Using OpenSSH to secure mobile LAN network traffic
NASA Astrophysics Data System (ADS)
Luu, Brian B.; Gopaul, Richard D.
2002-08-01
Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.
12 CFR 1250.2 - Procedural requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. (a) Procedures. An Enterprise shall implement procedures reasonably designed to ensure for any loan that is secured by improved real estate or a mobile home located in an area that has been... amended and purchased by the Enterprise, the building or mobile home and any personal property securing...
32 CFR 751.6 - Claims payable.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Mobile homes and contents in shipment. Claims for damage to mobile homes and contents in shipment are... in securing the mobile home or packing its contents. (e) Borrowed property (including vehicles). Loss... request of superior authority or by reason of military necessity. (j) Money deposited for safekeeping...
32 CFR 751.6 - Claims payable.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Mobile homes and contents in shipment. Claims for damage to mobile homes and contents in shipment are... in securing the mobile home or packing its contents. (e) Borrowed property (including vehicles). Loss... request of superior authority or by reason of military necessity. (j) Money deposited for safekeeping...
32 CFR 751.6 - Claims payable.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Mobile homes and contents in shipment. Claims for damage to mobile homes and contents in shipment are... in securing the mobile home or packing its contents. (e) Borrowed property (including vehicles). Loss... request of superior authority or by reason of military necessity. (j) Money deposited for safekeeping...
32 CFR 751.6 - Claims payable.
Code of Federal Regulations, 2013 CFR
2013-07-01
... (JFTR), rather than as a loss incident to service. (d) Mobile homes and contents in shipment. Claims for damage to mobile homes and contents in shipment are payable unless the damage was caused by structural or mechanical defects or by the claimant's negligence in securing the mobile home or packing its contents. (e...
32 CFR 751.6 - Claims payable.
Code of Federal Regulations, 2014 CFR
2014-07-01
... (JFTR), rather than as a loss incident to service. (d) Mobile homes and contents in shipment. Claims for damage to mobile homes and contents in shipment are payable unless the damage was caused by structural or mechanical defects or by the claimant's negligence in securing the mobile home or packing its contents. (e...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... title V of the Riegle Community Development and Regulatory Improvement Act,\\2\\ the National Flood... renewing a loan secured by a building or a mobile home located in a special flood hazard area to advise the... transferring a loan secured by a building or a mobile home located in a special flood hazard area to notify...
Design and implementation of modular home security system with short messaging system
NASA Astrophysics Data System (ADS)
Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad
2014-03-01
Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.
Security for IP Multimedia Services in the 3GPP Third Generation Mobile System.
ERIC Educational Resources Information Center
Horn, G.; Kroselberg, D.; Muller, K.
2003-01-01
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Code of Federal Regulations, 2012 CFR
2012-01-01
... apply: (a) Consumer means a natural person who seeks or acquires goods, services, or money for personal... credit cards. It also includes loans secured by liens on real estate and chattel liens secured by mobile... credit standing of the borrower, guaranties, or security other than the real estate or mobile home, as...
Code of Federal Regulations, 2014 CFR
2014-01-01
... apply: (a) Consumer means a natural person who seeks or acquires goods, services, or money for personal... credit cards. It also includes loans secured by liens on real estate and chattel liens secured by mobile... credit standing of the borrower, guaranties, or security other than the real estate or mobile home, as...
Code of Federal Regulations, 2011 CFR
2011-01-01
... apply: (a) Consumer means a natural person who seeks or acquires goods, services, or money for personal... credit cards. It also includes loans secured by liens on real estate and chattel liens secured by mobile... credit standing of the borrower, guaranties, or security other than the real estate or mobile home, as...
Code of Federal Regulations, 2013 CFR
2013-01-01
... apply: (a) Consumer means a natural person who seeks or acquires goods, services, or money for personal... credit cards. It also includes loans secured by liens on real estate and chattel liens secured by mobile... credit standing of the borrower, guaranties, or security other than the real estate or mobile home, as...
Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2008-01-01
This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.
Code of Federal Regulations, 2010 CFR
2010-07-01
... having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that...) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a permanent foundation when attached to the required...
Code of Federal Regulations, 2010 CFR
2010-01-01
... loan secured by a building or mobile home that is located or to be located in a special flood hazard... the Federal Emergency Management Agency. (g) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a permanent...
Code of Federal Regulations, 2010 CFR
2010-01-01
... loan means a loan secured by a building or mobile home that is located or to be located in a special... Director of the Federal Emergency Management Agency. (g) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a...
