Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G...Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.展开更多
BACKGROUND The glycemic control of children with type 1 diabetes(T1D)may be influenced by the economic status of their parents.AIM To investigate the association between parental economic status and blood glucose leve...BACKGROUND The glycemic control of children with type 1 diabetes(T1D)may be influenced by the economic status of their parents.AIM To investigate the association between parental economic status and blood glucose levels of children with T1D using a mobile health application.METHODS Data from children with T1D in China's largest T1D online community,Tang-TangQuan■.Blood glucose levels were uploaded every three months and parental economic status was evaluated based on annual household income.Children were divided into three groups:Low-income(<30000 Yuan),middle-income(30000-100000 Yuan),and high-income(>100000 yuan)(1 Yuan=0.145 United States Dollar approximately).Blood glucose levels were compared among the groups and associations were explored using Spearman’s correlation analysis and multivariable logistic regression.RESULTS From September 2015 to August 2022,1406 eligible children with T1D were included(779 female,55.4%).Median age was 8.1 years(Q1-Q3:4.6-11.6)and duration of T1D was 0.06 years(0.02-0.44).Participants were divided into three groups:Low-income(n=320),middle-income(n=724),and high-income(n=362).Baseline hemoglobin A1c(HbA1c)levels were comparable among the three groups(P=0.072).However,at month 36,the low-income group had the highest HbA1c levels(P=0.036).Within three years after registration,glucose levels increased significantly in the low-income group but not in the middle-income and high-income groups.Parental economic status was negatively correlated with pre-dinner glucose(r=-0.272,P=0.012).After adjustment for confounders,parental economic status remained a significant factor related to pre-dinner glucose levels(odds ratio=13.02,95%CI:1.99 to 126.05,P=0.002).CONCLUSION The blood glucose levels of children with T1D were negatively associated with parental economic status.It is suggested that parental economic status should be taken into consideration in the management of T1D for children.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
This paper presents the development and evaluation of the Domestic Abuse and Violence Support System(DAVSS),a mobile application designed to address domestic violence issues in Malaysia.DAVSS integrates the essential ...This paper presents the development and evaluation of the Domestic Abuse and Violence Support System(DAVSS),a mobile application designed to address domestic violence issues in Malaysia.DAVSS integrates the essential 27-DASH(Danger Assessment for Separation and Harassment)questionnaire to assess the severity of domestic violence situations.The project follows the phased approach of the Waterfall Model,encompassing requirements,analysis,design,development,and testing stages.Usability testing was conducted to evaluate the DAVSS application,revealing overall user satisfaction.However,this assessment relied primarily on frequency analysis,prompting consideration for enhanced reliability through alternative measurement methods such as median and standard deviation approaches.The DAVSS application’s Danger Assessment Test(DAT)algorithm,built upon the 27-DASH questions,represents a significant aspect of the system.Future work includes the validation of this rule-based algorithm using expert evaluation,potentially through Delphi techniques.Given the absence of dedicated domestic abuse mobile applications in Malaysia,DAVSS promises several advantages.It empowers victims to report incidents,locate shelters for protection,and facilitates shelter access through QR code integration.In conclusion,as domestic violence remains a pressing concern requiring increased support,the DAVSS mobile application emerges as a vital system that offers assistance to victims while breaking down barriers that may silence their voices.展开更多
Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for dig...Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for digital medical solutionshas been accelerated by the need for new diagnostic and therapeutic methods inthe current coronavirus disease 2019 pandemic. This also applies to clinicalpractice in gastroenterology, which has, in many respects, undergone a recentdigital transformation with numerous consequences that will impact patients andhealth care professionals in the near future. MHAs and MAs are considered tohave great potential, especially for chronic diseases, as they can support the selfmanagementof patients in many ways. Despite the great potential associated withthe application of MHAs and MAs in gastroenterology and health care in general,there are numerous challenges to be met in the future, including both the ethicaland legal aspects of applying this technology. The aim of this article is to providean overview of the current status of MHA and MA use in the field ofgastroenterology, describe the future perspectives in this field and point out someof the challenges that need to be addressed.展开更多
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera...To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications.展开更多
The growing use of mobile health applications for health purposes increased the expectations about their effectiveness. The study examines the effectiveness of mobile health applications on the self-management behavio...The growing use of mobile health applications for health purposes increased the expectations about their effectiveness. The study examines the effectiveness of mobile health applications on the self-management behaviors of 168 individuals diagnosed with cancer. The results of a secondary analysis indicate that using extensively mobile health applications significantly increases women’s health empowerment attitudes—reaching health decisions, changing their approach to health concerns, seeking additional health consultation. However, the use of mobile health applications does not increase the likelihood of adopting self-management behaviors. The study indicates that the effectiveness of mobile health applications in self-management practices is contingent upon a set of personal characteristics and the level of technology skills.展开更多
