129 resultados para Windows Mobile


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deployment of mobile technologies and applications in health care are becoming prevalent worldwide. As mobile innovation and standards in wireless continue to evolve, so does the mobile health care information systems framework. In this paper, we explore this evolving framework by synthesising current technologies, applications, issues and examining this through the actor-network theory (ANT) which seeks to understand socio-technical change by adopting a symmetric treatment of people and technologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the seamless diffusion and acceptance of mobile phones into people's everyday life as trusted communication devices, businesses have begun exploring their potential as payment devices. In this paper, we report on the findings from a pioneering study conducted in Australia, which explored inhibitors and facilitators in the adoption of mobile phones as payment devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we develop a robust method of target/mobile agent tracking involving two independent estimators with separate measurement systems. The outputs of the two estimators are combined using simple trigonometry (post-estimation data fusion) and provide a robust and reliable tracking path. We demonstrate that through the use of recent advances in robust set-value state estimation, our robust parallel filter approach performs well even when the individual filters do not. Brief comparisons with common data fusion methods are conducted in order to demonstrate the advantages of our parallel (post-estimation fusion) approach

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile computing has enabled users to seamlessly access databases even when they are on the move. However, in the absence of readily available high-quality communication, users are often forced to operate disconnected from the network. As a result, software applications have to be redesigned to take advantage of this environment while accommodating the new challenges posed by mobility. In particular, there is a need for replication and synchronization services in order to guarantee availability of data and functionality, (including updates) in disconnected mode. To this end we propose a scalable and highly available data replication and management service. The proposed replication technique is compared with a baseline replication technique and shown to exhibit high availability, fault tolerance and minimal access times of the data and services, which are very important in an environment with low-quality communication links.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background

Epidural analgesia is the most effective labour pain relief but is associated with increased rates of instrumental vaginal delivery and other effects, which might be related to the poor motor function associated with traditional epidural. New techniques that preserve motor function could reduce obstetric intervention. We did a randomised controlled trial to compare low-dose combined spinal epidural and low-dose infusion (mobile) techniques with traditional epidural technique.
Methods

Between Feb 1, 1999, and April 30, 2000, we randomly assigned 1054 nulliparous women requesting epidural pain relief to traditional (n=353), low-dose combined spinal epidural (n=351), or low-dose infusion epidural (n=350). Primary outcome was mode of delivery, and secondary outcomes were progress of labour, efficacy of procedure, and effect on neonates. We obtained data during labour and interviewed women postnatally.
Findings

The normal vaginal delivery rate was 35·1% in the traditional epidural group, 42·7% in the low-dose combined spinal group (odds ratio 1·38 [95% CI 1·01–1·89]; p=0·04); and 42·9% in the low-dose infusion group (1·39 [1·01–1·90]; p=0·04). These differences were accounted for by a reduction in instrumental vaginal delivery. Overall, 5 min APGAR scores of 7 or less were more frequent with low-dose technique. High-level resuscitation was more frequent in the low-dose infusion group.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple distributed power control algorithm for communication systems with mobile users and unknown time-varying link gains is proposed. We prove that the proposed algorithm is exponentially converging. Furthermore, we show that the algorithm significantly outperforms the well-known Foschini and Miljanic algorithm in the case of quickly moving mobile users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile phones offer a new marketing channel, but socially there are concerns about their intrusiveness. Marketers need to understand the social etiquettes governing their use in order to exploit their value. In addition, the use of mobiles whilst driving is the cause of car accidents and is illegal in some parts of the world. A study of 893 United States, Australian and Chinese tertiary students showed that there was widespread but not universal agreement that usage was inappropriate in places of worship, classrooms and libraries or while driving a car. Australian and Chinese students were more tolerant of mobile usage than Americans in most situations, apart from use while driving. The study showed a conflict between actual driving behaviour and views on the desirability of using mobiles while driving. The persistence of talking while driving should be a concern to those who promote road safety. Use of SMS was more broadly tolerated in class and in picture theatres than was speaking on a mobile phone. The use of inbound and outbound telemarketing is limited by the social etiquettes discovered. Further research into tolerable mobile behaviour in various public and private spaces is required in order to make best use of this marketing medium.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.