... share personal information let your kids spend real money — even if the app is free include ads link to social media What’s more, ... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making ... Security "Free" Security Scans Computer Security Disposing of Old Computers ...
ERIC Educational Resources Information Center
National Association of School Security Directors, Bellevue, WA.
Workshop materials, all from Broward County (Florida), include job descriptions for the positions of director of security, security investigator, security specialist, and security patrolman. A security report also contains charts reflecting arson, vandalism, and theft costs from the school in years 1970 through 1979. The last section contains…
NASA Astrophysics Data System (ADS)
Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming
2017-02-01
With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.
12 CFR 226.2 - Definitions and rules of construction.
Code of Federal Regulations, 2011 CFR
2011-01-01
... an individual condominium unit, cooperative unit, mobile home, and trailer, if it is used as a... means a transaction in which a mortgage, deed of trust, purchase money security interest arising under...
12 CFR 1026.2 - Definitions and rules of construction.
Code of Federal Regulations, 2013 CFR
2013-01-01
... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...
12 CFR 1026.2 - Definitions and rules of construction.
Code of Federal Regulations, 2012 CFR
2012-01-01
... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...
12 CFR 1026.2 - Definitions and rules of construction.
Code of Federal Regulations, 2014 CFR
2014-01-01
... unit, cooperative unit, mobile home, and trailer, if it is used as a residence. (20) Open-end credit... which a mortgage, deed of trust, purchase money security interest arising under an installment sales...
Safe and Secure Services Based on NGN
NASA Astrophysics Data System (ADS)
Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito
Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2011 CFR
2011-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2013 CFR
2013-07-01
... political subdivision of a State that has zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that... of Veterans Affairs. (c) Building means a walled and roofed structure, other than a gas or liquid...
Code of Federal Regulations, 2014 CFR
2014-01-01
... zoning and building code jurisdiction over a particular area having special flood hazards. (e) Designated loan means a loan secured by a building or mobile home that is located or to be located in a special...) Building means a walled and roofed structure, other than a gas or liquid storage tank, that is principally...
38 CFR 36.4707 - Determination fees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Determination fees. 36...) LOAN GUARANTY Sale of Loans, Guarantee of Payment, and Flood Insurance § 36.4707 Determination fees. (a... a reasonable fee for determining whether the building or mobile home securing the loan is located or...
12 CFR 614.4950 - Determination fees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Determination fees. 614.4950 Section 614.4950... Insurance Requirements § 614.4950 Determination fees. (a) General. Notwithstanding any Federal or State law... charge a reasonable fee for determining whether the building or mobile home securing the loan is located...
12 CFR 561.12 - Consumer credit.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Consumer credit. 561.12 Section 561.12 Banks... AFFECTING ALL SAVINGS ASSOCIATIONS § 561.12 Consumer credit. The term consumer credit means credit extended... real estate and chattel liens secured by mobile homes and leases of personal property to consumers that...
Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
12 CFR 34.203 - Appraisals for higher-priced mortgage loans.
Code of Federal Regulations, 2014 CFR
2014-01-01
....203 Section 34.203 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL... et seq.), and any implementing regulations, in effect at the time the appraiser signs the appraiser's... secured by a mobile home, boat, or trailer. (4) A transaction to finance the initial construction of a...
12 CFR 22.3 - Requirement to purchase flood insurance where available.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Requirement to purchase flood insurance where... IN AREAS HAVING SPECIAL FLOOD HAZARDS § 22.3 Requirement to purchase flood insurance where available... building or mobile home and any personal property securing the loan is covered by flood insurance for the...
12 CFR 22.7 - Forced placement of flood insurance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Forced placement of flood insurance. 22.7... HAVING SPECIAL FLOOD HAZARDS § 22.7 Forced placement of flood insurance. If a bank, or a servicer acting... or mobile home and any personal property securing the designated loan is not covered by flood...
12 CFR 572.3 - Requirement to purchase flood insurance where available.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Requirement to purchase flood insurance where... LOANS IN AREAS HAVING SPECIAL FLOOD HAZARDS § 572.3 Requirement to purchase flood insurance where... loan unless the building or mobile home and any personal property securing the loan is covered by flood...
Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398
Code of Federal Regulations, 2010 CFR
2010-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Notice of special flood... of Payment, and Flood Insurance § 36.4708 Notice of special flood hazards and availability of Federal... a loan secured by a building or a mobile home located or to be located in a special flood hazard...
VOLTTRON™: An Agent Platform for Integrating Electric Vehicles and Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haack, Jereme N.; Akyol, Bora A.; Tenney, Nathan D.