<div style="text-align:justify;"> <span style="font-family:Verdana;">Software reliability is an important quality attribute, and software reliability models are frequently used to measu...<div style="text-align:justify;"> <span style="font-family:Verdana;">Software reliability is an important quality attribute, and software reliability models are frequently used to measure and predict software maturity. The nature of mobile environments differs from that of PC and server environments due to many factors, such as the network, energy, battery, and compatibility. Evaluating and predicting mobile application reliability are real challenges because of the diversity of the mobile environments in which the applications are used, and the lack of publicly available defect data. In addition, bug reports are optionally submitted by end-users. In this paper, we propose assessing and predicting the reliability of a mobile application using known software reliability growth models (SRGMs). Four software reliability models are used to evaluate the reliability of an open-source mobile application through analyzing bug reports. Our experiment proves it is possible to use SRGMs with defect data acquired from bug reports to assess and predict the software reliability in mobile applications. The results of our work enable software developers and testers to assess and predict the reliability of mobile software applications.</span> </div>展开更多
The building information model/modeling (BIM) technology is currently applied in a broad range of applications and research for facility management, while the BIM-based mobile FM is difficult owing to various factor...The building information model/modeling (BIM) technology is currently applied in a broad range of applications and research for facility management, while the BIM-based mobile FM is difficult owing to various factors and environments. For example, the mobile applications usually require frequent cross-equipment compatibility. This paper proposes a reasonable BIM-based FM cross-platform framework and develops a mobile application on the basis of an existing BIM-based FM system. The developed mobile application is applied in a case study of a metro station project in Guangzhou to verify its effectiveness in FM practice. It helps maintenance staff in viewing BIMs, accessing related information, and updating maintenance records in a unique platform. The test results demonstrate that the proposed BIM-based cross-platform framework meet the FM application requirements and supports the extension of FM functions.展开更多
Many wireless applications are deployed and available to customers via their mobile phones. Variety of these applications and services are based on determination of the current or future location of mobile user. Locat...Many wireless applications are deployed and available to customers via their mobile phones. Variety of these applications and services are based on determination of the current or future location of mobile user. Location based services (LBS) are one of the vital applications which are subdivided into two main categories: economical category and public category. Economic applications include mobile marketing, entertainment and tracking applications. Whereas, emergency cases, safety, traffic management, Muslims’ applications and public information applications are sort of public applications. The first part of the paper presents a new proposed system with developed procedure to recreate public and economic applications with high positioning accuracy and good authentication of users’ data. The developed system is created to enhance both location based services and network allocation resources within mobile network platform using either normal or GPS supported mobile equipment. The second part of the paper introduces future location prediction of mobile user dependent applications. New algorithm is developed depending on utilizing both intra-cell Movement Pattern algorithm (ICMP) [1] and hybrid uplink time Difference of Arrival and Assisted GPS technique (UTDOA_AGPS) [2]. It has been noticed that ICMP algorithm outperforms other future location prediction algorithms with high precision and within suitable time (less than 220) msec. However, UTDOA_AGPS guarantees high precession of mobile user independent of the surrounding environment. The proposed technique is used to enhance reliability and efficiency of location based services using cellular network platform.展开更多
Today’s mobile devices and networks enable the development of novel mobile service applications. Developing such applications raises many challenges including heterogeneity in terms of mobile operating systems and AP...Today’s mobile devices and networks enable the development of novel mobile service applications. Developing such applications raises many challenges including heterogeneity in terms of mobile operating systems and APIs, service availability and scalability, and providing for the diverse communication needs of different applications. In this paper, we present an overview of the Odin middleware platform whose aim is to address these challenges. Odin utilises a surrogate-based architectural model to promote a mobile service’s scalability and availability. The middleware is reconfigurable, allowing mobile applications to adapt to changing operating conditions and minimise resource consumption. It also includes an optimised communication channel that masks the complexity of interacting with mobile services over mobile telecommunications networks. Using Odin’s interfaces and standards compliance, mobile applications and services with consistent communication behaviour can be easily implemented on heterogeneous platforms. Through quantitative evaluation, Odin’s message-based communication primitives have been demonstrated to perform favourably with leading industry push messaging providers.展开更多
