Search results for "Telecommunication"
showing 10 items of 1769 documents
Cloud-based eHealth video encoding system for real time thermographic streaming: Performance evaluation
2017
Recent studies about the use of cloud platforms indicate that more than three-fourths of healthcare institutions apply these technologies in their daily lives. However, in most cases the cloud is based on “Infrastructure as a Service”, instead of developing new applications using the benefits that can bring us this type of technology. For these reasons, this paper shows a private cloud-based system to provide a new application based on thermographic video streaming. In this case, the cloud architecture is divided into three zones. The first zone is where the patient is under medical supervision through body temperature analysis using a global thermal camera. The second zone is the cloud its…
Phone-Controlled Delivery of NGN Services into Residential Environments
2008
The horizontally layered architecture of the IMS/NGN standards family enables the delivery of services independent of access network and requesting device. In this article, the authors propose a further separation of service control and delivery, allowing the requesting device - in particular a user's mobile phone - to invite other devices (we will focus on DLNA appliances) into the service delivery, enhancing both user experience and service design flexibility. The proposed solution builds on exploiting proximity technologies (e.g. barcodes, NFC) for pairing the control device with a remote environment. Motivated by scenarios, the architecture concepts are explained and a prototype that wa…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks
2018
International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …
P and R Wave Detection in Complete Congenital Atrioventricular Block
2009
Complete atrioventricular block (type III AVB) is characterized by an absence of P wave transmission to ventricles. This implies that QRS complexes are generated in an autonomous way and are not coordinated with P waves. This work introduces a new algorithm for the detection of P waves for this type of pathology using non-invasive electrocardiographic surface leads. The proposed algorithm is divided into three stages. In the first stage, the R waves located by a QRS detector are used to generate the RR series and time references for the other stages of the algorithm. In the second stage, the ventricular activity (QT segment) is removed by using an adaptive filter that obtains an averaged pa…
Metabolomic Changes after Coffee Consumption: New Paths on the Block
2021
Scope Several studies suggest that regular coffee consumption may help preventing chronic diseases, but the impact of daily intake and the contribution of coffee metabolites in disease prevention are still unclear. The present study aimed at evaluating whether and how different patterns of coffee intake (one cup of espresso coffee/day, three cups of espresso coffee/day, one cup of espresso coffee/day and two cocoa-based products containing coffee two times per day) might impact endogenous molecular pathways. Methods and results A three-arm, randomized, cross-over trial was performed in 21 healthy volunteers who consumed each treatment for one month. Urine samples were collected to perform u…
Age Differences in Face Processing: The Role of Perceptual Degradation and Holistic Processing
2017
Abstract Objectives We simultaneously investigated the role of three hypotheses regarding age-related differences in face processing: perceptual degradation, impaired holistic processing, and an interaction between the two. Methods Young adults (YA) aged 20–33-year olds, middle-age adults (MA) aged 50–64-year olds, and older adults (OA) aged 65–82-year olds were tested on the context congruency paradigm, which allows measurement of face-specific holistic processing across the life span (Meinhardt-Injac, Persike & Meinhardt, 2014. Acta Psychologica, 151, 155–163). Perceptual degradation was examined by measuring performance with faces that were not filtered (FSF), with faces filtered to …
The use of technology in the context of frailty screening and management interventions: a study of stakeholders’ perspectives
2019
Abstract Background Health and social care interventions show promise as a way of managing the progression of frailty in older adults. Information technology could improve the availability of interventions and services for older adults. The views of stakeholders on the acceptability of technological solutions for frailty screening and management have not been explored. Methods Focus groups were used to gather data from healthy and frail/pre-frail older adults, health and social care providers, and caregivers in three European countries – Italy, Poland and UK. Data were analysed using framework analysis in terms of facilitators or determinants of older adults’ adoption of technology. Results…
Radiofrequency electromagnetic fields emitted from base stations of DECT cordless phones and the risk of glioma and meningioma (Interphone Study Grou…
2006
The objective of this study was to test the hypothesis that exposure to continuous low-level radiofrequency electromagnetic fields (RF EMFs) increases the risk of glioma and meningioma. Participants in a population-based case-control study in Germany on the risk of brain tumors in relation to cellular phone use were 747 incident brain tumor cases between the ages of 30 and 69 years and 1494 matched controls. The exposure measure of this analysis was the location of a base station of a DECT (Digital Enhanced Cordless Telecommunications) cordless phone close to the bed, which was used as a proxy for continuous low-level exposure to RF EMFs during the night. Estimated odds ratios were 0.82 (95…
Towards Improved Healthcare Performance: Examining Technological Possibilities and Patient Satisfaction with Wireless Body Area Networks
2009
Published version of an article from the journal: Journal of Medical Systems. he original publication is available at Springerlink. http://dx.doi.org/10.1007/s10916-009-9291-8 This paper investigates the benefits of using less intrusive wireless technologies for heart monitoring. By replacing well established heart monitoring devices (i.e. Holter) with wireless ECG based Body Area Networks (BAN), improved healthcare performance can be achieved, reflected in (1) high quality ECG recordings during physical activities and (2) increased patient satisfaction. A small scale clinical trial was conducted to compare both technologies and the results illustrate that the wireless ECG monitor was able …