• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 14
  • 14
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

運用無線通訊科技提昇病人安全之研究以高風險通報為例 / Using Mobile Technology to Improve Patient Safety Based on High Risk Reminder System Evaluation

趙嘉成, Chao,Victor Unknown Date (has links)
Objective: High Risk Reminder (HRR) system is the lately mobile application technology developed by Taipei Medical University of Medical Informatics Research Institute. The objective of HRR is to provide high risk patient test results such as lab, radiology, pathology to physician immediately by mobile short message and internet e-mail. The mobile short message is to provide abstract information to physician such as patient name, inpatient bed ward number, the abcdrmal test result. The physician can receive the latest patient’s abcdrmal test information at any place, time. Therefore, the physician can take intervention treatment as soon as possible for patient treatment. Moreover, the physician wants to know more detail the high risk patient’s information can open the e-mail to review the patient’s profile in order to provide treatment plan. The purpose of using the mobile and internet technology is to improve patient safety. The WF Teaching Hospital has using the HRR system to serve its patient and physician for 6 months. There are more than 600 mobile short messages and e-mail communication for physicians. To reach the patient safety goals is the critical mission of WF Hospital. Therefore, the evaluation of HRR patient safety contribution needs to analyze.。This study is introducing HRR system functions and evaluating HRR’s contribution.。This research is based on the empirical study. We investigate the HRR’s impaction to assist high risk patient severe test result information communication for physician to assist patient’s treatment for physician and hospital. Meanwhile, the two mobile short message and e-mail communication media which one is more effective for physician is analyzed also. Design: This study measures dimensions of information quality, system quality, use, user satisfaction, individual impact and organizational impact based on the D&M IS Success Model. Multivariate techniques were used to evaluate the relationships of the Model. Measurements: The dimensionality of each scale and degree of association of each item with the attribute of interest were determined by principal components factor analysis with orthogonal varimax rotation. The reliability of each resultant scale was computed using Cronbach’s alpha coefficient. Construct validity was examined through factor analysis and by correlation analyses. Multiple regression techniques were used to evaluate the relationship between the set of six dimensions and comparison of PHS and e-mail. Results: Physicians have using the HRR systems are the surveyors composed of this survey samples. There are 56 questionnaires had been distributed the physicians. Seven questionnaires are invalid due to rarely using the HRR system. The valid questionnaires are 85%。Of the respondents, 93% were male; 73% were undergraduate; 90% were primary physicians.。 From the research finding , the two communication medias of short message, and e-mail are positive relationships for effective and efficiency communication for physicians to assist high risk patient severe test result information delivery. The research two constructs of PHS and e-mails’ indicators are positive for improving better communication; The information quality for user’s effectiveness, satisfaction relationship impacts for users and organization. Comparison effective communication between PHS and e-mail media, the research finding is PHS is more powerful than e-mail to deliver information for physician. From regression analysis, each □ value of PHS is higher than e-mail. The individual using PHS and e-mail is positive to effect the hospital to diffuse of HRR system. Conclusion: The survey of user’s satisfaction of using the HRR system is reached over 70%. However, 60 % of physicians indicates the HRRS provides efficiency and effectiveness each high risk patient’s information causing the information overload. This is the drawback of the implementation HRR system. How to decrease the information overload pressure needs to solve in the near future to improve HRR system. Furthermore, utilization mobile technology to provide two channel communication for physician to access the patient‘s database treatment, test, medication information to integrate all required information to develop the well treatment plan to improve patient safety and reduce patient risk.
2

Factors Affecting the Adoption of a Mobile Replenishment System: The case of Uni-President Vender