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such as user location, time of the day, nearby people and devices, and user activ...Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such as user location, time of the day, nearby people and devices, and user activity. This paper intends to study the context-awareness in depth and demonstrate the usefulness of this new technology through two mobile applications that are adaptive to dynamic context.展开更多
Objectives:In recent years,the use of mobile health applications(mHealth apps)to deliver care for patients with breast cancer has increased exponentially.This study aimed to summarize the available evidence on develop...Objectives:In recent years,the use of mobile health applications(mHealth apps)to deliver care for patients with breast cancer has increased exponentially.This study aimed to summarize the available evidence on developing mHealth apps to care for patients with breast cancer and identify the need for systematic efforts.Methods:A scoping review was performed according to Arksey and O’Malley’s framework,aiming to identify eligible research studies in PubMed,CINAHL,and Web of Science between January 2010 and December 2020.All identified studies were screened,extracted,and analyzed independently by two reviewers.Results:A total of 676 studies were retrieved,and eight eligible studies were finally included.Four themes emerged:the involvement of patients and health professionals in the phases of design and development,patients’preferences,the characteristics of patients,and the motivators to use mHealth apps.The results indicated promising prospects for using mHealth apps to care for patients with breast cancer and identified the need for systematic efforts to develop and validate relevant apps.Conclusions:The attributes of patient characteristics,needs,and patient-reported outcomes data are vital components for developing mHealth apps for patients with breast cancer.Additionally,collaborative efforts,including patients,nurses,and other significant health professionals,should develop mHealth apps for breast cancer care.Additional research focusing on the design and development of mHealth apps for patients with breast cancer is warranted.展开更多
Multi-agent mobile applications play an essential role in mobile applications and have attracted more and more researchers’attention.Previous work has always focused on multi-agent applications with perfect informati...Multi-agent mobile applications play an essential role in mobile applications and have attracted more and more researchers’attention.Previous work has always focused on multi-agent applications with perfect information.Researchers are usually based on human-designed rules to provide decision-making searching services.However,existing methods for solving perfect-information mobile applications cannot be directly applied to imperfect-information mobile applications.Here,we take the Contact Bridge,a multi-agent application with imperfect information,for the case study.We propose an enhanced searching strategy to deal with multi-agent applications with imperfect information.We design a self-training bidding system model and apply a Recurrent Neural Network(RNN)to model the bidding process.The bridge system model consists of two parts,a bidding prediction system based on imitation learning to get a contract quickly and a visualization system for hands understanding to realize regular communication between players.Then,to dynamically analyze the impact of other players’unknown hands on our final reward,we design a Monte Carlo sampling algorithm based on the bidding system model(BSM)to deal with imperfect information.At the same time,a double-dummy analysis model is designed to efficiently evaluate the results of sampling.Experimental results indicate that our searching strategy outperforms the top rule-based mobile applications.展开更多
The use of mobile phone applications for our touristic activity is very common nowadays with the simplification of smartphones. The tourism mobile applications currently can be argued to be one of the most useful appl...The use of mobile phone applications for our touristic activity is very common nowadays with the simplification of smartphones. The tourism mobile applications currently can be argued to be one of the most useful applications that can facilitate the movement of travelers. However, existing usability evaluation metrics are too general to be applied to a more specific application, such as mobile tourism application. Thus, the objective of the study is to propose usability evaluation metrics for tourism mobile applications. The study employs four phases: identifying problem and the objective, encompassing the techniques of developing usability measurement of metrics, selecting the usability metrics of tourism mobile application and conducting expert review and verification. The verification phase was conducted using expert review approach to measure the proposed metrics in terms of its consistency ease of use, understandable, verifiable and overall impression. The finding revealed that the proposed metrics have been well received by the experts in terms of consistency, ease to use, understandable, verifiability and overall impression. Finally, this study presented usability metrics for the tourism mobile applications that can be used by designers or usability practitioners in creating a useable mobile application for the tourists.展开更多
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co...Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication.展开更多
