1,904 research outputs found

    Exploring Health Information Using WAP Technology: Maternity and Children Guide

    Get PDF
    The present study attempts to investigate WAP based application for pregnancy and after the birth of the baby. The system highlights the development of the fetus to the pregnant mother and the required physical exercises that the mother should go through during pregnancy. The system also provides information regarding the child’s immunization which can be stored for future reference or course of action. This entire information is made available to the mothers through their mobile devices throughout the process. The system is evaluated by enabling selected respondents to test drive the developed prototype. The findings show that the respondents consider the benefit, usefulness, and ease of use of the Maternity and Children Guide (MCG)

    A conceptual service oriented architecture framework for integrated flood management

    Get PDF
    Service oriented architecture (SOA) is a platform and language-independent that guide different services to work together in order to perform business process.The benefits of using SOA such as interoperability, discoverability, loose coupling, flexibility and reliability have led previous researchers to use it as their fundamental basis in designing their software architecture framework.Previous researchers also have exploit SOA and implement it into flood management domain to manage the complex systems that are distributed across the network.However, previous works do not provide the detail process of emergency management into their flood management framework.Therefore, this study aims to propose a conceptual SOA framework for an integrated flood management (IFM) in order to increase the effectiveness and efficiency of managing flood.Furthermore the feasibility of using SOA and the required process of flood management in order to construct the conceptual framework are being investigated by means of a comparative study.In addition, this study also suggests the Service oriented architecture Modeling Language (SoaML) as a technique to model the services for anIFM

    A case studies approach to the analysis of profiling and framing structures for pervasive information systems

    Get PDF
    Model-Based/Driven Development (MDD) constitutes an approach to software design and development that potentially contributes to: concepts closer to domain and reduction of semantic gaps; automation and less sensitivity to technological changes; capture of expert knowledge and reuse. The widespread adoption of pervasive technologies as basis for new systems and applications, lead to the need of effectively design pervasive information systems that properly fulfil the goals they were designed for. This paper presents a profiling and framing structure approach for the development of Pervasive Information Systems (PIS). This profiling and framing structure allows the organization of the functionality that can be assigned to computational devices in a system and of the corresponding development structures and models, being. The proposed approach enables a structural approach to PIS development. The paper also presents two case studies that allowed demonstrating the applicability of the approach.Fundação para a Ciência e a Tecnologia (FCT

    A Threat Table Based Approach to Telemedicine Security

    Get PDF
    Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper presents a high level analysis of a telemedicine application in order to better understand the security threats to this unique and vulnerable environment. This risk analysis is performed using the concept of threat tables. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, we present a threat modeling framework utilizing a table driven approach. Our analysis reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats

    Interoperability of Enterprise Software and Applications

    Get PDF
    • …
    corecore