Spelling suggestions: "subject:"amobile communmunication lemsystems"" "subject:"amobile communmunication atemsystems""
301 |
Near field communication in smart phones using MIFARE standards for illiterate patientsMareli, Mahlaku 17 September 2014 (has links)
M.Ing. (Electrical And Electronic Engineering) / Patient safety in healthcare is sometimes compromised due to medical and clerical errors. These errors can increase the operational cost of healthcare if not identified and rectified speedily. They can also result in misdiagnosis, wrong treatment options being provided to patients and in the worst case may result in fatalities. Healthcare errors in medication documentation, administration, and prescription can cause incorrect medicine administration and dosage instructions for patients. Sub-Saharan Africa has the lowest percentage (adults is 59% and youth is 70%) of literacy compared to other regions of the world sitting at (adults is 84% and youth is 89%). The challenge facing illiterate patients is that they can easily make the same mistakes and may not take their medication correctly. The application of Near Field Communication (NFC) technology in healthcare has demonstrated some advantages of security, accuracy and effectiveness over other technologies. The availability of NFC in some smartphones has also encouraged the development of more applications. The main objective of this thesis is to present a solution using an Android based NFC application that enables a NFC enabled smartphone to read NFC tags placed on medication containers and be able to play the audio instructions to illiterate patients. Based on a comprehensive review of the literature on NFC applications in healthcare, this solution is the first of its kind. A set of experiments were done in an effort to understand the operation of NFC phones under different environments. The proposed application reads the NFC tag placed on the medicine container. The data read from the NFC tag is used to identify the audio file corresponding to the particular patient’s medicine instructions. If the audio instructions are not available, on the phone, it is fetched from a remote server database using an Internet connection. The application automatically plays the audio file to the patient. Three research hypotheses were tested and it was confirmed that (H1), modified NFC antenna can reduce the level of induced power in it; (H2), the NFC technology is faster and more accurate in reading tag code that Barcode technology reading the barcode; (H3), the NFC reading process of NFC tag code is not negatively affected by the amount of light in the environment it is operated in. The Barcode reading accuracy was 10% errors when operating in the environment with light brightness of 128000 lumens. When the light brightness was reduced to 8900 lumens, the Barcode accuracy errors increased to 45%.
|
302 |
Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networksAbidogun, Olusola Adeniyi January 2005 (has links)
Magister Scientiae - MSc / Huge amounts of data are being collected as a result of the increased use of mobile telecommunications. Insight into information and knowledge derived from these databases can give operators a competitive edge in terms of customer care and retention, marketing and fraud detection. One of the strategies for fraud detection checks for signs of questionable changes in user behavior. Although the intentions of the mobile phone users cannot be observed, their intentions are reflected in the call data which define usage patterns. Over a period of time, an individual phone generates a large pattern of use. While call data are recorded for subscribers for billing purposes, we are making no prior assumptions about the data indicative of fraudulent call patterns, i.e. the calls made for billing purpose are unlabeled. Further analysis is thus, required to be able to isolate fraudulent usage. An unsupervised learning algorithm can analyse and cluster call patterns for each subscriber in order to facilitate the fraud detection process. This research investigates the unsupervised learning potentials of two neural networks for the profiling of calls made by users over a period of time in a mobile telecommunication network. Our study provides a comparative analysis and application of Self-Organizing Maps (SOM) and Long Short-Term Memory (LSTM) recurrent neural networks algorithms to user call data records in order to conduct a descriptive data mining on users call patterns. Our investigation shows the learning ability of both techniques to discriminate user call patterns; the LSTM recurrent neural network algorithm providing a better discrimination than the SOM algorithm in terms of long time series modelling. LSTM discriminates different types of temporal sequences and groups them according to a variety of features. The ordered features can later be interpreted and labeled according to specific requirements of the mobile service provider. Thus, suspicious call behaviours are isolated within the mobile telecommunication network and can be used to to identify fraudulent call patterns. We give results using masked call data from a real mobile telecommunication network. / South Africa
|
303 |
Secure proximity queries in mobile geo-social servicesLi, Hong Ping 01 January 2013 (has links)
No description available.
