mHealth

Author(s):  
C. Peter Waegemann

mHealth systems have been maturing since 1995, yet there remains no common definition. The widest definition encompasses not only mobile devices and digital communication systems, but also the multitudes of apps and add-ons for those mobile devices and systems. Accordingly, mHealth is an indicator of emerging communication-based healthcare and an enabler of participatory health. mHealth implementation and user acceptance vary by geographical region. In the most advanced regions, mobile devices and new communication systems lead to disruptive changes that improve the quality of care and reduce healthcare costs. At the same time, providers and public authorities are challenged with designing and implementing mHealth policies and security measures. Ultimately, mHealth will change healthcare policies and procedures, the structures of healthcare, and the roles of patients and healthcare professionals.

2020 ◽  
Vol 12 (2) ◽  
pp. 35-51
Author(s):  
Herald N. Kundaeli

In digital communication systems, ARQ and HARQ schemes are employed in order to ensure efficient transmission of information and utilisation of the channel by retransmitting information that has not being received correctly at the receiver. In some applications, however, such as real-time services, the quality of information is degraded if too many retransmission trials are employed for each unit of erroneously received information. The  retransmissions are therefore limited leading to truncated ARQ and HARQ schemes. In this study we develop a new method for deriving the  expressions for the throughput efficiencies of truncated ARQ and HARQ schemes and investigate how the efficiencies vary with the number of allowed retransmissions. Keywords: ARQ, HARQ, Throughput Efficiency, Truncated ARQ.


2015 ◽  
Vol 9 (1) ◽  
pp. 41
Author(s):  
Saed Ali Thuneibat ◽  
Huthaifa Al_Issa ◽  
Abdallah Ijjeh

<p>The Bit Error Rate (BER) is a key parameter of the Quality of Service (QoS) for engineers and designers of digital communication systems and networks. At the present  time, a set of models and methods are exist for calculating the BER. But these methods are complex and require large computing cost.</p><p>In this paper, we provide a new model for calculating the BER. This model simplifies the procedures in the existing models and reduces the computing time. In the same time, the proposed model save the accuracy and the state consideration of existing models.</p>


Author(s):  
Stanley M. Soliday ◽  
James A. Gardner

Digital communication systems distort their signals as a consequence of the digitization process. The distortions are related to the code length and sampling frequency of the system. The present study assessed viewers' responses to these variables by using simulated digital television. To do this, 24 subjects rated the quality of pictures distorted by several combinations of the variables. A response surface generated from the ratings showed that the ratings were affected by both variables, but most profoundly by code length. Interpretation of the surface's contours from the perspective of system costs revealed that costs should be considered solely from the standpoint of code length.


Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


Author(s):  
Cedric Gesbert ◽  
Joëlle André-Vert ◽  
Marc Guerrier ◽  
Margaret Galbraith ◽  
Christine Devaud ◽  
...  

Abstract Background In 2017, The French National Authority for Health (HAS) created an open, online, systematic contribution process to enable patient and consumer groups (PCGs) to contribute to health technology assessment (HTA) carried out to aid public authorities in reimbursement and pricing decision making. Objectives This retrospective study analyzes how French PCGs contributed to the HTA process within the HAS for the first 2 years of this new mechanism. Methods PCG contributions received between 01 January 2017 and 31 December 2018 and the recording of deliberations leading to reports of the corresponding HTAs were included. Analysis grids were designed by the investigators with 5 rounds of refinement tests on 10 random PCG contributions and the reports. Systematic data extraction was then performed separately by two investigators. PCG answers to the open-question templates and the related final HTA report published by the HAS were analyzed. Results Seventy-nine contributions from 44 PCGs were received and analyzed by the HAS for 78 out of the 592 HTAs performed for drugs or medical devices during the 2-year period. Twenty-five percent of the HTAs performed for drugs received at least one contribution. The contributions covered quality-of-life aspects, access to care, and personal and family impact. Membership and budget of the contributing PCGs varied greatly. Conclusions The experience gained in the first 2 years demonstrates the feasibility of the process and the fact that PCG contribution actually provides relevant input on the patient perspective for HTAs used for reimbursement decisions. The challenges identified on the side of PCGs were time constraints and human resources.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 56-56
Author(s):  
Rashmita Basu

Abstract Objective: While about 75% of people with ADRD receive care informally by their family members, relatively little is known about the effect of the quality of caregiving on maintaining carerecipient’s health and financial burden of out-of-pocket (OOP) healthcare costs. The goal of this study is to examine the quality of caregiving on the out-of-pocket healthcare costs among ADRD patients and if caregiving prevents deterioration of physical health of carerecipients. Data and Sample: We used a nationally representative sample of people diagnosed with ADRD from the Aging Demographic and Memory Study, subsample of the Health and Retirement Study. The study sample includes carerecipients whose caregivers participated in the survey (N=261). Outcome measures: Primary outcomes were deterioration of carerecipients’ health (1=yes, 0=no) and annual OOP healthcare costs. The quality of caregiving is captured by if caregiving made them feel good, feel useful and fee closer to carerecipients. More than 70% caregivers reported that caregiving make them feel good or useful. About 60% of carerecipients’ physical health was maintained, and average out-of-pocket costs was $3,701/year ($0-$31,051). Multivariable logit for binary health outcome and OLS regression for OOP cost were estimated. Results: The likelihood of health deterioration was significantly lower for carerecipients whose caregivers reported that caregiving made them feel useful (AOR=5.1, 95% CI: 1.9- 14.5) and lower OOP remained significantly associated with presence of usefulness of caregiving (cost decrease, $3000 [95% CI: $6309-$918). Positive feeling of caregiving is independently associated with lower OOP cost and deterioration of physical health among ADRD patients.


2011 ◽  
Vol 2011 ◽  
pp. 1-6
Author(s):  
Valentine A. Aalo ◽  
George P. Efthymoglou

The received signal in many wireless communication systems comprises of the sum of waves with random amplitudes and random phases. In general, the composite signal consists of correlated nonidentical Gaussian quadrature components due to the central limit theorem (CLT). However, in the presence of a small number of random waves, the CLT may not always hold and the quadrature components may not be Gaussian distributed. In this paper, we assume that the fading environment is such that the quadrature components follow a correlated bivariate Student-t joint distribution. Then, we derive the envelope distribution of the received signal and obtain new expressions for the exact and high signal-to-noise (SNR) approximate average BER for binary modulations. It also turns out that the derived envelope pdf approaches the Rayleigh and Hoyt distributions as limiting cases. Using the derived envelope pdf, we investigate the effect of correlated nonidentical quadratures on the error rate performance of digital communication systems.


Sign in / Sign up

Export Citation Format

Share Document