647 resultados para Mobile Telephone


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study compared the outcome of total knee replacement (TKR) in adult patients with fixed- and mobile-bearing prostheses during the first post-operative year and at five years' follow-up, using gait parameters as a new objective measure. This double-blind randomised controlled clinical trial included 55 patients with mobile-bearing (n = 26) and fixed-bearing (n = 29) prostheses of the same design, evaluated pre-operatively and post-operatively at six weeks, three months, six months, one year and five years. Each participant undertook two walking trials of 30 m and completed the EuroQol questionnaire, Western Ontario and McMaster Universities osteoarthritis index, Knee Society score, and visual analogue scales for pain and stiffness. Gait analysis was performed using five miniature angular rate sensors mounted on the trunk (sacrum), each thigh and calf. The study population was divided into two groups according to age (≤ 70 years versus > 70 years). Improvements in most gait parameters at five years' follow-up were greater for fixed-bearing TKRs in older patients (> 70 years), and greater for mobile-bearing TKRs in younger patients (≤ 70 years). These findings should be confirmed by an extended age controlled study, as the ideal choice of prosthesis might depend on the age of the patient at the time of surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With inflation, there is no longer a completely adequate budget for highway construction and maintenance. Restricted budgets have generated development and implementation of pavement management programs. A need for management guidelines generated National Cooperative Highway Research Program Synthesis of Highway Practice 84, "Evaluation Criteria and Priority Setting for State Highway Programs". Traffic volumes and present conditions are two major factors in determining the priority of a proposed highway improvement. The Iowa DOT, Highway Division, Office of Materials has been conducting pavement condition inventory surveys on a three-year frequency since 1969 as input for pavement management. Development of substantial wheel rutting on paved roadways results in a potential hazard to highway safety. During periods of rain, these water-filled ruts may cause hydroplaning and loss of vehicle control. It is, therefore, imparitive that Iowa roadways be continually monitored for rut depths and further that this data be used in a pavement management program to determine priorities for rehabilitation or resurfacing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Remote control systems are a very useful element to control and monitor devices quickly and easily. This paper proposes a new architecture for remote control of Android mobile devices, analyzing the different alternatives and seeking the optimal solution in each case. Although the area of remote control, in case of mobile devices, has been little explored, it may provide important advantages for testing software and hardware developments in several real devices. It can also allow an efficient management of various devices of different types, perform forensic security tasks, etc ... The main idea behind the proposed architecture was the design of a system to be used as a platform which provides the services needed to perform remote control of mobile devices. As a result of this research, a proof of concept was implemented. An Android application running a group of server programs on the device, connected to the network or USB interface, depending on availability. This servers can be controlled through a small client written in Java and runnable both on desktop and web systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes preliminary results of a qualitative case study on mobile communication conducted in an elders¿ retirement home in Toronto (Ontario, Canada) in May 2012. This is part of an international research project on the relationship between mobile communications and older people.Secondary data at a Canadian level contextualizes the case study. We focus ondemographic characteristics and on adoption and use of information and communication technologies (ICTs) broken by age.Participants in the study (21 individuals) are between 75 and 98 years of age, thereforewe can consider that the gathered evidence refers to the ¿old¿ older. Mobile phoneusers in the sample describe very specific uses of the mobile phone, while non-usersreport not facing external pressures for adopting that technology. The main channel formediated communication is the landline; in consequences mobile phones ¿when used¿ constitute an extra layer of communication. Finally, when members of the personal network of the individuals live abroad they are more prone to use Internet and Skype. We are also able to find ex-users of both mobile telephony and computers/internet who stopped using these technologies because they did not find any use for them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

By means of a qualitative approach I bring insights on the relationship older people (60+) have with mobile communication in a low income district of Lima (Peru). The case study I conducted in September 2013 included interviews and one focus group with 20 inhabitants of San Juan de Miraflores district. The user/non-user dichotomous classification turned out to be too narrow in this context. While some participants reported a common, bidirectional use of the device, restrictions and discontinuities played a role. Some described an asymmetric use of the mobile phone, as they used it exclusively for receiving calls, while never making outgoing calls. Others described discontinuities in ownership, which was the case when their mobile was stolen and they could not replace it immediately. My initial hypothesis is that such restrictions are related to income, skills and age.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.