scholarly journals A Mobile Telephone-Based SMS and Internet Survey System for Self-Assessment in Australian Anaesthesia: Experience of a Single Practitioner

2014 ◽  
Vol 42 (6) ◽  
pp. 771-776 ◽  
Author(s):  
D. Belavy

Self-assessment and audit in anaesthesia require a systematic approach to postoperative data collection. The increasing prevalence of mobile internet technology offers a new data collection method for anaesthetists. In this paper, a system for mobile internet data collection is described and the preliminary experience with its use is presented. The system was developed by the author and combined an open source survey application and a short message service (SMS) gateway to send SMS messages to patients after their anaesthesia and surgery. The messages requested patients to complete an online Quality of Recovery survey questionnaire if they had a smartphone. The results were immediately available. A preliminary survey of consenting patients with available mobile telephone numbers in a private practice was undertaken by the author. A total of 123 procedures were eligible for follow-up and survey requests were sent to 94 patients. Sixty-five surveys were completed. This represents 69% of surveys requested, demonstrating that mobile phone technology can be used to provide significant amounts of data for quality assurance. However, the implementation of a mobile internet data collection system requires consideration of privacy principles, security and ethical handling of data.

2020 ◽  
Vol 4 (2) ◽  
pp. 69-80
Author(s):  
Mohamed Ibrahim Eymoi ◽  
Patrick Mbataru

The unprecedented global adoption of information and communication technologies (ICTs) is rapidly changing the way people are communicating in solving problems. For several years now, the role of ICTs has become important in the way people construct their relationships in conflict resolution. Yet little is known on the dynamism of this interaction. It is not clear how mobile technology has contributed toward conflict resolution, and this study will contribute to the knowledge on the role of mobile telephones in conflict resolution. The purpose of this study was to explore how the mobile phone technology contributed in resolving communal conflicts in Mandera County, Kenya. This study was guided by three theories: conflict transformation theory, diffusion of innovations theory and social representation theory. The conflict Tansformation Theory is adopted as the main theory of analysis.  The main idea of this theory is transforming negative conflict into constructive conflict, deals with structural, behavioural and attitudinal aspects of conflict. This study adopted a descriptive survey. The population for this study consisted of 301 employees in ICT and security department where stakeholders in technology and security sectors and the public. Primary and secondary  data was analysed according to the objectives. Primary data was derived from questionnaires formulated to target employees in ICT and security department. The data analysis included qualitative and quantitative techniques.  Qualitative data was summarized and categorized according to common themes and was presented using frequency distribution tables, graphs and charts. Content analysis was used mostly to arrive at inferences through a systematic and objective identification of the specific messages. The quantitative data collected was analyzed using descriptive statistics. The results confirmed that short message service, social media plateform, instant messaging applications, and video conferencing play a role in resolving communal conflicts in Mandera County. The study concludes that Short Message Service, Social Media Platforms and Instant Messaging Applications can be used conflict such as communal conflicts. Video Conferencing can be used to solve conflict such as relationship conflict, arises from differences in personality, style, matters of taste, and even conflict style as well as conflict in the workplace like task conflict. County government of Mandera must come up with ways of incorporating mobile phone technologies such as Short Message Service, Social Media Platforms, Instant Messaging and Video Conferencing on matters conflict resolution. The study recommends that the County Government of Mandera in collaboration with the National Government need to come up with agencies to regulate the use of social media as a medium to communicate in times of conflict since they are sometimes prone to misuse.


