Mobile agents for global mobile device grid infrastructure enterprises
- Authors: Gouws, Gerard
- Date: 2010-05-25T06:08:02Z
- Subjects: Mobile agent systems , Mobile computing , Computational grids (Computer systems) , Computer chess
- Type: Thesis
- Identifier: uj:6828 , http://hdl.handle.net/10210/3261
- Description: M.Sc. , Grid computing is a technology concerned with harvesting idle resources of geographically distributed and interconnected computers. It solves problems regarded as too complex or large to be solved by a single computer. Furthermore, economic grid computing is becoming the most dominant form of grid computing. It enables some form of payment to occur between resource producers and resource consumers in grid computing. Mobile devices and mobile telecommunication services, a relatively new field of technology, are rapidly increasing in popularity, size, strength and application. At the end of 2006, there were approximately 2.7 billion global active mobile users utilising mobile devices and mobile telecommunication services [Aho07]. At the end of 2007 this number had grown to 3.3 billion mobile users, more than half a billion additional mobile users in a period of one year [McN07]. With such large numbers, grid computing can benefit from the clustering of mobile devices forming a mobile grid computing model. However, there are many inherent disadvantages concerning mobile devices, such as low processing capabilities, unpredictable network connections and battery utilisation. Such hurdles must be addressed and solved if a mobile computing infrastructure or architecture is ever to be considered. This dissertation proposes the implementation of an economic mobile computing solution: Mobile Agents for Global Mobile Device Grid Infrastructure Enterprises, or MAGGIE. MAGGIE is concerned with harvesting idle mobile device resources by implementing the supply and demand economic model, aiming to create a healthy competitive economic market environment. MAGGIE implements agent and mobile agent technology to compensate for the hurdles introduced by mobile devices and mobile device software development platforms. It is targeted at both Sun Microsystems’s J2ME MIDP 2.0 and Microsoft’s .NET Compact Framework, enabling lower-end and higher-end mobile devices to contribute mobile computing services and resources for utilisation by other mobile device users. The primary goal of MAGGIE is to produce an architecture as generic as possible regarding the development and implementation of MAGGIE services. MAGGIE allows third-party application developers to seamlessly implement an array of MAGGIE services, without indepth prior knowledge of the architecture and technical aspects of MAGGIE. Finally, MAGGIE’s capabilities are demonstrated by implementing a distributed mobile chess service known as the MAGGIE Chess Service. The MAGGIE Chess Service enables a collection of distributed mobile devices in determining the best move originating from a chessboard position.
- Full Text:
- Authors: Gouws, Gerard
- Date: 2010-05-25T06:08:02Z
- Subjects: Mobile agent systems , Mobile computing , Computational grids (Computer systems) , Computer chess
- Type: Thesis
- Identifier: uj:6828 , http://hdl.handle.net/10210/3261
- Description: M.Sc. , Grid computing is a technology concerned with harvesting idle resources of geographically distributed and interconnected computers. It solves problems regarded as too complex or large to be solved by a single computer. Furthermore, economic grid computing is becoming the most dominant form of grid computing. It enables some form of payment to occur between resource producers and resource consumers in grid computing. Mobile devices and mobile telecommunication services, a relatively new field of technology, are rapidly increasing in popularity, size, strength and application. At the end of 2006, there were approximately 2.7 billion global active mobile users utilising mobile devices and mobile telecommunication services [Aho07]. At the end of 2007 this number had grown to 3.3 billion mobile users, more than half a billion additional mobile users in a period of one year [McN07]. With such large numbers, grid computing can benefit from the clustering of mobile devices forming a mobile grid computing model. However, there are many inherent disadvantages concerning mobile devices, such as low processing capabilities, unpredictable network connections and battery utilisation. Such hurdles must be addressed and solved if a mobile computing infrastructure or architecture is ever to be considered. This dissertation proposes the implementation of an economic mobile computing solution: Mobile Agents for Global Mobile Device Grid Infrastructure Enterprises, or MAGGIE. MAGGIE is concerned with harvesting idle mobile device resources by implementing the supply and demand economic model, aiming to create a healthy competitive economic market environment. MAGGIE implements agent and mobile agent technology to compensate for the hurdles introduced by mobile devices and mobile device software development platforms. It is targeted at both Sun Microsystems’s J2ME MIDP 2.0 and Microsoft’s .NET Compact Framework, enabling lower-end and higher-end mobile devices to contribute mobile computing services and resources for utilisation by other mobile device users. The primary goal of MAGGIE is to produce an architecture as generic as possible regarding the development and implementation of MAGGIE services. MAGGIE allows third-party application developers to seamlessly implement an array of MAGGIE services, without indepth prior knowledge of the architecture and technical aspects of MAGGIE. Finally, MAGGIE’s capabilities are demonstrated by implementing a distributed mobile chess service known as the MAGGIE Chess Service. The MAGGIE Chess Service enables a collection of distributed mobile devices in determining the best move originating from a chessboard position.
