94 resultados para Apps for smartphones and tablets
Resumo:
Background: There is limited information on the effect of isoflavones on homocysteine concentrations, a risk factor for a number of chronic diseases. Methods: Twenty-three premenopausal women participated in a double-blind, randomized, parallel study for four menstrual cycles. Subjects consumed either placebo or purified red clover (Trifolium pratense) isoflavone (86mg/day) tablets. Blood samples were collected weekly during cycles 1, 3, and 4 for determination of serum folate and total homocysteine concentrations. Dietary intake was monitored monthly. Results: Concentrations of folate and homocysteine in serum did not change significantly in either group, and there were no significant differences observed between the follicular and luteal phases of the menstrual cycle. The participants' dietary records indicated that nutrient intake was constant, and compliance was confirmed by analysis of urinary isoflavone concentrations and tablet counts in returned containers. Conclusions: These results suggest that in the absence of any dietary modification, supplementation with purified isoflavones that are predominantly methoxylated has no effect on serum homocysteine or folate in premenopausal women.
Resumo:
At the centre of this research is an ethnographic study that saw the researcher embedded within the fabric of inner city life to better understand what characteristics of user activity and interaction could be enhanced by technology. The initial research indicated that the experience of traversing the city after dark unified an otherwise divergent user group through a shared concern for personal safety. Managing this fear and danger represented an important user need. We found that mobile social networking systems are not only integral for bringing people together, they can help in the process of users safely dispersing as well. We conclude, however, that at a time when the average iPhone staggers under the weight of a plethora of apps that do everything from acting as a carpenter’s level to a pregnancy predictor, we consider the potential for the functionality of a personal safety device to be embodied within a stand alone artifact.
Resumo:
Background Iron deficiency, anemia and hookworm disease are important public health problems for women of reproductive age living in developing countries and affect the health of newborns and infants. Iron supplementation and deworming treatment are effective in addressing these problems in both pregnant and non-pregnant women. Daily iron supplementation and deworming after the first trimester is recommended for pregnant women although these programs usually do not operate efficiently or effectively. Weekly iron-folic acid supplementation and regular deworming for non-pregnant women may be a viable approach for improving iron status and preventing anemia during the reproductive years. Addressing these diseases at a population level before women become pregnant could significantly improve women's health before and during pregnancy, as well as their infants' growth and development. Methods and Results This paper describes the major processes undertaken in a demonstration intervention of preventive weekly iron-folic acid supplementation with regular deworming for all 52,000 women aged 15–45 years in two districts of Yen Bai province, in northern Viet Nam. The intervention strategy included extensive consultation with community leaders and village, commune, district and provincial health staff, and training for village health workers. Distribution of the drugs was integrated with the existing health service infrastructure and the village health workers were the direct point of contact with women. Iron-folic acid tablets and deworming treatment were provided free of charge from May 2006. An independent Vietnamese NGO was commissioned to evaluate compliance and identify potential problems. The program resulted in effective distribution of iron-folic acid tablets and deworming treatment to all villages in the target districts, with full or partial compliance of 85%. Conclusion Training for health staff, the strong commitment of all partners and the use of appropriate educational materials led to broad support for weekly iron-folic acid supplementation and high participation in the regular deworming days. In March 2008 the program was expanded to all districts in the province, a target population of approximately 250,000 WRA, and management was handed over to provincial authorities.
Resumo:
This year marks the completion of data collection for year three (Wave 3) of the CAUSEE study. This report uses data from the first three years and focuses on the process of learning and adaptation in the business creation process. Most start-ups need to change their business model, their product, their marketing plan, their market or something else about the business to be successful. PayPal changed their product at least five times, moving from handheld security, to enterprise apps, to consumer apps, to a digital wallet, to payments between handhelds before finally stumbling on the model that made the a multi-billion dollar company revolving around email-based payments. PayPal is not alone and anecdotes abounds of start-ups changing direction: Sysmantec started as an artificial intelligence company, Apple started selling plans to build computers and Microsoft tried to peddle compilers before licensing an operating system out of New Mexico. To what extent do Australian new ventures change and adapt as their ideas and business develop? As a longitudinal study, CAUSEE was designed specifically to observe development in the venture creation process. In this research briefing paper, we compare development over time of randomly sampled Nascent Firms (NF) and Young Firms(YF), concentrating on the surviving cases. We also compare NFs with YFs at each yearly interval. The 'high potential' over sample is not used in this report.
Resumo:
Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges—most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology (IT) infrastructure—that make a full migration to the public cloud difficult at present. Private and hybrid cloud solutions have consequently emerged within the industry to yield as much benefit from cloud-based technologies as possible while working within these constraints. This paper argues, however, that the move to private and hybrid clouds will very likely prove only to be a temporary stepping stone in the industry’s technological evolution. By presenting evidence from other market sectors that have faced similar challenges in their journey to the cloud, we propose that enabling technologies and conditions will probably fall into place in a way that makes the public cloud a far more attractive option for the upstream oil & gas industry in the years ahead. The paper concludes with a discussion about the implications of this projected shift towards the public cloud, and calls for more of the industry’s services to be offered through cloud-based “apps.”