2020 ◽  
Vol 12 (16) ◽  
pp. 6333
Author(s):  
Chan Liu ◽  
Raymond K. H. Chan ◽  
Maofu Wang ◽  
Zhe Yang

Harnessing the rapid development of mobile internet technology, the sharing economy has experienced unprecedented growth in the global economy, especially in China. Likely due to its increasing popularity, more and more businesses have adopted this label in China. There is a concern as to the essential meaning of the sharing economy. As it is difficult to have a universally accepted definition, we aim to map the sharing economy and demystify the use of it in China in this paper. We propose seven organizing essential elements of the sharing economy: access use rights instead of ownership, idle capacity, short term, peer-to-peer, Internet platforms mediated, for monetary profit, and shared value orientation. By satisfying all or only parts of these elements, we propose one typology of sharing economy, and to differentiate bona fide sharing economy from quasi- and pseudo-sharing economy. Finally, there are still many problems that need to be solved urgently in the real sharing economy from the perspective of the government, companies and individuals.


2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Qiang Yan ◽  
Lianren Wu ◽  
Lanli Yi

Through analyzing the data about the releases, comment, and forwarding of 120,000 microblog messages in a year, this paper finds out that the intervals between information releases and comment follow a power law; besides, the analysis of data in each 24 hours reveals obvious differences between microblogging and website visit, email, instant communication, and the use of mobile phone, reflecting how people use fragments of time via mobile internet technology. The paper points out the significant influence of the user's activity on the intervals of information releases and thus demonstrates a positive correlation between the activity and the power exponent. The paper also points out that user's activity is influenced by social identity in a positive way. The simulation results based on the social identity mechanism fit well with the actual data, which indicates that this mechanism is a reasonable way to explain people's behavior in the mobile Internet.


Author(s):  
Juyuan Yin ◽  
Jian Sun ◽  
Keshuang Tang

Queue length estimation is of great importance for signal performance measures and signal optimization. With the development of connected vehicle technology and mobile internet technology, using mobile sensor data instead of fixed detector data to estimate queue length has become a significant research topic. This study proposes a queue length estimation method using low-penetration mobile sensor data as the only input. The proposed method is based on the combination of Kalman Filtering and shockwave theory. The critical points are identified from raw spatiotemporal points and allocated to different cycles for subsequent estimation. To apply the Kalman Filter, a state-space model with two state variables and the system noise determined by queue-forming acceleration is established, which can characterize the stochastic property of queue forming. The Kalman Filter with joining points as measurement input recursively estimates real-time queue lengths; on the other hand, queue-discharging waves are estimated with a line fitted to leaving points. By calculating the crossing point of the queue-forming wave and the queue-discharging wave of a cycle, the maximum queue length is also estimated. A case study with DiDi mobile sensor data and ground truth maximum queue lengths at Huanggang-Fuzhong intersection, Shenzhen, China, shows that the mean absolute percentage error is only 11.2%. Moreover, the sensitivity analysis shows that the proposed estimation method achieves much better performance than the classical linear regression method, especially in extremely low penetration rates.


2021 ◽  
Vol 5 (2) ◽  
Author(s):  
Sujatmi Sujatmi

This research is motivated by the discovery of teachers who do not compile test instruments according to the indicators and learning objectives, teachers have not been able to arrange instruments according to the level of difficulty, and the use of language according to the level of understanding of students. This study aims to improve the ability of teachers to compile test instruments through integrated self-assessment training activities. This research is in the form of school action research conducted on teachers of SDN 007 Pematang Ibul. The research subjects were 17 teachers. The data collection instrument used an observation sheet. The results showed that in the first cycle the teacher's ability to compile the test instrument was 71.78 which was a good criterion, then increased in the second cycle to 87.14 which reached very good criteria. Based on the results of the study it can be concluded that through integrated self-assessment training can improve the ability of SDN 007 Pematang Ibul teachers in preparing test instruments.


