Pub Date : 2014-04-01DOI: 10.4018/ijhcr.2014040102
W. Barott, Kevin M. Scott
A communications method is presented based on the backscatter modulation of incident radio frequency signals using low-complexity tags. The incident signals arise from digital television stations used as illuminators of opportunity. A receiver detects the tag using coherent processing algorithms similar to those used in passive radar, extending the detection range over published noncoherent techniques. This method enables shared use of the UHF television band for low-data-rate applications. While analyses suggest that rates exceeding 1 kbps might be achievable at 1 km range, experimental results demonstrate the challenges in designing and implementing such a system.
{"title":"Coherent Passive Backscatter Communications Using Ambient Transmitters","authors":"W. Barott, Kevin M. Scott","doi":"10.4018/ijhcr.2014040102","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040102","url":null,"abstract":"A communications method is presented based on the backscatter modulation of incident radio frequency signals using low-complexity tags. The incident signals arise from digital television stations used as illuminators of opportunity. A receiver detects the tag using coherent processing algorithms similar to those used in passive radar, extending the detection range over published noncoherent techniques. This method enables shared use of the UHF television band for low-data-rate applications. While analyses suggest that rates exceeding 1 kbps might be achievable at 1 km range, experimental results demonstrate the challenges in designing and implementing such a system.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-01DOI: 10.4018/ijhcr.2014040101
Sami Oweis, S. Ganesan, K. Cheok
Flocking is a term that describes the behavior of a group of birds a "flock" in flight, or the swarming behavior of insects. This paper presents detailed information about how to use the flocking techniques to control a group of embedded controlled systems-''Boids''-such as ground systems robotic vehicles/ swarm robots. Each one of these systems collectively moves inside/outside of a building to reach a target. The flocking behavior is implemented on a server-based control, which processes each of the boids' properties e.g. position, speed & target. Subsequently, the server will assign the appropriate move to a specific boid. The calculated information will be used locally to control and direct the movements/flocking for each boid in the group. A simulation technique and detailed flow chart is presented. In addition to Reynolds three original rules for flocking, two other rules-targeting obstacle avoidance-are presented-. Our result shows that the obstacles' avoiding rule was utilized to ensure that the flock didn't collide with obstacles in each of the boids' paths.
{"title":"Illustration of Centralized Command and Control for Flocking Behavior","authors":"Sami Oweis, S. Ganesan, K. Cheok","doi":"10.4018/ijhcr.2014040101","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040101","url":null,"abstract":"Flocking is a term that describes the behavior of a group of birds a \"flock\" in flight, or the swarming behavior of insects. This paper presents detailed information about how to use the flocking techniques to control a group of embedded controlled systems-''Boids''-such as ground systems robotic vehicles/ swarm robots. Each one of these systems collectively moves inside/outside of a building to reach a target. The flocking behavior is implemented on a server-based control, which processes each of the boids' properties e.g. position, speed & target. Subsequently, the server will assign the appropriate move to a specific boid. The calculated information will be used locally to control and direct the movements/flocking for each boid in the group. A simulation technique and detailed flow chart is presented. In addition to Reynolds three original rules for flocking, two other rules-targeting obstacle avoidance-are presented-. Our result shows that the obstacles' avoiding rule was utilized to ensure that the flock didn't collide with obstacles in each of the boids' paths.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-01DOI: 10.4018/ijhcr.2014040106
Arab AlSharif, M. Das
A piecewise linear, time-varying model for modeling the charging and discharging processes of Li-ion batteries is introduced in this paper. Such a model consists of a group of piecewise linear model segments, whose parameters are adapted online over time. Thus, the combined overall model is capable of modeling nonlinear time-varying processes, such as a Li-ion battery charging and discharging processes, quite well. Modeling results of both simulated test data and actual test data gathered from a high-power automotive-grade Li-ion cell are presented. The close matches between actual and model-predicted behaviors demonstrate the effectiveness of the proposed modeling approach and indicate the potential usefulness of such models for a battery management system.