In this paper, we propose a cheap means for propagating mobile application using Bluetooth, a convenient short range wireless technology. Today, one of the main problems about mobile technology is about implementing a...In this paper, we propose a cheap means for propagating mobile application using Bluetooth, a convenient short range wireless technology. Today, one of the main problems about mobile technology is about implementing automatically the software in the multiple and various type of phones devices, irrespective of the phone model (Nokia, Samsung, iPhone, etc.). There are many ways of doing OTA like by SMS. This approach allows providing an http download link by SMS but, we are limited by the maximum size one can have to build an application and send it trough this means. This approach is also expensive because data sources are expensive. Within the context of mobile social networking and proximity marketing, we come up with an original way of provisioning mobile applications using Bluetooth. We use anybody who is already a subscriber of an application to become an ambassador of it. The application is self-replicating and distributing in itself and sending back results. It ethically acts like a virus or a disease. A prototype is built to validate the proposed methodology.展开更多
Software reverse engineering is the process of analyzing a software system to extract the design and implementation details.Reverse engineering provides the source code of an application,the insight view of the archit...Software reverse engineering is the process of analyzing a software system to extract the design and implementation details.Reverse engineering provides the source code of an application,the insight view of the architecture and the third-party dependencies.From a security perspective,it is mostly used for finding vulnerabilities and attacking or cracking an application.The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics.Nowadays,reverse engineering is widely used for mobile applications and is considered a security risk.The Open Web Application Security Project(OWASP),a leading security research forum,has included reverse engineering in its top 10 list of mobile application vulnerabilities.Mobile applications are used in many sectors,e.g.,banking,education,health.In particular,the banking applications are critical in terms of security as they are used for financial transactions.A security breach of such applications can result in huge financial losses for the customers as well as the banks.There exist various tools for reverse engineering of mobile applications,however,they have deficiencies,e.g.,complex configurations,lack of detailed analysis reports.In this research work,we perform an analysis of the available tools for reverse engineering of mobile applications.Our dataset consists of the mobile banking applications of the banks providing services in Pakistan.Our results indicate that none of the existing tools can carry out the complete reverse engineering process as a standalone tool.In addition,we observe significant differences in terms of the execution time and the number of files generated by each tool for the same file.展开更多
Due to the rapid rise of mobile phones around the globe, many consumers, researchers, clinicians, and health services are starting to see their utility in health. As well as a health informatics role in improving the ...Due to the rapid rise of mobile phones around the globe, many consumers, researchers, clinicians, and health services are starting to see their utility in health. As well as a health informatics role in improving the uptake and efficiency of current health services, mobile communication-assisted health care (m-health) also opens opportunities for services that are strikingly new and curative, in particular delivering personal health behaviour change programmes. Herein, we report the preliminary findings of a health-promotion survey titled "Mobile Apps User Trend Analysis of Turkish People". The survey examines the information needs and media preferences of women and men who research health information and use mobile apps for their healthcare in everyday life. Also this study tries to recover the behaviour of people and what applications they are downloading with respect to health, wellness, and medical mobile applicaitons. In looking the data, it appears that adoption of mHealth is growing at a furious pace. In this context, improvements to health communication have the potential to make a significant role to a promising new medium for health education and communication.展开更多
Objective:To explore the current development and challenges regarding mobile medical applications(mmAPPs),so as to provide reference for application function elevation and quality improvement.Methods:We retrieved lite...Objective:To explore the current development and challenges regarding mobile medical applications(mmAPPs),so as to provide reference for application function elevation and quality improvement.Methods:We retrieved literature databases like Web of Science,PubMed,China National Knowledge Infrastructure,Wanfang,China Biomedical Network,time limit was from January 1,2010 to December 31,2021,and restricted to the Chinese or English language.Results:This study concluded with the following six aspects:Domestic and foreign development of mmAPP,reminder function,barriers and challenges(low quality;slow update rate;lack of standard evaluation tool or criterion),privacy and safety concerns,adverse drug event report state(low report rate-related reasons,different countries’report policies),and current hindrances in the progression(economic worries;personal education level;acceptance and study of technology;rural districts,and low-income countries).Conclusions:We should focus on the application’s quality elevation rather than quantity,pay more attention to patients’adverse drug event reports,privacy and safety,and place emphasis on rural districts and low-income countries.展开更多
基金This work was supported by the National Science and Technology Council,Taiwan,under Project NSTC 112-2221-E-029-015.
