移动通信设备的基础服务应用技术_第1页
移动通信设备的基础服务应用技术_第2页
移动通信设备的基础服务应用技术_第3页
移动通信设备的基础服务应用技术_第4页
移动通信设备的基础服务应用技术_第5页
已阅读5页,还剩26页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Students thoughts about the importance and costs of their mobile devices features and servicesTelematics and InformaticsIn recent years, handheld devices have become one of the fastest growing communication gadgets. Mobile technology is becoming widespread and research in this area is urgently needed. Using a survey instrument, the thoughts of male and female students regarding the importance and costs of mobile devices were investigated. It was found that students tend to consider the following features important: battery life, mp3 player, video camera, photo camera, storage memory, Bluetooth, design and elegance, clock, calendar, organizer and reminder. Also, they are eager to spend an amount of money so as their mobile device to support them. On average, both genders would pay extra money for such features. However, the majority of females think less of the price than males do. On the contrary, most of the respondents do not consider the following important: touch screen, voice commands, chat, teleconference, encryption and cryptography, common use of files, printing. Therefore, they would not spend any money for these features. Interested decision makers would try to increase their interest on such features. Moreover, all respondents appear to own a mobile phone while most of them do not have Internet connection at home. In general, some gender differences are found in the importance and costs of the mobile devices, but they are not statistically significant.Article Outline1. Introduction2. Methodology3. Results and discussion 3.1. General profile3.2. Importance and willingness to pay for technical characteristics 3.2.1. Weight and dimensions3.2.2. Wide screen, storing memory, easy structure and organization of menu, easy to use menu, icons, etc.3.2.3. Easy use of tools and applications, organization of personal files, photos, SMS, etc.3.2.4. Mp3 player3.2.5. Photo and video camera3.2.6. IrDA3.2.7. Resilience in water, drops, etc.3.2.8. Design and elegance3.2.9. Sound recording3.2.10. 3G (third generation)3.2.11. Battery life3.2.12. Processing speed3.2.13. Hands-free or Bluetooth earphone, Bluetooth technology3.2.14. Wi-Fi, GPS, search engine, touch screen, voice commands, easy interface3.3. Importance and willingness to pay for applications 3.3.1. Sending and receiving email, sending and receiving MMS3.3.2. Chat, teleconference, Internet navigation3.3.3. Support of open software and variety of files types3.3.4. Encryption and cryptography for exchanging data, common use of files, anti-virus and anti-spam protection, conversion voice-to-text, language translation3.3.5. Calculator, clock, calendar, organizer, reminder3.3.6. Playing games3.3.7. TV watching, printing, viewing maps, locking the keyboard or the touch screen, locking with password4. Managerial implications 4.1. Design and development4.2. Advertising, marketing and promotion4.3. Training and usage4.4. Pricing4.5. Applications and services5. Conclusions and future researchAppendix A. AppendixA.1. Gender differences found in previous studiesReferencesA mobile network operator-independent mobile signature serviceJournal of Network and Computer ApplicationsElectronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secure signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM/USIM cards, which are broadly extended, are the ideal devices to create these e-signatures (named mobile signatures or m-signatures). Furthermore, thanks to m-signatures the development of m-signature-based applications becomes simpler for mobile application/service providers. There are several solutions to create m-signatures. However, current solutions present some problems: either they require that the solution is developed by every mobile network operator or the components to implement it in the mobile handset are too complex. As a solution to these problems we present an m-signature service that is not linked to a mobile network operator and where the client has more control over the signatures to perform them in an easier way. This paper presents the description and analysis of this new m-signature service as well as the prototype that is being tested in the University of Murcia.Article Outline1. Introduction2. Related work 2.1. Server-based solutions2.2. Mobile signature service2.3. Mobile signature application unit3. Mobile network operator-independent mobile signature service 3.1. Overview of the system and its processes3.2. Roles and responsibilities 3.2.1. Mobile network operators3.2.2. MNO-independent mobile signature service provider3.2.3. Certification service provider3.2.4. Mobile service/application provider3.2.5. Mobile user3.3. Flow of acquiring and using an m-signature3.4. Processes 3.4.1. Mobile user certification3.4.2. Mobile user registration at iMSSP3.4.3. MASP registration at iMSSP3.4.4. Mobile signature request and generation3.4.5. Other services3.5. Web services description 3.5.1. iMSSP Web service3.5.2. MASP Web service3.6. Security requirements and analysis 3.6.1. Certification process3.6.2. Mobile user registration at iMSSP3.6.3. MASP registration at iMSSP3.6.4. Mobile signature request and generation3.6.5. Summary of the security properties of the exchanges3.7. Scenarios of application4. Implementation details 4.1. Development environment4.2. Mobile client4.3. MNO-independent mobile signature service provider4.4. Mobile application/service provider5. Prototype/scenario of application 