Independent Living Support for Disabled and Elderly People using Cell Phones

Author(s):  
Begoña García Zapirain ◽  
Amaia Mendez Zorrilla

This chapter presents a technological solution to promote and help independent access to work for disabled people using Smart Phones. A deep state of the art about smart phones technologies and about examples of other projects is presented. The aim is to develop a form of technical assistance that supports them in the control of schedules, prevention of dangerous areas in the work place, warnings, and automatic alarm generation. The device chosen to exchange all this information is a Smartphone based on Android Operating System and GPS technology. A set of Android applications have been developed using Java language, and controlling the device via Google-developed Java libraries. All of these are connected to the Server Application through the Communications Module. The server Application Module provides the assistants or psychologists the possibility of supervise all the handicapped people’s activities. The assistants, psychologists, and users have all evaluated the application very positively as it covers disabled people’s needs perfectly.

2021 ◽  
pp. 1-14
Author(s):  
Elizabeth Magee ◽  
Anthony Plotner

BACKGROUND: For young adults with disabilities, post-high school outcomes in employment, higher education, and independent living are markedly worse than their peers without disabilities. As a result, legislation and research aimed at supporting transitioning students has increased. Further, numerous initiatives that better support youth and families have been implemented at the state and local level. Collaboration within and across service delivery systems has been identified as a critical aspect of transition planning and supports; however, evidence-based research related to the implementation and effects of collaborative partnerships is limited. OBJECTIVE: In the current study, we identify transition professionals’ perceptions of collaborative factors that facilitate and inhibit collaboration. METHOD: This study utilizes a single-state survey research design to examine the viewpoints of transition professions, specifically educators, Vocational Rehabilitation professionals, and community supports providers. RESULTS: Variance in perceptions were found among participant role groups. Specifically, educators as a whole report that time and workload barriers affect their ability to collaborate effectively. Further, findings indicate that ensuring individual collaborative team member responsibility is perceived as an effective strategy. CONCLUSIONS: These findings may be applied to technical assistance providers when developing team-level evaluations to monitor current levels and support needs of collaborative transition planning teams.


Author(s):  
Manokaran Newlin Rajkumar ◽  
Varadhan Venkatesa Kumar ◽  
Ramachandhiran Vijayabhasker

This modern era of technological advancements facilitates the people to possess high-end smart phones with incredible features. With the increase in the number of mobile applications, we are witnessing the humongous increase in the malicious applications. Since most of the Android applications are available open source and used frequently in the smart phones, they are more vulnerable. Statistical and dynamical-based malware detection approaches are available to verify whether the mobile application is a genuine one, but only to a certain extent, as the level of mobile application scanning done by the said approaches are in general routine or a common, pre-specified pattern using the structure of control flow, information flow, API call, etc. A hybrid method based on deep learning methodology is proposed to identify the malicious applications in Android-based smart phones in this chapter, which embeds the possible merits of both the statistical-based malware detection approaches and dynamical-based malware detection approaches and minimizes the demerits of them.


Author(s):  
Arturo Mascorro ◽  
Francisco Mesa ◽  
Jose Alvarez ◽  
Laura Cruz

ABSTRACTA computational cost comparative study through both Java and C applications was developed. Computational routines consist of a matrix multiplications, the discrete cosine transform and the bubble-sorting algorithm. Memory and Runtime for each application were measure. It was determined that the runtime of matrix multiplication in Java was within the limits of 200 and 300 milliseconds, as opposed to the application developed in C, which shown to be stable with an execution period less than 20 milliseconds. In the ordering algorithm with the bubble method, it was observe that the Java language show be very slow compared to C. In addition, the memory usage was lower in most of the applications, showing a minimum difference. Applications were tested in both, a mobile LG-E510f and a Laptop Toshiba Satellite. The study allowed to report the profit generated in both runtime and memory consumption when performing a native implementation in C and Java.


