137 research outputs found

    Re-imagining commonly used mobile interfaces for older adults

    Get PDF
    Many countries have an increasingly ageing population. In recent years, mobile technologies have had a massive impact on social and working lives. As the size of the older user population rises, many people will want to continue professional, social and lifestyle usage of mobiles into 70s and beyond. Mobile technologies can lead to increased community involvement and personal independence. While mobile technologies can provide many opportunities, the ageing process can interfere with their use. This workshop brings together researchers who are re-imagining common mobile interfaces so that they are more suited to use by older adults

    Mobile health information system: a mobile app. to aid health workers relate health information.

    Get PDF
    Healthcare is conventionally regarded as an important determinant in promoting the general health and wellbeing of peoples around the world. And in doing this, health education and information plays a major role, because it is a reliable medium and the most effective way to reduce morbidity and mortality in developing countries. We need to deliver vital messages and information to people at the lower quarter of the society, this information can be used for changing behaviors’ and practices, and this in turn can save and protect lives. It is in this context that the use of mobile phones in delivering vital health information and effective fieldwork reporting is of significance. This project seeks to use the availability of mobile service across the urban and rural areas to benefit healthcare.KEY WORDS: Health Information System; Mobile Health Information System, Medical Informatio

    Context-aware mobile applications design: implications and challeges for a new indusy

    Get PDF
    Context-aware computing is slowly becoming the new mobile paradigm in which applications can discover and use information “out and about”. Typical sources of knowledge about context are the device’s location, data about the environment at large, the mobile device’s prior activity log and even the user’s biometrics. The mobile industry agrees that this paradigm improves the appeal and value of applications by personalising and adapting them to the context in which they run. However, capturing contextual information and processing it to enhance or create a new application is a daunting task: it involves scattered systems and infrastructures and an increasingly wide array of heterogeneous data, architectures and technological tools. In this paper, we explore and analyse existing mobile context-aware applications and the proposed frameworks that enable them. The paper aims to clarify the echnological choices behind context-aware mobile applications and the challenges that still remain ahead for this area to fulfil the promises it offers

    RF Localization in Indoor Environment

    Get PDF
    In this paper indoor localization system based on the RF power measurements of the Received Signal Strength (RSS) in WLAN environment is presented. Today, the most viable solution for localization is the RSS fingerprinting based approach, where in order to establish a relationship between RSS values and location, different machine learning approaches are used. The advantage of this approach based on WLAN technology is that it does not need new infrastructure (it reuses already and widely deployed equipment), and the RSS measurement is part of the normal operating mode of wireless equipment. We derive the Cramer-Rao Lower Bound (CRLB) of localization accuracy for RSS measurements. In analysis of the bound we give insight in localization performance and deployment issues of a localization system, which could help designing an efficient localization system. To compare different machine learning approaches we developed a localization system based on an artificial neural network, k-nearest neighbors, probabilistic method based on the Gaussian kernel and the histogram method. We tested the developed system in real world WLAN indoor environment, where realistic RSS measurements were collected. Experimental comparison of the results has been investigated and average location estimation error of around 2 meters was obtained

    A peer to peer approach to large scale information monitoring

    Get PDF
    Issued as final reportNational Science Foundation (U.S.

    Mobile network anomaly detection and mitigation: The NEMESYS approach

    Get PDF
    Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and eliminate or mitigate their effects, as part of the EU FP7 NEMESYS project. These ideas are supplemented with a careful review of the state-of-the-art regarding anomaly detection techniques that mobile network operators may use to protect their infrastructure and secure users against malware

    Effectiveness of Reconfigurable Intelligent Surfaces to Enhance Connectivity in UAV Networks

    Full text link
    Reconfigurable intelligent surfaces (RISs) are expected to make future 6G networks more connected and resilient against node failures, due to their ability to introduce controllable phase-shifts onto impinging electromagnetic waves and impose link redundancy. Meanwhile, unmanned aerial vehicles (UAVs) are prone to failure due to limited energy, random failures, or targeted failures, which causes network disintegration that results in information delivery loss. In this paper, we show that the integration between UAVs and RISs for improving network connectivity is crucial. We utilize RISs to provide path diversity and alternative connectivity options for information flow from user equipments (UEs) to less critical UAVs by adding more links to the network, thereby making the network more resilient and connected. To that end, we first define the criticality of UAV nodes, which reflects the importance of some nodes over other nodes. We then employ the algebraic connectivity metric, which is adjusted by the reflected links of the RISs and their criticality weights, to formulate the problem of maximizing the network connectivity. Such problem is a computationally expensive combinatorial optimization. To tackle this problem, we propose a relaxation method such that the discrete scheduling constraint of the problem is relaxed and becomes continuous. Leveraging this, we propose two efficient solutions, namely semi-definite programming (SDP) optimization and perturbation heuristic, which both solve the problem in polynomial time. For the perturbation heuristic, we derive the lower and upper bounds of the algebraic connectivity obtained by adding new links to the network. Finally, we corroborate the effectiveness of the proposed solutions through extensive simulation experiments.Comment: 14 pages, 8 figures, journal paper. arXiv admin note: text overlap with arXiv:2308.0467

    Improvement and Performance Evaluation for Multimedia Files Transmission in Vehicle-Based DTNs

    Get PDF
    In recent years, P2P file sharing has been widely embraced and becomes the largest application of the Internet traffic. And thedevelopment of automobile industry has promoted a trend of deploying Peer-to-Peer (P2P) networks over vehicle ad hoc networks(VANETs) for mobile content distribution. Due to the high mobility of nodes, nodes’ limited radio transmission range and sparsedistribution, VANETs are divided and links are interrupted intermittently. At this moment, VANETs may become Vehicle-basedDelay Tolerant Network (VDTNs). Therefore, this work proposes an Optimal Fragmentation-based Multimedia Transmissionscheme (OFMT) based on P2P lookup protocol in VDTNs, which can enable multimedia files to be sent to the receiver fast andreliably in wireless mobile P2P networks over VDTNs. In addition, a method of calculating the most suitable size of the fragmentis provided, which is tested and verified in the simulation. And we also show that OFMT can defend a certain degree of DoS attackand senders can freely join and leave the wireless mobile P2P network. Simulation results demonstrate that the proposed schemecan significantly improve the performance of the file delivery rate and shorten the file delivery delay compared with the existingschemes
    corecore