AC3P: an architecture using cloud computing for the provision of mathematical powerpoint content to feature phones
- Authors: Joubert, Jean-Pierre
- Date: 2012
- Subjects: Cloud computing , Mobile computing , Mathematics -- Study and teaching.
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10474 , http://hdl.handle.net/10948/d1011088 , Cloud computing , Mobile computing , Mathematics -- Study and teaching.
- Description: The Govan Mbeki Mathematics Development Unit (GMMDU) provides additional mathematics content to learners via mathematics workshops and DVDs. Mathematics is presented in PPT format. The prominence of feature phone usage has been confirmed amongst learners in socio-economic disadvantaged schools, specifically those learners participating in the GMMDU mathematics workshops. Feature phones typically contain limited device resources such as memory, battery power, and network resources. Distributed computing provides the potential to facilitate a new class of mobile applications with the provision of off-device resources. The objective of this research was the design of an architecture using Cloud Computing for the provision of mathematics in the form of PPT slides to feature phones. The capabilities of typical feature phones were reviewed as well as various distributed computing architectures that demonstrate potential benefit to the mobile environment. An Architecture using Cloud Computing for Content Provision (AC3P) was subsequently designed and applied as a proof of concept to facilitate the provision of mathematics in the form of PPT slides to feature phones. The application of AC3P was evaluated for efficiency and effectiveness. It was demonstrated that the application of AC3P provided efficient and effective provision of PPT to feature phones. The successful application of AC3P provided evidence that Cloud Computing may be used to facilitate the provision of mathematics content to feature phones. It is evident that AC3P may be applied in domains other than the provision of mathematics.
- Full Text:
- Date Issued: 2012
- Authors: Joubert, Jean-Pierre
- Date: 2012
- Subjects: Cloud computing , Mobile computing , Mathematics -- Study and teaching.
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10474 , http://hdl.handle.net/10948/d1011088 , Cloud computing , Mobile computing , Mathematics -- Study and teaching.
- Description: The Govan Mbeki Mathematics Development Unit (GMMDU) provides additional mathematics content to learners via mathematics workshops and DVDs. Mathematics is presented in PPT format. The prominence of feature phone usage has been confirmed amongst learners in socio-economic disadvantaged schools, specifically those learners participating in the GMMDU mathematics workshops. Feature phones typically contain limited device resources such as memory, battery power, and network resources. Distributed computing provides the potential to facilitate a new class of mobile applications with the provision of off-device resources. The objective of this research was the design of an architecture using Cloud Computing for the provision of mathematics in the form of PPT slides to feature phones. The capabilities of typical feature phones were reviewed as well as various distributed computing architectures that demonstrate potential benefit to the mobile environment. An Architecture using Cloud Computing for Content Provision (AC3P) was subsequently designed and applied as a proof of concept to facilitate the provision of mathematics in the form of PPT slides to feature phones. The application of AC3P was evaluated for efficiency and effectiveness. It was demonstrated that the application of AC3P provided efficient and effective provision of PPT to feature phones. The successful application of AC3P provided evidence that Cloud Computing may be used to facilitate the provision of mathematics content to feature phones. It is evident that AC3P may be applied in domains other than the provision of mathematics.
- Full Text:
- Date Issued: 2012
From desktop to mobile : a framework for function and content transformation
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
- Authors: Jurgens, Geert Dirk
- Date: 2011
- Subjects: Mobile computing , Pocket computers
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9752 , http://hdl.handle.net/10948/1429 , Mobile computing , Pocket computers
- Description: The use of mobile phones and other mobile devices are becoming widespread and almost all of these mobile devices have some sort of mobile Internet access. Due to the increase in mobile Internet usage, many websites need altering in order to become mobile compatible. Creating a mobile compatible version of a website is challenging due to formatting and capability restrictions imposed by the mobile device. Currently, one of the popular methods of creating a mobile compatible website involves the creation of a new, dedicated mobile version of the website. However, this approach can prove to be expensive, and repetitive, since a fully functional desktop version of the website often already exists. A second method involves the use of a transformation proxy to transform the traditional website into a mobile compatible version. This research develops a transformation framework that enables a web developer to create a single set of source files that can be used to render output compatible with both traditional and mobile devices. In developing this framework, capabilities and restrictions of the mobile device were examined. Furthermore, current mobile web development guidelines and best practices were discussed. This resulted in the development of a method to identify and outline areas of a traditional website for transformation into a mobile friendly format. Furthermore, a transformation engine that allowed processing of the traditional website into a mobile compatible website was developed. This transformation engine extracted the outlined areas, and rendered the extracted content, all while maintaining the website’s original functionality. The development of a prototype verified that the transformation concepts are valid, and provided for the development of guidelines and recommendations. The development of a framework to enable the web developer to create a website once, and enable it to adapt its output for mobile devices, will have a positive impact on the development of content for the mobile web.
