![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Handheld devices (eg Palm, PocketPC)
Longitudinal studies have traditionally been seen as too cumbersome and labor-intensive to be of much use in research on Human-Computer Interaction (HCI). However, recent trends in market, legislation, and the research questions we address, have highlighted the importance of studying prolonged use, while technology itself has made longitudinal research more accessible to researchers across different application domains. Aimed as an educational resource for graduate students and researchers in HCI, this book brings together a collection of chapters, addressing theoretical and methodological considerations, and presenting case studies of longitudinal HCI research. Among others, the authors: discuss the theoretical underpinnings of longitudinal HCI research, such as when a longitudinal study is appropriate, what research questions can be addressed and what challenges are entailed in different longitudinal research designs reflect on methodological challenges in longitudinal data collection and analysis, such as how to maintain participant adherence and data reliability when employing the Experience Sampling Method in longitudinal settings, or how to cope with data collection fatigue and data safety in applications of autoethnography and autobiographical design, which may span from months to several years present a number of case studies covering different topics of longitudinal HCI research, from "slow technology", to self-tracking, to mid-air haptic feedback, and crowdsourcing.
This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front which focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and health care.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front which focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and health care.
There's Not an App for That will make your work stand out from the crowd. It walks you through mobile experiences, and teaches you to evaluate current UX approaches, enabling you to think outside of the screen and beyond the conventional. You'll review diverse aspects of mobile UX: the screens, the experience, how apps are used, and why they're used. You'll find special sections on "challenging your approach", as well as a series of questions you can use to critique and evaluate your own designs. Whether the authors are discussing real-world products in conjunction with suggested improvements, showcasing how existing technologies can be put together in unconventional ways, or even evaluating "far out" mobile experiences of the future, you'll find plenty of practical pointers and action items to help you in your day-to-day work.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
This book gathers outstanding research papers presented at the International Joint Conference on Advances in Computational Intelligence (IJCACI 2020), organized by Daffodil International University (DIU) and Jahangirnagar University (JU) in Bangladesh and South Asian University (SAU) in India. These proceedings present novel contributions in the areas of computational intelligence and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye - from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot. "Palm and Treo Hacks" gives you tips and tools that show you how to make the most of your Palm. A few minutes spent reading some of the hacks in this book will save you hours of research. Inside this book, you'll learn how to: find great applications for your Palm and make the most of the ones you're using now; get super-organized, getting more from the built-in Personal Information Manager and learning how to manage complex projects with your Palm; extend the Palm with must-have software and hardware add-ons; take your Palm online, reading email, surfing the web, and sending instant messages; and get some rest and relaxation with your Palm, whether it's listening to music, playing classic games, or watching video. Written for beginning to experienced Palm users, "Palm and Treo Hacks" is full of practical, ingenious tips and tricks you can apply immediately. Whether you're looking to master the built-in applications or you want to trick out your Palm to its fullest extent, this book will show you how to get it.
This book provides the details of developing a digital pedestrian map construction system over the intermittently connected mobile network. Over the past couple of decades, countries across the world, both developing and developed, have witnessed a significant number of disasters. Thus, it has become mandatory for each of the disaster-prone countries to equip themselves with appropriate measures to cope with the challenges of providing post-disaster services. Some of the serious challenges are incapacitated communication infrastructure, unstable power supply and inaccessible road networks. Out of these challenges, the destruction of road networks, especially in developing countries, acts as a major hindrance to effective disaster management. To be more specific, the success of a disaster response operation generally depends on the speed of evacuation and transportation of adequate amount of relief materials at the right time to the disaster-affected areas. Hence, map-based navigation support is a primary requirement for post-disaster relief operations. This book also provides the solution of the two other important post-disaster management services such as situational awareness and resource allocation. Both of these services are invariably dependent on the existence of navigation support. Finally, in order to offer such services, the other challenge is to address the problem of incapacitated communication infrastructure. This book also deals with such challenges in post-disaster scenarios and develops automated post-disaster management services.
This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.