Chen, Yung-Yuan 16 July 2007 (has links)
In the ever-changing environment, the mobile business market is burgeoning nowadays.In order to extend their management to end users, most enterprises decide to adopt mobility.During adoption, the greatest challenge happens to employees who are forced to make use of mobile equipment. What will affect employees when they are to accept new technological equipment? What is the implication of management? How should enterprises assist their employees when introducing new technology? Against the backdrop, more emphasis should be put on the study of user acceptance in order to enhance the benefits of new systems. At present, studies and theories concerning information technology acceptance are mostly applied to personal computers and systems, but seldom to mobility. In the filed of technology acceptance, numerous theoretical models have been established; however, each model is different from one another in constructs, variables and factors. As a result, based on the Unified Theory of Acceptance and Use of Technology (UTAUT), this Study discusses those factors that influence mobile staffers of the case study about PDA mobile system and equipment adoption. By means of literature collection and sorting, this Study adopts questionnaires to inspect a total of 185 mobile staffers of the case study. Because this Studyhas included all mobile staffers of the case study, the findings will make great contributions toboth the case study and relevant industries. According to the findings, Performance Expectancy, Social Influence, and Facilitating Conditions prove to be major influential factors of Behavioral Intention, while Effort Expectancy is not directly related to Behavioral Intention. In the analysis of moderators, this Study finds out that experience, educational background and age of users have apparent moderating effects on various paths of the model. As for the implication of management, in order to strengthen mobile staffers¡¦ intention to use new systems and to increase system benefits, enterprises should first promote the usage of new systems, communicate with and encourage their employees when introducing new systems. Second, enterprises should better the quality and quantity of vocational trainings.Third, new systems should be equipped with functions which help mobile staffers improve their performance. Fourth, new systems should be easy to use and learn according to different designs for usage. In addition, mobile staffers should realize those benefits which new systems offer, and have more opportunities to practice using new systems. Therefore, mobile staffers can have higher perception of Performance Expectancy, Effort Expectancy, Social Influence, and Facilitating Conditions concerning new systems. As for the analysis of moderators, this Study finds out that the variable of Social Influence has a strong indirect relationship to mobile staffers who are older, graduated from senior high school, or have worked for over 12 years. Hence, the management level should educate and encourage the above-mentioned staffers, in order to enhance their intention to use new systems.
3

Scaling location-based services with location privacy constraints: architecture and algorithms