- Full Text:
- Date Issued: 2011
A model to measure the maturuty of smartphone security at software consultancies
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
- Authors: Allam, Sean
- Date: 2009
- Subjects: Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Language: English
- Type: Thesis , Masters , MCom (Information Systems)
- Identifier: vital:11135 , http://hdl.handle.net/10353/281 , Computer networks -- Security measures , Capability maturity model (Computer software) , Smartphones , Wireless Internet , Mobile communication systems , Mobile computing
- Description: Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Full Text:
- Date Issued: 2009
An investigation into interoperable end-to-end mobile web service security
- Authors: Moyo, Thamsanqa
- Date: 2008
- Subjects: Web services , Mobile computing , Smartphones , Internetworking (Telecommunication) , Computer networks -- Security measures , XML (Document markup language) , Microsoft .NET Framework , Java (Computer program language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4595 , http://hdl.handle.net/10962/d1004838 , Web services , Mobile computing , Smartphones , Internetworking (Telecommunication) , Computer networks -- Security measures , XML (Document markup language) , Microsoft .NET Framework , Java (Computer program language)
- Description: The capacity to engage in web services transactions on smartphones is growing as these devices become increasingly powerful and sophisticated. This capacity for mobile web services is being realised through mobile applications that consume web services hosted on larger computing devices. This thesis investigates the effect that end-to-end web services security has on the interoperability between mobile web services requesters and traditional web services providers. SOAP web services are the preferred web services approach for this investigation. Although WS-Security is recognised as demanding on mobile hardware and network resources, the selection of appropriate WS-Security mechanisms lessens this burden. An attempt to implement such mechanisms on smartphones is carried out via an experiment. Smartphones are selected as the mobile device type used in the experiment. The experiment is conducted on the Java Micro Edition (Java ME) and the .NET Compact Framework (.NET CF) smartphone platforms. The experiment shows that the implementation of interoperable, end-to-end, mobile web services security on both platforms is reliant on third-party libraries. This reliance on third-party libraries results in poor developer support and exposes developers to the complexity of cryptography. The experiment also shows that there are no standard message size optimisation libraries available for both platforms. The implementation carried out on the .NET CF is also shown to rely on the underlying operating system. It is concluded that standard WS-Security APIs must be provided on smartphone platforms to avoid the problems of poor developer support and the additional complexity of cryptography. It is recommended that these APIs include a message optimisation technique. It is further recommended that WS-Security APIs be completely operating system independent when they are implemented in managed code. This thesis contributes by: providing a snapshot of mobile web services security; identifying the smartphone platform state of readiness for end-to-end secure web services; and providing a set of recommendations that may improve this state of readiness. These contributions are of increasing importance as mobile web services evolve from a simple point-to-point environment to the more complex enterprise environment.
