首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The Human Dynamics research group is developing methods to automatically map the flow of information within groups and communities using audio collected from wearable sensors such as mobile phones or PDAs. Computational models of group interaction dynamics are then derived from this data, allowing us to answer questions such as: Who influences whom? How much? How can we modify group interactions to promote better information diffusion? The goal is real-time learning and modification of information flow within organisations; we describe initial results and discuss concerns about user privacy.  相似文献   

2.
In this article, we describe a low-cost indoor navigation system, based on the capabilities of modern smartphones commonly equipped with accelerometer, gyroscope, camera and Internet connection. The main claim of this paper is that, relaxing the requirement of best accuracy, with an intelligent use of inertial sensors, digital maps, and ambient tagging, it is still possible to get good results. Our mobile application helps the user in retrieving directions and finding places in large indoor environments where the global positioning system (GPS) is not available, such as airports, hospitals, museums and so on. The goal is to get a system able to work without the use of any physical ad hoc infrastructure and without relying on any wearable device. We name our infrastructure-free system Roodin, and its features are as follows: user-friendly interface, quick install and calibration tool, point-of-interest search and guidance. All the features presented in this paper are designed and implemented, and the application has been evaluated with real users. A summary of user evaluation is reported in the paper.  相似文献   

3.
A wearable computer with an electronic performance support system can provide continuous learning and support to mobile workers. This system allows mobile users to ask for advice, receive instruction, access productivity tools, communicate with others, and assess their knowledge on a continuous basis. Workers can get this support when they need it, where they need it. Compared to traditional training and support, this new technique may provide substantial performance improvements. We are developing an architecture for this type of support system and are currently investigating the use of this system to help mobile factory workers perform their tasks.  相似文献   

4.
用户对移动网络服务偏好学习技术综述   总被引:1,自引:0,他引:1  
为了缓解日益严重的"移动信息过载问题",移动用户偏好学习已成为个性化服务领域的首要问题。对最近几年移动网络服务中用户偏好学习技术的研究进展进行综述,对移动用户偏好的表示方法、获取技术、自适应学习方法、评价方法等进行前沿概括、比较和分析。最后对移动网络服务中用户偏好学习技术的发展方向和趋势进行展望。  相似文献   

5.
立足于可穿戴设备逐步走向成熟的背景下,针对可穿戴设备在各大互联网盛会中的推陈出新和各大咨询机构的不俗预期,基于现有的手表、眼镜等可穿戴设备形态对现状进行梳理、对比和分析;同时,根据移动芯片、新型显示技术、操作系统和能源管理等关键技术的突破和演进趋势,对可穿戴智能设备对未来移动应用体系和周边领域的带动做出研判。  相似文献   

6.
王羽莹  孙礼 《通信技术》2010,43(11):126-128,133
移动学习足了信息化时代人们随时随地进行学习的需求,是泛在学习的重要组成。然而用户个体的差异性、学习环境的复杂性、终端设备的局限性等因素阻碍了移动学习的个性化发展。在对比了现有移动学习实现模式的基础上,构建了一个基于上下文感知的移动学习系统,利用泛在计算中的上下文感知技术应对复杂的学习环境,提升人与移动设备之间的交互,实现系统的个性化及智能化。  相似文献   

7.
Wearable devices, which provide the services of collecting personal data, monitoring health conditions, and so on, are widely used in many fields, ranging from sports to healthcare. Although wearable devices bring convenience to people's lives, they bring about significant security concerns, such as personal privacy disclosure and unauthorized access to wearable devices. To ensure the privacy and security of the sensitive data, it is critical to design an efficient authentication protocol suitable for wearable devices. Recently, Das et al proposed a lightweight authentication protocol, which achieves secure communication between the wearable device and the mobile terminal. However, we find that their protocol is vulnerable to offline password guessing attack and desynchronization attack. Therefore, we put forward a user centric three‐factor authentication scheme for wearable devices assisted by cloud server. Informal security analysis and formal analysis using ProVerif is executed to demonstrate that our protocol not only remedies the flaws of the protocol of Das et al but also meets desired security properties. Comparison with related schemes shows that our protocol satisfies security and usability simultaneously.  相似文献   

8.
Wearable computers and PDA's are physically close to, or are in contact with, the user during most of the day. This proximity would seemingly limit the amount of heat such a device may generate, conflicting with user demands for increasing processor speeds and wireless capabilities. However, this paper explores significantly increasing the heat dissipation capability per unit surface area of a mobile computer by thermally coupling it to the user. In particular, a heat dissipation model of a forearmmounted wearable computer is developed, and the model is verified experimentally. In the process, this paper also provides tools and novel suggestions for heat dissipation that may influence the design of a wearable computer.  相似文献   

9.