2013-12-06
The VOLTTRON™ platform provides a secure environment for the deployment of intelligent applications in the smart grid. VOLTTRON design is based on the needs of control applications running on small form factor devices, namely security and resource guarantees. Services such as resource discovery, secure agent mobility, and interacting with smart and legacy devices are provided by the platform to ease the development of control applications and accelerate their deployment. VOLTTRON platform has been demonstrated in several different domains that influenced and enhanced its capabilities. This paper will discuss the features of VOLTTRON and highlight its usage to coordinate electric vehiclemore » charging with home energy usage« less
Productivity and quality improvements in health care through airboss mobile messaging services.
Shah, P J; Martinez, R; Cooney, E
1997-01-01
The US health care industry is in the midst of revolutionary changes. Under tremendous pressures from third-party payers and managed care programs to control costs while providing high quality medical services, health care entities are now looking at information technologies to help them achieve their goals. These goals typically include improved productivity, efficiency and decision-making capabilities among staff members. Moreover, hospitals and other health care facilities that provide a broad and integrated range of inpatient and outpatient care, wellness and home care services are in the best position to offer comprehensive packages to managed care and private insurers. Many health care providers and administrators are considered mobile employees. This mobility can range from intra-building and intra-campus to multi-site and metropolitan areas. This group often relies on a variety of information technologies such as personal computers, communicating laptops, pagers, cellular phones, wireline phones, cordless phones and fax machines to stay in touch and handle information needs. These health care professionals require mobile information access and messaging tools to improve communications, control accessibility and enhance decision-making capabilities. AirBoss mobile messaging services could address the health care industry's need for improved messaging capabilities for its mobile employees. The AirBoss family of services supports integrated voice services, data messaging, mobile facsimile and customized information delivery. This paper describes overview of the current mobile data networking capability, the AirBoss architecture, the health care-related applications it addresses and long-term benefits. In addition, a prototype application for mobile home health care workers is illustrated. This prototype application provides integrated e-mail, information services, web access, real-time access and update of patient records from wireline or wireless networks, and cross media delivery and notification. It provides seamless wide area access to patient data in a secure environment, thus providing a continuity of care from the hospital to home.
Telemedicine Support Groups for Home Parenteral Nutrition Users.
Nelson, Eve-Lynn; Yadrich, Donna Macan; Thompson, Noreen; Wright, Shawna; Stone, Kathaleen; Adams, Natasia; Werkowitch, Marilyn; Smith, Carol E
2017-12-01
Patients receiving home parenteral nutrition (HPN), a life-sustaining intravenous (IV) infusion that provides nourishment and hydration to patients with short gut or inflammatory bowel diseases, are often isolated and not in visual contact with peers or health providers. One completed clinical trial (Clinical Trials.gov NCT0190028) and 1 ongoing clinical trial (Clinical Trials.gov NCT02987569) are evaluating a mobile videoconferencing-delivered support group intervention for patients on HPN and their caregivers. This home-based telemedicine intervention uses encrypted tablet-based videoconferencing to connect multiple families in real time. The twice-daily IV regimen is challenging for patients who may experience infusion catheter-related bloodstream infections, difficulties with fatigue, loss of sleep, depressive disorders, and worry over the potential life-threatening side effects and the expenses of this therapy. Using secure telemedicine, the facilitated support group intervention aims to enhance HPN home care, daily functioning, and quality of life. The authors provide the rationale for the telemedicine approach with HPN users and caregivers. They provide "how-to" information about the content and process of the facilitated support group sessions via secure videoconferencing. They share lessons learned from the ongoing evaluation of the telemedicine approach.
Sousa, Cindy A; Kemp, Susan; El-Zuhairi, Mona
2014-11-01
Political violence is increasingly played out within everyday civilian environments, particularly family homes. Yet, within the literature on political violence and mental health, the role of threats to home remains under-explored. Using focus group data from 32 Palestinian women, this paper explores the implications of violations to the home within political violence. Threats to the privacy, control, and constancy of the family home - key dimensions of ontological security (Giddens, 1990) emerged as central themes in women's narratives. Surveillance, home invasions, and actual or threatened destruction of women's home environments provoked fear, anxiety, grief, humiliation, and helplessness, particularly as women struggled to protect their children. Women also described how they mobilized the home for economic, familial and cultural survival. Study findings illuminate the impact of threats to intimate environments on the well-being of women and their families living with chronic political violence, and underscore the importance of attention to violations of place and home in research on civilian experiences of and responses to political violence. Copyright © 2014 Elsevier Ltd. All rights reserved.
