scholarly journals Satellite Gamelan: Microtonal Sonification Using a Large Consort of Mobile Phones

Author(s):  
Greg Schiemer

This paper describes an approach to sonification based on an iPhone app created for multiple users to explore a microtonal scale generated from harmonics using the combination product set method devised by tuning theorist Erv Wilson. The app is intended for performance by a large consort of hand-held mobile phones where phones are played collaboratively in a shared listening space. Audio consisting of handbells and sine tones is synthesised independently on each phone. Sound projection from each phone relies entirely on venue acoustics unaided by mains-powered amplification. It was designed to perform a microtonal composition called Transposed Dekany which takes the form of a chamber concerto in which a consort of players explore the properties of an microtonal scale. The consort subdivides into families of instruments that play in different pitch registers assisted by processes that are enabled and disabled at various stages throughout the performance. The paper outlines Wilson’s method, describes its current implementation and considers hypothetical sonification scenarios for implementation using different data with potential applications in the physical world.

Author(s):  
Jo Cranwell ◽  
Xu Sun ◽  
David Golightly ◽  
Genovefa Kefalidou ◽  
Benjamin Bedwell ◽  
...  

Mobile device-based data capture studies have potential as contextual data collection methods to address the limitations of the traditional paper-based diary method. The ever-evolving computing power of mobile phones broadens the potential applications of such methods in novel and interesting ways. While there have been a number of studies that demonstrate the power of the mobile device-based diary approach, there is less known about participants' experience of such studies. This chapter presents five case studies to bring together user experiences of participating in mobile data capture studies and evaluates how this can be fed into the future study design.


Author(s):  
Sushruta Mishra ◽  
Hrudaya Kumar Tripathy ◽  
Brojo Kishore Mishra ◽  
Sunil Kumar Mohapatra

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. In general, it may be beneficial to incorporate a number of the technologies of IoT with the use of services that can act as the bridge between each technology and the applications that developers wish to implement in IoT. This chapter studies the state-of-the-art of IoT and presents the key potential applications, challenges and future research areas in the domain of IoT. This chapter presents four main categories of services according to technical features. Some major issues of future research in IoT are identified and discussed briefly.


Author(s):  
H. K. Dhonju ◽  
W. Xiao ◽  
B. Shakya ◽  
J. P. Mills ◽  
V. Sarhosis

Heritage documentation has become increasingly urgent due to both natural impacts and human influences. The documentation of countless heritage sites around the globe is a massive project that requires significant amounts of financial and labour resources. With the concepts of volunteered geographic information (VGI) and citizen science, heritage data such as digital photographs can be collected through online crowd participation. Whilst photographs are not strictly geographic data, they can be geo-tagged by the participants. They can also be automatically geo-referenced into a global coordinate system if collected via mobile phones which are now ubiquitous. With the assistance of web-mapping, an online geo-crowdsourcing platform has been developed to collect and display heritage structure photographs. Details of platform development are presented in this paper. The prototype is demonstrated with several heritage examples. Potential applications and advancements are discussed.


Author(s):  
Shilpa V ◽  
H. S. Pradeep ◽  
M Z Kurian

As mobile phone handsets attain increasing capabilities, there are many more opportunities for novel applications development. While it is important to respect these resource constraints, some of the unique features of mobile phones also want to highlight, such as high quality audio, constant connectivity and comfortable form factor for use as device to interact with the physical world. In this project, there is exploration of the opportunities available with the usage of Symbian OS coupled with Bluetooth technology in developing an environment for current mobile phones and demonstrate applications and simultaneously exploiting the unique features of these commercially available devices. Applications for mobile phones have been limited to standard telephony or messaging services, PDA activities (calendar and contact management) and games. In this paper, the goal is to demonstrate that viewing a handset as a generic computing platform with some unique capabilities opens up the possibility for a variety of interesting applications. The main aim of the paper is to design and develop a symbian OS coupled with Bluetooth technology based wireless remote control to control motions of robot in the real time applications with four degrees of freedom. In this paper, there is a development of program which uses the symbian OS, which reads the data from the MEMS sensor present in the cell phone. This data is then compared to the stored data and then the user will get to know the way the cell phone is being tilted, This data is sent to the robot using the blue tooth technology that is present in the cell phone. At the other end the Blue tooth in the robot will read the data and will send the data to the micro controller, which will then accordingly drive the robot in the direction as required by the user.


2018 ◽  
Vol 7 (2.12) ◽  
pp. 11
Author(s):  
Yoon Su Jeong ◽  
Yong Tae Kim ◽  
Gil Cheol Park

Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively under way. In particular, as the types and functions of mobile phones and IoT devices using 5G services are diversified, mutual authentication technology among multiple users is required.Methods/Statistical analysis: In this paper, we propose a multi - user authentication scheme which can efficiently mutually authenticate different types of mobile phones and IoT devices that are provided with 5G service. The proposed method minimizes the authentication delay time because it identifies the authentication security parameter δ of multiple users requesting authentication to the server as a polynomial coefficient. As a result of the performance evaluation, the proposed method showed an average improvement of 9.3% in authentication processing time and 5.5% lower overhead than the existing method. In addition, the multiuser authentication latency was improved by 6.1% on average compared with the existing scheme.Findings: The proposed scheme minimizes the user 's authentication delay time by constructing the users who simultaneously request the 5G service into a subnet and then applying the authentication security parameter δ constituting each subnet to n - bit and applying it to the polynomial coefficients. Especially, for multi - user authentication, the proposed scheme divides the authentication path into two paths (main path and secondary path) to guarantee user authentication and integrity. The proposed scheme is suitable for mobile phones and IoT devices that use low power because it generates keys without performing additional cryptographic algorithms like conventional techniques when performing multi - user authentication.Improvements/Applications: In future research, we plan to apply the proposed method to the actual environment based on the results of this study.  