|
304 |
Simulation of adaptive equalization in two-ray, SIRCIM, and SMRCIM mobile radio channelsHuang, Weifeng 25 April 2009 (has links)
This work presents a study of the adaptive equalization techniques designed to improve the bit error rates of digital transmissions degraded by intersymbol interference in radio communication. This thesis considers the following structures: the linear transversal equalizer (LTE), the decision feedback equalizer (DFE), the lattice equalizer, and the maximum likelihood sequence estimation (MLSE) equalizer. Least mean square (LMS) and recursive least squares (RLS) algorithms are used as the adaptive algorithms for these equalizers. Lattice-DFE, DFE, and MLSE with an RLS algorithm are recommended to be implemented in mobile systems because of their better performances. A two-ray Rayleigh fading channel model is used to simulate the mobile channels. The results show that adaptive equalization can significantly improve the performance of mobile communications if the channel does not change too fast. The simulation shows that if the delay (T) of the second ray is too small, the adaptive equalization will degrade the BER performance, and the value of T at which the adaptive equalizer can improve the BER is determined by the speed of the mobile channel variation. Also, simulation results obtained by using SIRCIM, a real world indoor channel simulator, shows that adaptive equalization has good performance in slowly varying channels. An equalizer working in indoor high data rate systems has a BER less than 10-3 at 15 dB Eb/Noâ ¢ The SMRCIM urban channel model is also developed and implemented for equalization simulation. Finally, equalization structures for differential modulation techniques are proposed. / Master of Science
|
305 |
Application of importance sampling simulation to CDMA systemsNagpal, Sanjay 16 June 2009 (has links)
The wireless revolution has taken the telecommunication industry by storm. The convenience provided by wireless in the day to day activities is the driving force behind it's popularity. With the increasing demand for such systems, research in multiple access techniques has received much interest. CDMA has been proposed as a next generation multiple access technique for cellular systems. The performance capabilities of a CDMA system are gauged by a variety of methods including analytical studies and simulations.
Simulation studies are the most reliable and popular performance measurement techniques. This thesis studies the application of Importance Sampling to the simulation of the IS-95 CDMA standard. Importance Sampling techniques help to achieve the simulation results by sending fewer bits and thus reduce the simulation time by a significant factor. Different versions of Importance Sampling techniques have been discussed and applied to the system. The results of Importance Sampling have been compared with the original results for the Bit Error Rate and Frame Error Rate to prove the validity and the effectiveness of Importance Sampling Techniques. / Master of Science
|
306 |
Bit error simulation of FSK, BPSK, and pi/4 DQPSK in flat and frequency-selective fading mobile radio channels using two-ray and measurement- based impulse response modelsFung, Victor 14 August 2009 (has links)
A software simulation tool has been developed to simulate the performance of digital mobile radio systems in fading channels. The simulation tool generates average bit error rate (BER) and bit-by-bit error patterns with user-specified parameters. The simulation tool can simulate various communication system parameters (i.e. modulation scheme, data rate, signal to noise ratio, and receiver speed, etc.) and different channel environments (i.e. outdoor and indoor fading channels). Additive white Gaussian noise and co-channel interference effects for outdoor channels are also simulated. Using the simulation tool, we studied average BER results for FSK, BPSK, and Ï /4 DQPSK with Nyquist pulse shaping in indoor and outdoor, flat and frequency-selective fading channels. The BER performance of Ï / 4 DQPSK using the data rate and the pulse shaping requirement in the U.S. Digital Cellular Standard are studied. BER results for high data rate (> 450 kbps) transmissions in indoor channels generated by a measurement-based channel model, SIRCIM, are compared with results in channels generated by the classic two-ray Rayleigh fading model. Simulation results show that irreducible BER is not only a function of rms delay spread, but is also a function of the temporal and spatial distribution of multipath components. The simulation results are also applied into a real-time bit-by-bit error simulation using a hardware simulator between a data source and a data sink. Simulation results of the transmission of a video image in mobile radio fading channels are shown. This simulation methodology allows subjective evaluation of link quality between a source and sink in a laboratory in real-time without the need of building radio frequency hardware. / Master of Science
|
307 |
Design of an L-band high efficiency circularly polarized microstrip antennaFaiz, Mir Mohammad Abul 01 January 1999 (has links)
No description available.