- Full Text:
Near field communication in smart phones using MIFARE standards for illiterate patients
- Authors: Mareli, Mahlaku
- Date: 2014-09-17
- Subjects: Mobile communication systems , Near field communication , Mobile computing
- Type: Thesis
- Identifier: uj:12328 , http://hdl.handle.net/10210/12115
- Description: M.Ing. (Electrical And Electronic Engineering) , Patient safety in healthcare is sometimes compromised due to medical and clerical errors. These errors can increase the operational cost of healthcare if not identified and rectified speedily. They can also result in misdiagnosis, wrong treatment options being provided to patients and in the worst case may result in fatalities. Healthcare errors in medication documentation, administration, and prescription can cause incorrect medicine administration and dosage instructions for patients. Sub-Saharan Africa has the lowest percentage (adults is 59% and youth is 70%) of literacy compared to other regions of the world sitting at (adults is 84% and youth is 89%). The challenge facing illiterate patients is that they can easily make the same mistakes and may not take their medication correctly. The application of Near Field Communication (NFC) technology in healthcare has demonstrated some advantages of security, accuracy and effectiveness over other technologies. The availability of NFC in some smartphones has also encouraged the development of more applications. The main objective of this thesis is to present a solution using an Android based NFC application that enables a NFC enabled smartphone to read NFC tags placed on medication containers and be able to play the audio instructions to illiterate patients. Based on a comprehensive review of the literature on NFC applications in healthcare, this solution is the first of its kind. A set of experiments were done in an effort to understand the operation of NFC phones under different environments. The proposed application reads the NFC tag placed on the medicine container. The data read from the NFC tag is used to identify the audio file corresponding to the particular patient’s medicine instructions. If the audio instructions are not available, on the phone, it is fetched from a remote server database using an Internet connection. The application automatically plays the audio file to the patient. Three research hypotheses were tested and it was confirmed that (H1), modified NFC antenna can reduce the level of induced power in it; (H2), the NFC technology is faster and more accurate in reading tag code that Barcode technology reading the barcode; (H3), the NFC reading process of NFC tag code is not negatively affected by the amount of light in the environment it is operated in. The Barcode reading accuracy was 10% errors when operating in the environment with light brightness of 128000 lumens. When the light brightness was reduced to 8900 lumens, the Barcode accuracy errors increased to 45%.
- Full Text:
- Authors: Mareli, Mahlaku
- Date: 2014-09-17
- Subjects: Mobile communication systems , Near field communication , Mobile computing
- Type: Thesis
- Identifier: uj:12328 , http://hdl.handle.net/10210/12115
- Description: M.Ing. (Electrical And Electronic Engineering) , Patient safety in healthcare is sometimes compromised due to medical and clerical errors. These errors can increase the operational cost of healthcare if not identified and rectified speedily. They can also result in misdiagnosis, wrong treatment options being provided to patients and in the worst case may result in fatalities. Healthcare errors in medication documentation, administration, and prescription can cause incorrect medicine administration and dosage instructions for patients. Sub-Saharan Africa has the lowest percentage (adults is 59% and youth is 70%) of literacy compared to other regions of the world sitting at (adults is 84% and youth is 89%). The challenge facing illiterate patients is that they can easily make the same mistakes and may not take their medication correctly. The application of Near Field Communication (NFC) technology in healthcare has demonstrated some advantages of security, accuracy and effectiveness over other technologies. The availability of NFC in some smartphones has also encouraged the development of more applications. The main objective of this thesis is to present a solution using an Android based NFC application that enables a NFC enabled smartphone to read NFC tags placed on medication containers and be able to play the audio instructions to illiterate patients. Based on a comprehensive review of the literature on NFC applications in healthcare, this solution is the first of its kind. A set of experiments were done in an effort to understand the operation of NFC phones under different environments. The proposed application reads the NFC tag placed on the medicine container. The data read from the NFC tag is used to identify the audio file corresponding to the particular patient’s medicine instructions. If the audio instructions are not available, on the phone, it is fetched from a remote server database using an Internet connection. The application automatically plays the audio file to the patient. Three research hypotheses were tested and it was confirmed that (H1), modified NFC antenna can reduce the level of induced power in it; (H2), the NFC technology is faster and more accurate in reading tag code that Barcode technology reading the barcode; (H3), the NFC reading process of NFC tag code is not negatively affected by the amount of light in the environment it is operated in. The Barcode reading accuracy was 10% errors when operating in the environment with light brightness of 128000 lumens. When the light brightness was reduced to 8900 lumens, the Barcode accuracy errors increased to 45%.