First Monday ◽  
2021 ◽  
Author(s):  
André H. Caron ◽  
Kate K. Mays

This qualitative study aimed to investigate the norms and daily practices around mobile and social technology by examining what happens when mobile phones and social media on any devices are removed from one’s daily life. Most studies on technology non-use focus on one device or plat-form. In this study, participants (N = 78) relinquished not only social media but also their mobile phones for a 10-day period, and made observations on their experiences before, during, and after the “withdrawal.” Participants initially experienced guilt and anxiety over violating a social contract by not being available and reachable anytime and anywhere, but mostly found their social capital — particularly bonding social capital — reinforced through the withdrawal. On the personal front, participants (re)discovered certain “life skills” like memory, imagination, and creativity in navigating their physical world and spending their time.


2019 ◽  
Vol 9 (19) ◽  
pp. 4162 ◽  
Author(s):  
Jin Zhang ◽  
Yanmiao Xie ◽  
Weilai Liu ◽  
Xiaoli Gong

Internet of Things (IoT) technology allows us to measure, compute, and decide about the physical world around us in a quantitative and intelligent way. It makes all kinds of intelligent IoT devices popular. We are continually perceived and recorded by intelligent IoT devices, especially vision devices such as cameras and mobile phones. However, a series of security issues have arisen in recent years. Sensitive data leakage is the most typical and harmful one. Whether we are just browsing files unintentionally in sight of high-definition (HD) security cameras, or internal ghosts are using mobile phones to photograph secret files, it causes sensitive data to be captured by intelligent IoT vision devices, resulting in irreparable damage. Although the risk of sensitive data diffusion can be reduced by optical character recognition (OCR)-based packet filtering, it is difficult to use it with sensitive data presented in table form. This is because table images captured by the intelligent IoT vision device face issues of perspective transformation, and interferences of circular stamps and irregular handwritten signatures. Therefore, a table-recognition algorithm based on a directional connected chain is proposed in this paper to solve the problem of identifying sensitive table data captured by intelligent IoT vision devices. First, a Directional Connected Chain (DCC) search algorithm is proposed for line detection. Then, valid line mergence and invalid line removal is performed for the searched DCCs to detect the table frame, to filter the irregular interferences. Finally, an inverse perspective transformation algorithm is used to restore the table after perspective transformation. Experiments show that our proposed algorithm can achieve accuracy of at least 92%, and filter stamp interference completely.


2009 ◽  
Vol 18 (1) ◽  
pp. 54-71 ◽  
Author(s):  
Bill Tomlinson ◽  
Man Lok Yau ◽  
Eric Baumer ◽  
Joel Ross ◽  
Andrew Correa ◽  
...  

Many human activities now take place in settings that include several computational devices—such as desktop computers, laptops, and mobile phones—in the same physical space. However, we lack interaction paradigms that support a coherent experience across these collocated technologies and enable them to work effectively as systems. This article presents a conceptual framework for building richly connected systems of collocated devices, and offers two implemented examples of interactive virtual worlds built on this framework. Aspects of this framework include multiple channels of real and apparent connectivity among devices: for example, multiple kinds of data networking, cross-device graphics and sound, and embodied mobile agents that inhabit the multi-device system. In addition, integration of the system with the physical world helps bridge the gap between devices. We evaluate the framework in terms of the types of user experiences afforded and enabled by the implemented systems. We also present a number of lessons learned from this evaluation regarding how to develop richly connected systems using heterogeneous devices, as well as the expectations that users bring to this kind of system. The core contribution of this paper is a novel framework for collocated multi-device systems; by presenting this framework, this paper lays the groundwork for a wide range of potential applications.


2020 ◽  
pp. 004912412091492
Author(s):  
Assaf Rotman ◽  
Michael Shalev

Automatically collected behavioral data on the location of users of mobile phones offer an unprecedented opportunity to measure mobilization in mass protests, while simultaneously expanding the range of researchable questions. Location data not only improve estimation of the number and composition of participants in large demonstrations. Thanks to high spatial and temporal resolution they also reveal when, where, and with whom different sociopolitical sectors join a protest campaign. This article compares the features and advantages of this type of data with other methods of measuring who participates in street protests. The steps in preparing a usable data set are explained with reference to a six-week campaign of mass mobilization in Israel in 2011. Findings based on the Israeli data set illustrate a wide range of potential applications, pertaining to both the determinants and consequences of protest participation. Limitations of mobile location data and the privacy issues it raises are also discussed.


Sign in / Sign up

Export Citation Format

Share Document