and user authentication technology were applied. And we use white-box cryptography to get root of trust of the key which is used for secure storage and data encryption/decryption. We believe this is a fundamental solution for protecting the mobile device users from hacking. We implemented and tested various mobile applications operating on a mobile device that incorporates our proposed structure based on domain isolation. There is some performance degradation caused by the domain separation, but it is negligible. According to https://www.wired.com/insights/2012/11/mobile-supercomputers/, the chips for mobile phones have evolved and mobile phones will soon become supercomputers. In this case, the addition of virtualization to the mobile device will have less impact on the computing power of the mobile device, and data protection stored in mobile devices and secure execution environment of security programs will become more important issues. Therefore, our TeeMo structure is a necessary technology to protect mobile device users.  相似文献   

17.
Mobile cloud computing is a dynamic, virtually scalable and network based computing environment where mobile device acts as a thin client and applications run on remote cloud servers. Mobile cloud computing resources required by different users depend on their respective personalized applications. Therefore, efficient resource provisioning in mobile clouds is an important aspect that needs special attention in order to make the mobile cloud computing a highly optimized entity. This paper proposes an adaptive model for efficient resource provisioning in mobile clouds by predicting and storing resource usages in a two dimensional matrix termed as resource provisioning matrix. These resource provisioning matrices are further used by an independent authority to predict future required resources using artificial neural network. Independent authority also checks and verifies resource usage bill computed by cloud service provider using resource provisioning matrices. It provides cost computation reliability for mobile customers in mobile cloud environment. Proposed model is implemented on Hadoop using three different applications. Results indicate that proposed model provides better mobile cloud resources utilization as well as maintains quality of service for mobile customer. Proposed model increases battery life of mobile device and decreases data usage cost for mobile customer.  相似文献   

18.
Wireless mobile services are computing applications that run on handheld wireless devices. Such applications must work within the daunting constraints of the devices, which include memory, processing power, input capabilities, and size of display. It is therefore important that mobile services take into account the user’s context, optimize resource usage, and minimize input effort imposed on the user. In this paper, we present the design and implementation of a smart agent-enabled system for personalizing wireless mobile services and advertisements for Java 2 Micro Edition (J2ME) or Java ME, and Wireless Application Protocol (WAP) enabled devices. We use software agents for context filtering because such autonomous software entities have characteristics that can benefit mobile devices and the wireless environment, and the Composite Capability/Preference Profiles (CC/PP) standard for defining profiles for user preferences and device capabilities. The system incorporates the use of artificial neural networks to adaptively and iteratively learn to select the best available service based on contextual information. The system is evaluated using practical operating scenarios, as well as empirical data and results show an 87% success rate in the selection of the best available service.  相似文献   

19.
In today’s consumer electronics market, Java has become one of the most important programming languages for the rapid development of mobile applications – spanning from home appliances/controllers, mobile and communication devices, to network-centric applets. However, the demand for high-performance low-power Java-based consumer mobile applications puts forward new challenges to the system design and implementation. This paper analyzes the energy consumption, execution efficiency, and speed issues of Java applications in a typical consumer mobile device environment. By adopting a hardware-assisted approach, we introduce a Java accelerator with a companion Java virtual machine. The accelerator is designed in an asynchronous style, and can be integrated with most existing processors and operating systems. The core architecture, design philosophy, and implementation considerations are presented in detail in this paper.  相似文献   

20.
The deep penetration of mobile devices have led to the emergence of multiple mobile applications that seek to harness the positioning capabilities embedded in such devices. One of the most functional of these applications is local search. Local search is similar to a regular web search, yet is more powerful in a mobile setting since results are ranked both by prominence and locality. Undoubtedly popular, the current design of local search applications fails to cater equally to a privacy-aware user who desires finer controls in her location disclosure. Towards this end, we propose the design for a private local search (PriLS) application that enables a user to first learn the geographic variation in local search results and then use it to determine a noisy location that has little or no affect on the search results. Parametric studies and real-world evaluations show that PriLS can help identify geographic locations that would produce similar search results (compared to when the user’s location is used) with no noticeable delays in user experience. They also reveal that large areas typically exist where there is no change in the result of a local search query, and can be exploited to provide spatial privacy guarantees to a user.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号