Three-dimensional(3D)city models have uses including on-site validation of utility infrastructure,support for augmented reality,personalized tourist information,real estate sales,and 3D pedestrian navigation.Increasin...Three-dimensional(3D)city models have uses including on-site validation of utility infrastructure,support for augmented reality,personalized tourist information,real estate sales,and 3D pedestrian navigation.Increasingly,such applications are deployed on mobile devices,whose use is becoming more prevalent.Tablet devices are used for more professional use requiring larger screens,mobile phones for more casual users.However,many 3D city models contain hundreds of buildings,which in turn results in performance issues when attempting to visualize such models on these devices.Two issues can be identified as contributory factors-the lower specification of the mobile device itself when compared with desktop machines and the lower bandwidth network between the device and the server(3G mobile or Wi-Fi).Both of these can be addressed by reducing the volume of data in the model.To achieve this,we generalize a 2D data-set(using aggregation and simplification)and then extrude the generalized 2D maps to 3D.This minimizes the number of buildings to be transmitted over the network and processed by the on-board graphics engine.To additionally address the bandwidth issue,we make use of topological data structuring to build and transmit a minimal description for each building.Combining these approaches,we compare the results obtained for generalized and un-generalized data-sets,on a tablet and mobile device.A performance increase of between 7 and 9 times is observed.展开更多
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape...The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.展开更多
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuou...The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods.展开更多
Developing mobile applications have always been a rising topic in the technology world. With the recent development in technology, mobile applications play an important role in various applications throughout the worl...Developing mobile applications have always been a rising topic in the technology world. With the recent development in technology, mobile applications play an important role in various applications throughout the world. Mobile applications are constantly evolving. There are several ongoing research and developments in both industry and academia. In this paper, we present the design and implementation of a mobile application that creates an electronic map or e-map application for the campus of Tuskegee University. The goals for this mobile application are to make the campus map easier and user-friendly for parents, visitors, and students using mobile devices. With this mobile application, the users will be able to search and find campus buildings, as well as give feedback on the application to eliminate the need for paper documentation.展开更多
While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer fro...While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only^1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%.展开更多
According to Cisco, mobile multimedia services now account for more than half the total amount of Internet traffic. This trend is burdening mobile devices in terms of power consumption, and as a result, more effort is...According to Cisco, mobile multimedia services now account for more than half the total amount of Internet traffic. This trend is burdening mobile devices in terms of power consumption, and as a result, more effort is needed to devise a range of pow- er-saving techniques. While most power-saving techniques are based on sleep scheduling of network interfaces, little has been done to devise multimedia content adaptation techniques. In this paper, we propose a multiple linear regression model that predicts the battery voltage discharge rate for several video send bit rates in a VoIP application. The battery voltage dis- charge rate needs to be accurately estimated in order to esti- mate battery life in critical VoIP contexts, such as emergency communication. In our proposed model, the range of video send bitrates is carefully chosen in order to maintain an acceptable VoIP quality of experience. From extensive profiling, the empir- ical resuhs show that the model effectively saves power and pro- longs real-time VoIP sessions when deployed in power-driven adaptation schemes.展开更多
To date, there has been limited research carried out to better understand seniors' needs and purchase motivations related to mobile devices. To that end, this research enabled an exploratory assessment of the intrins...To date, there has been limited research carried out to better understand seniors' needs and purchase motivations related to mobile devices. To that end, this research enabled an exploratory assessment of the intrinsic and extrinsic needs/motives to consider in future research and development of ubiquitous mobile devices and related applications, specifically for seniors. The 65+ population is expected to double by 2025 (WHO, 2013) from 390 million to 800 million. The results demonstrate specific needs/motives which should be considered during the development of new mobile attributes and apps for this segment. For both attributes of devices themselves and the applications found on them, three tiers of priority for development were determined.展开更多