- Full Text:
A systematic literature review of the Internet of Things
- Authors: Khanyile, Sibusiso
- Date: 2017
- Subjects: Internet of things , Embedded Internet devices , Mobile computing , Computer networks - Security measures
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/269236 , uj:28602
- Description: Abstract: The explosiveness of the internet continuously transforms communication between people and information technology systems. The mass adoption of the web transformed the methods of communication, giving the ability to interconnect anytime, anywhere in different time zones in the world. The information technology development is the primary bridge that enabled a seamlessly connected environment despite geographical location. The technology progressions from accessing information from the internet through mobile devices using social media to deliver information to users brought enrichment to society and enterprises with information at fingertips. With this interest, there has been a rise in academic interest resulting in an acceleration of research on the Internet of Things (IoT). The scientific research in IoT has been exponentially growing in the last decade. There has been an abundance of research material generated on the issues of IoT. The research primarily focuses on the rise of the research interest in IoT for the industrial sector in the last decade. Moreover, the research provides a systematic review in the attempt to address IoT security, standards, and practices. The dissertation highlights the rise in scientific research in IoT lead by Energy, Industry 4.0 and Health. The IoT proliferation in the noted industry sectors attracts security concerns; several security themes are presented in conjunction with standards and practices to address the issue of security. Moreover, the research provides a systematic review in the attempt to address IoT security, standards, and practices. The review process identified 632 papers, of which 45 primary studies are classified pertinent to the IoT security. The data is extracted from articles to determine various challenges of IoT concerning security. The evaluation process identified the strategies to deal with issues arising from IoT and provided a review of initiatives by standards bodies to combat IoT security. The findings are expected to help other researchers and experts in the field of IoT to understand the challenges involved with technology evolution of IoT and the approaches offered to deal with them. , M.Phil. (Engineering Management)
- Full Text:
- Authors: Khanyile, Sibusiso
- Date: 2017
- Subjects: Internet of things , Embedded Internet devices , Mobile computing , Computer networks - Security measures
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/269236 , uj:28602
- Description: Abstract: The explosiveness of the internet continuously transforms communication between people and information technology systems. The mass adoption of the web transformed the methods of communication, giving the ability to interconnect anytime, anywhere in different time zones in the world. The information technology development is the primary bridge that enabled a seamlessly connected environment despite geographical location. The technology progressions from accessing information from the internet through mobile devices using social media to deliver information to users brought enrichment to society and enterprises with information at fingertips. With this interest, there has been a rise in academic interest resulting in an acceleration of research on the Internet of Things (IoT). The scientific research in IoT has been exponentially growing in the last decade. There has been an abundance of research material generated on the issues of IoT. The research primarily focuses on the rise of the research interest in IoT for the industrial sector in the last decade. Moreover, the research provides a systematic review in the attempt to address IoT security, standards, and practices. The dissertation highlights the rise in scientific research in IoT lead by Energy, Industry 4.0 and Health. The IoT proliferation in the noted industry sectors attracts security concerns; several security themes are presented in conjunction with standards and practices to address the issue of security. Moreover, the research provides a systematic review in the attempt to address IoT security, standards, and practices. The review process identified 632 papers, of which 45 primary studies are classified pertinent to the IoT security. The data is extracted from articles to determine various challenges of IoT concerning security. The evaluation process identified the strategies to deal with issues arising from IoT and provided a review of initiatives by standards bodies to combat IoT security. The findings are expected to help other researchers and experts in the field of IoT to understand the challenges involved with technology evolution of IoT and the approaches offered to deal with them. , M.Phil. (Engineering Management)
- Full Text:
Indoor mobility modelling for MANETs: an activity approach
- Authors: Sumbwanyambe, Mbuyu
- Date: 2010-03-15T06:32:19Z
- Subjects: Ad hoc networks (Computer networks) , Wireless LANs , Mobile computing , Electric network topology
- Type: Thesis
- Identifier: uj:6674 , http://hdl.handle.net/10210/3079
- Description: M.Ing. , Mobile adhoc networks (MANETs) are multihop wireless topologies that have rapidly changing node structure and limited connectivity. Since MANETs are not deployed on a wide scale, the research community still depends on the simulators such as the network simulator (Ns2) to evaluate MANET protocols. The topic of how to accurately model an indoor environment in the MANET research community is explored in this dissertation. We take an empirical and simulative approach to model our mobility pattern. Our mobility model is based on activity patterns drawn from the transport science. A comparison with the random way point is made in order to understand the weighty discrepancy between the two models. Our contribution in this research is three fold: 1. We argue that mobility modelling should be based on activities other than stochastic process that have got no realistic backing; 2. We model our network using by putting up an algorithm and take an empirical approach to model the radio frequency propagation. To show the difference of the two mobility models, the behaviour of the signal strength on the two mobility models is drawn; and 3. Finally an implementation of our mobility pattern and RF measurements in ns2 is done.
