Showing 221 - 240 results of 402 for search '"Mobile phone', query time: 0.05s Refine Results
  1. 221

    Patient's Heart Beat and Temperature Monitoring System. by Mbabazi Caleb

    Published 2023
    “…It also triggered an alarm and send SMS to a mobile phone of medical expert or health personnel, if the threshold value of the heartbeat rate is exceeded. …”
    Get full text
    Thesis
  2. 222

    Development of a Car Battery Monitoring System. by Dusabimana Abel

    Published 2023
    “…The GSM module is to be used for communication purpose of sending the message via mobile phone indicating low battery level and then the buzzer is to trigger an alarm. …”
    Get full text
    Thesis
  3. 223

    The Role Of Cyberchondria In Mediating Health Anxiety, Fears And Obsessions Among Students Of Private Medical Colleges Sargodha by Muhammad Usman, Adnan Afzal, Muhammad Afzal, Sundas Ahmad, Bilal Habib, Amina Iqbal

    Published 2025-01-01
    “…However, non-significant difference on OCD patterns, mobile phone daily usage. Conclusion: This study shows that feeling constantly worried about your health and obsessively checking the internet for information can make you feel more anxious and stressed, and can also lower your quality of life. …”
    Get full text
    Article
  4. 224

    Prevalence and Associated Risk Factors of Childhood Obesity and Overweight in Erbil City, Kurdistan, Iraq: A Household Survey by Sabah Shareef Mohammed, Sherzad Abdulahad Shabu

    Published 2024-03-01
    “…On the other hand, the children's habit of using electronic devices, smartphones, and other devices was significant, either using their mobile phone or their parent's phone. In conclusion, in Erbil city, the prevalence rate of obesity and overweight was dramatically increased, as well as the lifestyle factor that contributed to the development of these conditions, especially among those children exposed to multi-screen devices. …”
    Get full text
    Article
  5. 225

    Diagnosing skin neglected tropical diseases with the aid of digital health tools: A scoping review. by Ewelina Julia Barnowska, Anil Fastenau, Srilekha Penna, Ann-Kristin Bonkass, Sophie Stuetzle, Ricky Janssen

    Published 2024-10-01
    “…Most digital tools were found to be mobile-phone based, such as mobile Health (mHealth) apps, store-and-forward tele-dermatology, and Short Messaging Service (SMS) text-messaging. …”
    Get full text
    Article
  6. 226

    Intellectualized forensic technique for Android pattern locks by Jiahao QIU, Weidong QIU, Yangde WANG, Yan ZHA, Yuming XIE, Yan LI

    Published 2022-02-01
    “…In the field of digital forensics, how to unlock mobile devices such as phones has always been an urgent problem to overcome.As a special kind of password, pattern lock is widely used in mobile phone screen unlock and software access authorization.Existing pattern lock cracking techniques have several non-negligible disadvantages, such as poor concealment, low practicability, non-intelligence and single application scenario.Two basic threat models were abstracted from shoulder surfing, surveillance camera, and real-time forensics, and a multi-scenario side channel attack on pattern locks was proposed.Based on the data of surveillance camera or manual video, intelligent vision recognition algorithms were adopted to identify, select and track the target device and biological key points in the video dynamically.Then, discrete tracking points were integrated by spatial mapping and pruning algorithm.The denoising algorithm was used to eliminate redundancy and optimize the trajectory.Through procedures above, the original trajectory was simplified into regular polylines defined by several key turning points.Finally, the simplified pattern was compared and matched with the rules of legal pattern locks to inference and retort its actual pattern.Possible candidates will be sorted in the output according to their confidences.Results show that in the surveillance camera scenario, where the device screen is always visible, the cracking success rate of our technique is 89% for 10 attempts and 99.3% for 20 attempts.In the face-to-face scenario, where the subject consciously blocks the screen and his drawing finger, the success rate was 82% after 10 attempts and 89.3% after 20 attempts.In the surveillance camera scenario, the increase of shooting horizontal distance can significantly decrease the cracking success rate.But this effect diminishes with the increase of the number of attempts.Results show that the cracking success rate of the complex password is always higher than that of the simple password during 20 attempts, which means a complex pattern lock cannot play a better protection role if the proposed technique is applied.Shooting angle deflection within 5° has little effect on the success rate of cracking.…”
    Get full text
    Article
  7. 227