The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Neverth...The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Nevertheless,collecting raw data,which may contain various per⁃sonal information,would lead to serious personal privacy leaks.Local differential privacy(LDP)has been proposed to protect privacy on the device side so that the server cannot obtain the raw data.However,existing mechanisms assume that all keys are equally sensitive,which can⁃not produce high-precision statistical results.A utility-improved data collection framework with LDP for key-value formed mobile data is pro⁃posed to solve this issue.More specifically,we divide the key-value data into sensitive and non-sensitive parts and only provide an LDPequivalent privacy guarantee for sensitive keys and all values.We instantiate our framework by using a utility-improved key value-unary en⁃coding(UKV-UE)mechanism based on unary encoding,with which our framework can work effectively for a large key domain.We then vali⁃date our mechanism which provides better utility and is suitable for mobile devices by evaluating it in two real datasets.Finally,some pos⁃sible future research directions are envisioned.展开更多
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec...Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.展开更多
Purpose: This paper presents an innovative program of Shanghai Jiao Tong University Library which aims to help engineering students to make use of mobile devices to improve their learning efficiency. Design/methodolo...Purpose: This paper presents an innovative program of Shanghai Jiao Tong University Library which aims to help engineering students to make use of mobile devices to improve their learning efficiency. Design/methodology/approach: Information literacy training and course learning resources were integrated into students' learning process. Surveys on students' learning with the touch pads were conducted to help evaluate the program's effectiveness. Findings: Our practice showed that collaboration of library staff with faculty members is an effective way to integrate information literacy education and course-specific library resources into students' learning with mobile devices, which has greatly improved the efficiency of students' learning. Research limitations: First, our literacy training still focused on the use of mobile devices in information access, but not on how to evaluate and manage their information resources with mobile devices. Second, subject librarians need to shift their role from information service providers into information resource instructors while developing the partnership with faculty members and teaching assistants. Practical implications: This paper provides learning efficiency of university students with touch pads conveniently. a new insight into the way of how to enhance such new technical devices as smartphones and Originality/value: Our practice can be used as a valuable guide for libraries that plan to leverage mobile technologies to enhance students' learning efficiency.展开更多
在东京车展上,奥迪不仅展示了新车型A1,同时还推出了一款配合A1使用的专用导航手机——Audi Mobile Device,该机将在汽车销售时赠送给消费者。这款奥迪自家品牌的手机采用触控操作方式,支持3G,Wi-Fi和GPS,奥迪A1上专门设计了放置手机的...在东京车展上,奥迪不仅展示了新车型A1,同时还推出了一款配合A1使用的专用导航手机——Audi Mobile Device,该机将在汽车销售时赠送给消费者。这款奥迪自家品牌的手机采用触控操作方式,支持3G,Wi-Fi和GPS,奥迪A1上专门设计了放置手机的插槽.并可通过汽车内置的车载充电器为手机充电。当你忘记带车钥匙时,通过手机可以打开A1的车门.也能用来开启汽车空调。展开更多
This paper proposes a co-optimal strategy using line hardening,mobile devices(mobile ice-melting device,mobile emergency generator,mobile energy storage system),and repair crew dispatching to improve distribution syst...This paper proposes a co-optimal strategy using line hardening,mobile devices(mobile ice-melting device,mobile emergency generator,mobile energy storage system),and repair crew dispatching to improve distribution system resilience during ice storms.A multi-stage defender-attacker-defender model is established to take into account interactions and coupling relationships between different measures.In our proposed model,ice storms will attack the distribution and transportation system in a worst-case scenario,affecting system performance from various perspectives.Corresponding to the different operating states in the distribution system affected by ice storms,aiming at minimizing the weighted load shedding value,this paper applies various measures to different stages to improve the response and defense capabilities to ice storms and realize restoration of the distribution system ultimately.The nested column-and-constraint generation algorithm is used to solve the model efficiently.The effectiveness of the proposed model and solution method for enhancing the distribution system resilience is verified on the modified IEEE 33-bus distribution system and modified realworld zone of Caracas 141-bus distribution system.展开更多