{"title":"A Piecewise Linear Time-Varying Model for Modeling the Charging and Discharging Processes of a Lithium-Ion Battery","authors":"Arab AlSharif, M. Das","doi":"10.4018/ijhcr.2014040106","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040106","url":null,"abstract":"A piecewise linear, time-varying model for modeling the charging and discharging processes of Li-ion batteries is introduced in this paper. Such a model consists of a group of piecewise linear model segments, whose parameters are adapted online over time. Thus, the combined overall model is capable of modeling nonlinear time-varying processes, such as a Li-ion battery charging and discharging processes, quite well. Modeling results of both simulated test data and actual test data gathered from a high-power automotive-grade Li-ion cell are presented. The close matches between actual and model-predicted behaviors demonstrate the effectiveness of the proposed modeling approach and indicate the potential usefulness of such models for a battery management system.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-01DOI: 10.4018/ijhcr.2014040105
B. Kumar, Shamina Hussein
Mobile money is creating entirely new opportunity for mobile devices and provides functionalities similar to e-commerce. The nature of these devices pose two major limitations that are small screen size and lack of input capability, which makes designing applications for mobile devices a challenging task. It is important that the user interface is user-friendly and help users easily obtain their desired results. This study applied heuristic evaluation to examine the interface of SMS based mobile money application provided by vodafone called M-Paisa in Fiji. User interface evaluation of this application based on seven heuristic involving fifteen experts is described. The results show that there are minor usability problems with M-Paisa interfaces and we provide our recommendations to address them. Findings of this research can be applied to develop a set of guidelines to support the future design of effective interfaces for other mobile money applications.
{"title":"Heuristic Based User Interface Evaluation of Mobile Money Application: A Case Study","authors":"B. Kumar, Shamina Hussein","doi":"10.4018/ijhcr.2014040105","DOIUrl":"https://doi.org/10.4018/ijhcr.2014040105","url":null,"abstract":"Mobile money is creating entirely new opportunity for mobile devices and provides functionalities similar to e-commerce. The nature of these devices pose two major limitations that are small screen size and lack of input capability, which makes designing applications for mobile devices a challenging task. It is important that the user interface is user-friendly and help users easily obtain their desired results. This study applied heuristic evaluation to examine the interface of SMS based mobile money application provided by vodafone called M-Paisa in Fiji. User interface evaluation of this application based on seven heuristic involving fifteen experts is described. The results show that there are minor usability problems with M-Paisa interfaces and we provide our recommendations to address them. Findings of this research can be applied to develop a set of guidelines to support the future design of effective interfaces for other mobile money applications.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-01-01DOI: 10.4018/ijhcr.2014010104
Mohammad M. Alnabhan
This paper presents a new adaptive m-learning model supporting collaborative and context-aware learning. A seamless integration between learners' location information and a set of associated learning context dimensions is used to facilitate the provision of pervasive and ubiquitous learning services. The new model adopts nearest search algorithm in order to group spatially related mobile learners, constructing learning-oriented virtual communities and achieving a collaborative learning experience. The presented model implements two virtual community construction modes, described as client-based and server-based collaboration modes. A preliminary evaluation methodology was conducted, measuring the successful implementation of the proposed new model, and confirming the establishment of the virtual community after considering a set of learning context dimensions; such as learning collaboration type, learning style and learners' location information. Results have confirmed that both collaboration modes were successful in establishing the virtual communities between mobile learners. However, the server-based mode was more scalable than client-based mode while handling the increased number of mobile peers, in which less response time was experienced and a smaller learning grid area was formed.
{"title":"Ubiquity and Context-Aware M-Learning Model: A Mobile Virtual Community Approach","authors":"Mohammad M. Alnabhan","doi":"10.4018/ijhcr.2014010104","DOIUrl":"https://doi.org/10.4018/ijhcr.2014010104","url":null,"abstract":"This paper presents a new adaptive m-learning model supporting collaborative and context-aware learning. A seamless integration between learners' location information and a set of associated learning context dimensions is used to facilitate the provision of pervasive and ubiquitous learning services. The new model adopts nearest search algorithm in order to group spatially related mobile learners, constructing learning-oriented virtual communities and achieving a collaborative learning experience. The presented model implements two virtual community construction modes, described as client-based and server-based collaboration modes. A preliminary evaluation methodology was conducted, measuring the successful implementation of the proposed new model, and confirming the establishment of the virtual community after considering a set of learning context dimensions; such as learning collaboration type, learning style and learners' location information. Results have confirmed that both collaboration modes were successful in establishing the virtual communities between mobile learners. However, the server-based mode was more scalable than client-based mode while handling the increased number of mobile peers, in which less response time was experienced and a smaller learning grid area was formed.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.4018/ijhcr.2013100104
A. Plessas, V. Stefanis, Andreas Komninos, J. Garofalakis
As mobile contact lists get bigger and bigger the cognitive load on the user increases while trying to retrieve the next contact to start a communication session. In this paper we focus on the task of retrieving a contact when the purpose is to start a phone call, examining mobile users' call logs and showing that it is possible to accurately predict the next contact to be called using relatively simple heuristics and algorithms that describe usage context. The authors present and discuss the results of the proposed method applied on a dataset collected from an experiment the authors organised involving 25 mobile users.