Get the most out of your iPhone X Apple's iPhone X represents such a radical departure from all previous models of the globally known iPhone that it needs its own book to help users navigate the new features. Luckily, iPhone X For Dummies is here to provide the guidance you need to figure out the features of your new iPhone and the software that powers it. Written by the experts who've created all previous editions of iPhone For Dummies, this book takes a deep dive into this fabulous new phone and its unique controls. It then delves into iOS 11 and how it works on the iPhone X. It leaves no stone unturned and offers all the in-depth coverage you need to make your iPhone X work for you--right out of the box! Control your iPhone X with iOS 11 gestures Explore advanced camera tools that produce stunning photos Set up face recognition to access your phone with a smile Charge your iPhone wirelessly If you've invested in this awesome new device, you deserve to get the very most out of it. And this book shows you how!
Without correct timing, there is no safe and reliable embedded software. This book shows how to consider timing early in the development process for embedded systems, how to solve acute timing problems, how to perform timing optimization, and how to address the aspect of timing verification.The book is organized in twelve chapters. The first three cover various basics of microprocessor technologies and the operating systems used therein. The next four chapters cover timing problems both in theory and practice, covering also various timing analysis techniques as well as special issues like multi- and many-core timing. Chapter 8 deals with aspects of timing optimization, followed by chapter 9 that highlights various methodological issues of the actual development process. Chapter 10 presents timing analysis in AUTOSAR in detail, while chapter 11 focuses on safety aspects and timing verification. Finally, chapter 12 provides an outlook on upcoming and future developments in software timing. The number of embedded systems that we encounter in everyday life is growing steadily. At the same time, the complexity of the software is constantly increasing. This book is mainly written for software developers and project leaders in industry. It is enriched by many practical examples mostly from the automotive domain, yet the vast majority of the book is relevant for any embedded software project. This way it is also well-suited as a textbook for academic courses with a strong practical emphasis, e.g. at applied sciences universities. Features and Benefits * Shows how to consider timing in the development process for embedded systems, how to solve timing problems, and how to address timing verification * Enriched by many practical examples mostly from the automotive domain * Mainly written for software developers and project leaders in industry
Ocean covers 70.8% of the Earth's surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean's volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and weak communication characteristics of USNs make underwater localization much more challenging in comparison to terrestrial sensor networks. In this book, we focus on the localization problem in USNs, taking into account the unique characteristics of the underwater environment. This problem is of considerable importance, since fundamental guidance on the design and analysis of USN localization is very limited at present. To this end, we first introduce the network architecture of USNs and briefly review previous approaches to the localization of USNs. Then, the asynchronous clock, node mobility, stratification effect, privacy preserving and attack detection are considered respectively and corresponding localization schemes are developed. Lastly, the book's rich implications provide guidance on the design of future USN localization schemes. The results in this book reveal from a system perspective that underwater localization accuracy is closely related to the communication protocol and optimization estimator. Researchers, scientists and engineers in the field of USNs can benefit greatly from this book, which provides a wealth of information, useful methods and practical algorithms to help understand and explore the ocean.
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.
Get started as a mobile app developer and learn the art and science of Android app development. With no assumed knowledge about programming languages or Android required, you will gain the key skills for constructing fully functional Android apps for smartphones, tablets, and other devices. You will also build a solid foundation in the Java programming language and the business of creating and releasing software for Android. Along the way you'll get comfortable with Android Studio - the best way to write modern Android apps - before diving into your first Android code. The author spends plenty of time explaining how to build a robust UI with widgets, menus, layouts and more. These components will be the basis of your Android apps and so are covered in depth. Having grasped the basics, you'll move onto what will make your app stand out: sound, music, images, animations, and notifications. Taking these elements and combining them with phone features like calling and sensors, will take your apps to the next level. The final part of the book covers services, events, intents, receivers, files and databases, essential sources of information and functionality for users and your app. In addition, you'll see how to protect your users and their data with permissions and security in examples throughout the book What You Will Learn Get started with Android and build your first apps with it Install and use the Android Studio IDE Set up and manage the app development life cycle Master the basics of Java and XML required to create Android apps Discover the strengths and features of the Android APIs and device capabilities Who This Book Is For Total beginners who have little or no exposure to software development. This book is also useful for developers who are completely new to Android.
Marc-Andre Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.