Mobile device is an important interactive platform. Due to the limitation of computation, memory, display area and energy, how to realize the efficient and real-time interaction of 3D models based on mobile devices is...Mobile device is an important interactive platform. Due to the limitation of computation, memory, display area and energy, how to realize the efficient and real-time interaction of 3D models based on mobile devices is an important research topic. Considering features of mobile devices, this paper adopts remote rendering mode and point models, and then, proposes a transmission and rendering approach that could interact in real time. First, improved simplification algorithm based on MLS and display resolution of mobile devices is proposed. Then, a hierarchy selection of point models and a QoS transmission control strategy are given based on interest area of operator, interest degree of object in the virtual environment and rendering error. They can save the energy consumption. Finally, the rendering and interaction of point models are completed on mobile devices. The experiments show that our method is efficient.展开更多
With the rapid progress of the network and mobile techniques, mobile devices such as mobile phones and portable devices, have become one of the most important parts in common life. Efficient techniques for watching, n...With the rapid progress of the network and mobile techniques, mobile devices such as mobile phones and portable devices, have become one of the most important parts in common life. Efficient techniques for watching, navigating and sharing videos on mobile devices collaboratively are appealing in mobile environment. In this paper, we propose a novel approach supporting efficiently collaborative operations on videos with sketch gestures. Furthermore, effective collaborative annotation and navigation operations are given to interact with videos on mobile devices for facilitating users' communication based on mobile devices' characteristics. Gesture operation and collaborative interaction architecture are given and improved during the interactive process. Finally, a user study is conducted showing that the effectivity and collaborative accessibility of video exploration is improved.展开更多
Indoor visible light positioning becomes attractive due to the increasing demands of location-based services. This Letter proposes an indoor imaging visible light positioning scheme with a sampled sparse light source,...Indoor visible light positioning becomes attractive due to the increasing demands of location-based services. This Letter proposes an indoor imaging visible light positioning scheme with a sampled sparse light source, image sensor, and gyro. An indoor positioning cellular with a single reference light source and an off-the-shelf mobile device is demonstrated. Experimental results show that the 3-dimensional positioning error is only several centimeters even with a rotated, rolled, and pitched mobile device. The proposed scheme is convenient and cost effective because the transmitter takes advantage of the existing lighting infrastructure and the receiver is a commercial mobile phone without any extra accessories.展开更多
Facial scanning is becoming more common as the commercial use of facial recognition technology expands.Face recognition technology,can be widely used in public security,finance,subway,airport and other important field...Facial scanning is becoming more common as the commercial use of facial recognition technology expands.Face recognition technology,can be widely used in public security,finance,subway,airport and other important fields of natural identification.Now,the technology has also been applied to the routine outbreak control and prevention,through the form of"face recognition"to bring more convenient,safer and more accurate experience.However,with the development of technology,the drawbacks of facial recognition are gradually revealed,and people's opinions on the technology are mixed.As facial recognition is widely used in the market,protecting users'privacy information and data is becoming an increasingly important issue.In this article,this paper will discuss the different factors contributing to the popularity of facial recognition among people from five aspects,respectively from the aspects of devices and people.This paper was covered a number of parts in this article to explore what factors influence the popularity of facial recognition,racially biased,Accuracy of identification,public acceptance,Personal experience with technology,public perception of face recognition technology and Alternatives to FRS.The conclusion is that the factors which most strongly impact on FR is accuracy.展开更多
Background:This study evaluates the ability of mobile AI voice assistants(AI-VAs)to provide accurate medical advice for early knee osteoarthritis(KOA)and compares their performance with conventional web searches and h...Background:This study evaluates the ability of mobile AI voice assistants(AI-VAs)to provide accurate medical advice for early knee osteoarthritis(KOA)and compares their performance with conventional web searches and human clinicians.Methods:From September to October 2024,two AI-VAs(Apple’s Siri and Huawei’s Xiaoyi)were tested on 15 KOA-related questions in Chinese and English.The assessment focused on the accuracy of voice recognition,response capabilities,and medical advice.Siri was further tested in four international regions(USA,UK,Germany,Hong Kong)using localized languages.Results:In Chinese-language tests,Siri and Xiaoyi showed comparable voice recognition(recognition accuracy:95.6%vs.93.3%)and response ability(speech response:88.9%vs.85.7%).However,Siri provided significantly more accurate medical advice(medical advice:95.6%vs.53.3%;Z=2.762,P<0.001).External validation via Global Quality Score further confirmed Siri’s superiority(mean Global Quality Score=4.0 vs.Xiaoai=0.9).Siri outperformed Xiaoyi in English-language tests(53.3%vs.0%).While Siri’s medical advice accuracy(95.6%)surpassed non-specialist clinicians(Z=2.685,P=0.007),it primarily reflects filtered search results(Baidu/Google)rather than clinical synthesis.Claims of equivalence to junior surgeons(98.2%)must be interpreted cautiously,as AI-VAs lack diagnostic reasoning capabilities.This distinction is critical to avoid overstating their role in clinical decision-making.Conclusion:Current AI-VAs offer limited value in providing precise medical advice for KOA,primarily serving as intermediaries for web search results.Their performance varies across languages,regions,and search engines.展开更多
