808 research outputs found

    Usability and Security in Medication. Administration Applications

    Get PDF
    The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicinechart. This process can be very strenuous and error-prone, given the number of sub-tasksinvolved in the entire workflow and the dynamic nature of the work environment.Therefore, efforts are being made to digitalise the medication dispensation process byintroducing a mobile application called Smart Dosing application. The introduction ofthe Smart Dosing application into hospital workflow raises security concerns and callsfor security requirement analysis. This thesis is written as a part of the smart medication management project at EmbeddedSystems Laboratory, A˚bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive state-of-the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.Siirretty Doriast

    Next Generation Bike Sharing Design Concept using axiomatic design theory

    Get PDF
    Bike sharing systems have been in use since the 1960’s, from the modest beginning to one of the fastest spreading services today. Each generation of bike sharing systems had its challenges, but the advancement in technology was and is a key factor in eliminating any short comings or problem facing it as well as opening new opportunities for enhancing the service and the user experience. The main focus of this thesis is to propose a new design concept of bike sharing system using axiomatic design theory, the concept consist of a modified bike sharing model that can help solve some of the challenges faced by the traditional models while meeting the customer’s needs and the basic functional requirements of a traditional bake sharing program. Axiomatic design theory provides a method for the design of products, it makes it possible to design structure and decompose function at the same time. Utilizing currently available technologies such as electrical components and global positioning systems, the new system will include a new design for the bike, the docking station, central control station, and payment systems.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Next Generation Bike Sharing Design Concept using axiomatic design theory

    Get PDF
    Bike sharing systems have been in use since the 1960’s, from the modest beginning to one of the fastest spreading services today. Each generation of bike sharing systems had its challenges, but the advancement in technology was and is a key factor in eliminating any short comings or problem facing it as well as opening new opportunities for enhancing the service and the user experience. The main focus of this thesis is to propose a new design concept of bike sharing system using axiomatic design theory, the concept consist of a modified bike sharing model that can help solve some of the challenges faced by the traditional models while meeting the customer’s needs and the basic functional requirements of a traditional bake sharing program. Axiomatic design theory provides a method for the design of products, it makes it possible to design structure and decompose function at the same time. Utilizing currently available technologies such as electrical components and global positioning systems, the new system will include a new design for the bike, the docking station, central control station, and payment systems.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Design and implementation of face recognition-based door access control system

    Get PDF
    Capstone Project submitted to the Department of Engineering, Ashesi University in partial fulfillment of the requirements for the award of Bachelor of Science degree in Computer Engineering, May 2020With recent dramatic development in the field of artificial intelligence (AI), smart access control has become crucial part of our modern everyday lives. This paper presents a door security system designed to prevent trespassing in a highly secure areas like home environment. The implemented system is cheaper and more reliable for intruder detection and door security. The door access is solely based on face recognition to ensure that only authorized individuals go through the door. The principle on which face recognition works is that the sysadmin defines an individual or a group of individuals who are allowed to enter the area, a room or a building, through a door, a gate, or any physical barrier. Thus, the access is limited to these individuals. Faces of authorized individuals are captured, stored, and trained by the system, and a real-time face is captured and matched against the ones of authorized individuals to identify the individual gaining access through the door after which the access is granted if that individual is authorized and denied otherwise. Haar-based cascade classifier was used for face detection while Local Binary Pattern Histograms (LBPH) algorithm was used for face recognition. 150 faces of individual were captured and trained after which real-time faces were tested on the system to determine the accuracy. The implemented recognition system achieved a recognition or accuracy rate of 88.6%. Notification has been achieved, using Simple Mail Transfer Protocol (SMTP), by sending emails to the sysadmin in case of any successful or unsuccessful attempt to gain access through the door. Python’s Open Source Computer Vision (OpenCV) library was used for face recognition. The implemented system is cheap, user-friendly, and reliable.Ashesi Universit
    corecore