- Full Text:
- Date Issued: 2008
- Authors: Moyo, Thamsanqa
- Date: 2008
- Subjects: Web services , Mobile computing , Smartphones , Internetworking (Telecommunication) , Computer networks -- Security measures , XML (Document markup language) , Microsoft .NET Framework , Java (Computer program language)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4595 , http://hdl.handle.net/10962/d1004838 , Web services , Mobile computing , Smartphones , Internetworking (Telecommunication) , Computer networks -- Security measures , XML (Document markup language) , Microsoft .NET Framework , Java (Computer program language)
- Description: The capacity to engage in web services transactions on smartphones is growing as these devices become increasingly powerful and sophisticated. This capacity for mobile web services is being realised through mobile applications that consume web services hosted on larger computing devices. This thesis investigates the effect that end-to-end web services security has on the interoperability between mobile web services requesters and traditional web services providers. SOAP web services are the preferred web services approach for this investigation. Although WS-Security is recognised as demanding on mobile hardware and network resources, the selection of appropriate WS-Security mechanisms lessens this burden. An attempt to implement such mechanisms on smartphones is carried out via an experiment. Smartphones are selected as the mobile device type used in the experiment. The experiment is conducted on the Java Micro Edition (Java ME) and the .NET Compact Framework (.NET CF) smartphone platforms. The experiment shows that the implementation of interoperable, end-to-end, mobile web services security on both platforms is reliant on third-party libraries. This reliance on third-party libraries results in poor developer support and exposes developers to the complexity of cryptography. The experiment also shows that there are no standard message size optimisation libraries available for both platforms. The implementation carried out on the .NET CF is also shown to rely on the underlying operating system. It is concluded that standard WS-Security APIs must be provided on smartphone platforms to avoid the problems of poor developer support and the additional complexity of cryptography. It is recommended that these APIs include a message optimisation technique. It is further recommended that WS-Security APIs be completely operating system independent when they are implemented in managed code. This thesis contributes by: providing a snapshot of mobile web services security; identifying the smartphone platform state of readiness for end-to-end secure web services; and providing a set of recommendations that may improve this state of readiness. These contributions are of increasing importance as mobile web services evolve from a simple point-to-point environment to the more complex enterprise environment.
- Full Text:
- Date Issued: 2008
A framework for secure mobile computing in healthcare
- Thomas, Godwin Dogara Ayenajeh
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
- Authors: Thomas, Godwin Dogara Ayenajeh
- Date: 2007
- Subjects: Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9789 , http://hdl.handle.net/10948/618 , Mobile computing
- Description: Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, the increase in government and industry regulation to ensure the privacy and security of health information, makes mobile security no longer just desirable, but mandatory. In addition, as healthcare becomes more aware of the need to reinforce patient confidence to gain competitive advantage, it makes mobile security desirable. Several guidelines regarding security best practices exist. Healthcare institutions are thus faced with matching the guidelines offered by best practices, with the legal and regulatory requirements. While this is a valuable question in general, this research focuses on the aspect of considering this question when considering the introduction of mobile computing into the healthcare environment. As a result, this research proposes a framework that will aid IT administrators in healthcare to ensure that privacy and security of health information is extended to mobile devices. The research uses a comparison between the best practices in ISO 17799:2005 and the regulatory requirements stipulated in HIPAA to provide a baseline for the mobile computing security model. The comparison ensures that the model meets healthcare specific industry requirement and international information security standard. In addition, the framework engages the Information Security Management System (ISMS) model based on the ISO 27000 standard. The framework, furthermore, points to existing technical security measurers associated with mobile computing. It is believed that the framework can assist in achieving mobile computing security that is compliant with the requirements in the healthcare industry.
- Full Text:
- Date Issued: 2007
A model for adaptive multimodal mobile notification
- Authors: Brander, William
- Date: 2007
- Subjects: Mobile computing , Context-aware computing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10473 , http://hdl.handle.net/10948/699 , Mobile computing , Context-aware computing
- Description: Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
- Full Text:
- Date Issued: 2007
- Authors: Brander, William
- Date: 2007
- Subjects: Mobile computing , Context-aware computing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10473 , http://hdl.handle.net/10948/699 , Mobile computing , Context-aware computing
- Description: Information is useless unless it is used whilst still applicable. Having a system that notifies the user of important messages using the most appropriate medium and device will benefit users that rely on time critical information. There are several existing systems and models for mobile notification as well as for adaptive mobile notification using context awareness. Current models and systems are typically designed for a specific set of mobile devices, modes and services. Communication however, can take place in many different modes, across many different devices and may originate from many different sources. The aim of this research was to develop a model for adaptive mobile notification using context awareness. An extensive literature study was performed into existing models for adaptive mobile notification systems using context awareness. The literature study identified several potential models but no way to evaluate and compare the models. A set of requirements to evaluate these models was developed and the models were evaluated against these criteria. The model satisfying the most requirements was adapted so as to satisfy the remaining criteria. The proposed model is extensible in terms of the modes, devices and notification sources supported. The proposed model determines the importance of a message, the appropriate device and mode (or modes) of communication based on the user‘s context, and alerts the user of the message using these modes. A prototype was developed as a proof-of-concept of the proposed model and evaluated by conducting an extensive field study. The field study highlighted the fact that most users did not choose the most suitable mode for the context during their initial subscription to the service. The field study also showed that more research needs to be done on an appropriate filtering mechanism for notifications. Users found that the notifications became intrusive and less useful the longer they used them.