Location Based Navigation System (LBNS) is a specific Location Based Service (LBS) purely for navigational purpose. These systems resolve position of a user by using GNSS/GPS positioning technologies, to which supplem...Location Based Navigation System (LBNS) is a specific Location Based Service (LBS) purely for navigational purpose. These systems resolve position of a user by using GNSS/GPS positioning technologies, to which supplementary information on goods and services are tagged. The navigation services have become popular and can be installed on mobile phones to provide route information, location of points of interest and user’s current location. LBS has continued to face challenges which include “communication” process towards user reference. Location Based Service System conveys suitable information through a mobile device for effective decision making and reaction within a given time span. This research was geared at understanding the state of LBS technology acceptance and adoption by users in Nairobi Kenya. To do this a quantitative study was carried out through a questionnaire, to investigate mobile phone users’ response on awareness and use of LBS technology. Testing the growth of this technology in this region compared to predictions in previous studies using Technology Acceptance Model (TAM), it is evident that many users may be aware of GPS functionality in mobile phones but are certainly yet to fully embrace the technology as they rarely use it. This points to some underlying challenges towards this technology within this part of the World, thereby recommending for deliberate monitoring and evaluation of LBS technology for sustenance growth based on user satisfaction and acceptance for improved usability.展开更多
Previously we have designed and implemented new image browsing facilities to support effective offiine image contents on mobile devices with limited capabilities: low bandwidth, small display, and slow processing. In...Previously we have designed and implemented new image browsing facilities to support effective offiine image contents on mobile devices with limited capabilities: low bandwidth, small display, and slow processing. In this letter, we fulfill the automatic production of cartoon contents fitting small-screen display, and introduce a clustering method useful for various types of cartoon images as a prerequisite stage for preserving semantic meaning. The usage of neural networks is to properly cut the various forms of pages. Texture information that is useful for grayscale image segmentation gives us a good clue for page layout analysis using the multilayer perceptron (MLP) based x-y recursive algorithm. We also automatically frame the segment MLP using agglomerative segmentation. Our experimental results show that the combined approaches yield good results of segmentation for several cartoons.展开更多
文摘Three-dimensional(3D)city models have uses including on-site validation of utility infrastructure,support for augmented reality,personalized tourist information,real estate sales,and 3D pedestrian navigation.Increasingly,such applications are deployed on mobile devices,whose use is becoming more prevalent.Tablet devices are used for more professional use requiring larger screens,mobile phones for more casual users.However,many 3D city models contain hundreds of buildings,which in turn results in performance issues when attempting to visualize such models on these devices.Two issues can be identified as contributory factors-the lower specification of the mobile device itself when compared with desktop machines and the lower bandwidth network between the device and the server(3G mobile or Wi-Fi).Both of these can be addressed by reducing the volume of data in the model.To achieve this,we generalize a 2D data-set(using aggregation and simplification)and then extrude the generalized 2D maps to 3D.This minimizes the number of buildings to be transmitted over the network and processed by the on-board graphics engine.To additionally address the bandwidth issue,we make use of topological data structuring to build and transmit a minimal description for each building.Combining these approaches,we compare the results obtained for generalized and un-generalized data-sets,on a tablet and mobile device.A performance increase of between 7 and 9 times is observed.
基金supported in part by the National Natural Science Foundation of China under Grant No.61072061the National Science and Technology Major Projects under Grant No.2012ZX03002008the Fundamental Research Funds for the Central Universities under Grant No.2012RC0121
文摘The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.
文摘The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods.