文摘Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.
基金Supported by the Strategic Priority Research Program of Chinese Academy of Sciences,No.XDB38010100the Natural Science Research Project of Anhui Educational Committee,No.2023AH040398+1 种基金Emergency Technological Research Project for COVID-19Science and Technology Projects in Guangzhou,No.2023A04J1087.
文摘BACKGROUND The glycemic control of children with type 1 diabetes(T1D)may be influenced by the economic status of their parents.AIM To investigate the association between parental economic status and blood glucose levels of children with T1D using a mobile health application.METHODS Data from children with T1D in China's largest T1D online community,Tang-TangQuan■.Blood glucose levels were uploaded every three months and parental economic status was evaluated based on annual household income.Children were divided into three groups:Low-income(<30000 Yuan),middle-income(30000-100000 Yuan),and high-income(>100000 yuan)(1 Yuan=0.145 United States Dollar approximately).Blood glucose levels were compared among the groups and associations were explored using Spearman’s correlation analysis and multivariable logistic regression.RESULTS From September 2015 to August 2022,1406 eligible children with T1D were included(779 female,55.4%).Median age was 8.1 years(Q1-Q3:4.6-11.6)and duration of T1D was 0.06 years(0.02-0.44).Participants were divided into three groups:Low-income(n=320),middle-income(n=724),and high-income(n=362).Baseline hemoglobin A1c(HbA1c)levels were comparable among the three groups(P=0.072).However,at month 36,the low-income group had the highest HbA1c levels(P=0.036).Within three years after registration,glucose levels increased significantly in the low-income group but not in the middle-income and high-income groups.Parental economic status was negatively correlated with pre-dinner glucose(r=-0.272,P=0.012).After adjustment for confounders,parental economic status remained a significant factor related to pre-dinner glucose levels(odds ratio=13.02,95%CI:1.99 to 126.05,P=0.002).CONCLUSION The blood glucose levels of children with T1D were negatively associated with parental economic status.It is suggested that parental economic status should be taken into consideration in the management of T1D for children.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金funding this work under the TEJA Internal Grant number GDT2022/1-18.
文摘This paper presents the development and evaluation of the Domestic Abuse and Violence Support System(DAVSS),a mobile application designed to address domestic violence issues in Malaysia.DAVSS integrates the essential 27-DASH(Danger Assessment for Separation and Harassment)questionnaire to assess the severity of domestic violence situations.The project follows the phased approach of the Waterfall Model,encompassing requirements,analysis,design,development,and testing stages.Usability testing was conducted to evaluate the DAVSS application,revealing overall user satisfaction.However,this assessment relied primarily on frequency analysis,prompting consideration for enhanced reliability through alternative measurement methods such as median and standard deviation approaches.The DAVSS application’s Danger Assessment Test(DAT)algorithm,built upon the 27-DASH questions,represents a significant aspect of the system.Future work includes the validation of this rule-based algorithm using expert evaluation,potentially through Delphi techniques.Given the absence of dedicated domestic abuse mobile applications in Malaysia,DAVSS promises several advantages.It empowers victims to report incidents,locate shelters for protection,and facilitates shelter access through QR code integration.In conclusion,as domestic violence remains a pressing concern requiring increased support,the DAVSS mobile application emerges as a vital system that offers assistance to victims while breaking down barriers that may silence their voices.
文摘Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for digital medical solutionshas been accelerated by the need for new diagnostic and therapeutic methods inthe current coronavirus disease 2019 pandemic. This also applies to clinicalpractice in gastroenterology, which has, in many respects, undergone a recentdigital transformation with numerous consequences that will impact patients andhealth care professionals in the near future. MHAs and MAs are considered tohave great potential, especially for chronic diseases, as they can support the selfmanagementof patients in many ways. Despite the great potential associated withthe application of MHAs and MAs in gastroenterology and health care in general,there are numerous challenges to be met in the future, including both the ethicaland legal aspects of applying this technology. The aim of this article is to providean overview of the current status of MHA and MA use in the field ofgastroenterology, describe the future perspectives in this field and point out someof the challenges that need to be addressed.