- Full Text:
- Date Issued: 2007
An intelligent user interface model for contact centre operations
- Authors: Singh, Akash
- Date: 2007
- Subjects: User interfaces (Computer systems) , Human-computer interaction , Mobile computing , Customer services -- Management , Call centers -- Customer services
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10475 , http://hdl.handle.net/10948/d1011399 , User interfaces (Computer systems) , Human-computer interaction , Mobile computing , Customer services -- Management , Call centers -- Customer services
- Description: Contact Centres (CCs) are at the forefront of interaction between an organisation and its customers. Currently, 17 percent of all inbound calls are not resolved on the first call by the first agent attending to that call. This is due to the inability of the contact centre agents (CCAs) to diagnose customer queries and find adequate solutions in an effective and efficient manner. The aim of this research is to develop an intelligent user interface (IUI) model to support and improve CC operations. A literature review of existing IUI architectures, modelbased design and existing CC software together with a field study of CCs has resulted in the design of an IUI model for CCs. The proposed IUI model is described in terms of its architecture, component-level design and interface design. An IUI prototype has been developed as a proof of concept of the proposed IUI model. The IUI prototype was evaluated in order to determine to what extent it supports problem identification and query resolution. User testing, incorporating the use of eye tracking and a post-test questionnaire, was used in order to determine the usability and usefulness of the prototype. The results of this evaluation show that the users were highly satisfied with the task support and query resolution assistance provided by the IUI prototype. This research resulted in the design of an IUI model for the domain of CCs. This model can be used to assist the development of CC applications incorporating IUIs. Use of the proposed IUI model is expected to support and enhance the effectiveness and efficiency of CC operations. Further research is needed to conduct a longitudinal study to determine the impact of IUIs in the CC domain.
- Full Text:
- Date Issued: 2007
- Authors: Singh, Akash
- Date: 2007
- Subjects: User interfaces (Computer systems) , Human-computer interaction , Mobile computing , Customer services -- Management , Call centers -- Customer services
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:10475 , http://hdl.handle.net/10948/d1011399 , User interfaces (Computer systems) , Human-computer interaction , Mobile computing , Customer services -- Management , Call centers -- Customer services
- Description: Contact Centres (CCs) are at the forefront of interaction between an organisation and its customers. Currently, 17 percent of all inbound calls are not resolved on the first call by the first agent attending to that call. This is due to the inability of the contact centre agents (CCAs) to diagnose customer queries and find adequate solutions in an effective and efficient manner. The aim of this research is to develop an intelligent user interface (IUI) model to support and improve CC operations. A literature review of existing IUI architectures, modelbased design and existing CC software together with a field study of CCs has resulted in the design of an IUI model for CCs. The proposed IUI model is described in terms of its architecture, component-level design and interface design. An IUI prototype has been developed as a proof of concept of the proposed IUI model. The IUI prototype was evaluated in order to determine to what extent it supports problem identification and query resolution. User testing, incorporating the use of eye tracking and a post-test questionnaire, was used in order to determine the usability and usefulness of the prototype. The results of this evaluation show that the users were highly satisfied with the task support and query resolution assistance provided by the IUI prototype. This research resulted in the design of an IUI model for the domain of CCs. This model can be used to assist the development of CC applications incorporating IUIs. Use of the proposed IUI model is expected to support and enhance the effectiveness and efficiency of CC operations. Further research is needed to conduct a longitudinal study to determine the impact of IUIs in the CC domain.
