The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
Now-a-days, providing a platform, where customers can obtain first-hand assessments of product information and manufacturers can collect customers reviews cum feedbacks to improve the product quality, is the prime need of any organization. These reviews are the people's opinion about particular product. Every website has reviews of their product and those reviews are difficult to analyze. Thus, the...
With the explosion of Web 2.0, platforms such as blogs, e-commerce sites, peer-to-peer networks and social media, consumers have a broad platform and unlimited power to share their experiences in the form of reviews. With this, bulks of reviews are available for a single product, that needs to be analyzed, processed and mine. Opinion Mining or Sentiment Analysis is a Natural Language Processing and...
This paper presents a novel smartphone application that is expected to offer a solution from a different perspective to the problem of mobile phone power. The developed mobile application utilizes crowd sourced battery energy and offers software services in order to enable smartphone users sharing their devices' energy surplus between other users that need it. A hybrid criteria based algorithm that...
The study presents data on the state of health of smartphone and tablet lithium-ion batteries that were used in devices in the field for up to several years. Data was retrieved from the coconutBattery database, which contains thousands of datasets on batteries from several device models from the same manufacturer. The durability of batteries in the sample data was found to be quite high. Even batteries...
Our goal has been to examine the possibility of using charging station data to new user groups in the professional market. Opportunities have been identified through in-depth interviews with large public and private fleet owners, car distributors, utility transport providers, operators of charging infrastructure and developers of digital maps. As a result of the survey, the selected main focus has...
In wireless sensor network (WSN), position awareness (localization) of the sensor nodes is necessary to exploit the communication and to provide the meaningful information about their surroundings. Here Received Signal Strength Indicator (RSSI) technique is used as it requires no extra hardware and can be used for both indoor and outdoor environment. RSSI is having limitations such as high randomness...
In the recent years, there is an extremely growing interest in the development of mobile information systems for museum visitors. Many of these systems utilize sensor technologies like HF RFIDs to provide an enhanced experience to the visitors. We explore the usage of UHF RFIDs to enhance museum visits and demonstrate a mobile application for delivering multimedia information to museum visitors.
Battery exhaustion attack is a ldquodenial of servicerdquo attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the limitation in battery capacity. Researches have been conducted to discover the cause of the abnormal usage of handset battery by employing power estimation techniques. It is also important, however, to automatically respond...
Since the year of 2006, China Mobile had carried out field tests on hundreds of strings of batteries to verify how conductance/impedance tests could indicate the battery's health condition and its capacity, results of which has been presented in 2007 Intelec paper. With the conclusions drawn from the validation filed tests, China Mobile started to apply the ohmic testing technology in the practice...
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
Mobile terminals (MTs) in real personal communication service (PCS) environments are turned off due to limited battery lifetime, avoidance of unwanted incoming calls, and undesirable subscriber behaviors. Since the probability that an MT is in the off-state may be significant, MT power on/off-state transition behavior and the effect of state management on mobile communication networks require analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.