40,080 research outputs found
Impact of Mobile and Wireless Technology on Healthcare Delivery services
Modern healthcare delivery services embrace the use of leading edge technologies and new
scientific discoveries to enable better cures for diseases and better means to enable early
detection of most life-threatening diseases. The healthcare industry is finding itself in a
state of turbulence and flux. The major innovations lie with the use of information
technologies and particularly, the adoption of mobile and wireless applications in
healthcare delivery [1]. Wireless devices are becoming increasingly popular across the
healthcare field, enabling caregivers to review patient records and test results, enter
diagnosis information during patient visits and consult drug formularies, all without the
need for a wired network connection [2]. A pioneering medical-grade, wireless
infrastructure supports complete mobility throughout the full continuum of healthcare
delivery. It facilitates the accurate collection and the immediate dissemination of patient
information to physicians and other healthcare care professionals at the time of clinical
decision-making, thereby ensuring timely, safe, and effective patient care. This paper
investigates the wireless technologies that can be used for medical applications, and the
effectiveness of such wireless solutions in a healthcare environment. It discusses challenges
encountered; and concludes by providing recommendations on policies and standards for
the use of such technologies within hospitals
A Concurrency Control Method Based on Commitment Ordering in Mobile Databases
Disconnection of mobile clients from server, in an unclear time and for an
unknown duration, due to mobility of mobile clients, is the most important
challenges for concurrency control in mobile database with client-server model.
Applying pessimistic common classic methods of concurrency control (like 2pl)
in mobile database leads to long duration blocking and increasing waiting time
of transactions. Because of high rate of aborting transactions, optimistic
methods aren`t appropriate in mobile database. In this article, OPCOT
concurrency control algorithm is introduced based on optimistic concurrency
control method. Reducing communications between mobile client and server,
decreasing blocking rate and deadlock of transactions, and increasing
concurrency degree are the most important motivation of using optimistic method
as the basis method of OPCOT algorithm. To reduce abortion rate of
transactions, in execution time of transactions` operators a timestamp is
assigned to them. In other to checking commitment ordering property of
scheduler, the assigned timestamp is used in server on time of commitment. In
this article, serializability of OPCOT algorithm scheduler has been proved by
using serializability graph. Results of evaluating simulation show that OPCOT
algorithm decreases abortion rate and waiting time of transactions in compare
to 2pl and optimistic algorithms.Comment: 15 pages, 13 figures, Journal: International Journal of Database
Management Systems (IJDMS
Security Implications of Fog Computing on the Internet of Things
Recently, the use of IoT devices and sensors has been rapidly increased which
also caused data generation (information and logs), bandwidth usage, and
related phenomena to be increased. To our best knowledge, a standard definition
for the integration of fog computing with IoT is emerging now. This integration
will bring many opportunities for the researchers, especially while building
cyber-security related solutions. In this study, we surveyed about the
integration of fog computing with IoT and its implications. Our goal was to
find out and emphasize problems, specifically security related problems that
arise with the employment of fog computing by IoT. According to our findings,
although this integration seems to be non-trivial and complicated, it has more
benefits than the implications.Comment: 5 pages, conference paper, to appear in Proceedings of the ICCE 2019,
IEEE 37th International Conference on Consumer Electronics (ICCE), Jan 11-
13, 2019, Las Vegas, NV, US
Incentives in peer-to-peer and grid networking
Today, most peer-to-peer networks are based on the assumptionthat the participating nodes are cooperative. Thisworks if the nodes are indifferent or ignorant about the resourcesthey offer, but limits the usability of peer-to-peernetworks to very few scenarios. It specifically excludes theirusage in any non-cooperative peer-to-peer environment, beit Grid networks or mobile ad-hoc networks. By introducingsoft incentives to offer resources to other nodes, we seean overall performance gain in traditional file-sharing networks.We also see soft incentives promoting the convergenceof peer-to-peer and Grid networks, as they increasethe predictability of the participating nodes, and thereforethe reliability of the services provided by the system as awhole. Reliability is what is required by Grid networks, butmissing in peer-to-peer networks
- …