- Full Text:
- Authors: Sumbwanyambe, Mbuyu
- Date: 2010-03-15T06:32:19Z
- Subjects: Ad hoc networks (Computer networks) , Wireless LANs , Mobile computing , Electric network topology
- Type: Thesis
- Identifier: uj:6674 , http://hdl.handle.net/10210/3079
- Description: M.Ing. , Mobile adhoc networks (MANETs) are multihop wireless topologies that have rapidly changing node structure and limited connectivity. Since MANETs are not deployed on a wide scale, the research community still depends on the simulators such as the network simulator (Ns2) to evaluate MANET protocols. The topic of how to accurately model an indoor environment in the MANET research community is explored in this dissertation. We take an empirical and simulative approach to model our mobility pattern. Our mobility model is based on activity patterns drawn from the transport science. A comparison with the random way point is made in order to understand the weighty discrepancy between the two models. Our contribution in this research is three fold: 1. We argue that mobility modelling should be based on activities other than stochastic process that have got no realistic backing; 2. We model our network using by putting up an algorithm and take an empirical approach to model the radio frequency propagation. To show the difference of the two mobility models, the behaviour of the signal strength on the two mobility models is drawn; and 3. Finally an implementation of our mobility pattern and RF measurements in ns2 is done.
- Full Text:
The application of Technology Acceptance Model in predicting user acceptance (adoption) of mobile devices in the workplace
- Authors: Mabaso, B.G.
- Date: 2016
- Subjects: Mobile computing , Information technology
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/82676 , uj:18991
- Description: Abstract: The study examines the relationship between external and internal variable constructs of the Technology Acceptance Model (TAM) to predict the adoption of mobile devices in the workplace. It is general knowledge that once a technology adopter or user perceives a technology device to be useful, this ultimately influences their behavioural intention to use that device. It is also stated in the literature that perceived ease of use influences perceived usefulness leading to behavioural intention to use and ultimately leading to actual usage of a technology. The study takes a quantitative approach using a survey questionnaire as a data collection method and Chi square for hypothesis testing. A survey questionnaire was send to respondents via email for data collection purpose and the response rate was 73%. Perceived Usefulness (PU) and Perceived ease of Use (PEOU) are hypothesized to be the fundamental determinants of user acceptance. Three hypotheses were stated and the relationship between the external variable (IT Policies), PU & PEOU, and the behavioural intention towards use was tested using the chi-square statistic. It was found that a positive relationship existed between IT policies and the behavioural intention towards use, PU and attitude towards use, and also between PEOU and the behavioural intention towards use and in all three tests the null hypothesis was rejected. These results will therefore be of benefit to the South African Broadcasting Corporation (SABC) as they will be using the TAM as a tool to predict adoption on any future technology. , M.Com. (Information Systems)
- Full Text:
- Authors: Mabaso, B.G.