    The Role of Financial Technology in Promoting Digital Finances in Algeria (2016-2024) by Abderraouf Abada, Messaoud Boukhalfi, Mohammed Abderrahmane Bentadjine, Abdelfattah Daoudi

    Published 2024-12-01
    “…The results of the study showed that there is an effective contribution of financial technology indicators in the field of retail electronic payments in Algeria in enhancing levels of digital financial inclusion, reflected in the improvement of: online payment activities, the number of active bank ATMs, payment activity and the number of operating electronic payment terminals (EPT), mobile phone payment transactions, mobile money transfers, and the number of circulating cards, including the "Gold" card and interbank cards (CIB). …”
    Get full text
    Article
  8. 228

    Reorienting information searching research by applying a situated abilities perspective by Gerd Berget

    Published 2024-03-01
    “…Spelling skills, however, may also be influenced by fatigue, illness, or using a mobile phone while walking. All types of users can therefore at certain times experience challenges related to query input. …”
    Get full text
    Article
  9. 229

    Internet use and e-health literacy among tuberculosis patients in the Directly Observed Therapy Centre, Lagos State, Nigeria by Olalekan Moses Olayemi, Timothy Shola Abolarinwa

    Published 2023-03-01
    “…The findings of the study revealed that a majority (73.3%) of the respondents had mobile phone devices for accessing e-health information and acknowledged that the Internet is very useful to their health. …”
    Get full text
    Article
  10. 230
  11. 231

    Autonóm repülő robotok alkalmazása vízelvezető csatornák felügyeletére (Using Autonomous Flying Robots to Monitor Canals) by Anita Szabó

    Published 2017-06-01
    “…The controlling device can be a personal computer, a tablet or even a mobile phone. It is planned that the client software be extended with capability to upload video and photos to the cloud for later reference. …”
    Get full text
    Article
  12. 232

    Digital Panopticon Dilemmas: A Study on Contact Tracing Apps Carried Out by the Ministry of Health by Elifnur Terzioğlu

    Published 2023-12-01
    “…Through these applications, known as contact tracing systems, there was an attempt to control the spread of the illness. These systems used mobile phone applications to record personal data. …”
    Get full text
    Article
  13. 233

    Magneto-dynamic method in wireless transmission of electrical energy by Pedro Osvaldo Díaz Fustier, Orestes Hernandez Areu, Josnier Ramos Guardarrama

    Published 2024-09-01
    “…Wireless transmission of electrical energy was born at the beginning of the 20th century, but at commercial level it is relatively recent in recharging of mobile phone batteries and in electric vehicles (first decade of the 21st century), using the development of contemporary electronics, both authors working with synchronous generators note that there is a wireless transmission with certain advantages, this text presents experiments based on the mechanical rotation of stationary magnetic fields (magneto-dynamic method) very similar to the excitation in synchronous generators , there were some first tests in a British university in 2014 as the only reference of previous use. …”
    Get full text
    Article
  14. 234

    Strengthening economic resilience through ICT during the COVID-19 pandemic: evidence from 100 countries by Muhammad Bilal, Sohaib Aqib, Ahmad Raza

    Published 2024-12-01
    “…We employed a comprehensive ICT index developed by UNCTAD, including indicators such as fixed broadband, mobile phone subscriptions, and secure internet servers, using data from 100 countries between 2017 and 2022. …”
    Get full text
    Article
  15. 235

    Research and Application of Data-driven Forecast Method for Water Level Increment of Small and Medium-sized Rivers by DING Wu, LIN Hanxiong, WANG Hangang, ZHANG Wei, YANG Bin

