Artykuł przedstawia wybrane formy składowania danych tj. Local Storage, Shared Preferences, pliki płaskie oraz SQLite w kontekście dwóch systemów mobilnych – Android oraz Windows Mobile. Opisuje on ...również sposoby, poprzez które możliwe jest połączenie z zewnętrznymi systemami bazodanowymi takimi jak Microsoft SQL Server, PostgreSQL czy MySQL i stara się odpowiedzieć na pytanie, użycie której z tych opcji ma największy sens w poszczególnych przypadkach. Całość argumentuje badaniami wydajności, którym poddane zostały wszystkie z wymienionych opcji.
Sleep is not just a passive process, but rather a highly dynamic process that is terminated by waking up. Throughout the night a specific number of sleep stages that are repeatedly changing in ...various periods of time take place. These specific time intervals and specific sleep stages are very important for the wake up event. It is far more difficult to wake up during the deep NREM (2-4) stage of sleep because the rest of the body is still sleeping. On the other hand if we wake up during the mild (REM, NREM1) sleep stage it is a much more pleasant experience for us and for our bodies. This problem led the authors to undertake this study and develop a Windows Mobile-based device application called wakeNsmile. The wakeNsmile application records and monitors the sleep stages for specific amounts of time before a desired alarm time set by users. It uses a built-in microphone and determines the optimal time to wake the user up. Hence, if the user sets an alarm in wakeNsmile to 7:00 and wakeNsmile detects that a more appropriate time to wake up (REM stage) is at 6:50, the alarm will start at 6:50. The current availability and low price of mobile devices is yet another reason to use and develop such an application that will hopefully help someone to wakeNsmile in the morning. So far, the wakeNsmile application has been tested on four individuals introduced in the final section.
In this paper, a novel interval possibilistic fuzzy c-means (IPFCM) clustering method is proposed for clustering symbolic interval data. Clustering algorithms are important methods that required in ...pattern recognition, data mining and text mining, etc. Most of cluster algorithms focus on single-valued data. The interval fuzzy c-means (IFCM) clustering method is first proposed for symbolic interval data. However, the IFCM may not have good performance when facing noisy date or data with outliers. Hence, the advantages of the proposed IPFCM clustering algorithm in this study mainly overcome the noisy date or data with outliers in symbolic interval data. In the proposed approach, two different distances; namely, Euclidean and Hausdorff distance measures are all individually considered. That is, based on Lagrange multipliers nonlinear programming method, the proposed IPFCM clustering algorithm under Euclidean and Hausdorff distance measure was individually derived for symbolic interval data. From our experimental results, the proposed IPFCM clustering algorithm indeed has better performance than the IFCM and the interval fuzzy possibilistic c-means (IFPCM) clustering algorithm under different distance measures for the noisy date or data with outlier problem. Besides, the proposed IPFCM clustering algorithm is also implemented on windows smart phone platform and shown better performance as expected. Finally, a real data set is added for testing.
In large organizations, handling personnel authorization for access to various sites within the building has always proved to be a challenge for security departments. In this work, we develop a ...prototype that utilizes an identity-based identification scheme to provide access control for incoming and outgoing personnel from the building, as well as their activities within. Our prototype is built using open-source web technology as well as mobile app support for personal smart phones. The novelty lies in the application of an identity-based identification scheme as a crucial component to ensure that no third party malicious observers, or even observers disguised as honest users trying to break the system, will be able to learn anything about the authentication processes of other users. We also reveal the running time for our various mobile applications for both the registration and identification process and show that they are competitive to that of previous work done in identity-based identification simulation experiments in the past. Lastly, as proof of concept, we demonstrate our prototype with a Nuvton electromagnetic door lock that communicates with the verification process on the server.
According to the needs of the field information, a remote monitoring system for farmland was developed based on the smart phone platform and GPRS wireless technology. The system collects the farmland ...soil temperature, crop leaf temperature, soil moisture and light intensity information data to communicate with remote Smart phone control gateway. The experimental results that the system works to meet the actual requirements.
We propose a new system for image recorder server from IP camera. The system consists of 2 parts, Server and viewer. Server is software running on PC with ability to capture image from IP camera and ...save to disk like an image server. The second part is the viewer. A user be able to monitor and view the saved image on the server via a web-based application from everywhere with password protection. Live and history image can be show to user to check the status of area or investigate the history event. Further more. The server can connect to IP camera to collect image or connect a web cam directly to the server for cost reduction. Finally, the user can view the image by using browser on the PC or Windows mobile phone.
Viral Attacks on the Modern Mobile Platforms V. N. Konev; M. I. Froimson; D. M. Mikhailov ...
Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ,
09/2012, Letnik:
19, Številka:
2S
Journal Article
Recenzirano
Odprti dostop
The article provides an overview of currently existing operating systems for mobile phones in terms of their safety. The analysis of vulnerabilities of most common ones and their possible ...contamination with harmful software is presented. The authors justify the necessity of developing trusted operating system for mobile devices that can provide the proper level of data protection.
As the living quality of the citizens gradually improved, traveling becomes an important recreational activity. The internet speedily provides information related to tour sites. However, web pages ...generally present merely words and pictures that are not impressive enough to the viewers. Spatial concepts, distance calculation, and tools for vacation planning are also often not provided by the websites. This study combines the usage of 3dSpace, GoogleMap, ER Model, Windows Mobile, SuperPad. It gathers the tour-sites related information of HsinChu city; such as local restaurants, famous attractions, and high rating hotels in the area. The study develops search interface integrated with the Google Map Engine. After selecting of category and input of specific key words, the related information of specific location and 360° satellite image could be shown on browser. The route calculation trips between local attractions is provided on this project. This investigation combines the GPS function to the smart phone, helping the users to arrive at their destination correctly within the minimum time.
Lately the use of Mobile Phone has been saturated and the use of Smart Phone including iPhone had rapidly increased. At present there are 3 kinds of Forensic Data Extraction methods which are SYN, ...JTAG and Revolving. However, different Forensic Data Extraction method should be used depending on the difference in Mobile Phone and Smart Phone technology and how to use them. This thesis aims at studying on Forensic Data Extraction method in the case of Smart Phone. For the analysis of Google Android and Windows Mobile Smart Phone which are mainly used for Smart Phone, Spec. and O.S. analysis as well as Data analysis are conducted, and evidence data are created by extracting Forensic data of Google Android and Windows Mobile Smart Phone. The research on the technology experimented through this research will contribute to the development of Mobile Smart Phone Forensic technology.
Cardiovascular disease (CVD) is the single leading cause of global mortality and is projected to remain so. Cardiac arrhythmia is a very common type of CVD and may indicate an increased risk of ...stroke or sudden cardiac death. The ECG is the most widely adopted clinical tool to diagnose and assess the risk of arrhythmia. ECGs measure and display the electrical activity of the heart from the body surface. During patients' hospital visits, however, arrhythmias may not be detected on standard resting ECG machines, since the condition may not be present at that moment in time. While Holter-based portable monitoring solutions offer 24-48 h ECG recording, they lack the capability of providing any real-time feedback for the thousands of heart beats they record, which must be tediously analyzed offline. In this paper, we seek to unite the portability of Holter monitors and the real-time processing capability of state-of-the-art resting ECG machines to provide an assistive diagnosis solution using smartphones. Specifically, we developed two smartphone-based wearable CVD-detection platforms capable of performing real-time ECG acquisition and display, feature extraction, and beat classification. Furthermore, the same statistical summaries available on resting ECG machines are provided.