This book offers the reader a comprehensive view of the design space of wearable computers, cutting across multiple application domains and interaction modalities. Besides providing several examples of wearable technologies, Wearable Interaction illustrates how to create and to assess interactive wearables considering human factors in design decisions related to input entry and output responses. The book also discusses the impacts of form factors and contexts of use in the design of wearable interaction. Miniaturized components, flexible materials, and sewable electronics toolkits exemplify advances in technology that facilitated the design and development of wearable technologies. Despite such advances, creating wearable interfaces that are efficient is still challenging. The new affordances of on-body interfaces require the consideration of new interaction paradigms, so that the design decisions for the user interaction take into account key limitations in the interaction surfaces of wearables concerning input entry, processing power for output responses, and in the time and attention that wearers dedicate to complete their interaction. Under such constraints, creating interfaces with high usability levels is complex. Also, because wearables are worn continuously and in close contact with the human body, on-body interfaces must be carefully designed to neither disturb nor overwhelm wearers. The context of use and the potential of wearable technologies must be both well understood to provide users with relevant information and services using appropriate approaches and without overloading them with notifications. Wearable Interaction explains thoroughly how interactive wearables have been created taking into account the needs of end users as well as the vast potential that wearable technologies offer. Readers from academia, industry or government will learn how wearables can be designed and developed to facilitate human activities and tasks across different sectors.
Build great voice apps of any complexity for any domain by learning both the how's and why's of voice development. In this book you'll see how we live in a golden age of voice technology and how advances in automatic speech recognition (ASR), natural language processing (NLP), and related technologies allow people to talk to machines and get reasonable responses. Today, anyone with computer access can build a working voice app. That democratization of the technology is great. But, while it's fairly easy to build a voice app that runs, it's still remarkably difficult to build a great one, one that users trust, that understands their natural ways of speaking and fulfills their needs, and that makes them want to return for more. We start with an overview of how humans and machines produce and process conversational speech, explaining how they differ from each other and from other modalities. This is the background you need to understand the consequences of each design and implementation choice as we dive into the core principles of voice interface design. We walk you through many design and development techniques, including ones that some view as advanced, but that you can implement today. We use the Google development platform and Python, but our goal is to explain the reasons behind each technique such that you can take what you learn and implement it on any platform. Readers of Mastering Voice Interfaces will come away with a solid understanding of what makes voice interfaces special, learn the core voice design principles for building great voice apps, and how to actually implement those principles to create robust apps. We've learned during many years in the voice industry that the most successful solutions are created by those who understand both the human and the technology sides of speech, and that both sides affect design and development. Because we focus on developing task-oriented voice apps for real users in the real world, you'll learn how to take your voice apps from idea through scoping, design, development, rollout, and post-deployment performance improvements, all illustrated with examples from our own voice industry experiences. What You Will Learn Create truly great voice apps that users will love and trust See how voice differs from other input and output modalities, and why that matters Discover best practices for designing conversational voice-first applications, and the consequences of design and implementation choices Implement advanced voice designs, with real-world examples you can use immediately. Verify that your app is performing well, and what to change if it doesn't Who This Book Is For Anyone curious about the real how's and why's of voice interface design and development. In particular, it's aimed at teams of developers, designers, and product owners who need a shared understanding of how to create successful voice interfaces using today's technology. We expect readers to have had some exposure to voice apps, at least as users.
Harness the power of React and the related libraries that you need to know to deliver successful front-end implementations. Whether you are a beginner getting started or an existing React developer, this book will provide you with the must-have knowledge you need in your toolbox to build a complete app. Start by learning how to create and style your own components, add state management, and manage routing. You'll also learn how to work with the backend using the MERN stack (MongoDB, Express, React, and Node.js). Once you have completed building your app you will learn how to deliver quality software by conducting unit testing, integration testing, and end-to-end (E2E) testing, as well as learn techniques to debug, profile, and optimize your React app. Libraries and tools covered include TypeScript, Material-UI, Styled Components, SCSS, React Router, Redux Toolkit, Recoil, Jest, Enzyme, Sinon, MongoDB, NodeJS, Express, Serve, Grunt, Puppeteer, ESLint, Prettier and many others. And, you'll get access to bonus material and learn how to conduct and nail React interview questions. Each chapter in this book can be used independently so you can pick and choose the information you'd like to learn. Use it to get deep into your React development world and find out why React has been rated the most loved framework by front-end developers for three years in a row. What You'll Learn Review the basics of DOM, React Virtual DOM, JSX, Babel, ES5/ES6, CRA, package manager, Yarn, Webpack, and build tools Write your own custom React components and learn about hooks and props. Apply routing and state management with React Route, Recoil, and Redux Toolkit Deliver quality software and reduce QA load by learning unit testing integration testing and end-to-end testing with libraries such as Jest, Jest-dom, Enzyme, Sinon, and Puppeteer Set an ultimate React automated development and CI cycle with ESLint, Prettier, Husky, Jest, Puppeteer, GitHub Actions, Codecov.io, Coveralls, Travis, and DeepScan Publish your code on Ubuntu Server with the help of Grunt Optimize your React app with pure components, lazy loading, prerender, precache, code splitting, tree shaking, reduce media size, and prefetching Who This Book Is For? This book is for new developers looking to start working on React applications, and React developers looking to expand on their existing knowledge. It is also suitable for developers coming from other front-end frameworks such as Angular and Vue who would like to add React to their toolbox.
