Identification of age-dependent transition zone in the use of internet / electronic devices is important for healthcare communication in cancer patients

2012 ◽  
Vol 3 ◽  
pp. S90-S91
Author(s):  
A. Saied ◽  
N.J. Espat ◽  
S.J. Sherry ◽  
D. Castricone ◽  
K. Perry ◽  
...  
Author(s):  
Samuel Oliveira Azevedo ◽  
Rummenigge Rudson Dantas ◽  
Luiz Marcos Gonçalves

This chapter introduces the use of middleware tools in applications for healthcare and social services, focusing on solutions designed for Interactive Digital Television (IDTV), and discusses its implications to modern roles for easing patient and caretaker relations. The authors explore the capacities of such solutions to assist the patients in their personal needs, optimizing the time and tasks of the caretaker. They discuss the limits of the use of Internet in satisfying the needs of communication of elderly and other patients, and then they propose new roles for caretaking based on this new reality. The authors also present an architecture that allows the remote use and control of electronic devices via IDTV set-top boxes for the middleware Ginga. They show applications based on this architecture that promote healthcare and social services, as a set of infrared lights coupled to a hat that can be used as input for impaired patients, and how an accelerometer can be used with IDTV applications for treatment and entertainment. Before concluding, the authors point out research directions on the topics discussed in this chapter.


2019 ◽  
Vol 15 (6) ◽  
pp. 967-973 ◽  
Author(s):  
Vincenzo L. Malavasi ◽  
Giuseppina De Marco ◽  
Jacopo F. Imberti ◽  
Filippo Placentino ◽  
Marco Vitolo ◽  
...  

2019 ◽  
Vol 40 (17) ◽  
pp. 4994-5010 ◽  
Author(s):  
Jeroen Blommaert ◽  
Gwen Schroyen ◽  
Mathieu Vandenbulcke ◽  
Ahmed Radwan ◽  
Ann Smeets ◽  
...  

2008 ◽  
Vol 26 (15_suppl) ◽  
pp. 20704-20704
Author(s):  
M. López ◽  
J. Feliú ◽  
E. Espinosa ◽  
B. Castelo ◽  
J. de Castro ◽  
...  

AYUSHDHARA ◽  
2021 ◽  
pp. 3547-3550
Author(s):  
Borkar Manasi R ◽  
Kotangale Sumedha Y ◽  
Kotangale Yogesh T

Computer vision syndrome (CVS) is a symptom complex in which symptoms develop due to long screening time and improper postures while using computers. Ayurveda has mentioned Shushkakshipaka under Sarvagat Netra Roga. The symptoms of CVS and Shushkakshipaka when corelated, it denotes imbalance of Vata and Pitta Dosha. These vitiated Doshas carried by Siras to the eyes. When Doshas accumulated in eye the condition develops, called as Shushkakshipaka. Over use of Internet, Computers, Electronic devices increasing the risk factors about maintaining the normal vision. For the management of the CVS case, the Saindhava Jala Seka and Abhyantara Triphala Ghritapana is chosen from Sushrut Samhita. Triphala Ghrita is beneficial for complete maintenance of physiology of eye. The Guna Karma of Saindhava and Triphala Ghrita are Vata-Pitta Shamaka and both having Chakshushya properties. The main purpose for this study is to find safe and effective treatment without untoward effect in the management of CVS along with respective ergonomics advice. The required clinical tests done to observe the effectiveness of the combination of local and systemic treatment. The dryness in the eyes and associated symptoms can be resolved with the local treatment like Seka. Both the treatment modalities in combination have potential to give local and systemic relief improving the symptoms of CVS.


2015 ◽  
Vol 12 (2) ◽  
pp. 1192
Author(s):  
Ümit Bostancı ◽  
Recep Benzer

<p>In the context of computer forensics, computer is merely the one of the devices that can be used to commit IT crime. Nowadays, there is an increase related to IT crimes committed consciously or unconsciously. In addition, cyber crimes can be committed through a variety of electronic devices. In related to this matter, there are some legal regulations in both Turkish Penal Code and Law of Criminal Procedure.</p><p>In the globalizing world, together with expansion of use of Internet quickly, uncontrolled and unconsciously, dimension of IT crimes have become beyond the country’s border and cooperation with each of the countries to struggle with this issue has become compulsory. Indeed, as investigation are getting deeper, a computer crime that seems to have been commited in a country through misleading IP addresses can be observed that this crime actually had been committed in an another country.</p><p>In an investigation or prosecution phase of a committed cyber crime, searching on the computer, copying data of the computer and even seizing the computer as an evidence of a crime may be required.</p><p>In societies using Information systems so intense; making more specific regulations regarding how incident response of cyber crimes and other crimes committed by means of information systems, investigation and prosecution should be done will ensure more effective results in the fight against these crimes.</p><p>The main purpose of this study, to expose the legal arrangements about search, copy and seizure on the computers in the Turkish legal system, to express encountered problems in practice and to reccomend some solutions related to these.</p><p> </p><p><strong>Özet</strong></p><p>Adli bilişim bağlamında bilgisayar, bilişim suçu işlemede kullanılabilecek aygıtlardan sadece birisidir. Günümüzde bilişim suçlarının bilinçli ya da bilinçsiz olarak işlenmeleri ile ilgili göze çarpan bir artış söz konusudur.  Ayrıca bilişim suçları çeşitli elektronik aletler vasıtasıyla işlenebilmektedir. Bu konuyla ilgili olarak gerek TCK’da gerek Ceza Muhakemeleri Kanununda bazı yasal düzenlemeler yer almaktadır.</p><p>Globalleşen dünyada İnternet kullanımının hızla, kontrolsüz ve bilinçsiz bir şekilde yayılmasıyla birlikte bilişim suçlarının boyutları ülke sınırlarını aşar hale gelmiş ve bilişim suçları ile mücadele edebilmek için ülkelerin birbirleriyle işbirliği yapmaları zorunlu hale gelmiştir. Zira, yanıltıcı IP adresleri vasıtasıyla bir ülkede işlenmiş gibi gözüken bir bilişim suçunun araştırmalar derinleştikçe aslında o ülkede değil başka ülkede ya da ülkelerde yer alan sunucular vasıtasıyla işlenebildiği gözlemlenmektedir.                                                                           </p><p>İşlenen bir bilişim suçunun soruşturması ya da kovuşturma aşamasında bilgisayarlar üzerinde arama yapılması, bilgisayar üzerindeki verilerin birebir kopyalanması ve hatta suç delili olarak bu bilgisayarlara el konulması gerekebilir. </p><p>Bilgi sistemlerini bu kadar yoğun kullanan toplumlarda, bilişim suçlarına ve bilişim sistemleri vasıtasıyla işlenen diğer suçlara müdahale, soruşturma ve kovuşturma’nın nasıl yapılması gerektiğine ilişkin daha özel yasal düzenlemelerin yapılması bu suçlarla mücadelede daha etkili sonuçların alınmasını sağlayacaktır.</p><p>Çalışmanın temel amacı, Türk hukuk sisteminde bilgisayarlarda arama, kopyalama ve el koymaya ait yasal düzenlemelerin ortaya konulması, uygulamada karşılaşılan aksaklıkların dile getirilerek bunlara ilişkin çözümlerin önerilmesidir.</p>


1984 ◽  
Vol 12 (4) ◽  
pp. 660-660 ◽  
Author(s):  
JACQUELINE LABAT-ROBERT ◽  
JEAN-PASCAL POTAZMAN ◽  
LADISLAS ROBERT

Sign in / Sign up

Export Citation Format

Share Document