1,219 research outputs found

    Potential of mobile applications in human-centric production and logistics management

    Get PDF
    With the increasing market penetration of smart devices (smartphones, smartwatches, and tablets), various mobile applications (apps) have been developed to fulfill tasks in daily life. Recently, efforts have been made to develop apps to support human operators in industrial work. When apps installed on commercial devices are utilized, tasks that were formerly done purely manually or with the help of investment-intensive specific devices can be performed more efficiently and/or at a lower cost and with reduced errors. Despite their advantages, smart devices have limitations because embedded sensors (e.g., accelerometers) and components (e.g., cameras) are usually designed for nonindustrial use. Hence, validation experiments and case studies for industrial applications are needed to ensure the reliability of app usage. In this study, a systematic literature review was employed to identify the state of knowledge about the use of mobile apps in production and logistics management. The results show how apps can support human centricity based on the enabling technologies and components of smart devices. An outlook for future research and applications is provided, including the need for proper validation studies to ensure the diversity and reliability of apps and more research on psychosocial aspects of human-technology interaction

    Strategies for Health Research: Lessons from 3 Mobile Intervention Studies

    Get PDF
    The capacity of Mobile Health (mHealth) technologies to propel healthcare forward is directly linked to the quality of mobile interventions developed through careful mHealth research. mHealth research entails several unique characteristics, including collaboration with technologists at all phases of a project, reliance on regional telecommunication infrastructure and commercial mobile service providers, and deployment and evaluation of interventions in the wild , with participants using mobile tools in uncontrolled environments. In the current paper, we summarize the lessons our multi-institutional/multi-disciplinary team has learned conducting a range of mHealth projects using mobile phones with diverse clinical populations. First, we describe three ongoing projects that we draw from to illustrate throughout the paper. We then provide an example for multidisciplinary teamwork and conceptual mHealth intervention development that we found to be particularly useful. Finally, we discuss mHealth research challenges (i.e. evolving technology, mobile phone selection, user characteristics, the deployment environment, and mHealth system bugs and glitches ), and provide recommendations for identifying and resolving barriers, or preventing their occurrence altogether

    Continuity in Multi-Device Interaction:An Online Study

    Get PDF

    The Best Doggone App Since Instagram: Experiences with the iOS SDK

    Get PDF
    Many dogs don’t get enough exercise and people may be unaware of great hiking locations in their neighborhood. Paw Parks iOS mobile application (app) was created to raise awareness of pet friendly locations and encourage dog lovers to be more active with their pets. Paw Parks uses GPS to obtain the user’s current location and displays a map with pins indicating nearby parks. The user can click on the park and see a park description, amenities list, photos, reviews, and can even log a visit. The user can also leave a review or comment on the park, mark the park as a favorite, and edit park information. If the user’s favorite dog friendly area is not available on the map, they can easily add it. Paw Parks is a crowdsourced application that relies on users entering park data. Paws Parks includes a user profile area where the user can enter their dog(s) and dog’s profiles along with notes on their favorite food, birthday, and photo. In the profile area, the users will see a collection of all the photos they have posted, their history of check-ins, and quick links to their favorite parks. One challenge of this application is to get users to add data so the app is more useful. However, the love most dog owners have for their pets and social media features make Paw Parks an app that is expected to maintain an active user base. In addition, gamification components are included to encourage interaction and data input. The user with the most check- ins becomes Top Dog of the park and has their profile image, name, and number of check-ins displayed on the park. Each photo also has a number indicating the number of likes it has received. Many times application development is specific to company use, which can be either confidential or too obscure for family and friends to interact with the application. Mobile application development is unique from other application development since smartphones are widespread and common making it fun and easy to share, which allows you to involve your friends and family. With an idea for a new app, persistence and dedication to learn, anybody could be an iOS mobile application developer

    Debatable issues in automated ECG reporting

    Get PDF
    Although automated ECG analysis has been available for many years, there are some aspects which require to be re-assessed with respect to their value while newer techniques which are worthy of review are beginning to find their way into routine use. At the annual International Society of Computerized Electrocardiology conference held in April 2017, four areas in particular were debated. These were a) automated 12 lead resting ECG analysis; b) real time out of hospital ECG monitoring; c) ECG imaging; and d) single channel ECG rhythm interpretation. One speaker presented the positive aspects of each technique and another outlined the more negative aspects. Debate ensued. There were many positives set out for each technique but equally, more negative features were not in short supply, particularly for out of hospital ECG monitoring