|
308 |
The interplay of mobile technology, structure of social relationships, and adolescents' agency: a study of adolescents' social use of mobile telephone in Hong Kong.January 2003 (has links)
Hoi Pui-shan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 129-139). / Abstracts in English and Chinese. / Abstract --- p.i / 摘要 --- p.ii / Acknowledgement --- p.iii / Chapter CHAPTER 1 --- Introduction --- p.1-8 / Chapter 1.1 --- The Technological Significance of Mobile Telephone: The Ambiguity of Mobile Technology --- p.2-3 / Chapter 1.2 --- The Empirical Significance of Mobile Telephone: Adolescents' Actual Process of Mobile Telephone Use --- p.3- 4 / Chapter 1.3 --- The Social Significance of Mobile Telephone: The Importance of the Context of Mobile Telephone Use --- p.4- 6 / Chapter 1.4 --- "The Theoretical Significance of Mobile Telephone: The Interplay of Technology, Structure and Agency" --- p.6- 7 / Chapter 1.5 --- Overview of the Thesis --- p.7- 8 / Chapter CHAPTER 2 --- Literature Review --- p.9- 30 / Chapter 2.1 --- Research on Mobile Telephone: An Overview --- p.10- 12 / Chapter 2.2 --- Technological and Social Changes: Technological Determinism --- p.12- 17 / Chapter 2.3 --- Contextualize the Use of Technology: Structure and Context --- p.17- 24 / Chapter 2.3.1 --- Family as an Important Context of the Use of Technology --- p.18- 22 / Chapter 2.3.2 --- The Changing Social Context in Hong Kong: Socio-demographic Changes and Family Life --- p.22- 24 / Chapter 2.4 --- Individuals' Voluntaristic Nature: Users' Agency --- p.24- 28 / Chapter 2.5 --- Concluding Remarks --- p.28- 30 / Chapter CHAPTER 3 --- Conceptual Framework --- p.31- 40 / Chapter 3.1 --- "Re-approach the Study of Mobile Technology, the Context of Use, and Adolescents' Agency" --- p.31- 34 / Chapter 3.2 --- Domestication --- p.34- 38 / Chapter 3.2.1 --- Process of Domestication --- p.35- 37 / Chapter 3.2.2 --- Domestication as an Interactive Process --- p.37- 38 / Chapter 3.3 --- The Research Questions --- p.38- 40 / Chapter CHAPTER 4 --- Methodology --- p.41- 48 / Chapter 4.1 --- The Research --- p.42- 46 / Chapter 4.1.1 --- Research Design --- p.42- 43 / Chapter 4.1.1a --- The Research Design and the Issue of Reliability and Validity in Qualitative Research --- p.42- 43 / Chapter 4.1.2 --- Data Sources --- p.43- 45 / Chapter 4.1.2a --- Group Interviews --- p.43- 44 / Chapter 4.1.2b --- Individual Interviews --- p.44 / Chapter 4.1.2c --- Observing The Focus Group Respondents --- p.44- 45 / Chapter 4.1.3 --- Subject Selection --- p.45-46 / Chapter 4.2 --- Interview Core Questions --- p.46- 47 / Chapter 4.3 --- Method of Data Analysis --- p.47- 48 / Chapter CHAPTER 5 --- Purchasing Mobile Telephone: Negotiating the Meaning of Mobile Technology --- p.49- 66 / Chapter 5.1 --- Purchasing Pattern --- p.49- 54 / Chapter 5.1.1 --- Parents Initiate the Purchase --- p.50- 52 / Chapter 5.1.2 --- Adolescents Initiate the Purchase --- p.52- 54 / Chapter 5.2 --- Establish Rules that Govern Mobile Telephone Usage in the Purchasing Stage: Parents' Perception of Mobile Telephone --- p.54- 58 / Chapter 5.2.1 --- Control the Amount of Use: Excessive Use of Mobile Telephone --- p.55- 57 / Chapter 5.2.2 --- Control of Situation of Use: Using Mobile Telephone at Home is Banned --- p.57- 58 / Chapter 5.2.3 --- Control of Content: Legitimate Use --- p.58 / Chapter 5.3 --- Adolescents' Perception of Mobile Telephone --- p.59-64 / Chapter 