2021 ◽  
Vol 13 (18) ◽  
pp. 10221
Author(s):  
Sufyan Habib ◽  
Nawaf N. Hamadneh

E-commerce industry has witnessed a phenomenal growth globally due to the sudden spread of the COVID-19 pandemic and the advancement of mobile Internet technology, with fast adaption of online shopping technologies by the customers. Previously, online shopping was only available in a few product categories and to a select group of consumers. The COVID-19 guidelines related to safety, physical distancing, closure, lockdown, and other restrictions have insisted that consumers shop online. Because of e-commerce growth, the grocery (FMCG) industry is also equipped with advanced technologies such as the Internet of Things (IoT), cloud computing, and block chain technology. This paper analyzes the UTAUT2 model and its influence on perceived risk and consumer trust in online purchase intention of grocery categories of products among Indian customers. We tried to analyze the growth potential of new technologies in grocery retail and formulated the hypotheses. The results showed that the spread of COVID-19 pandemic had a significant influence on the online shopping behavior of Indian customers. The outcome of the study partly assists businesses in understanding the impact of the factors of consumer adaption of technology, perceived risk associated with online transaction, consumer trust in online technologies and consumer online purchase intention of grocery products. To promote e-commerce in India, the current study suggests that marketers should try to develop consumer trust and lowering the perceived risk associated with online shopping. Some management implications and future area of study based on empirical findings are also highlighted in the present research work.


2019 ◽  
Author(s):  
Xia Huiyi ◽  
◽  
Nankai Xia ◽  
Liu Liu ◽  
◽  
...  

With the development of urbanization and the continuous development, construction and renewal of the city, the living environment of human beings has also undergone tremendous changes, such as residential community environment and service facilities, urban roads and street spaces, and urban public service formats. And the layout of the facilities, etc., and these are the real needs of people in urban life, but the characteristics of these needs or their problems will inevitably have a certain impact on the user's psychological feelings, thus affecting people's use needs. Then, studying the ways in which urban residents perceive changes in the living environment and how they perceive changes in psychology and emotions will have practical significance and can effectively assist urban management and builders to optimize the living environment of residents. This is also the long-term. One of the topics of greatest interest to urban researchers since then. In the theory of demand hierarchy proposed by American psychologist Abraham Maslow, safety is the basic requirement second only to physiological needs. So safety, especially psychological security, has become one of the basic needs of people in the urban environment. People's perception of the psychological security of the urban environment is also one of the most important indicators in urban environmental assessment. In the past, due to the influence of technical means, the study of urban environmental psychological security often relied on the limited investigation of a small number of respondents. Low-density data is difficult to measure the perceptual results of universality. With the leaping development of the mobile Internet, Internet image data has grown geometrically over time. And with the development of artificial intelligence technology in recent years, image recognition and perception analysis based on machine learning has become possible. The maturity of these technical conditions provides a basis for the study of the urban renewal index evaluation system based on psychological security. In addition to the existing urban visual street furniture data obtained through urban big data collection combined with artificial intelligence image analysis, this paper also proposes a large number of urban living environment psychological assessment data collection strategies. These data are derived from crowdsourcing, and the collection method is limited by the development of cost and technology. At present, the psychological security preference of a large number of users on urban street images is collected by forced selection method, and then obtained by statistical data fitting to obtain urban environmental psychology. Security sense training set. In the future, when the conditions are mature, the brainwave feedback data in the virtual reality scene can be used to carry out the machine learning of psychological security, so as to improve the accuracy of the psychological security data.


Author(s):  
Yunhua Xiao

With the progress of science and technology, the development and improvement of internet technology and smart phones are gradually popular in the daily life; this world has achieved a swift transition to the mobile internet era from the traditional internet era. Various tourist areas have established “Digital Scenic Spots” in recent years, making the internet combine tightly with tourism. The construction of scenic-spot marketing platforms based on internet is an important component of constructing “Digital scenic spot.” In this article, a tourism marketing platform on the mobile internet is established by analyzing the mobile internet mainstream technology and its application in tourism marketing. In this article, the architecture of the marketing system uses the MVC pattern with a three-tier distributed structure and the logic layer of the system uses a construction of JavaBean and EJB. The article also builds a WeChat marketing model based on MM-TIP. The result of research provides some reference for constructing tourism marketing platform based on mobile internet.


2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.


Sign in / Sign up

Export Citation Format

Share Document