基金Acknowledgements This work was supported by the National Natural ScienceFoundation of China under Grants No. 60873191, No. 60903152, No. 60821001, and the Beijing Natural Science Foundation under Grant No. 4072020.
文摘To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications.
文摘The growing use of mobile health applications for health purposes increased the expectations about their effectiveness. The study examines the effectiveness of mobile health applications on the self-management behaviors of 168 individuals diagnosed with cancer. The results of a secondary analysis indicate that using extensively mobile health applications significantly increases women’s health empowerment attitudes—reaching health decisions, changing their approach to health concerns, seeking additional health consultation. However, the use of mobile health applications does not increase the likelihood of adopting self-management behaviors. The study indicates that the effectiveness of mobile health applications in self-management practices is contingent upon a set of personal characteristics and the level of technology skills.
文摘<div style="text-align:justify;"> <span style="font-family:Verdana;">Software reliability is an important quality attribute, and software reliability models are frequently used to measure and predict software maturity. The nature of mobile environments differs from that of PC and server environments due to many factors, such as the network, energy, battery, and compatibility. Evaluating and predicting mobile application reliability are real challenges because of the diversity of the mobile environments in which the applications are used, and the lack of publicly available defect data. In addition, bug reports are optionally submitted by end-users. In this paper, we propose assessing and predicting the reliability of a mobile application using known software reliability growth models (SRGMs). Four software reliability models are used to evaluate the reliability of an open-source mobile application through analyzing bug reports. Our experiment proves it is possible to use SRGMs with defect data acquired from bug reports to assess and predict the software reliability in mobile applications. The results of our work enable software developers and testers to assess and predict the reliability of mobile software applications.</span> </div>
基金Supported by the National High-tech Research and Development Program of China(2013AA041307)the National Natural Science Foundation of China(51478249)the Tsinghua University-Glodon Joint Research Centre for Building Information Model
文摘The building information model/modeling (BIM) technology is currently applied in a broad range of applications and research for facility management, while the BIM-based mobile FM is difficult owing to various factors and environments. For example, the mobile applications usually require frequent cross-equipment compatibility. This paper proposes a reasonable BIM-based FM cross-platform framework and develops a mobile application on the basis of an existing BIM-based FM system. The developed mobile application is applied in a case study of a metro station project in Guangzhou to verify its effectiveness in FM practice. It helps maintenance staff in viewing BIMs, accessing related information, and updating maintenance records in a unique platform. The test results demonstrate that the proposed BIM-based cross-platform framework meet the FM application requirements and supports the extension of FM functions.
文摘Many wireless applications are deployed and available to customers via their mobile phones. Variety of these applications and services are based on determination of the current or future location of mobile user. Location based services (LBS) are one of the vital applications which are subdivided into two main categories: economical category and public category. Economic applications include mobile marketing, entertainment and tracking applications. Whereas, emergency cases, safety, traffic management, Muslims’ applications and public information applications are sort of public applications. The first part of the paper presents a new proposed system with developed procedure to recreate public and economic applications with high positioning accuracy and good authentication of users’ data. The developed system is created to enhance both location based services and network allocation resources within mobile network platform using either normal or GPS supported mobile equipment. The second part of the paper introduces future location prediction of mobile user dependent applications. New algorithm is developed depending on utilizing both intra-cell Movement Pattern algorithm (ICMP) [1] and hybrid uplink time Difference of Arrival and Assisted GPS technique (UTDOA_AGPS) [2]. It has been noticed that ICMP algorithm outperforms other future location prediction algorithms with high precision and within suitable time (less than 220) msec. However, UTDOA_AGPS guarantees high precession of mobile user independent of the surrounding environment. The proposed technique is used to enhance reliability and efficiency of location based services using cellular network platform.
