scholarly journals Open Application for Global Connectivity with Smart Video Conferencing Technology

Author(s):  
Joel Miranda

Advancements in mobile phones and technologies, have forced the mobile software community to develop smart applications which can help users in general purposes. During the pandemic, people have shifted their focus onto Video chatting and conferencing applications for conducting business, schools, and universities. The current software’s available provide several useful functions like live transcripts, allow users to create notes and providing third party application support. But there are certain areas where, video conferencing applications can improve upon primarily in interns of language support. This application will provide a new video conferencing feature which is live translation of speech which could help conduct business and conducting lectures.

2021 ◽  
Author(s):  
Joel Miranda

Advancements in mobile phones and technologies, have forced the mobile software community to develop smart applications which can help users in general purposes. During the pandemic, people have shifted their focus onto Video chatting and conferencing applications for conducting business, schools, and universities. The current software’s available provide several useful functions like live transcripts, allow users to create notes and providing third party application support. But there are certain areas where, video conferencing applications can improve upon primarily in interns of language support. This application will provide a new video conferencing feature which is live translation of speech which could help conduct business and conducting lectures.


Due to the proliferation of mobile phones in recent years there are many advantages and some disadvantages in smart-phones usage. Many applications like E-commerce, Social media and games get access of user’s permission to use some privileges. Normally while installing any application the users grant permission to the particular application to access all the privileges. While installing the app in smart- phones, it has tie-up with some advertisement company. So that to benefit the app developer these ads will run in the app background. This paper describe the advertisements can behave maliciously some times. This malicious behavior extracts personal information like user’s contact and files by using the permission access policy of particular app. This data theft may happen without the knowledge of user. The malicious ad will upload the collected information to the desired server. In this paper proposed third party server is used to validate the advertisement before the ad gets loaded into the app


The huge growth of the mobile industry leads to more efficient software to be developed in a mobile phone or android platform. the mobile software and games are now powerful to compete with computer’s software but as it seems the problems will also to be carried out from this enhancement.problems in the sense bug or misbehave of any software that can hang your device.so the Task manager would be needed for mobile devices too, where we can monitor what are all the applications are running and the complete package of informa- tion in one single Application. The Task Manager application shows all the device’s active applications, along with information about:task manager will show how much processor power and cores the app is consuming, and theRAM item shows how much memory of RAM the app occupies. You can use Task Manager to end or turn off tasks that are taking too much CPU time or memory or that any bug containing app. You can click applications you want to stop and then click End Apps button. This project will provide the Active applications ( Applications that are currently running on the device), Installed (Applications that have been installed from the Play Store or any third party provider) RAM manager (Random Access Memory), Storage (Available memory storage), Network uses(Amount of internet data used), GPU ( graphics processing unit), Screen time (time spend on app in day), Internet Speed(speed of connected in- ternet source) and Temperature(temperature of the whole device).


2013 ◽  
Vol 432 ◽  
pp. 571-574
Author(s):  
Bin Jia

This paper contains such contents as follows based on the research of the system: analyzing the problems and defections existed in the system, enhancing the transfer mode to be a standard way, and improving the efficiency of data query and transfer. Take advantages of the superiority of this system and innovates on the technology, we have completed a business software based on J2ME platform [1-.In the research and develop process we designed client-side functions and structural model combined with some functions used on the mobile phones, accordingly, the system technology has been practiced to some extents. And we optimize the software interface by a third party plug-in board called the polish [7-, this work must will provide far-reaching significance for later work on this technology.


2012 ◽  
Vol 1 (1) ◽  
pp. 58-67 ◽  
Author(s):  
Anastasia N. Kastania ◽  
Anastasius Moumtzoglou

Existing medical applications for 4G mobile phones include Mobile MIM, MobiUS, Gyromaniac, and FaceTime. Mobile MIM (http://www.mimsoftware.com) allows viewing MRI, PET and CT using iPhones and iPads. MRI, PET, and CT images are broadcasted using software that allows measurement of both the intensity and the distance an image is transferred. MobiUS (MobiSante Inc, 2011) commercial ultrasound imaging system, used in emergencies, is smartphone-based, and cheaper than traditional ultrasound systems which allow sharing images with patients or clinicians. The Gyromaniac application (Subversus Interactive, 2011) uses the iPhone 4 new gyroscope feature to help physicians practice spatial orientation. Moreover, physicians can use iPhone 4's FaceTime (Apple Inc, 2011) video conferencing feature for patient care while other applications include a blood pressure monitor that displays the current pressure reading, simultaneously tracking previous results. The applications reshape the nature and expectations of health care delivery and emphasize active involvement of patients and enable digital proximity and self-care, thus challenging the traditional paternal model of medicine.