Bamba, Bhuvan 06 July 2010 (has links)
Advances in sensing and positioning technology, fueled by wide deployment of wireless networks, have made many devices location-aware. These emerging technologies have enabled a new class of applications, known as Location-Based Services (LBS), offering both new business opportunities and a wide array of new quality of life enhancing services. One example of such services is spatial alarms, an enabling technology for location-based advertisement, location-based alerts or reminders and a host of other applications. On the other hand, the ability to locate mobile users accurately also opens door for new threats - the intrusion of location privacy. The time series of location data can be linked to personal identity, which leads to unauthorized information exposure about the individual's medical conditions, alternative lifestyles, unpopular political views or location-based spam and stalking. Thus, there are two important challenges for location-based service provisioning. How do we scale LBSs in the presence of client mobility and location dependent constraints for the multitude of new, upcoming location-based applications under a common framework? How do we provide anonymous location- based services with acceptable performance and quantifiable privacy protection in the next generation of mobile networks, systems and applications? This dissertation delivers technical solutions to address these important challenges. First, we introduce spatial alarms as the basic primitive to represent a class of locationbased services that require location-based trigger capability. Similar to time-based alarms, spatial alarms serve as spatial event reminders that enable us to express different location-based information needs supported by a variety of applications ranging from location-based advertisements, location-based personal assistants, to friend locator services like Google Latitude. We develop a generalized framework and a suite of optimization techniques for server-centric scalable processing of spatial alarms. Our architecture and algorithm development provide significant performance enhancement in terms of system scalability compared to naive spatial alarm processing techniques, while maintaining high accuracy for spatial alarm processing on the server side and reduced communication costs and energy consumption on the client side. Concretely, we develop safe period optimizations for alarm processing and introduce spatial alarm grouping techniques to further reduce the unnecessary safe period computation costs. In addition, we introduce a distributed alarm processing architecture that advocates the partitioning of the alarm processing load among the server and the relevant mobile clients to reduce the server load and minimize the client-to-server communication cost through intelligent distribution and parallelization. We also explore a variety of optimization opportunities such as incorporating non-spatial constraints into the location-based information monitoring problem and utilizing efficient indexing methods such as bitmap indexing to further enhance the performance and scalability of spatial alarm processing in the presence of mobility hotspots and skewed spatial alarm distributions. Second, we develop the PrivacyGrid framework for privacy-enhanced location service provisioning, focusing on providing customizable and personalized location privacy solutions while scaling the mobile systems and services to a large number of mobile users and a large number of service requests. The PrivacyGrid approach has three unique characteristics. First, we develop a three-tier architecture for scaling anonymous information delivery in a mobile environment while preserving customizable location privacy. Second, we develop a suite of fast, dynamic location cloaking algorithms. It is known that incorporation of privacy protection measures may lead to an inherent conflict between the level of privacy and the quality of services (QoS) provided by the location-based services. Our location cloaking algorithms can scale to higher levels of location anonymity while achieving a good balance between location privacy and QoS. Last but not the least; we develop two types of location anonymization models under the PrivacyGrid architecture, one provides the random way point mobility model based location cloaking solution, and the other provides a road network-based location privacy model powered by both location k-anonymity and segment s-anonymity. A set of graph-based location cloaking algorithms are developed, under the MobiCloak approach, to provide desired levels of privacy protection for users traveling on a road network through scalable processing of anonymous location services. This dissertation, to the best of our knowledge, is the first one that presents a systematic approach to the design and development of the spatial alarm processing framework and various optimization techniques. The concept of spatial alarms and the scaling techniques developed in this dissertation can serve as building blocks for many existing and emerging location-based and presence based information and computing services and applications. The second unique contribution made in this dissertation is its development of the PrivacyGrid architecture for scaling anonymous location based services under the random waypoint mobility model and its extension of the PrivacyGrid architecture through introducing the MobiCloak road-network based location cloaking algorithms with reciprocity support for spatially constrained network mobility model. Another unique feature of the PrivacyGrid and MobiCloak development is its ability to protect location privacy of mobile users while maintaining the end-to-end QoS for location-based service provisioning in the presence of dynamic and personalized privacy constraints.
4

Aligning System Architectures on Requirements of Mobile Business Processes

Gruhn, Volker, Köhler, André 30 January 2019 (has links)
The support of mobile workers with mobile IT solutions can create tremendous improvements in mobile business processes of a company. The main characteristic of such a mobile system is the ability to connect via a (mobile) network to a central server, e.g. in order to access customer data. This paper presents a detailed description of the four main software architectures for mobile client/server-based systems and their main characteristics. Beyond, typical business requirements in mobile environments like the location of use, data topicality, interaction requirements, synchronisation mechanisms and many more are mapped onto each of these architectures. The presented results can be used for discussing concurrent business needs as well as for deriving a mobile system architecture based on these needs.
5

Aligning Software Architectures of Mobile Applications on Business Requirements

Gruhn, Volker, Köhler, André 30 January 2019 (has links)
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system is the ability to connect via a (mobile) network to a central server, e.g. in order to access customer data. The frequency and the location of the use, data topicality, interaction requirements and many more are central aspects when developing a suitable system architecture. This paper provides a detailed decription of the four main software architectures for mobile systems and their main charateristics. Beyond, typical business requirements are developed, the implications for the system architecture for each of them is shown.
6