Author(s):  
Satish Agarwal ◽  
Priyanka Bhagoliwal

<em>Smart phones have become a mandatory device to carry now a days. People of all age groups, business category, service class, house wives, students etc need a Smartphone so as to carry their daily routines. From morning alarm to evening engagements, they keep everything in their mobile phone. Meetings, conferences, birthdays and anniversaries, the ‘to do list’, appointments, emails, documents, notes etc are remembered with the help of a Smartphone. And most importantly, people also carry their mobile charger or a power bank with them. If they do not carry a charger and their mobile phone shows the message that the battery is about to die, it seems as if they do not have enough oxygen to breathe properly. Even in businesses, be it a small scale or a large scale business, Smartphones are used to conduct transactions, video conferencing, conferencing calls, Emails, etc. The paper aims at reviewing the literature on the potential of a Smartphone to make a business successful. It describes how carrying a Smartphone to the work place provides a sense of satisfaction and motivation among the employees.</em>


Author(s):  
Kurt Manal ◽  
Benjamin Gillette ◽  
Ira Lockwood

Abstract Manual dexterity is key to engaging one’s environment and interfacing with technologies for communication and personal computing. Individuals with marginal or no dexterity are faced with obstacles and barriers limiting educational opportunity, workplace productivity, independent living and community participation. We have, developed an effective and intuitive Bluetooth tongue controller (a.k.a. “Mouth Mouse”) designed to give people with severe upper limb impairment effective control of computers, smart phones and tablets. The device is inherently portable requiring no external hardware or supporting software and thus can be used virtually anywhere. Preliminary testing has shown the Mouth Mouse to be an effective computer input device. In this paper we outline key design objectives and present preliminary data demonstrating the efficacy of the Mouth Mouse as a computer input device.


2018 ◽  
Vol 4 (2) ◽  
pp. 72
Author(s):  
I Putu Alit Putra Yudha ◽  
Made Sudarma ◽  
Putu Arya Mertasana

This research aims to design an applications of goods inventory system that uses barcode scanner on Android device. The desktop applications is based on Basic language and on for Android applications is developed using Java language. MySql database is store on online server, so that can be accessed by applications in Android mobile. The process of data exchange between Android and database is done by using web service to make distribution data easier.The result of making the application that is able to check the information status of goods stock availability via Android smartphone just by scanning the barcode listed on the goods. Indirectly this application can also increase the waiter’s service to the consumers.


2017 ◽  
Vol 5 (6) ◽  
pp. 240-246
Author(s):  
Govinda Naik ◽  
Manikanta ◽  
Naram Pooja Reddy ◽  
Krishna ◽  
Manjunath

Android is one of the most user friendly mobile platforms that have grasped the attention of smart phone users around the globe. According to stats available there are 1.4 billion people who have used Android mobile platform. And this has led to the development of android application exponentially; there are around 2.8 million android applications available in play store. Many of the available application do not fit into low specification smart phones due to some reasons. Share and Use is an android application that lets you use another smart phones application by your phone without actually installing it on your phone.  Share and Use lets user to use application installed on other phones and access applications on their smart phones. Share and Use helps phones with lower specification android phones to use applications that are not be able to install in them.


Author(s):  
Manokaran Newlin Rajkumar ◽  
Varadhan Venkatesa Kumar ◽  
Ramachandhiran Vijayabhasker

This modern era of technological advancements facilitates the people to possess high-end smart phones with incredible features. With the increase in the number of mobile applications, we are witnessing the humongous increase in the malicious applications. Since most of the Android applications are available open source and used frequently in the smart phones, they are more vulnerable. Statistical and dynamical-based malware detection approaches are available to verify whether the mobile application is a genuine one, but only to a certain extent, as the level of mobile application scanning done by the said approaches are in general routine or a common, pre-specified pattern using the structure of control flow, information flow, API call, etc. A hybrid method based on deep learning methodology is proposed to identify the malicious applications in Android-based smart phones in this chapter, which embeds the possible merits of both the statistical-based malware detection approaches and dynamical-based malware detection approaches and minimizes the demerits of them.


Sign in / Sign up

Export Citation Format

Share Document