Get ready to build applications that can run anywhere using the Uno Platform and WinUI. Modern application development can be an intimidating and complex topic, especially when you are building cross-platform applications that need to support multiple operating systems and form factors. There are so many options when it comes to frameworks and selecting the right one for your enterprise is critical in delivering a successful product to market. For the developer who has zero experience building apps with Xamarin, UWP, WinUI, or the Uno Platform, this book deconstructs those complex concepts into tangible building blocks so that productivity gains are immediately recognized.You will start off learning basic concepts and get a bird's-eye view of the enabling technologies to ensure that you feel comfortable with the tools and terminology. From there, you will learn about some of the more popular options in the .NET ecosystem, understand their attributes and shortcomings, and learn why the Uno Platform is ideal for building a cross-platform application that targets Android, iOS, Windows, WASM (Web Assembly), Linux, and MacOS. Then, you will follow a product release timeline that takes you through building an application, introducing key concepts at every step of the way. Each section of the book is chock full of tips and edge case documentations for the different platforms. What You Will Learn Manage multi-targeting solutions: specifically, how to handle the different project heads Effectively write cross-platform software and handle the edge cases of the different platforms Understand the fundamentals of working with Uno Platform WinUI apps Explore enterprise-grade application architecture using MVVM Understand Dependency Injection and how it applies to application architecture Who This Book Is For Developers who understand some basics of C# and object-oriented programming
This book features best selected research papers presented at the International Conference on Machine Learning, Internet of Things and Big Data (ICMIB 2020) held at Indira Gandhi Institute of Technology, Sarang, India, during September 2020. It comprises high-quality research work by academicians and industrial experts in the field of machine learning, mobile computing, natural language processing, fuzzy computing, green computing, human-computer interaction, information retrieval, intelligent control, data mining and knowledge discovery, evolutionary computing, IoT and applications in smart environments, smart health, smart city, wireless networks, big data, cloud computing, business intelligence, internet security, pattern recognition, predictive analytics applications in healthcare, sensor networks and social sensing and statistical analysis of search techniques.
Use this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You won't see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system. This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so I'm now sharing these techniques with you, whether you are an Android internals software engineer or security researcher. What You Will Learn Discover the differences between and how to access application names, package names, IDs, and unique identifiers in Android Quickly reference common techniques such as storage, the activity lifecycle, and permissions Debug using the Android shell Work with Android's obfuscation and encryption capabilities Extract and decompile Android applications Carry out Android reflection and dex class loading Who This Book Is For Programmers, developers, and admins with at least prior Android and Java experience. |
![]() ![]() You may like...
Proceedings of International Joint…
Mohammad Shorif Uddin, Jagdish Chand Bansal
Hardcover
R5,815
Discovery Miles 58 150
Design and Optimization of Sensors and…
Vinod Kumar Singh, Ratnesh Tiwari, …
Hardcover
R6,536
Discovery Miles 65 360
Advanced Android Application Development
Joseph Annuzzi, Lauren Darcey, …
Paperback
Context-Aware Machine Learning and…
Iqbal Sarker, Alan Colman, …
Hardcover
R4,128
Discovery Miles 41 280
Advanced Methodologies and Technologies…
D.B.A., Mehdi Khosrow-Pour,
Hardcover
R10,100
Discovery Miles 101 000
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo
Hardcover
R5,635
Discovery Miles 56 350
Virtual and Mobile Healthcare…
Information Reso Management Association
Hardcover
R12,134
Discovery Miles 121 340
|