scholarly journals Orientation-Based Interaction on Mobile Devices and Desktops - An Evaluation

2017 ◽  
Vol 869 ◽  
pp. 244-262
Author(s):  
Johannes Schwank ◽  
Franca Alexandra Rupprecht ◽  
Sebastian Schöffel

Nowadays, mobile devices, such as smartphones, tablets or smartwatches, are essential items in our daily life. Further, more and more people use smart mobile devices in their everyday work for remote controlling, observing diagrams, performing web analytics, etc. However, the full potential of mobile devices is not tapped yet; built-in sensors such as accelerometers or gyroscopes offer a wide range of interaction capabilities, which are still often not fully used in nowadays mobile applications. On the other hand, desktops are still the dominating working device, but with significantly differing interaction means. With additional hand tracking devices capturing the user's gestures additional input possibilities are available but still often unused. In this paper, we investigate on a concept for orientation-based touch-less interaction. Depending on the type of device - traditional desktop or a mobile device - we use an interaction metaphor called "Waggle"; utilizing of tilting and turning of either the user's hand or the mobile device itself for additional input possibilities. Based on the results of two pilot studies for both environments, basic parameters for future design decisions are derived: on the one hand, the maximum angle for basic rotation axes are evaluated. On the other hand, different discretizations of tilt and turn angles are investigated. Based on the outcome of both studies the optimal configuration for the use of the Waggle interaction metaphor in future applications on both mobile and desktop environments are defined.

1989 ◽  
Vol 67 (8) ◽  
pp. 1354-1358 ◽  
Author(s):  
Jacques Paquet ◽  
Paul Brassard

The behaviour of various types of polar dienes towards halogenated ortho quinones has been investigated in a number of representative cases. As compared to the commonly used para analogues, o-quinones provide a wide range of products that indicate a keener response to the nature, number, and position of substituents on both reactants. 3-Halogenated-o-naphthoquinones 1 and 2 react smoothly with a representative vinologous ketene acetal 3, vinylketene acetals 4 and 5, and a monooxygenated diene 6 to provide variously substituted phenanthrenequinones 7–11. Only monooxygenated dienes on the other hand add to o-benzoquinones 14–16 and give convenient syntheses of the corresponding o-naphthoquinones 18–20. Keywords: cycloaddition, o-naphthoquinones, phenanthrenequinones, regiospecificity.


2002 ◽  
Vol 55 (1) ◽  
pp. 1-37 ◽  
Author(s):  
Craig A. Monson

Abstract Reexamination of a wide range of documents surrounding the twenty-second, twenty-fourth, and twenty-fifth sessions of the Council of Trent reveals that delegates strived officially to say as little as possible about music: only that secular or impure elements should be eliminated and that specific issues should be settled locally, by individual bishops and provincial synods. But, beginning with Gustave Reese, several scholars have misleadingly strung together a preliminary canon, stressing textual intelligibility, which was never approved in the general congregations, and the few lines that actually supplanted it, concerned only with the elimination of lasciviousness. On the other hand, a largely unrecognized or misunderstood attack on church polyphony did occur at the less familiar twenty-fifth session, when Gabriele Paleotti may have attempted to suppress elaborate music in female monasteries. Although this attempt was rejected in the general congregations, its restrictions were subsequently revived by local authorities such as Paleotti and Carlo Borromeo in their own dioceses. In the Council's immediate aftermath, reformers such as Paleotti and Borromeo once again focused on the issue of intelligibility, affording it a quasi-official status that seems to have quickly become widely accepted as “iuxta formam concilii.”


Author(s):  
Shweta Singh ◽  
Sureshbabu Popuri ◽  
Qazi Mohammad Junaid ◽  
Sabiah Shahul Hameed ◽  
Jeyakumar Kandasamy

A wide range of N-tosyl α–ketoamides underwent transamidation with various alkyl amines in the absence of catalyst, base, or additives. On the other hand, transamidation in N-Boc α–ketoamides is achieved...