In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because there is no immediate treatment. Elderly care has become an important issue. According to this issue, we want to monitor the physiological data of the elderly, such as heartbeat, blood pressure, etc., through wearable devices. Once an abnormal condition is detected, the wearable device can be used to immediately request treatment from a nearby clinic or hospital. In order to improve the network quality of this service, we use the architecture of the mobile edge computing. The mobile edge computing provides features such as immediacy, low latency, proximity etc. However, the process of data transmission on the mobile edge computing has the risk of being stolen and identity authentication is also an important issue. Therefore, we propose a secure protocol based on cryptography to protect personal information with lightweight authentication. The proposed scheme aims to achieve mutual authentication, non-repudiation, integrity, user privacy, and defend against known attacks.

  相似文献   

10.
基于移动互联网用户上网记录的大数据系统能够多维度地记录和分析移动用户的行为特征。本文介绍了移动互联网大数据系统在无线网络规划中的应用,即利用对移动互联网用户上网行为特征的有效分析辅助3G基站的新建规划。基于已有的移动用户的上网行为特征的数据业务流量模型分析要比传统的无线网络话务模型分析更为有效、更具有实时性。  相似文献   

11.
Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.  相似文献   

12.
The construction industry is acknowledged to be heavily dependent on information flow and communications. Electronic communication from one office to another is relatively straightforward with today's technology. However, when one of the parties wishing to communicate is based out on the construction site, problems of remoteness and insufficient infrastructure can limit the effectiveness of their communications. The emergence of wearable computers offers a potential method of improving this situation, particularly when a visual link is provided by a mobile video transmission system.This paper outlines the subject of wearable computers, and describes the use of a mobile video camera in a construction application setting. The system has been used on a live construction project at Brindleyplace in Birmingham. Brindleyplace is currently one of the largest commercial construction projects in Europe.The system is described in detail, followed by some critical comments made by the users of the system. The paper also draws on issues such as possible applications and potential benefits to be gained in the long term. Technology and design issues of the system are also discussed.  相似文献   

13.
To address the vast multimedia traffic volume and requirements of user quality of experience in the next‐generation mobile communication system (5G), it is imperative to develop efficient content caching strategy at mobile network edges, which is deemed as a key technique for 5G. Recent advances in edge/cloud computing and machine learning facilitate efficient content caching for 5G, where mobile edge computing can be exploited to reduce service latency by equipping computation and storage capacity at the edge network. In this paper, we propose a proactive caching mechanism named learning‐based cooperative caching (LECC) strategy based on mobile edge computing architecture to reduce transmission cost while improving user quality of experience for future mobile networks. In LECC, we exploit a transfer learning‐based approach for estimating content popularity and then formulate the proactive caching optimization model. As the optimization problem is NP‐hard, we resort to a greedy algorithm for solving the cache content placement problem. Performance evaluation reveals that LECC can apparently improve content cache hit rate and decrease content delivery latency and transmission cost in comparison with known existing caching strategies.  相似文献   

14.
Natural communication with information systems   总被引:1,自引:0,他引:1  
Pervasive networking and sophisticated computing open opportunities for collaborative information processing independent of time and space. In this instance the information system becomes an enhancer of human intellect, as well as a mediator for communication among participants. The human user favors the sensory dimensions of sight, sound, and touch as primary channels of communication. Machines that can accommodate these modes promise flexibilities and functionalities that transcend the traditional mouse and keyboard. The paper describes research to establish human-computer interfaces that capture attributes of natural face-to-face communication. An experimental multimodal system is developed to study several aspects of natural style human-computer communication. While as yet primitive, the technologies of image and gaze processing, hands-free conversation, and force feedback tactile transduction are combined and used simultaneously for manipulating objects in a shared workspace. Software agents fuse the sensory signals to estimate and interpret user intent. Current areas of experimental application include disaster relief/crisis management, telemedicine/rehabilitation, and mobile office/wearable computers  相似文献   