    A methodology for obtaining More Realistic Cross-Layer QoS Measurements in mobile networks: A VoIP over LTE Use Case

    Get PDF
    Los servicios de voz han sido durante mucho tiempo la primera fuente de ingresos para los operadores móviles. Incluso con el protagonismo creciente del tráfico de datos, los servicios de voz seguirán jugando un papel importante y no desaparecerán con la transición a redes basadas en el protocolo IP. Por otra parte, hace años que los principales actores en la industria móvil detectaron claramente que los usuarios no aceptarían una degradación en la calidad de los servicios de voz. Es por esto que resulta crítico garantizar la experiencia de usuario (QoE) en la transición a redes de nueva generación basadas en conmutación de paquetes. El trabajo realizado durante esta tesis ha buscado analizar el comportamiento y las dependencias de los diferentes servicios de Voz sobre IP (VoIP), así como identificar configuraciones óptimas, mejoras potenciales y metodologías que permitan asegurar niveles de calidad aceptables al mismo tiempo que se trate de minimizar los costes. La caracterización del rendimiento del tráfico de datos en redes móviles desde el punto de vista de los usuarios finales es un proceso costoso que implica la monitorización y análisis de un amplio rango de protocolos y parámetros con complejas dependencias. Para abordar desde la raíz este problema, se requiere realizar medidas que relacionen y correlen el comportamiento de las diferentes capas. La metodología de caracterización propuesta en esta tesis proporciona la posibilidad de recoger información clave para la resolución de problemas en las comunicaciones IP, relaciolándola con efectos asociados a la propagación radio, como cambios de celda o pérdida de enlaces, o con carga de la red y limitaciones de recursos en zonas geográficas específicas. Dicha metodología se sustenta en la utilización de herramientas nativas de monitorización y registro de información en smartphones, y la aplicación de cadenas de herramientas para la experimentación extensiva tanto en redes reales y como en entornos de prueba controlados. Con los resultados proporcionados por esta serie de herramientas, tanto operadores móviles y proveedores de servicio como desarrolladores móviles podrían ganar acceso a información sobre la experiencia real del usuario y sobre cómo mejorar la cobertura, optimizar los servicios y adaptar el funcionamiento de las aplicaciones y el uso de protocolos móviles basados en IP en este contexto. Las principales contribuciones de las herramientas y métodos introducidos en esta tesis son los siguientes: - Una herramienta de monitorización multicapa para smartphones Android, llamada TestelDroid, que permite la captura de indicadores clave de rendimiento desde el propio equipo de usuario. Asimismo proporciona la capacidad de generar tráfico de forma activa y de verificar el estado de alcanzabilidad del terminal, realizando pruebas de conectividad. - Una metodología de post-procesado para correlar la información presente en las diferentes capas de las medidas realizadas. De igual forma, se proporciona la opción a los usuarios de acceder directamente a la información sobre el tráfico IP y las medidas radio y de aplicar metodologías propias para la obtención de métricas. - Se ha realizado la aplicación de la metodología y de las herramientas usando como caso de uso el estudio y evaluación del rendimiento de las comunicaciones basadas en IP a bordo de trenes de alta velocidad. - Se ha contribuido a la creación de un entorno de prueba realista y altamente configurable para la realización de experimentos avanzados sobre LTE. - Se han detectado posibles sinergias en la utilización de instrumentación avanzada de I+D en el campo de las comunicaciones móviles, tanto para la enseñanza como para la investigación en un entorno universitario

    Strategically Addressing the Latest Challenges of Workplace Mobility to Meet the Increasing Mobile Usage Demands