文摘Developing mobile applications have always been a rising topic in the technology world. With the recent development in technology, mobile applications play an important role in various applications throughout the world. Mobile applications are constantly evolving. There are several ongoing research and developments in both industry and academia. In this paper, we present the design and implementation of a mobile application that creates an electronic map or e-map application for the campus of Tuskegee University. The goals for this mobile application are to make the campus map easier and user-friendly for parents, visitors, and students using mobile devices. With this mobile application, the users will be able to search and find campus buildings, as well as give feedback on the application to eliminate the need for paper documentation.
基金This work was financially supported by the National Natural Science Foundation of China(Grant No.61379145)the Joint Funds of CETC(Grant No.20166141B08020101).
文摘While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only^1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%.
基金funding from the European Union Seventh Framework Programme (FP7/2007-2013) undergrant agreement No. 284863 (FP7 SEC GERYON)
文摘According to Cisco, mobile multimedia services now account for more than half the total amount of Internet traffic. This trend is burdening mobile devices in terms of power consumption, and as a result, more effort is needed to devise a range of pow- er-saving techniques. While most power-saving techniques are based on sleep scheduling of network interfaces, little has been done to devise multimedia content adaptation techniques. In this paper, we propose a multiple linear regression model that predicts the battery voltage discharge rate for several video send bit rates in a VoIP application. The battery voltage dis- charge rate needs to be accurately estimated in order to esti- mate battery life in critical VoIP contexts, such as emergency communication. In our proposed model, the range of video send bitrates is carefully chosen in order to maintain an acceptable VoIP quality of experience. From extensive profiling, the empir- ical resuhs show that the model effectively saves power and pro- longs real-time VoIP sessions when deployed in power-driven adaptation schemes.
文摘To date, there has been limited research carried out to better understand seniors' needs and purchase motivations related to mobile devices. To that end, this research enabled an exploratory assessment of the intrinsic and extrinsic needs/motives to consider in future research and development of ubiquitous mobile devices and related applications, specifically for seniors. The 65+ population is expected to double by 2025 (WHO, 2013) from 390 million to 800 million. The results demonstrate specific needs/motives which should be considered during the development of new mobile attributes and apps for this segment. For both attributes of devices themselves and the applications found on them, three tiers of priority for development were determined.
文摘The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Nevertheless,collecting raw data,which may contain various per⁃sonal information,would lead to serious personal privacy leaks.Local differential privacy(LDP)has been proposed to protect privacy on the device side so that the server cannot obtain the raw data.However,existing mechanisms assume that all keys are equally sensitive,which can⁃not produce high-precision statistical results.A utility-improved data collection framework with LDP for key-value formed mobile data is pro⁃posed to solve this issue.More specifically,we divide the key-value data into sensitive and non-sensitive parts and only provide an LDPequivalent privacy guarantee for sensitive keys and all values.We instantiate our framework by using a utility-improved key value-unary en⁃coding(UKV-UE)mechanism based on unary encoding,with which our framework can work effectively for a large key domain.We then vali⁃date our mechanism which provides better utility and is suitable for mobile devices by evaluating it in two real datasets.Finally,some pos⁃sible future research directions are envisioned.
文摘Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.
基金supported by Shanghai Municipal Education Commission
文摘Purpose: This paper presents an innovative program of Shanghai Jiao Tong University Library which aims to help engineering students to make use of mobile devices to improve their learning efficiency. Design/methodology/approach: Information literacy training and course learning resources were integrated into students' learning process. Surveys on students' learning with the touch pads were conducted to help evaluate the program's effectiveness. Findings: Our practice showed that collaboration of library staff with faculty members is an effective way to integrate information literacy education and course-specific library resources into students' learning with mobile devices, which has greatly improved the efficiency of students' learning. Research limitations: First, our literacy training still focused on the use of mobile devices in information access, but not on how to evaluate and manage their information resources with mobile devices. Second, subject librarians need to shift their role from information service providers into information resource instructors while developing the partnership with faculty members and teaching assistants. Practical implications: This paper provides learning efficiency of university students with touch pads conveniently. a new insight into the way of how to enhance such new technical devices as smartphones and Originality/value: Our practice can be used as a valuable guide for libraries that plan to leverage mobile technologies to enhance students' learning efficiency.