文摘Today’s mobile devices and networks enable the development of novel mobile service applications. Developing such applications raises many challenges including heterogeneity in terms of mobile operating systems and APIs, service availability and scalability, and providing for the diverse communication needs of different applications. In this paper, we present an overview of the Odin middleware platform whose aim is to address these challenges. Odin utilises a surrogate-based architectural model to promote a mobile service’s scalability and availability. The middleware is reconfigurable, allowing mobile applications to adapt to changing operating conditions and minimise resource consumption. It also includes an optimised communication channel that masks the complexity of interacting with mobile services over mobile telecommunications networks. Using Odin’s interfaces and standards compliance, mobile applications and services with consistent communication behaviour can be easily implemented on heterogeneous platforms. Through quantitative evaluation, Odin’s message-based communication primitives have been demonstrated to perform favourably with leading industry push messaging providers.
文摘Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such as user location, time of the day, nearby people and devices, and user activity. This paper intends to study the context-awareness in depth and demonstrate the usefulness of this new technology through two mobile applications that are adaptive to dynamic context.
基金This study was supported by the Natural Science Foundation of China(71874032)the Natural Science Foundation of China(72074054).
文摘Objectives:In recent years,the use of mobile health applications(mHealth apps)to deliver care for patients with breast cancer has increased exponentially.This study aimed to summarize the available evidence on developing mHealth apps to care for patients with breast cancer and identify the need for systematic efforts.Methods:A scoping review was performed according to Arksey and O’Malley’s framework,aiming to identify eligible research studies in PubMed,CINAHL,and Web of Science between January 2010 and December 2020.All identified studies were screened,extracted,and analyzed independently by two reviewers.Results:A total of 676 studies were retrieved,and eight eligible studies were finally included.Four themes emerged:the involvement of patients and health professionals in the phases of design and development,patients’preferences,the characteristics of patients,and the motivators to use mHealth apps.The results indicated promising prospects for using mHealth apps to care for patients with breast cancer and identified the need for systematic efforts to develop and validate relevant apps.Conclusions:The attributes of patient characteristics,needs,and patient-reported outcomes data are vital components for developing mHealth apps for patients with breast cancer.Additionally,collaborative efforts,including patients,nurses,and other significant health professionals,should develop mHealth apps for breast cancer care.Additional research focusing on the design and development of mHealth apps for patients with breast cancer is warranted.
基金supported by the Funds for Creative Research Groups of China under No.61921003 and Snyrey Bridge Company.
文摘Multi-agent mobile applications play an essential role in mobile applications and have attracted more and more researchers’attention.Previous work has always focused on multi-agent applications with perfect information.Researchers are usually based on human-designed rules to provide decision-making searching services.However,existing methods for solving perfect-information mobile applications cannot be directly applied to imperfect-information mobile applications.Here,we take the Contact Bridge,a multi-agent application with imperfect information,for the case study.We propose an enhanced searching strategy to deal with multi-agent applications with imperfect information.We design a self-training bidding system model and apply a Recurrent Neural Network(RNN)to model the bidding process.The bridge system model consists of two parts,a bidding prediction system based on imitation learning to get a contract quickly and a visualization system for hands understanding to realize regular communication between players.Then,to dynamically analyze the impact of other players’unknown hands on our final reward,we design a Monte Carlo sampling algorithm based on the bidding system model(BSM)to deal with imperfect information.At the same time,a double-dummy analysis model is designed to efficiently evaluate the results of sampling.Experimental results indicate that our searching strategy outperforms the top rule-based mobile applications.
文摘The use of mobile phone applications for our touristic activity is very common nowadays with the simplification of smartphones. The tourism mobile applications currently can be argued to be one of the most useful applications that can facilitate the movement of travelers. However, existing usability evaluation metrics are too general to be applied to a more specific application, such as mobile tourism application. Thus, the objective of the study is to propose usability evaluation metrics for tourism mobile applications. The study employs four phases: identifying problem and the objective, encompassing the techniques of developing usability measurement of metrics, selecting the usability metrics of tourism mobile application and conducting expert review and verification. The verification phase was conducted using expert review approach to measure the proposed metrics in terms of its consistency ease of use, understandable, verifiable and overall impression. The finding revealed that the proposed metrics have been well received by the experts in terms of consistency, ease to use, understandable, verifiability and overall impression. Finally, this study presented usability metrics for the tourism mobile applications that can be used by designers or usability practitioners in creating a useable mobile application for the tourists.