Use of Photovoltaic on an E-bike? : A Feasibility Study

Schnabel, Thomas January 2013 (has links)
In recent years the number of bicycles with e-motors has been increased steadily. Within the pedelec – bikes where an e-motor supports the pedaling – a special group of transportation bikes has developed. These bikes have storage boxes in addition to the basic parts of a bike. Due to the space available on top of those boxes it is possible to install a PV system to generate electricity which could be used to recharge the battery of the pedelec. Such a system would lead to grid independent charging of the battery and to the possibility of an increased range of motor support. The feasibility of such a PV system is investigated for a three wheeled pedelec delivered by the company BABBOE NORDIC.The measured data of the electricity generation of this mobile system is compared to the possible electricity generation of a stationary system.To measure the consumption of the pedelec different tracks are covered, and the energy which is necessary to recharge the bike battery is measured using an energy logger. This recharge energy is used as an indirect measure of the electricity consumption. A PV prototype system is installed on the bike. It is a simple PV stand alone system consisting of PV panel, charge controller with MPP tracker and a solar battery. This system has the task to generate as much electricity as possible. The produced PV current and voltage aremeasured and documented using a data logger. Afterwards the average PV power is calculated. To compare the produced electricity of the on-bike system to that of a stationary system, the irradiance on the latter is measured simultaneously. Due to partial shadings on the on-bike PV panel, which are caused by the driver and some other bike parts, the average power output during riding the bike is very low. It is too low to support the motor directly. In case of a similar installation as the PV prototype system and the intention always to park the bike on a sunny spot an on-bike system could generate electricity to at least partly recharge a bike battery during one day. The stationary PV system using the same PV panel could have produced between 1.25 and 8.1 times as much as the on-bike PV system. Even though the investigation is done for a very specific case it can be concluded that anon-bike PV system, using similar components as in the investigation, is not feasible to recharge the battery of a pedelec in an appropriate manner. The biggest barrier is that partial shadings on the PV panel, which can be hardly avoided during operation and parking, result in a significant reduction of generated electricity. Also the installation of the on-bike PV system would lead to increased weight of the whole bike and the need for space which is reducing the storage capacity. To use solar energy for recharging a bike battery an indirect way is giving better results. In this case a stationary PV stand alone system is used which is located in a sunny spot without shadings and adjusted to use the maximum available solar energy. The battery of the bike is charged using the corresponding charger and an inverter which provides AC power using the captured solar energy.
7

Impact of Webpage Access on the Design of Single-Chip Heterogeneous Multiprocessors

Somers, Marc Steven 25 May 2007 (has links)
Mobile devices are currently designed similar to embedded systems where performance is derived from a specification that allows the device to interact in a periodic manner with the environment. However, as mobile devices increasingly interact with the Internet they exhibit a different style of computing that does not fit the embedded system model. At the same time, a mobile device designer needs to consider many different issues such as the number and types of processors, scheduling strategies, applications, power consumption, and dimensions of the device, which increase the total number of design decisions at an alarming rate. This research shows that by using a more realistic model of mobile devices using webpage-based benchmarks, customization can allow specialized architectures to improve performance up to 70 percent over a homogeneous multiprocessor composed of general purpose processors and 25 percent additional improvement over the next best architecture when individual user preferences were also considered. Webpage access, to include user profiling for individual utilization, is clearly a significant factor in the design of mobile devices — and thus should be included in future benchmarks based upon webpage content and webpage access patterns. When new evaluation techniques are developed, new design strategies can be discovered and employed. / Master of Science
8

Desenvolvimento de aplicativo de tecnologia móvel para arborização urbana / The mobile tecnology application development for urban forestation