5.3.1 --- Instrumental Use: Coordination of Social Activities --- p.61-62 / Chapter 5.3.2 --- Expressive Use: Being Connected --- p.62-64 / Chapter 5.4 --- Different Perception of Mobile Telephone Between Adolescents and Parents --- p.64-66 / Chapter CHAPTER 6 --- Negotiating Boundary and Autonomy: Mobile Telephone and Family Life --- p.67- 87 / Chapter 6.1 --- Reporting --- p.68- 79 / Chapter 6.1.1 --- Parents' Perception of Reporting --- p.68- 71 / Chapter 6.1.1a --- Reporting as Information Collection --- p.68- 69 / Chapter 6.1.1b --- Reporting as Adolescents' Responsibility --- p.69- 71 / Chapter 6.1.2 --- Adolescents' Perception of Reporting --- p.71- 76 / Chapter 6.1.2a --- Reporting as a Strategy to Negotiate Autonomy --- p.74- 76 / Chapter 6.1.3 --- Reporting as a Complex of Care and Control --- p.76- 79 / Chapter 6.1.3a --- Rethinking the Meaning of Control --- p.78- 79 / Chapter 6.2 --- Mobile Telephone and Boundary Control --- p.80- 84 / Chapter 6.2.1 --- Control of Information Input and Output --- p.80- 81 / Chapter 6.2.2 --- Reserve the Contents of Mobile Telephone Conversations --- p.81- 84 / Chapter 6.3 --- Concluding Remarks --- p.85- 87 / Chapter CHAPTER 7 --- Mobile Telephone and Peer Culture: Mobile Telephone and Construction of Identity --- p.88- 98 / Chapter 7.1 --- Mobile Telephone as a Shared Object: The Culture of Sharing --- p.89- 91 / Chapter 7.1.1 --- Sharing the Handset --- p.89 / Chapter 7.1.2 --- Game Playing as a Collective Experience --- p.89- 90 / Chapter 7.1.3 --- Share the Handset with Non-owners --- p.90 / Chapter 7.1.4 --- Share the Handset with Peer Group Members --- p.91 / Chapter 7.2 --- Using Mobile Telephone at School as a Part of Adolescents' Mobile Telephone Culture --- p.92- 93 / Chapter 7.3 --- Mobile Telephone Use and Friendship Network --- p.93- 95 / Chapter 7.3.1 --- Exchange Mobile Telephone Number: Extension of Friendship Network --- p.93 / Chapter 7.3.2 --- Maintenance of Peer Group Relationships --- p.93- 94 / Chapter 7.3.3 --- Sharing Emotions --- p.94- 95 / Chapter 7.3.4 --- A Sense of Sameness: Using the Same Network Services --- p.95 / Chapter 7.4 --- Display of Mobile Telephone Among Peer Social Network --- p.95- 97 / Chapter 7.5 --- Concluding Remarks --- p.97- 98 / Chapter CHAPTER 8 --- Conclusion --- p.99- 111 / Chapter 8.1 --- Summary of Findings --- p.100- 103 / Chapter 8.1.1 --- Adolescents as a Heterogeneous Group of Mobile Telephone Users --- p.100- 101 / Chapter 8.1.2 --- The Meaning of Control --- p.101- 102 / Chapter 8.1.3 --- Adolescents' Identity Construction --- p.102- 103 / Chapter 8.2 --- "Rethinking the Relations between Mobile Technology, Individual Agency, and the Context of Use" --- p.103- 107 / Chapter 8.2.1 --- Evaluation of the Concept of Domestication --- p.107- 108 / Chapter 8.3 --- Evaluation of Methodology --- p.108- 109 / Chapter 8.4 --- Suggestions for Further Research --- p.109- 111 / Appendices --- p.112- 128 / Bibliography --- p.129- 138
|
309 |
Management of innovation in network industries the mobile internet in Japan and Europe /Haas, Michael. January 2006 (has links)
Thesis (doctoral) - Universität, München, 2006. / Bibliographical references p. 243-266.
|
310 |
Business development of PCN operators in Hong Kong /Kong, Tsz-wai, Sally. January 1998 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1998. / Includes bibliographical references (leaf 148-152).
|
Page generated in 0.1368 seconds