文摘在东京车展上,奥迪不仅展示了新车型A1,同时还推出了一款配合A1使用的专用导航手机——Audi Mobile Device,该机将在汽车销售时赠送给消费者。这款奥迪自家品牌的手机采用触控操作方式,支持3G,Wi-Fi和GPS,奥迪A1上专门设计了放置手机的插槽.并可通过汽车内置的车载充电器为手机充电。当你忘记带车钥匙时,通过手机可以打开A1的车门.也能用来开启汽车空调。
文摘This paper proposes a co-optimal strategy using line hardening,mobile devices(mobile ice-melting device,mobile emergency generator,mobile energy storage system),and repair crew dispatching to improve distribution system resilience during ice storms.A multi-stage defender-attacker-defender model is established to take into account interactions and coupling relationships between different measures.In our proposed model,ice storms will attack the distribution and transportation system in a worst-case scenario,affecting system performance from various perspectives.Corresponding to the different operating states in the distribution system affected by ice storms,aiming at minimizing the weighted load shedding value,this paper applies various measures to different stages to improve the response and defense capabilities to ice storms and realize restoration of the distribution system ultimately.The nested column-and-constraint generation algorithm is used to solve the model efficiently.The effectiveness of the proposed model and solution method for enhancing the distribution system resilience is verified on the modified IEEE 33-bus distribution system and modified realworld zone of Caracas 141-bus distribution system.
基金Supported by the National Natural Science Foundation of China (Grant No. 60873159)the Program for New Century Excellent Talents in University (Grant No. NCET-07-0039)the National High-Tech Research & Development Progrom of China (Grant No. 2006AA01Z333)
文摘Mobile device is an important interactive platform. Due to the limitation of computation, memory, display area and energy, how to realize the efficient and real-time interaction of 3D models based on mobile devices is an important research topic. Considering features of mobile devices, this paper adopts remote rendering mode and point models, and then, proposes a transmission and rendering approach that could interact in real time. First, improved simplification algorithm based on MLS and display resolution of mobile devices is proposed. Then, a hierarchy selection of point models and a QoS transmission control strategy are given based on interest area of operator, interest degree of object in the virtual environment and rendering error. They can save the energy consumption. Finally, the rendering and interaction of point models are completed on mobile devices. The experiments show that our method is efficient.
基金supported by the National Basic Research 973 Program of China under Grant No. 2011CB302205the National Natural Science Foundation of China under Grant Nos. 61173058 and 61272228+1 种基金the National High Technology Research and Development 863 Program of China under Grant Nos. 2012AA011801 and 2012AA02A608funded by Tsinghua National Laboratory for Information Science and Technology (TNList) Cross-Discipline Foundation
文摘With the rapid progress of the network and mobile techniques, mobile devices such as mobile phones and portable devices, have become one of the most important parts in common life. Efficient techniques for watching, navigating and sharing videos on mobile devices collaboratively are appealing in mobile environment. In this paper, we propose a novel approach supporting efficiently collaborative operations on videos with sketch gestures. Furthermore, effective collaborative annotation and navigation operations are given to interact with videos on mobile devices for facilitating users' communication based on mobile devices' characteristics. Gesture operation and collaborative interaction architecture are given and improved during the interactive process. Finally, a user study is conducted showing that the effectivity and collaborative accessibility of video exploration is improved.
基金supported by the National Natural Science Foundation of China(No.61475094)the National 973 Program of China(No.2013CB329202)
文摘Indoor visible light positioning becomes attractive due to the increasing demands of location-based services. This Letter proposes an indoor imaging visible light positioning scheme with a sampled sparse light source, image sensor, and gyro. An indoor positioning cellular with a single reference light source and an off-the-shelf mobile device is demonstrated. Experimental results show that the 3-dimensional positioning error is only several centimeters even with a rotated, rolled, and pitched mobile device. The proposed scheme is convenient and cost effective because the transmitter takes advantage of the existing lighting infrastructure and the receiver is a commercial mobile phone without any extra accessories.