{"title":"Using Communication Frequency and Recency Context to Facilitate Mobile Contact List Retrieval","authors":"A. Plessas, V. Stefanis, Andreas Komninos, J. Garofalakis","doi":"10.4018/ijhcr.2013100104","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100104","url":null,"abstract":"As mobile contact lists get bigger and bigger the cognitive load on the user increases while trying to retrieve the next contact to start a communication session. In this paper we focus on the task of retrieving a contact when the purpose is to start a phone call, examining mobile users' call logs and showing that it is possible to accurately predict the next contact to be called using relatively simple heuristics and algorithms that describe usage context. The authors present and discuss the results of the proposed method applied on a dataset collected from an experiment the authors organised involving 25 mobile users.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.4018/ijhcr.2013100102
M. Ahamed, Zahirul Islam, S. Hossain, S. Faruque
Due to the advancement of telecommunication platform, users are now demanding new applications such as Online Gaming, mobile TV, Web 2.0, and to meet this requirement operators needed to design more flexible network. To fulfill the requirements, 3rd Generation Partnership Project 3GPP works on the Long Term Evolution LTE and propose a system which has larger bandwidths up to 20 MHz, low latency and packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink Magdalena, 2007; Motorola, 2007; Skold, 2009. Offering a greater coverage by providing higher data rates over wider areas and flexibility of use at existing and new frequency bands plan is a major challenge. In this paper, we are analyzing practical coverage scenario in an urban area i.e. Kolkata in terms of received signal levels, total noise, interference, throughput, and quality factor for downlink signal level.
{"title":"LTE Cellular Network Planning for Urban Area","authors":"M. Ahamed, Zahirul Islam, S. Hossain, S. Faruque","doi":"10.4018/ijhcr.2013100102","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100102","url":null,"abstract":"Due to the advancement of telecommunication platform, users are now demanding new applications such as Online Gaming, mobile TV, Web 2.0, and to meet this requirement operators needed to design more flexible network. To fulfill the requirements, 3rd Generation Partnership Project 3GPP works on the Long Term Evolution LTE and propose a system which has larger bandwidths up to 20 MHz, low latency and packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink Magdalena, 2007; Motorola, 2007; Skold, 2009. Offering a greater coverage by providing higher data rates over wider areas and flexibility of use at existing and new frequency bands plan is a major challenge. In this paper, we are analyzing practical coverage scenario in an urban area i.e. Kolkata in terms of received signal levels, total noise, interference, throughput, and quality factor for downlink signal level.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.4018/ijhcr.2013100101
Yanxiao Zhao, B. Panigrahi, K. Sohraby, Wei Wang
Cognitive radio networks CRNs have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.
{"title":"Interference Modeling and Analysis in Cognitive Radio Networks","authors":"Yanxiao Zhao, B. Panigrahi, K. Sohraby, Wei Wang","doi":"10.4018/ijhcr.2013100101","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100101","url":null,"abstract":"Cognitive radio networks CRNs have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.4018/ijhcr.2013100105
Yanjun Zuo
Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.
{"title":"Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains","authors":"Yanjun Zuo","doi":"10.4018/ijhcr.2013100105","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100105","url":null,"abstract":"Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115414217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-01DOI: 10.4018/ijhcr.2013100103
M. H. A. Meniem, A. Hamad, E. Shaaban
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. Database Correlation Method DCM is a positioning technology that based on a database of a premeasured location dependent variable such as Received Signal Strength RSS. DCM has shown superior in terms of accuracy. Absolute RSS values received from a base station change with time, but the relative RSS RRSS values which refer to the relations of the RSS values between different base stations are more stable. This study proposes and implements a robust RRSS GSM-based technique for both positioning and traffic estimation. The study was tested and analyzed in Egypt roads using realistic data and Android smart phones. The performance evaluation showed good results. Mean positioning accuracy was about 29m in urban areas and velocity estimation was about 1 km/h in rural areas.
{"title":"GSM-Based Positioning Technique Using Relative Received Signal Strength","authors":"M. H. A. Meniem, A. Hamad, E. Shaaban","doi":"10.4018/ijhcr.2013100103","DOIUrl":"https://doi.org/10.4018/ijhcr.2013100103","url":null,"abstract":"Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. Database Correlation Method DCM is a positioning technology that based on a database of a premeasured location dependent variable such as Received Signal Strength RSS. DCM has shown superior in terms of accuracy. Absolute RSS values received from a base station change with time, but the relative RSS RRSS values which refer to the relations of the RSS values between different base stations are more stable. This study proposes and implements a robust RRSS GSM-based technique for both positioning and traffic estimation. The study was tested and analyzed in Egypt roads using realistic data and Android smart phones. The performance evaluation showed good results. Mean positioning accuracy was about 29m in urban areas and velocity estimation was about 1 km/h in rural areas.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}