Ramos, Rafael Rieger 22 August 2017 (has links)
The increasing development of the urban areas in the country turns the search for environmental and esthetic improvements to the cities the major key in the urban forestation planning. The precision forestry emerges as an urban afforestation and urban centers plan ally, offering control and scheduling activities such as the implantation and management of the vegetation in public routes, gardens and parks. Aiming to assist the urban forestation planning, the C7 Lignum Urben application was developed, which is a mobile tool linked to smartphones and tablets Android System that plans the urban forestation by the registration and evaluation of copies, the implantation and management of the vegetation in public areas and the emission of reports that allows group decisions. The C7 Lignum Urben provides more agility in the processes of data retrieval and dissemination due to the ability to specialize data and send reports in .CSV and .PDF formats that can be edited and take up less space. / O crescente desenvolvimento das áreas urbanas no país torna a busca por melhorias ambientais e estéticas às cidades, chave decisiva no planejamento da arborização urbana. A silvicultura de precisão surge como aliada da arborização urbana e do planejamento dos centros urbanos, oferecendo controle e programação de atividades como implantação e manejo da vegetação de vias públicas, jardins e praças. Objetivando auxiliar o planejamento da arborização urbana, foi desenvolvido o aplicativo C7 Lignum Urben que é uma ferramenta móvel, vinculada ao Sistema Android de smarthphones e tablets, de planejamento da arborização urbana através do cadastramento e avaliação de exemplares, da implantação e manejo da vegetação de áreas públicas e emissão de relatórios, que permitem a tomada de decisões em grupos. O C7 Lignum Urben permite maior agilidade nos processos de obtenção e difusão de dados devido a capacidade de espacializar dados e enviar relatórios em formato. CSV e PDF, que podem ser editados e ocupam menor espaço.
9

Key challenges to digital financial services in emerging economies: the Indian context

Rana, Nripendra P., Luthra, S., Rao, H.R. 25 October 2019 (has links)
Yes / Purpose: Digital Financial Services (DFS) have substantial prospect to offer a number of reasonable, appropriate and secure banking services to the underprivileged in developing countries through pioneering technologies such as mobile phone based solutions, digital platforms and electronic money models. DFS allow unbanked people to obtain access to financial services through digital technologies. However, DFS face tough challenges of adoption. Realising this, the aim of this paper is to identify such challenges and develop a framework. Design/Methodology/Approach: We develop a framework of challenges by utilising Interpretive Structural Modelling (ISM) and Fuzzy MICMAC approach. We explored eighteen such unique set of challenges culled from the literature and further gathered data from two sets of expert professionals. In the first phase, we gathered data from twenty-nine professionals followed by eighteen professionals in the second phase. All were pursuing Executive MBA programme from a metropolitan city in South India. The implementation of ISM and fuzzy MICMAC provided a precise set of driving, linkage and dependent variables that were used to derive a framework. Findings: ISM model is split in eight different levels. The bottom level consists of a key driving challenge V11 (i.e. high cost and low return related problem) whereas the topmost level consists of two highly dependent challenges namely V1 (i.e. risk of using digital services) and V14 (i.e. lack of trust). The prescribed ISM model shows the involvement of ‘high cost and low return related problem (V11)’, which triggers further challenges of DFS. Originality/value: None of the existing research has explored key challenges to DFS in detail nor formulated a framework for such challenges. To the best of our knowledge, this is the first paper on DFS that attempts to collate its challenges and incorporate them in a hierarchical model using ISM and further divide them into four categories of factors using fuzzy MICMAC analysis.
10

Design of SRAM for CMOS 32nm

Hamouche, Lahcen 15 December 2011 (has links) (PDF)
The PhD thesis focuses on the always-on low power SRAM memories (essentially low dynamic power) in thin CMOS technology node CMOS 32nm and beyond. It reviews the state of the art of the eSRAM and describes different techniques to reduce the static and dynamic power consumption with respect the variability issue. Main techniques of power reduction are reviewed with their contributions and their limitations. It presents also a discussion about a statistical variability modeling and the variability effects on the yield. An original low power architecture based on 5T-Portless bit-cell is presented, with current mode read/write operations, as an ideal candidate for the always-on SRAM memories. A test chip implementation in CMOS 32nm of the 5T-Porless is designed and a comparison with an existing 6T SRAM memory is presented based on simulation. Some test chip functionality results and power consumption are performed. Finally the conclusion highlights the major contributions of the study and discusses the various simplification assumptions to see possible limitations. It is concluded affirmatively about industrial interest of the 5T-Portless SRAM for always-on embedded applications. Perspectives concern the analytical modeling for statistical behavior of SRAM as the Monte-Carlo approach is no more practicable. The migration of the 5T-Portless SRAM may be already considered in advanced nodes.

Page generated in 0.322 seconds