- Date: 2016
- Subjects: Mobile computing , Information technology
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/82676 , uj:18991
- Description: Abstract: The study examines the relationship between external and internal variable constructs of the Technology Acceptance Model (TAM) to predict the adoption of mobile devices in the workplace. It is general knowledge that once a technology adopter or user perceives a technology device to be useful, this ultimately influences their behavioural intention to use that device. It is also stated in the literature that perceived ease of use influences perceived usefulness leading to behavioural intention to use and ultimately leading to actual usage of a technology. The study takes a quantitative approach using a survey questionnaire as a data collection method and Chi square for hypothesis testing. A survey questionnaire was send to respondents via email for data collection purpose and the response rate was 73%. Perceived Usefulness (PU) and Perceived ease of Use (PEOU) are hypothesized to be the fundamental determinants of user acceptance. Three hypotheses were stated and the relationship between the external variable (IT Policies), PU & PEOU, and the behavioural intention towards use was tested using the chi-square statistic. It was found that a positive relationship existed between IT policies and the behavioural intention towards use, PU and attitude towards use, and also between PEOU and the behavioural intention towards use and in all three tests the null hypothesis was rejected. These results will therefore be of benefit to the South African Broadcasting Corporation (SABC) as they will be using the TAM as a tool to predict adoption on any future technology. , M.Com. (Information Systems)
- Full Text:
A prototype to improve the security and integrity of mobile banking
- Authors: Jacobs, Christoff Jan
- Date: 2015-06-26
- Subjects: Mobile computing , Banks and banking, Mobile - Security measures
- Type: Thesis
- Identifier: uj:13632 , http://hdl.handle.net/10210/13812
- Description: M.Sc. (Computer Science) , In the rapidly evolving world that we live in, the methods by which items are purchased are starting to be revolutionized. In a developing country such as South Africa, financial institutions within the banking sector are starting to implement their own systems or processes to process bank transactions. These processes include the identification and authentication of bank transactions, as well as the validation of the integrity of bank transactions between buyer and merchant. The changing of these processes by the banking sector could be viewed as a result of the increase in mobile device users. The purpose of the research presented within this dissertation is to explore an alternative method for identifying and authenticating a user in order to authorize a purchase made from a mobile device. The research will include evidence for the necessity of an alternative process as well as investigate the current technology by examining a few mobile banking solutions provided by the banking sector. The alternative process will be based upon a prototype design, which will employ Near Field Communication (NFC) technology to forward the purchase information from a point-of-sale (POS) device to the client’s mobile device, as well as employ fingerprint recognition technology to improve the identification and authentication of a user in order to authorize the purchase. The prototype will be known as BankAuth. The researcher hopes that this dissertation encourages other academics to discover new approaches in further researching mobile banking solutions.
- Full Text:
- Authors: Jacobs, Christoff Jan
- Date: 2015-06-26
- Subjects: Mobile computing , Banks and banking, Mobile - Security measures
- Type: Thesis
- Identifier: uj:13632 , http://hdl.handle.net/10210/13812
- Description: M.Sc. (Computer Science) , In the rapidly evolving world that we live in, the methods by which items are purchased are starting to be revolutionized. In a developing country such as South Africa, financial institutions within the banking sector are starting to implement their own systems or processes to process bank transactions. These processes include the identification and authentication of bank transactions, as well as the validation of the integrity of bank transactions between buyer and merchant. The changing of these processes by the banking sector could be viewed as a result of the increase in mobile device users. The purpose of the research presented within this dissertation is to explore an alternative method for identifying and authenticating a user in order to authorize a purchase made from a mobile device. The research will include evidence for the necessity of an alternative process as well as investigate the current technology by examining a few mobile banking solutions provided by the banking sector. The alternative process will be based upon a prototype design, which will employ Near Field Communication (NFC) technology to forward the purchase information from a point-of-sale (POS) device to the client’s mobile device, as well as employ fingerprint recognition technology to improve the identification and authentication of a user in order to authorize the purchase. The prototype will be known as BankAuth. The researcher hopes that this dissertation encourages other academics to discover new approaches in further researching mobile banking solutions.
- Full Text:
A model for a mobile operating environment
- Authors: Du Toit, Jaco Louis
- Date: 2018
- Subjects: Mobile computing , Operating systems (Computers) , Mobile communication systems - Security measures
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/295350 , uj:32160
- Description: Abstract: In a connected world companies are facing many information and cyber security challenges. Users are using multiple computing devices for both business and personal use. The multiple devices create an environment where business and personal data becomes difficult to separate. The Neo model describes a mobile operating environment that supports a special mobile device, called the Neo device. The Neo device enables a user to use the device for both personal and business purposes. Personal and business information are strongly isolated with high levels of control for the data owner. The Neo model further describes a computing environment that allow users to use one device in many different scenarios using many different input and output peripherals, while maintaining a high level of security. , Ph.D. (Computer Science)
- Full Text:
- Authors: Du Toit, Jaco Louis
- Date: 2018
- Subjects: Mobile computing , Operating systems (Computers) , Mobile communication systems - Security measures
- Language: English
- Type: Doctoral (Thesis)
- Identifier: http://hdl.handle.net/10210/295350 , uj:32160
- Description: Abstract: In a connected world companies are facing many information and cyber security challenges. Users are using multiple computing devices for both business and personal use. The multiple devices create an environment where business and personal data becomes difficult to separate. The Neo model describes a mobile operating environment that supports a special mobile device, called the Neo device. The Neo device enables a user to use the device for both personal and business purposes. Personal and business information are strongly isolated with high levels of control for the data owner. The Neo model further describes a computing environment that allow users to use one device in many different scenarios using many different input and output peripherals, while maintaining a high level of security. , Ph.D. (Computer Science)
- Full Text:
- «
- ‹
- 1
- ›
- »