5.1. Performance analysis6. Conclusions and future workAcknowledgementsAdding value to the network: Mobile operators experiments with Software-as-a-Service and Platform-as-a-Service modelsThe environments of software development and software provision are shifting to web-based platforms supported by Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) models. This paper will make the case that there is equally an opportunity for mobile operators to identify additional sources of revenue by exposing network functionalities through web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, mobile operators experiments are compared and similarities with these models are identified. Based on the analysis of various case studies, this paper argues that mobile operators mobile web services are decisively shifting from SaaS to PaaS models. However, these platforms incorporate fragmentation at several levels and are likely to face future challenges in order to thrive.Article Outline1. Introduction2. Software-as-a-Service 2.1. Revenue models2.2. Benefits and risks3. Platform-as-a-Service 3.1. Revenue models3.2. Benefits and risks4. Success factors for platform adoption5. From SaaS to PaaS: mobile operators approaches6. ConclusionAcknowledgementsReferencesArchitectures for the future networks and the next generation Internet: A surveyComputer CommunicationsNetworking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.Article Outline1. Introduction2. Scope3. Security 3.1. Relationship-Oriented Networking 3.1.1. Identities3.1.2. Building and sharing relationships3.1.3. Relationship applications3.2. Security architecture for Networked Enterprises (SANE)3.3. Enabling defense and deterrence through private attribution3.4. Protecting user privacy in a network with ubiquitous computing devices3.5. Pervasive and trustworthy network and service infrastructures3.6. Anti-Spam Research Group (ASRG)4. Content distribution mechanisms 4.1. Next generation CDN4.2. Next generation P2P4.3. Swarming architecture4.4. Content Centric Networking5. Challenged network environments 5.1. Delay Tolerant Networks (DTN)5.2. Delay/fault tolerant mobile sensor networks (DFT-MSN)5.3. Postcards from the edge5.4. Disaster day after networks (DAN)5.5. Selectively Connected Networking (SCN)6. Network monitoring and control architectures 6.1. 4D architecture6.2. Complexity Oblivious Network Management (CONMan)6.3. Maestro6.4. Autonomic network management6.5. In-Network Management (INM)7. Service centric architectures 7.1. Service-Centric End-to-End Abstractions for Network Architecture7.2. SILO architecture for services integration, control, and optimization for the future Internet7.3. NetSerV: architecture of a service-virtualized Internet7.4. SLASOI: empowering the Service Economy with SLA-aware Infrastructures7.5. SOA4All: Service-Oriented Architectures for All7.6. Internet 3.0: a multi-tier diversified architecture for the next generation Internet based on object abstraction8. Next generation internetworking architectures 8.1. Algorithmic foundations for Internet architecture: clean slate approach8.2. Greedy routing on hidden metrics (GROH Model)8.3. HLP: hybrid link state path-vector inter-domain routing8.4. eFIT 94 enabling future Internet innovations through transit wire8.5. Postmodern internetwork architecture8.6. ID-locater split architectures 8.6.1. HIP8.6.2. LISP8.6.3. MILSA8.7. Other proposals 8.7.1. User controlled routes8.7.2. Switched Internet Architecture8.7.3. Routing Control Platform (RCP)9. Future Internet infrastructure design for experimentation 9.1. Background: a retrospect of PlanetLab, Emulab and others9.2. Next generation network testbeds: virtualization and federation 9.2.1. Federation9.2.2. Virtualization9.3. Next generation network testbeds: implementations 9.3.1. Global Environment for Network Innovations (GENI)9.3.2. FIRE testbeds9.3.3. WISEBED10. Conclusions11. List of abbreviationsReferencesQualification and certification for the competitive edge in Integrated DesignCIRP Journal of Manufacturing Science and TechnologyCompetitive Product Design is more and more linked to mastering the challenge of the complexity and the multidisciplinary nature of modern products in an integrated fashion from the very earliest phases of product development. Design Engineers are increasingly confronted with the need to master several different engineering disciplines in order to get a sufficient understanding of a product or a service. Industrialists demand for the certification of the required skills, as well as for their international recognition and exchangeability. This paper describes an innovative approach to establish a training curriculum and a certification in the domain of Integrated Engineering on a European level. It shows the key competences that have been identified for the new job role of Integrated Design Engineers, as well as their relevance to system competence, which is considered one of the most vital success factors of competitive product design. It also introduces the European-wide recognized schema for professional training and certification that has been adopted for the implementation of the qualification and certification of Integrated Design Engineers, and it points out the relevance of the activity for universities.Article Outline1. Introduction2. Background 2.1. Success factors of innovation2.2. Processes, job roles, and skills3. Integrated Design Engineer key skills 3.1. Background and motivation3.2. Skill set overview3.3. The reasons for integration in design 3.3.1. Understanding Competitive Design3.3.2. Understanding