- Full Text:
- Date Issued: 2007
A comparative analysis of Java and .NET mobile development environments for supporting mobile services
- Authors: Zhao, Xiaogeng
- Date: 2003 , 2013-05-23
- Subjects: Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4578 , http://hdl.handle.net/10962/d1003064 , Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Description: With the rapid development of wireless technologies, traditional mobile devices, such as pagers and cellular phones, have evolved from a purely communications and messaging-oriented medium to one that supports mobile data communication in general and acts as an application platform. As shown in a recent survey conducted by MDA, easy access to the present-day wireless Internet has resulted in mobile devices gaining more and more attention and popularity. The growth of and demand for mobile Web applications is expected to increase rapidly in the near future, as a range of software companies and mobile device manufacturers release increasingly accessible tools for creating mobile Web application and services. From a variety of possible development environments of this kind, the author has selected and examined two leading contenders, the J2ME and the Microsoft .NET mobile Web application development environments. This document reports the product life cycle of pilot mobile web applications, designed and implemented in each host environment in tum. A feature-by-feature investigation and comparison of the J2ME and .NET environments was carried out, covering the range of issues necessary for a complete mobile Web application development life cycle. The resulting analysis addresses features and efficiencies of the application development environment and the target deployment environment, the degree to which the resultant services are compatible on a variety of platforms, and the ease with which applications can be designed to be extensible. The thesis offers an objective evaluation of the J2ME and the .NET mobile development environments, which highlights their strengths and weaknesses, and suggests guidelines for designing, creating, and deploying high quality mobile Web applications. The research uncovers no clear winner across all categories assessed. J2ME currently favours situations in which bandwidth is limited and client side processing power is relatively sufficient, it exerts the processing power of mobile devices over distributed network environments. .NET requires a less constrained network throughput, but performs adequately on clients with more limited processing power, supports a more diverse target platform range, and offers a more efficient, in terms of development time, development environment. Both technologies are likely to receive significant user support for some time. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2003
- Authors: Zhao, Xiaogeng
- Date: 2003 , 2013-05-23
- Subjects: Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4578 , http://hdl.handle.net/10962/d1003064 , Microsoft .NET , Java (Computer program language) , Mobile computing , Wireless communication systems
- Description: With the rapid development of wireless technologies, traditional mobile devices, such as pagers and cellular phones, have evolved from a purely communications and messaging-oriented medium to one that supports mobile data communication in general and acts as an application platform. As shown in a recent survey conducted by MDA, easy access to the present-day wireless Internet has resulted in mobile devices gaining more and more attention and popularity. The growth of and demand for mobile Web applications is expected to increase rapidly in the near future, as a range of software companies and mobile device manufacturers release increasingly accessible tools for creating mobile Web application and services. From a variety of possible development environments of this kind, the author has selected and examined two leading contenders, the J2ME and the Microsoft .NET mobile Web application development environments. This document reports the product life cycle of pilot mobile web applications, designed and implemented in each host environment in tum. A feature-by-feature investigation and comparison of the J2ME and .NET environments was carried out, covering the range of issues necessary for a complete mobile Web application development life cycle. The resulting analysis addresses features and efficiencies of the application development environment and the target deployment environment, the degree to which the resultant services are compatible on a variety of platforms, and the ease with which applications can be designed to be extensible. The thesis offers an objective evaluation of the J2ME and the .NET mobile development environments, which highlights their strengths and weaknesses, and suggests guidelines for designing, creating, and deploying high quality mobile Web applications. The research uncovers no clear winner across all categories assessed. J2ME currently favours situations in which bandwidth is limited and client side processing power is relatively sufficient, it exerts the processing power of mobile devices over distributed network environments. .NET requires a less constrained network throughput, but performs adequately on clients with more limited processing power, supports a more diverse target platform range, and offers a more efficient, in terms of development time, development environment. Both technologies are likely to receive significant user support for some time. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2003
- «
- ‹
- 1
- ›
- »