2016 ◽  
Vol 11 (6) ◽  
pp. 32 ◽  
Author(s):  
Shwu-Ing Wu ◽  
Rou Jyun Chen

<p class="ArticleTitle">In recent years, the increasingly innovative and diverse mobile devices have significantly promoted the mobile device-based shopping. What factors influence this kind of shopping? Will consumers purchase things with mobile devices? These are two topics that need to be explored. Through the literature analysis and the empirical research, this study aims to analyze the quality of information, system, service and mobile devices on the mobile device-based shopping platform. Moreover, it studies the attitude of consumers towards mobile device-based shopping, their willingness to adopt the shopping method and the behavioral relationship model in the actual mobile device-based shopping as well as compares the groups of different frequencies of the Internet use in terms of the relationship model.</p>  With the convenient sampling, this study made an investigation among some of those who had experienced shopping on such mobile devices as tablets or smart phones. The 765 retrieved valid copies of questionnaire were divided into three groups—“often”, “average” and “seldom” according to the frequency consumers undertook mobile device-based shopping and were then compared. The results showed that there were significant differences among the three groups in four relationship paths, including: 1) the information quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “average” group than in the other two; 2) the service quality of the mobile device-based shopping platform has more significant positive influence on consumers’ attitude path of mobile device-based shopping in the “seldom” group than in the other two; 3) the preference for mobile device-based shopping has much significant positive influence on the behavior path of mobile device-based shopping in the “often” group. According to the research results, different groups have different behavior models. These results can serve as reference information in the decision-making of those who establish mobile device-based shopping platforms and manufacture mobile devices.


2019 ◽  
Vol 17 (1) ◽  
pp. 183-194
Author(s):  
Anna Rogacka-Łukasik

ADR (Alternative Dispute Resolution), as a non-judicial resolution of disputes, is a wide range of mechanisms that aim to put an end to a conflict without the need of conducting a trial before the court. On the other hand, the modern form of ADR is ODR (Online Dispute Resolution) – an online dispute resolution system that is the expression of the newest means of communication and technical innovations in order to help in non-judicial dispute resolving. The goal of this publication is to present the ODR platform and, in particular, to describe the process of filing a complaint by the consumer by means of it.


2018 ◽  
pp. 1431-1447
Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


Author(s):  
Barkha Narang ◽  
Jyoti Batra Arora

Mobile Commerce is a term to describe any commercial activity on a mobile device, such as a mobile phone (iPhone, Android, Blackberry) or a tablet (iPad, Galaxy Tab, Surface). This includes all steps of the customer journey; reach, attract, choose, convert and retain. Hence mobile commerce is probably best described as shopping that takes advantage of unique properties of mobile devices. It is also called as m-commerce. Pervasive computing aims at availability and invisibility. On the one hand, pervasive computing can be defined as availability of software applications and information anywhere and anytime. On the other hand, pervasive computing also means that computers are hidden in numerous so-called information appliances that we use in our day-to-day lives Characteristics of pervasive computing applications have been identified as interaction transparency, context awareness, and automated capture of experiences.


2009 ◽  
pp. 279-289
Author(s):  
Emerson Loureiro ◽  
Frederico Bublitz ◽  
Loreno Oliveira ◽  
Nadia Barbosa ◽  
Angelo Perkusich ◽  
...  