Author(s):  
Sonal Shirsath ◽  
Devyani Pagar ◽  
Mallikaraje Bhosale

Quick Response (QR) codes seem to appear everywhere these days. We can see them on posters, magazine ads, websites, product packaging and so on. Using the QR codes is one of the most intriguing ways of digitally connecting consumers to the internet via mobile phones since the mobile phones have become a basic necessity thing of everyone. Information about QR codes and their types get examine in the paper. Identification of objects and places in the real world is very important, and QR (2-D printing) code is useful to store identifiers of them. At the point when a barcode contains useful information or security data, the danger of security turns into an important issue. Because QR codes essentially highlight a square barcode with a special pattern, individuals have no clue whether the code will take them to legitimate data or a site loaded with malware. In recent year’s security of information have become big concern in the internet, so the information hiding has become an important issue. In steganography, Steganography hides the data in a medium such as text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party. In this paper, we present a methodology for creating QR codes and how they can be used to attack human interaction and automated systems and their different data types. Latest approach is proposed for secret communication by combining the concept of steganography and QR codes.


2018 ◽  
Vol 21 (4) ◽  
pp. 126-135
Author(s):  
Stephen James Walsh ◽  
Jie Yan ◽  
Vincent Mangematin ◽  
Maggie Qiuzhu Mei

How were paper bastions added to the walls of academic citadels? By mapping the evolution of the coauthorship network in 180 management journals from 1991 to 2009, we identify an elite league of business schools that retained dominance despite the research community’s significant growth. The elite universities maintain their prominence through a loop of reinforcement involving the peer review process and third-party ranking bodies, though the perceived quality of the papers published was declining as measured by the percentage of overall citations. Leading U.S. universities dominate top journal publications, while new local poles of management research among European and Asian universiteis emerged.


2021 ◽  
Author(s):  
Maryam AboMoslim ◽  
Niloufar Ghaseminejad-Tafreshi ◽  
Abdulaa Babili ◽  
Samia El Joueidi ◽  
John A Staples ◽  
...  

Abstract Background: Digital health interventions are increasingly used for patient care, yet little data is available on the phone access type and usage preferences of medical ward patients to inform the most appropriate digital interventions.Methods: To learn about mobile phone ownership, internet access, and cellular use preferences among medical patients, we conducted a researcher-administered survey of patients admitted to five internal medicine units at Vancouver General Hospital (VGH) in January 2020.Results: A total of 81 ward patients completed the questionnaire from the two survey dates. Of those, 63.0% owned their own mobile phone, an additional 22.2% had access to a mobile phone via a proxy (or an authorized third-party) such as a family member, and 14.8% did not own or have access to a mobile phone. All participants with mobile phone access had cellular plans (i.e., phone and text) ; however, a quarter of respondents did not have data plans with internet. 71.1% of men owned a mobile phone compared to only 52.8% of women. All participants at a ‘high’ risk of readmission had access to a mobile phone, either as phone-owners or proxy-dependent users.Conclusion: Access to mobile phones among medical ward patients was high, but incomplete. More patients had cellular than data plans (i.e., internet and applications). Understanding patient-specific access is key to informing potential uptake of digital health interventions aimed at using patients’ mobile phones (mHealth) from an effectiveness and equity lens.


The invasion of wireless, mobile phones and various internet technologies has resulted in the new implementation, making the e-voting method very quiet and effective. The E-voting ensures the option of a suitable, simple and secure manner of incarceration and the complete number of votes in an election. This study work offers the e-voting requirements and necessities using a platform based on Android or the internet. E-voting implies voting through electronic devices or websites in the election. An e-voting application is developed using the android or web platform. This request enables the user cast the ballot without going to the polling booth. To prevent fraud respondents using the scheme, the application utilizes adequate authentication steps. Once the polling process is completed in the electronic device, the outcomes can be obtained in a fraction of seconds instantly. All voting counts of applicants are encrypted using RSA and stored in the database to prevent third-party attack and disclosure of outcomes. Upon completion of the meeting, the admin can decrypt the count of votes and publish the outcome and finish the voting process.


Sign in / Sign up

Export Citation Format

Share Document