• Title/Summary/Keyword: Access points

Search Result 525, Processing Time 0.023 seconds

Cancer Care Management through a Mobile Phone Health Approach: Key Considerations

  • Mohammadzadeh, Niloofar;Safdari, Reza;Rahimi, Azin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.9
    • /
    • pp.4961-4964
    • /
    • 2013
  • Greater use of mobile phone devices seems inevitable because the health industry and cancer care are facing challenges such as resource constraints, rising care costs, the need for immediate access to healthcare data of types such as audio video texts for early detection and treatment of patients and increasing remote aids in telemedicine. Physicians, in order to study the causes of cancer, detect cancer earlier, act in prevention measures, determine the effectiveness of treatment and specify the reasons for the treatment ineffectiveness, need to access accurate, comprehensive and timely cancer data. Mobile devices provide opportunities and can play an important role in consulting, diagnosis, treatment, and quick access to health information. There easy carriage make them perfect tools for healthcare providers in cancer care management. Key factors in cancer care management systems through a mobile phone health approach must be considered such as human resources, confidentiality and privacy, legal and ethical issues, appropriate ICT and provider infrastructure and costs in general aspects and interoperability, human relationships, types of mobile devices and telecommunication related points in specific aspects. The successful implementation of mobile-based systems in cancer care management will constantly face many challenges. Hence, in applying mobile cancer care, involvement of users and considering their needs in all phases of project, providing adequate bandwidth, preparation of standard tools that provide maximum mobility and flexibility for users, decreasing obstacles to interrupt network communications, and using suitable communication protocols are essential. It is obvious that identifying and reducing barriers and strengthening the positive points will have a significant role in appropriate planning and promoting the achievements of mobile cancer care systems. The aim of this article is to explain key points which should be considered in designing appropriate mobile health systems in cancer care as an approach for improving cancer care management.

Diligence/Indolence Management Scheme Using WiFi Access Points (와이파이 무선접근점을 이용한 근태관리 기법)

  • Jo, Hyun Joon;Park, Jin Soo;Lee, Dong Gi;Kim, Dong Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1395-1400
    • /
    • 2014
  • Diligence/Indolence records are the key data for a human resource management and the basic data to measure the salaries of the employees. However, existing mechanical or electro-magnetic diligence/indolence management systems have the problems that the systems are often incorrect or require much cost to build them. In this paper, we design and implement the diligence/indolence management system using a smart device of an employee. To measure the data of the diligence/indolence, the implemented system acquires the location data of the employee using the MAC addresses of both a smart device and access points of the WiFi and transfers the data of punching-in/out based on the acquired location to a server. The benefit of the proposed system is that it is easy for small business to use the proposed D/I management system with low cost because the system exploits smart devices and WiFi access points installed previously.

Investigation and Testing of Location Systems Using WiFi in Indoor Environments

  • Retscher, Guenther;Mok, Esmond
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.83-88
    • /
    • 2006
  • Many applications in the area of location-based services and personal navigation require nowadays the location determination of a user not only in outdoor environment but also indoor. To locate a person or object in a building, systems that use either infrared, ultrasonic or radio signals, and visible light for optical tracking have been developed. The use of WiFi for location determination has the advantage that no transmitters or receivers have to be installed in the building like in the case of infrared and ultrasonic based location systems. WiFi positioning technology adopts IEEE802.11x standard, by observing the radio signals from access points installed inside a building. These access points can be found nowadays in our daily environment, e.g. in many office buildings, public spaces and in urban areas. The principle of operation of location determination using WiFi signals is based on the measurement of the signal strengths to the surrounding available access points at a mobile terminal (e.g. PDA, notebook PC). An estimate of the location of the terminal is then obtained on the basis of these measurements and a signal propagation model inside the building. The signal propagation model can be obtained using simulations or with prior calibration measurements at known locations in an offline phase. The most common location determination approach is based on signal propagation patterns, namely WiFi fingerprinting. In this paper the underlying technology is briefly reviewed followed by an investigation of two WiFi positioning systems. Testing of the system is performed in two localization test beds, one at the Vienna University of Technology and the second at the Hong Kong Polytechnic University. First test showed that the trajectory of a moving user could be obtained with a standard deviation of about ${\pm}$ 3 m.

  • PDF

Economic Justification of the Internet Access Management (인터넷 차단 시스템의 경제성 분석에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.269-278
    • /
    • 2005
  • To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system. sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper Proves that the overall impacts of the internet access management system have a Positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.

  • PDF

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

A Study on the Cross-Reference System based on Bibliographic Relations (서지적 관계유형에 기반한 참조시스템에 관한 연구)

  • Lee Yang-Sook;Kim Tae-Soo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.65-83
    • /
    • 1999
  • This study is intended to build a cross-reference system as syndetic device to provide bibliographic relations and to collocate variant access points through references, by developing a reference record format. To this end, the method of this study are as follows: First, the roles of references, which have long been used in traditional records, have been reviewed. Second, ways in which references are depicted not only by current cataloging rules but also by authority control systems are examined. Major characteristics of the reference record are summarized as fellows: 1) If variations either of an author name or of a title are made, or any related works are published, only a single reference record is created. This record uses existing authority records, and instead of adopting authority headings, it will expand the function of the explanatory reference as well as newly implementing a relational reference which can later be used as a reference record. 2) All the variations of identical personal or group names and of lilies are dealt as one access point. In place of current 'see' and 'see also' references, not drawing lines between authority heading(1XX field), 'see'(4XX field) and 'see also' reference(5XX field), all forms of names will be simply applied to record field '1XX'. 3) Any form of data elements, which are used as access points, will be described in '1XX' which has equal value. When a need arises to explain relationships between various access points, it can be met by applying the general explanation reference-name(666 field). Similarly, when there is a need to articulate bibliographic relationships between related works, they will be suggested through the title and relational reference. 4) The title and relational reference regulates related terms that each relation type contains its field, according to each relational type, by reclassifying entire fields in order to provide direct bibliographic relation types on reference records. 5) Pointers which are connected to each access point present reference control numbers.