The fast development on microelectronics has promoted the increase on the computational power of hardware components. On the other hand, we are facing a significant improvement on energy consumption as well as the reduction of the physical size of such components. These improvements and the emergence of wireless networking technologies are enabling the development of small and powered mobile devices. Due to this scenario, the so-called pervasive computing paradigm, introduced by Mark Weiser in 1991 (Weiser, 1991) is becoming a reality. Such a paradigm envisions a world where environments are inhabited by computing devices, all of them seamlessly integrated into peoples’ lives, and effectively helping to carry on their daily tasks. Among others, one major characteristic of Weiser’s vision is that each device in an environment becomes a potential client or provider of resources. Not surprisingly, pervasive computing environments are becoming dynamic repositories of computational resources, all of them available to mobile users from the palm of their hands. However, devices can unpredictably join and leave such environments. Thus, resources can be dynamically made available or unavailable. Such a scenario has a great impact on the way that resources are found and used. In the case of static environments, such as the Web, it is reasonable to look up and access resources, such as Web pages, knowing the address of their providers beforehand. On the other hand, for dynamic environments, such as the pervasive computing ones, this is not a reasonable approach. This is due to the fact that one cannot guarantee that the provider of a resource will be available at any moment, because it may have left the environment or simply turned off. A better approach would be to discover these resources based on their descriptions, or any other feature that does not require the client to know the specific address of their providers. To this end, some of the current pervasive computing solutions, like Wings (Loureiro, Bublitz, Oliveira, Barbosa, Perkusich, Almeida, & Ferreira, 2006), Green (Sivaharan, Blair, & Coulson, 2005), RUNES (Costa, Coulson, Mascolo, Picco, & Zachariadis, 2005), and Scooby (Robinson, Wakeman, & Owen, 2004), are making use of a novel approach from the branch of distributed applications, the service-oriented computing paradigm (Papazoglou, 2003; Huhns & Singh, 2005). This is due to the fact that such a paradigm provides a crucial element for pervasive computing systems, the ability for dynamically binding to remote resources (Bellur & Narenda, 2005), which enables mobile devices to find needed services on demand. However, pervasive environments may be structured in different ways. They can range from wired networks to completely wireless ones, where communication among the devices is performed in an ad hoc way. Such a characteristic indicates that the way services are provisioned in a pervasive computing environment should fit in its organization, in order to enhance the access to the services available. Considering the above discussion, in this article we provide a review on service provision and its applicability in pervasive computing. More precisely, we will list the existing service provision approaches and discuss the characteristics and problems associated with each one, as well as their usage in pervasive computing environments. We start by providing introductory concepts of service-oriented and pervasive computing, respectively in the service-oriented computing and pervasive computing sections. Next, we present the service provision techniques available and how they can be applied for pervasive computing environments. The main current solutions within this scope will be introduced in the service oriented technologies section. Some of the future trends associated with research for service provision in pervasive computing environments will be presented in the future research trends section. Finally, in the conclusions sect


2009 ◽  
pp. 1069-1079
Author(s):  
Sylvain Giroux ◽  
Hélène Pigot ◽  
Jean-François Moreau ◽  
Jean-Pierre Savary

The mobile device presented here is designed to offer several services to enhance autonomy, security, and communication for the cognitively impaired people and their caregivers. Two mobile devices are linked through a server; one is dedicated to the patient, the other one to the caregivers. The services fill three functions for patients: a simplified reminder, an assistance request service, and an ecological information gathering service. Three services are available for the caregiver: monitoring patients’ADLs, informing system and colleagues of an intervention, and planning patients’ ADLs.


2017 ◽  
Vol 2017 ◽  
pp. 1-21 ◽  
Author(s):  
Pieter Robyns ◽  
Bram Bonné ◽  
Peter Quax ◽  
Wim Lamotte

We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11) enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construct a fingerprint of the transmitter that is 80.0 to 67.6 percent unique for 50 to 100 observed devices and 33.0 to 15.1 percent unique for 1,000 to 10,000 observed devices. We show how existing mitigation strategies such as MAC address randomization can be circumvented using only this fingerprint and temporal information. Our second technique leverages peer-to-peer 802.11u Generic Advertisement Service (GAS) requests and 802.11e Block Acknowledgement (BA) requests to instigate transmissions on demand from devices that support these protocols. We validate these techniques using two datasets, one of which was recorded at a music festival containing 28,048 unique devices and the other at our research lab containing 138 unique devices. Finally, we discuss a number of countermeasures that can be put in place by mobile device vendors in order to prevent noncooperative tracking through the discussed techniques.


Sign in / Sign up

Export Citation Format

Share Document