文摘Facial scanning is becoming more common as the commercial use of facial recognition technology expands.Face recognition technology,can be widely used in public security,finance,subway,airport and other important fields of natural identification.Now,the technology has also been applied to the routine outbreak control and prevention,through the form of"face recognition"to bring more convenient,safer and more accurate experience.However,with the development of technology,the drawbacks of facial recognition are gradually revealed,and people's opinions on the technology are mixed.As facial recognition is widely used in the market,protecting users'privacy information and data is becoming an increasingly important issue.In this article,this paper will discuss the different factors contributing to the popularity of facial recognition among people from five aspects,respectively from the aspects of devices and people.This paper was covered a number of parts in this article to explore what factors influence the popularity of facial recognition,racially biased,Accuracy of identification,public acceptance,Personal experience with technology,public perception of face recognition technology and Alternatives to FRS.The conclusion is that the factors which most strongly impact on FR is accuracy.
文摘Background:This study evaluates the ability of mobile AI voice assistants(AI-VAs)to provide accurate medical advice for early knee osteoarthritis(KOA)and compares their performance with conventional web searches and human clinicians.Methods:From September to October 2024,two AI-VAs(Apple’s Siri and Huawei’s Xiaoyi)were tested on 15 KOA-related questions in Chinese and English.The assessment focused on the accuracy of voice recognition,response capabilities,and medical advice.Siri was further tested in four international regions(USA,UK,Germany,Hong Kong)using localized languages.Results:In Chinese-language tests,Siri and Xiaoyi showed comparable voice recognition(recognition accuracy:95.6%vs.93.3%)and response ability(speech response:88.9%vs.85.7%).However,Siri provided significantly more accurate medical advice(medical advice:95.6%vs.53.3%;Z=2.762,P<0.001).External validation via Global Quality Score further confirmed Siri’s superiority(mean Global Quality Score=4.0 vs.Xiaoai=0.9).Siri outperformed Xiaoyi in English-language tests(53.3%vs.0%).While Siri’s medical advice accuracy(95.6%)surpassed non-specialist clinicians(Z=2.685,P=0.007),it primarily reflects filtered search results(Baidu/Google)rather than clinical synthesis.Claims of equivalence to junior surgeons(98.2%)must be interpreted cautiously,as AI-VAs lack diagnostic reasoning capabilities.This distinction is critical to avoid overstating their role in clinical decision-making.Conclusion:Current AI-VAs offer limited value in providing precise medical advice for KOA,primarily serving as intermediaries for web search results.Their performance varies across languages,regions,and search engines.
文摘Location Based Navigation System (LBNS) is a specific Location Based Service (LBS) purely for navigational purpose. These systems resolve position of a user by using GNSS/GPS positioning technologies, to which supplementary information on goods and services are tagged. The navigation services have become popular and can be installed on mobile phones to provide route information, location of points of interest and user’s current location. LBS has continued to face challenges which include “communication” process towards user reference. Location Based Service System conveys suitable information through a mobile device for effective decision making and reaction within a given time span. This research was geared at understanding the state of LBS technology acceptance and adoption by users in Nairobi Kenya. To do this a quantitative study was carried out through a questionnaire, to investigate mobile phone users’ response on awareness and use of LBS technology. Testing the growth of this technology in this region compared to predictions in previous studies using Technology Acceptance Model (TAM), it is evident that many users may be aware of GPS functionality in mobile phones but are certainly yet to fully embrace the technology as they rarely use it. This points to some underlying challenges towards this technology within this part of the World, thereby recommending for deliberate monitoring and evaluation of LBS technology for sustenance growth based on user satisfaction and acceptance for improved usability.
基金Project partially supported by the Ministry of Knowledge Economy (MKE) of Korea under the Information Technology Research Center (ITRC) Support Programthe Basic Research Program of the Korea Science (No. R01-2006-000-11214-0)
文摘Previously we have designed and implemented new image browsing facilities to support effective offiine image contents on mobile devices with limited capabilities: low bandwidth, small display, and slow processing. In this letter, we fulfill the automatic production of cartoon contents fitting small-screen display, and introduce a clustering method useful for various types of cartoon images as a prerequisite stage for preserving semantic meaning. The usage of neural networks is to properly cut the various forms of pages. Texture information that is useful for grayscale image segmentation gives us a good clue for page layout analysis using the multilayer perceptron (MLP) based x-y recursive algorithm. We also automatically frame the segment MLP using agglomerative segmentation. Our experimental results show that the combined approaches yield good results of segmentation for several cartoons.