992 resultados para Mobile home parks.
Resumo:
En la primera part, de manera molt sintètica, s’indica que l’interès per l’activitat lúdica es desenvolupa sobretot a partir de la curiositat que desperta la infància en el segle XIX, la qual comença a considerar-se com un estat diferenciat de l’adult. Acostar-se al món infantil significà ocupar-se d’una de les activitats principals i primordials que desenvolupen els infants: el joc. D’aquesta manera fou com començarien a desplegar-se, des de perspectives diverses, variades teories explicatives en torn d’aquest fenomen. En l’abordatge d’aquest objecte d’estudi, però, els fruits han estat escassos i som lluny de trobar una teoria explicativa general. En aquest article, resseguint Huizinga, intentem acostar-nos a una definició en torn del joc a partir de considerar diversos dels elements constitutius de la seva essència. No obstant això, cal ser conscients que el joc no es deixa aprehendre amb facilitat, sobretot si aquesta aproximació a l’homo ludens no s’efectua des de la seva dimensió bio-psico-social. Per això el monogràfic té un caràcter multidisciplinari. La segona part d’aquest article té com a finalitat presentar cadascun dels tretze escrits, sabedors que, a pesar de significar interessants aportacions a l’estudi del joc, els articles no esgoten el discurs que es desplega quan estem interessats a fixar la nostra atenció en l’home que juga.
Resumo:
The Medicaid Home and Community Based Services (HCBS) Elderly Waiver program provides assistance to qualified individuals who are 65 or older and prefer to stay in their own home or another community setting when needing long-term health care services. The Elderly Waiver program provides services and support to older Iowans who are medically qualified for the level of care provided at a nursing facility but do not wish to live in a nursing home. The program allows older Iowans to age in environments that are familiar and comfortable, while saving money from expensive nursing home costs.
Resumo:
This paper introduces a qualitative case study on mobile communication among the older population (60+ years old) conducted in Great Los Angeles (CA, USA) in autumn 2011. Methodology, fieldwork and preliminary results are discussed.Before, country-level data is presented to better understand the specific characteristics of the studied individuals. The section focus is on demographics and on acceptance and use of information and communication technologies (ICT).Preliminary results show that within the sample under study (20 individuals) there is a high number of mobile phone users (15) while among non-mobile users (5), three of them decide to stop using this technology. A majority of mobile phone adopters describe a very limited use of the device for everyday life communications. Finally,while Internet is really popular within the sample (14 users), just 3 individuals go online through their mobile telephone.
Resumo:
This paper explores the distinctive characteristics of mobile telephone use among the elderly population using the most recent European country-level data on individual use of mobile telephony and advanced mobile services, Eurostat 2008. Through a cluster analysis of mobile phone use data across 30 countries, it is possible to confirm that mobile telephone occupies a peripheral position for the elderly in Europe.
Resumo:
We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.
Resumo:
By means of a qualitative approach I bring insights on the relationship older people (60+) have with mobile communication in a low income district of Lima (Peru). The case study I conducted in September 2013 included interviews and one focus group with 20 inhabitants of San Juan de Miraflores district. The user/non-user dichotomous classification turned out to be too narrow in this context. While some participants reported a common, bidirectional use of the device, restrictions and discontinuities played a role. Some described an asymmetric use of the mobile phone, as they used it exclusively for receiving calls, while never making outgoing calls. Others described discontinuities in ownership, which was the case when their mobile was stolen and they could not replace it immediately. My initial hypothesis is that such restrictions are related to income, skills and age.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.
Resumo:
Peer-reviewed
Resumo:
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.
Resumo:
BACKGROUND: Current bilevel positive-pressure ventilators for home noninvasive ventilation (NIV) provide physicians with software that records items important for patient monitoring, such as compliance, tidal volume (Vt), and leaks. However, to our knowledge, the validity of this information has not yet been independently assessed. METHODS: Testing was done for seven home ventilators on a bench model adapted to simulate NIV and generate unintentional leaks (ie, other than of the mask exhalation valve). Five levels of leaks were simulated using a computer-driven solenoid valve (0-60 L/min) at different levels of inspiratory pressure (15 and 25 cm H(2)O) and at a fixed expiratory pressure (5 cm H(2)O), for a total of 10 conditions. Bench data were compared with results retrieved from ventilator software for leaks and Vt. RESULTS: For assessing leaks, three of the devices tested were highly reliable, with a small bias (0.3-0.9 L/min), narrow limits of agreement (LA), and high correlations (R(2), 0.993-0.997) when comparing ventilator software and bench results; conversely, for four ventilators, bias ranged from -6.0 L/min to -25.9 L/min, exceeding -10 L/min for two devices, with wide LA and lower correlations (R(2), 0.70-0.98). Bias for leaks increased markedly with the importance of leaks in three devices. Vt was underestimated by all devices, and bias (range, 66-236 mL) increased with higher insufflation pressures. Only two devices had a bias < 100 mL, with all testing conditions considered. CONCLUSIONS: Physicians monitoring patients who use home ventilation must be aware of differences in the estimation of leaks and Vt by ventilator software. Also, leaks are reported in different ways according to the device used.