    Get PDF
    During this post-PC era, many organizations are embracing the concept of IT consumerization/ Bring-Your-Own Device (BYOD) in their workplace. BYOD is a strategy that enables employees to utilize their personally-owned mobile devices, such as smart phones, tablets, laptops, and netbooks, to connect to the corporate network and access enterprise data. It is estimated that employees will bring two to four Internet-capable devices to work for personal and professional activities. From increased employee satisfaction and productivity to lower IT equipment and operational expenditures, companies have recognized that mobile devices are reasonably essential to their own success. However, many organizations are facing significant challenges with the explosion of mobile devices being used today along with provisioning the appropriate supporting infrastructure due to the unprecedented demands on the wireless and network infrastructures. For example, there is not only a growth in the number of wirelessly connected devices but the amount of bandwidth being consumed on the enterprise networks as well which is furthermore driven by increased usage of video and enterprise applications. Managing mobility and storage along with securing corporate assets have become difficult tasks for IT professionals as many organizations underestimate the potential security and privacy risks of using wireless devices to access organizational resources and data. Therefore, to address the needs and requirements of a new mobile workforce, organizations must involve key members from the Information Technology (IT), Human Resources (HR) and various business units to evaluate the existing and emerging issues and risks posed by BYOD. Then a mobile strategy should be developed by taking into consideration the enterprise objectives to ensure it aligns with the overall organizational strategy. There are various solutions available to address the needs and demands of an organization, such as Distributed Intelligence Architecture, network optimization, monitoring tools, unified management and security platforms, and other security measures. By implementing a suitable mobile strategy, organizations can ensure their particular enterprise network and wireless architecture is designed for highly scalability, performance and reliability. They must also evaluate their existing policies and procedures to ensure appropriate security and privacy measures are in place to address the increasing mobile usage demands and potential liability risks. By taking these factors into consideration, our team has analyzed the current BYOD issues for Educational Testing Service (ETS), which is a non-profit organization based in Princeton, New Jersey. Our findings have revealed a few major technical concerns relating to inadequate network and wireless infrastructure and the lack of a unified management and security platform. Thus, the team has recommended for ETS to implement Distributed Intelligence Architecture, network optimization and Enterprise Mobility Management (EMM) to address and resolve their current issues and risks. In conclusion, companies are beginning to seize this transition in order to become competitive and productive in the workplace; however the unprecedented demands on the corporate network and risk to data security are critical aspects that need to be evaluated on an on-going basis. With this analysis, organizations can review, evaluate and implement the proposed solutions and best practices to address the most common BYOD-related issues that companies are facing these days. However, organizations should continually research the latest technologies that may be available and implement solutions that specifically meet their issues

    Internet of Things Based Technology for Smart Home System: A Generic Framework

    Get PDF
    Internet of Things (IoT) is a technology which enables computing devices, physical and virtual objects/devices to be connected to the internet so that users can control and monitor devices. The IoT offers huge potential for development of various applications namely: e-governance, environmental monitoring, military applications, infrastructure management, industrial applications, energy management, healthcare monitoring, home automation and transport systems. In this paper, the brief overview of existing frameworks for development of IoT applications, techniques to develop smart home applications using existing IoT frameworks, and a new generic framework for the development of IoTbasedsmart home system is presented. The proposed generic framework comprises various modules such as Auto-Configuration and Management, Communication Protocol, Auto-Monitoring and Control, and Objects Access Control. The architecture of the new generic framework and the functionality of various modules in the framework are also presented. The proposed generic framework is helpful for making every house as smart house to increase the comfort of inhabitants. Each of the components of generic framework is robust in nature in providing services at any time. The components of smart home system are designed to take care of various issues such as scalability, interoperability, device adaptability, security and privacy. The proposed generic framework is designed to work on all vendor boards and variants of Linux and Windows operating system

    Reengineering the user: Privacy concerns about personal data on smartphones.

    Get PDF
    Purpose: This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed. Design/methodology/approach: The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed. Findings: The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices. Research limitations/implications: The proposed approach was evaluated through an examination of the Android’s permission model, although issues arise in other operating systems. The authors’ future intention is to conduct a user study to measure the user’s awareness and concepts surrounding privacy concerns to empirically investigate the above-mentioned suggestions. Practical implications: The proposed suggestions in this paper, if adopted in practice, could significantly improve the situation and mitigate privacy concerns of users of smart devices. Social implications: The recommendations proposed in this paper would strongly enhance the control of users over their personal data and improve their ability to distinguish legitimate apps from malware or grayware. Originality/value: This paper emphasises two shortcomings of the permissions models of mobile operating systems which, in authors’ view, have not been adequately addressed to date and propose an inherent way for apps and other entities of the mobile computing ecosystem to commit to responsible and transparent practices on mobile users’ privacy
    • …
    corecore