    Published 2023-01-01
    “…Focusing on the forecast of flash flood disasters in small and medium-sized rivers,this paper adopts three data-driven forecast models to forecast the maximum water level increment.With Paitan Town,Zengcheng District,Guangzhou City as the research area,the mathematical modeling and accuracy evaluation of the three models are carried out.The analysis shows that the forecast accuracy of machine learning is the highest,but the forecast results are not interpretable.The forecast accuracy of the similarity analysis model is medium,and the prediction results have good cognition and interpretability.The overall prediction accuracy of the “rainfall-water level increment” relationship model is the lowest,but its operation is simple.The calculation of the similarity analysis model and machine learning model is relatively complex,relying on computer-aided calculation,and the results of the “rainfall-water level increment” relationship model can be plotted as graphs.Considering the forecast accuracy and convenience,multiple models such as the machine learning model and similarity analysis model can be applied for the forecast to improve the forecast accuracy if there is support from auxiliary equipment such as computers and mobile phone applications.Without support from computers and other basic equipment,the “rainfall-water level increment” relationship model can provide a convenient forecast method for flash flood forecast and early warning in small and medium-sized rivers.…”
    Get full text
    Article
  16. 236

    Validation Indicator Identification and Customer Ranking in Microloans: A Study at Middle East Bank in Iran by Azadeh Ahmadi Kousha, Faegh Ahmadi, Mohammad Hossein Ranjbar, Hamidreza Kordlouie

    Published 2024-06-01
    “…In the descriptive statistics section, various personality factors including age, gender, education, occupation, current debt status within the banking system, bounced checks history, money laundering records, bank account balance, transaction history, geographic location (residence and workplace), mobile phone model and operating system, as well as credit rating obtained from Iran's credit rating consulting company, were analyzed and presented using tables and graphs. …”
    Get full text
    Article
  17. 237

    Digital competences and collaborative skills among university students by Sandra Salazar Palomino, Yersi-Luis Huamán-Romaní, Carlos Alfredo Bocanegra García, Zany Sigrid Frisancho Triveño, Yajhayda Bellido Ascarza, Alexis León Ramírez, Calixto Cañari Otero

    Published 2025-01-01
    “…Resulting in the favorite place to use the Internet after home is any place because they have a device (mobile phone), which in the long term would bring consequences to visual and mental health. …”
    Get full text
    Article
  18. 238

    Research on public network and private network diversion scheme for 4G/5G users by MA Hongyuan, FENG Zheng, ZHOU Wei, SONG Xuguang, YANG Xiaole

    Published 2024-09-01
    “…There was only one IP channel in the mobile phone terminal to transmit public network services and private network services, corresponding to one public network IP channel and one private network IP channel on the network side, and SMF/PGW-C completed the mapping and splicing of the user-side IP channel and the corresponding network-side public network IP channel and private network IP channel, as well as the replacement of the user’s IP address, thus realizing the diversion of the user’s public network services and private network services. …”
    Get full text
    Article
  19. 239

    Analysis and Comparison of Methods for Determining Small Piles of Wood Chips Using Laser Scanning Technology by Miloš Gejdoš, Martin Lieskovský, Michal Ferenčík

    Published 2025-01-01
    “…The objective of this study was to assess the accuracy of smart methods based on laser scanning technology, integrated into mobile phones and a handheld laser scanner, for measuring smaller piles of forest chips. …”
    Get full text
    Article
  20. 240

    Arabic and Roman numbers as part of Chinese semiotic system by L.L. Bankova

    Published 2020-10-01
    “…Besides, Arabic numbers have acquired another important function in the Mandarin semiotic system over the last twenty years: they replace characters in the sphere of Internet and mobile-phone interaction. However, in contrast to other numbers in Mandarin, Arabic numbers, as mathematical signs, are devoid of the status of lexical units. …”
    Get full text
    Article