design externalization and outsourcing3.3.3. Understanding modern design environments3.3.4. Understanding innovation by design3.3.5. Understanding product and system complexity3.4. The targets of integration in design 3.4.1. Integrating the whole life-cycle of a product or a system3.4.2. Integrating the different stakeholders of the life-cycle3.4.3. Integrating the different cultures of the stakeholders3.5. Essential methods of integration in design 3.5.1. Concurrent engineering3.5.2. Just-Need approach3.5.3. Product modeling3.6. Mastering complexity in Integrated Design 3.6.1. Integration as a means to master complexity3.6.2. Functional re-use aware design principles3.6.3. Requirements engineering in Integrated Design3.6.4. Design Thinking for innovation3.7. Knowledge management for integration 3.7.1. Formalization of knowledge3.7.2. Capitalization on knowledge3.7.3. Sharing of knowledge3.7.4. Contextualization of knowledge3.8. Collaborative Integrated Design 3.8.1. Design process moderation3.8.2. Working in distributed engineering teams3.8.3. Communication with experts from different domains3.9. Selected aspects of integration 3.9.1. Integration of risk considerations in design3.9.2. Integrated Design in wood furniture industry3.9.3. Integrated safety design in the automotive industry3.9.4. Life-cycle assessment in Integrated Design3.9.5. Sustainable Integrated Design3.9.6. Test and quality driven Integrated Design3.9.7. Virtual techniques to support the Integrated Design process4. Integrated Engineering as a key to system competence 4.1. The importance of system competence4.2. Case study: the automotive powertrain development process4.3. Model-based integrated development4.4. IT-infrastructure in integrated engineering organizations5. Qualification and certification of integrated engineering skills 5.1. Skills acquisition with the ECQA platform5.2. Provision, maintenance and extension of skill sets5.3. Qualification and certification5.4. Importance for universities6. Summary and conclusionsAcknowledgementsReferencesImpacts of mobile Internet use intensity on the demand for SMS and voice services of mobile network operators: An empirical multi-method study of German mobile Internet customersTelecommunications PolicyScholarly and business publications alike convey the message that past and future strong growth in mobile Internet (MI) access and service demand has solely positive commercial implications for mobile network operators (MNOs). This position neglects the possibility that increasing MI use intensity may lead to demand decreases for the highly profitable short messaging service (SMS) and mobile voice telephony. The extant literature provides few insights on relations between MI use intensity, on the one hand, and SMS as well as mobile voice call use intensities, on the other hand. This study developed hypotheses concerning the presence or absence of impacts of MI use intensity and circumstances of MI use (e.g., device type, tariff scheme) on the demand for SMS and mobile voice telephony at the individual customer level. The hypotheses were tested by analyzing actual use behaviors of 304 MI adopters in Germany, for whom objective use intensity data were extracted from the billing system of an MNO. These non-reactive measures were combined with responses collected from the adopters through a telephone survey. Multivariate regression results suggest that though MI use intensity significantly negatively affected both number of SMS sent and received, these effects were so small that their practical relevance is highly doubtful. Further, customers who used MI more intensively did not generate lower volumes of outgoing or incoming mobile voice connection minutes. Conclusions are drawn for MNO, telecommunications sector regulators and scholarly researchers seeking to explain the acceptance of mobile communications services.Article Outline1. Research background and questions2. Clarification of basic concepts and development of hypotheses 2.1. Basic concepts 2.1.1. Mobile Internet2.1.2. Use intensity of mobile communication services2.2. Development of hypotheses3. Empirical methodology 3.1. Data generation procedures and sample3.2. Operationalization of variables 3.2.1. User intensities of mobile communication services3.2.2. Circumstances of mobile Internet use4. Empirical analyses addressing the research questions and hypotheses5. DiscussionReferencesExtracting road information from recorded GPS data using snap-drift neural networkNeurocomputingResearch towards an innovative solution to the problem of automated updating of road network databases is presented. It moves away from existing methods where vendors of road network databases either go through the time consuming and logistically challenging process of driving along roads to register changes or use update methods that rely on remote sensing images. The solution presented here would allow users of road network dependent applications (e.g. in-car navigation system or Sat Nav) to passively collect characteristics of any “unknown route” (departure from the known roads in the database) on behalf of the provider. These data would be processed either by an on-board artificial neural network (ANN) or transferred back to the Sat Nav provider and input into their ANN along with similar track data provided by other service users, to decide whether or not to automatically update (add) the “unknown road” to the road database. The solution presented here addresses the feasibility of identifying roads and assigni

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论