文摘Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication.
文摘In this paper, we propose a cheap means for propagating mobile application using Bluetooth, a convenient short range wireless technology. Today, one of the main problems about mobile technology is about implementing automatically the software in the multiple and various type of phones devices, irrespective of the phone model (Nokia, Samsung, iPhone, etc.). There are many ways of doing OTA like by SMS. This approach allows providing an http download link by SMS but, we are limited by the maximum size one can have to build an application and send it trough this means. This approach is also expensive because data sources are expensive. Within the context of mobile social networking and proximity marketing, we come up with an original way of provisioning mobile applications using Bluetooth. We use anybody who is already a subscriber of an application to become an ambassador of it. The application is self-replicating and distributing in itself and sending back results. It ethically acts like a virus or a disease. A prototype is built to validate the proposed methodology.
基金The authors acknowledge the support of Security Testing-Innovative Secured Systems Lab(ISSL)established at University of Engineering&Technology,Peshawar,Pakistan under the Higher Education Commission initiative of National Center for Cyber Security(Grant No.2(1078)/HEC/M&E/2018/707).
文摘Software reverse engineering is the process of analyzing a software system to extract the design and implementation details.Reverse engineering provides the source code of an application,the insight view of the architecture and the third-party dependencies.From a security perspective,it is mostly used for finding vulnerabilities and attacking or cracking an application.The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics.Nowadays,reverse engineering is widely used for mobile applications and is considered a security risk.The Open Web Application Security Project(OWASP),a leading security research forum,has included reverse engineering in its top 10 list of mobile application vulnerabilities.Mobile applications are used in many sectors,e.g.,banking,education,health.In particular,the banking applications are critical in terms of security as they are used for financial transactions.A security breach of such applications can result in huge financial losses for the customers as well as the banks.There exist various tools for reverse engineering of mobile applications,however,they have deficiencies,e.g.,complex configurations,lack of detailed analysis reports.In this research work,we perform an analysis of the available tools for reverse engineering of mobile applications.Our dataset consists of the mobile banking applications of the banks providing services in Pakistan.Our results indicate that none of the existing tools can carry out the complete reverse engineering process as a standalone tool.In addition,we observe significant differences in terms of the execution time and the number of files generated by each tool for the same file.
文摘Due to the rapid rise of mobile phones around the globe, many consumers, researchers, clinicians, and health services are starting to see their utility in health. As well as a health informatics role in improving the uptake and efficiency of current health services, mobile communication-assisted health care (m-health) also opens opportunities for services that are strikingly new and curative, in particular delivering personal health behaviour change programmes. Herein, we report the preliminary findings of a health-promotion survey titled "Mobile Apps User Trend Analysis of Turkish People". The survey examines the information needs and media preferences of women and men who research health information and use mobile apps for their healthcare in everyday life. Also this study tries to recover the behaviour of people and what applications they are downloading with respect to health, wellness, and medical mobile applicaitons. In looking the data, it appears that adoption of mHealth is growing at a furious pace. In this context, improvements to health communication have the potential to make a significant role to a promising new medium for health education and communication.
基金supported by the Joint Medical project of Chongqing Science and Technology Commission (No. 2020MSXM077)the Nursing Development project of Chinese Medical Association (No. CMAPH-NRD2021004)
文摘Objective:To explore the current development and challenges regarding mobile medical applications(mmAPPs),so as to provide reference for application function elevation and quality improvement.Methods:We retrieved literature databases like Web of Science,PubMed,China National Knowledge Infrastructure,Wanfang,China Biomedical Network,time limit was from January 1,2010 to December 31,2021,and restricted to the Chinese or English language.Results:This study concluded with the following six aspects:Domestic and foreign development of mmAPP,reminder function,barriers and challenges(low quality;slow update rate;lack of standard evaluation tool or criterion),privacy and safety concerns,adverse drug event report state(low report rate-related reasons,different countries’report policies),and current hindrances in the progression(economic worries;personal education level;acceptance and study of technology;rural districts,and low-income countries).Conclusions:We should focus on the application’s quality elevation rather than quantity,pay more attention to patients’adverse drug event reports,privacy and safety,and place emphasis on rural districts and low-income countries.