  • PDF

THE CANAL SYSTEM OF MANDIBULAR INCISORS (하악 절치의 근관계에 관한 연구)

  • Rhim, Eun-Mi;Choi, Ho-Young;Park, Sang-Jin;Choi, Gi-Woon
    • Restorative Dentistry and Endodontics
    • /
    • v.27 no.4
    • /
    • pp.432-440
    • /
    • 2002
  • The purpose of this study is to identificate root canal system including ideal access placement, root curvature, canal configuration, incidence of isthmus in mandibular incisors for success of endodontic treatment. 200 mandibular incisors were selected. The ideal access placement was determimed as follows. The teeth there radiographed from mesiodistal and buccolingual views using intraoral dental film. The image was divided into coronal, middle and apical third using the proximal film. Straight line access was determined by measuring the faciolingual canal width and placing points at midway point between the buccal and lingual wall at the junction of the middle and apical third and at the juntion of coronal and middle third of the root canal. A line was drawn connecting these two points extending through the crown of the tooth. The point at which the line crossed the external crown surface was recorded as facial, incisal, lingual. Degree of root curvature was determined by Schneider Protractor Method. Both section method and clearing method were used in this study. By section method, 100 mandibular incisors were embedded in clear resin and transeverse serial sectioned at 0.5, 1.0, 2.0, 3.0, 4.0, 5.0mm level from root apex. The resected surfaces were stained by methylene blue and examined under $\times$40 magnification with a stereomicroscope. By clearing method, 100 mandibular incisors were cleared in methysalicylate after decalcification with 10% nitric acid and evaluated under $\times$18 magnification with a stereomicroscope. The results were as follows ; 1. 29% had the center of the plotted straight-line access facial to incisal edge, whereas 71% had straight-line access at the incisal edge. When incisal wear classified as extensive, the straight-line access was plotted on the incisal edge 95.5%. When incisal wear classified as slight/none, the straight-line access was plotted on the facial 65.9%. 2. Degree of curvature of main canal was straight or almost straight, and only 10% in buccolingual direction had a degree of curvature greater than 20 degrees and 5.5% in mesiodistal direction had. 3. In section method, canal configuration analysis showed that 51% of the specimen classified as type I, 27% as type II, 12% as type III, 10% as type IV. For theses setions with two canals, the incidence of an isthmus was 36.7%, 64.3%, 79.2%, 96.3%, 97.4%, 97.6% at each level and highest in 3~5mm sections. 4. In clearing method, canal configuration analysis showed that 74% of the specimen classified as type I, 11% as type II, 6% as type III, 9% as type IV. These results suggested that traditional access from lingual should be moved as far toward the incisal as possible to locate and debride the lingual canal and root canal system should be cleaned, shaped completely and obturated three dimensionally for successful endodontic treatment.

WiSMax : Wifi Speed Maximization Application (와이파이 속도 극대화 애플리케이션)

  • Ryu, Kyu-Sang;Choi, Min-Seok;Jang, Beakcheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3440-3446
    • /
    • 2015
  • One of technologies that make it possible for users to enjoy always-on Internet service using potable devices does be Wifi. However, users frequently feel its connection is not stable or its speed becomes slow. On the other hand, users see multiple available Wifi access points exist often. In this paper, we present a smartphone application, called to WiSMax, that periodically changes its Wifi connection to the best one among available Wifi access points to maximize its speed. Experimental results show that WiSMax presents faster Internet connection than IEEE802.11 as much as about fifteen percent and higher signal strength than IEEE802.11 as much as about five dBm.

A Design and Implementation of Access Control Mechanism based on the Integrated Information Model (통합 전보 모델을 이용한 접근제어 메커니즘 설계 및 구현)

  • Kang, Chang-Goo;Park, Jin-Ho;Choi, Yong-Rak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2354-2365
    • /
    • 1997
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in modern information communication applications. In this paper, we proposed an integrated information model which can satisfy the combined goals of confidentiality, integrity and availability of any resource. We defined an integrated information model from the view points of identity-based, rule-based and role-based policy and implemented six access control operations. The proposed integrated information model can protect to unauthorized access to any resource based on the multilevel security policies of security label, integrity level, role and ownership.

  • PDF

Analysis of discussion and dispute on the future library model in Korea (도서관의 미래상에 대한 담론 및 쟁점의 분석과 형상화)

  • 윤희윤
    • Journal of Korean Library and Information Science Society
    • /
    • v.27
    • /
    • pp.61-95
    • /
    • 1997
  • The purpose of this paper is to overview a recent dispute of the library of the 21st century in Korea and to suggest a desirable model of the future library. There are two visions of the future of library. The first is an access based library model(digital library) emphasizing the digital resources that are networked and browsable electronically. The second is an ownership-based library model(paper library) which emphasize the use of traditional print collections stored locally and physically browsable. A points of dispute between the paper library as storehouse and the digital library as gateway are an electronic informations versus printed materials, access versus ownership, information professional versus librarians. The idea that library as physical place and as cyberspace are diametrically o n.0, pposed is a fallacy and surrealistic opinion. Future library has to acquire, organize, preserve, and make accessible the collections that users want and need. In other words, future libraries need both ownership and access. Access to remote electronic resources must serve as a reasonable substitute for holdings of older material. Therefore, it is a balanced solution that the more heavily used or important materials be considered for ownership and selective information resources for access. No doubt, the traditional library and the digital library will be coexist in the 21 century.

  • PDF