Resumo:
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
Young adults represent the largest group of first time donors to the Australian Red Cross Blood Service, but they are also the least loyal group and often do not return after their first donation. At the same time, many young people use the internet and various forms of social media on a daily basis. Web and mobile based technological practices and communication patterns change the way that young people interact with one another, with their families, and communities. Combining these two points of departure, this study seeks to identify best practices of employing mobile apps and social media in order to enhance the loyalty rates of young blood donors. The findings reported in this paper are based on a qualitative approach presenting a nuanced understanding of the different factors that motivate young people to donate blood in the first place, as well as the obstacles or issues that prevent them from returning. The paper discusses work in progress with a view to inform the development of interactive prototypes trialling three categories of features: personal services (such as scheduling); social media (such as sharing the donation experience with friends to raise awareness); and data visualisations (such as local blood inventory levels). We discuss our translation of research findings into design implications.
Resumo:
The late eighteenth century witnessed the emergence of new technologies of subjectivity and of the literary. Most obviously, “the novel as a literary form appeared to embody and turn into an object the experience of life itself” (Park), and the novel genre came to both reflect and shape notions of interiority and subjectivity. In this same period, “A shift was taking place in the way people felt and thought about children and the accoutrements of childhood, including books and toys, were implicated in this change” (Lewis). In seeking to understand the relationships between media (e.g. books and toys), genres (e.g. novels and picture books), and modes of subjectivity, Marx’s influential theory of commodity fetishism, whereby “a definite social relation between men, that assumes, in their eyes, the fantastic form of a relation between things”, has served as a productive tool of analysis. The extent to which Marx’s account of commodity fetishism continues to be of use becomes clear when the corollaries between the late eighteenth-century emergence of novels and pictures books as technologies of subjectivity and the early twenty-first century emergence of e-readers and digital texts as technologies of subjectivity are considered. This paper considers the literary technology of Apple’s iPad (first launched in 2010) as a commodity fetish, and the circulation of “apps” as texts made available by and offered as justifications for, this fetish object. The iPad is both book and toy, but is never “only” either; it is arguably a new technology of subjectivity which incorporates but also destabilises categories of reading and playing such as those made familiar by earlier technologies of literature and the self. The particular focus of this paper is on the multimodal versions (app, film, and picture book) of The Fantastic Flying Books of Mr. Morris Lessmore, which are understood here as a narrativisation of commodity fetishism, subjectivity, and the act of reading itself.
Resumo:
Advances in mobile telephone technology and available dermoscopic attachments for mobile telephones have created a unique opportunity for consumer-initiated mobile teledermoscopy. At least 2 companies market a dermoscope attachment for an iPhone (Apple), forming a mobile teledermoscope. These devices and the corresponding software applications (apps) enable (1) lesion magnification (at least ×20) and visualization with polarized light; (2) photographic documentation using the telephone camera; (3) lesion measurement (ruler); (4) adding of image and lesion details; and (5) e-mail data to a teledermatologist for review. For lesion assessment, the asymmetry-color (AC) rule has 94% sensitivity and 62 specificity for melanoma identification by consumers [1]. Thus, consumers can be educated to recognize asymmetry and color patterns in suspect lesions. However, we know little about consumers' use of mobile teledermoscopy for lesion assessment.
Resumo:
Previous research has shown that mobile phone use while driving can increase crash risk fourfold while texting results in 23 times greater crash risk for heavy vehicle drivers. However, mobile phone use has changed in recent years with the functional capabilities of smart phones to now also include a range of other common behaviours while driving such as using Facebook, emailing, the use of ‘apps’, and GPS. Research continues to show performance decrements for many such behaviours while driving, however many Australians still openly admit to illegal mobile phone use while driving despite ongoing enforcement efforts and public awareness campaigns. Of most concern are young drivers. ‘Apps’ available to restrict mobile phone use while in motion do not prevent use while a driver is stopped at traffic lights, so are therefore not a wholly viable solution. Vehicle manufacturers continue to develop in-vehicle technology to minimise distraction, however communication with the ‘outside world’ while driving is also perhaps a strong selling point for vehicles. Hence, the safety message that drivers should focus on the driving task solely and not use communication devices is unlikely to ever be internalised by many drivers. This paper reviews the available literature on the topic and argues that a better understanding of perceptions of mobile phone use while driving and motives for use are required to inform public awareness campaign development for specific road user groups. Additionally, illegal phone use while driving may be reinforced by not being apprehended (punishment avoidance), therefore stronger deterrence-focussed messages may also be beneficial.
Resumo:
This study models the joint production of desirable and undesirable output production (that is, CO2 emissions) of airlines. The Malmquist-Luenberger productivity index is employed to measure productivity growth when undesirable output production is regulated and unregulated. The results show that pollution abatement activities of airlines lowers productivity growth which suggests the traditional approach of measuring productivity growth, which ignores CO2 emissions, overstate "true" productivity growth.