15.
周安  王忠  马琼华 《电视技术》2016,40(6):39-43
针对人们遇到突发事件得不到及时救助的难题,设计并实现一种基于Android的智能求救系统.该系统由穿戴式智能手环和Android客户端组成,融合蓝牙4.0和移动通信技术.通过智能手环激活手机应用程序,利用移动通信技术发送求救信息,使用百度地图进行定位、兴趣点搜索、路径规划.利用蓝牙4.0技术设计智能手环,降低了功耗和成本;基于百度地图API开发客户端,提供了准确、及时的位置服务.实验结果证明,该系统实时可靠,提供了求救和自救双重保障,可以有效减少突发事故造成的伤亡,对生命安全保障具有重要意义.  相似文献   

16.
赵冲 《电子设计工程》2011,19(18):119-121
为了更加有效地防止车辆被盗,笔者设计了一种远程汽车防盗报警系统。系统以单片机作为控制器,利用其通信功能及WISMO移动通信模块Q2403A,将汽车被盗的警情信号用短信息的方式发送到某个确定的手机用户,使该报警信息能及时地跟随手机用户,达到移动报警的目的。同时该手机用户还可以给系统回复短信息,以控制汽车的状态,另外,系统还可以根据接收到的控制短信息的不同内容,向手机用户发送当前系统状态的提示信息,从而实现系统和手机用户之间的互动。  相似文献   

17.
InSense: Interest-Based Life Logging   总被引:1,自引:0,他引:1  
Our wearable data collection system lets users collect their experiences into a continually growing and adapting multimedia diary. The system - called inSense - uses the patterns in sensor readings from a camera, microphone, and accelerometers to classify the user's activities and automatically collect multimedia clips when the user is in an "interesting" situation  相似文献   

18.
文中分别介绍了移动运营商在通信网环境下的用户运营核心能力和互联网企业在移动互联网环境下用户运营体系的核心能力,总结出真实身份、安全交易环境、支付的三大用户运营核心能力。通过对两种用户运营核心能力的对比,指出移动运营商在移动互联网时代丧失了通信网时代建立的核心能力,推荐移动运营商建立基于公钥基础设施的用户运营核心能力符合移动互联网特征,赢得与互联网企业的用户运营能力的竞争。  相似文献   

19.
The wireless wearable network and wireless body-centric network can assistant to the user anywhere at anytime communicating with wireless components seamlessly. In this paper, the wireless wearable network and wireless body-centric network have been discussed, and the frequency band and human body effect has been estimated. The bluetooth and UWB technology can be used to construct the narrow band and the broad band wireless wearable network and wireless body-centric network separately. Further, the narrow band wireless wearable network and wireless body-centric network based on bluetooth technology has been constructed by integrated planar inverted-F antenna and the communication channel character has been studied by measurement. The results can provide the possibility of producing a prototype radio system that can be integrated with the wearable computers by suitable wireless technologies developed and applied to facilitate a reliable and continuous connectivity between the system units.  相似文献   

20.
Ozen  Bahattin  Kilic  Ozgur  Altinel  Mehmet  Dogac  Asuman 《Wireless Networks》2004,10(6):665-683
The inherent limitations of mobile devices necessitate information to be delivered to mobile clients to be highly personalized according to their profiles. This information may be coming from a variety of resources like Web servers, company intranets, email servers. A critical issue for such systems is scalability, that is, the performance of the system should be in acceptable limits when the number of users increases dramatically. Another important issue is being able to express highly personalized information in the user profiles, which requires a querying power as that of SQL on relational databases. Finally, the results should be customized according to user needs, preferences and the mark up language of their mobile device. Since the queries will be executed on the documents fetched over the Internet, it is natural to expect the documents to be XML documents.This paper describes an architecture for mobile network operators to deliver highly personalized information from XML resources to mobile clients. To achieve high scalability in this architecture, we index the user profiles rather than the documents because of the excessively large number of profiles expected in the system. In this way all queries that apply to a document at a given time are executed in parallel through a finite state machine (FSM) approach while parsing the document. Furthermore, the queries that have the same FSM representation are grouped and only one finite state machine is created for each group which contributes to the excellent performance of the system as demonstrated in the performance evaluation section.To provide for user friendliness and expressive power, we have developed a graphical user interface that translates the user profiles into XML-QL. XML-QL's querying power and its elaborate CONSTRUCT statement allows the format of the results to be specified. The results to be pushed to the mobile clients are converted to the markup language of the mobile device such as Wireless Markup Language (WML), CHTML or XHTML by the delivery component of the system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号