Smart mobility solution with multiple input Output interface.
Sethi, Aartika; Deb, Sujay; Ranjan, Prabhat; Sardar, Arghya
2017-07-01
Smart wheelchairs are commonly used to provide solution for mobility impairment. However their usage is limited primarily due to high cost owing from sensors required for giving input, lack of adaptability for different categories of input and limited functionality. In this paper we propose a smart mobility solution using smartphone with inbuilt sensors (accelerometer, camera and speaker) as an input interface. An Emotiv EPOC+ is also used for motor imagery based input control synced with facial expressions in cases of extreme disability. Apart from traction, additional functions like home security and automation are provided using Internet of Things (IoT) and web interfaces. Although preliminary, our results suggest that this system can be used as an integrated and efficient solution for people suffering from mobility impairment. The results also indicate a decent accuracy is obtained for the overall system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false Replacement housing payment for 180-day mobile homeowner displaced from a mobile home, and/or from the acquired mobile home site. 24.502 Section 24.502... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.502 Replacement housing payment for...
Martin, Timothy; Ding, Hang; D'Souza, Matthew; Karunanithi, Mohan
2012-01-01
Cardiovascular disease (CVD) is the leading cause of mortality in Australia, and places large burdens on the healthcare system. To assist patients with CVDs in recovering from cardiac events and mediating cardiac risk factors, a home based cardiac rehabilitation program, known as the Care Assessment Platform (CAP), was developed. In the CAP program, patients are required to manually enter health information into their mobile phones on a daily basis. The manual operation is often subject to human errors and is inconvenient for some elderly patients. To improve this, an automated wireless solution has been desired. The objectives of this paper are to investigate the feasibility of implementing the newly released Bluetooth 4.0 (BT4.0) for the CAP program, and practically evaluate BT4.0 communications between a developed mobile application and some emulated healthcare devices. The study demonstrated that BT4.0 addresses usability, interoperability and security for healthcare applications, reduces the power consumption in wireless communication, and improves the flexibility of interface for software development. This evaluation study provides an essential mobile BT4.0 framework to incorporate a large range of healthcare devices for clinical assessment and intervention in the CAP program, and hence it is useful for similar development and research work of other mobile healthcare solutions.
49 CFR 24.503 - Replacement housing payment for 90-day mobile home occupants.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false Replacement housing payment for 90-day mobile home... ASSISTANCE AND REAL PROPERTY ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.503 Replacement housing payment for 90-day mobile home occupants. A displaced tenant or owner-occupant of a mobile...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Mobile homes. 777.26 Section 777.26 Postal Service... POLICIES Uniform Relocation Assistance § 777.26 Mobile homes. (a) Moving Expenses. Displaced persons who are occupants of mobile homes are eligible for moving expenses under § 777.23 subject to the following...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 39 Postal Service 1 2013-07-01 2013-07-01 false Mobile homes. 777.26 Section 777.26 Postal Service... POLICIES Uniform Relocation Assistance § 777.26 Mobile homes. (a) Moving Expenses. Displaced persons who are occupants of mobile homes are eligible for moving expenses under § 777.23 subject to the following...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 39 Postal Service 1 2011-07-01 2011-07-01 false Mobile homes. 777.26 Section 777.26 Postal Service... POLICIES Uniform Relocation Assistance § 777.26 Mobile homes. (a) Moving Expenses. Displaced persons who are occupants of mobile homes are eligible for moving expenses under § 777.23 subject to the following...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 39 Postal Service 1 2012-07-01 2012-07-01 false Mobile homes. 777.26 Section 777.26 Postal Service... POLICIES Uniform Relocation Assistance § 777.26 Mobile homes. (a) Moving Expenses. Displaced persons who are occupants of mobile homes are eligible for moving expenses under § 777.23 subject to the following...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 39 Postal Service 1 2014-07-01 2014-07-01 false Mobile homes. 777.26 Section 777.26 Postal Service... POLICIES Uniform Relocation Assistance § 777.26 Mobile homes. (a) Moving Expenses. Displaced persons who are occupants of mobile homes are eligible for moving expenses under § 777.23 subject to the following...
A secure mobile crowdsensing (MCS) location tracker for elderly in smart city
NASA Astrophysics Data System (ADS)
Shien, Lau Khai; Singh, Manmeet Mahinderjit
2017-10-01
According to the UN's (United Nations) projection, Malaysia will achieve ageing population status by 2030. The challenge of the growing ageing population is health and social care services. As the population lives longer, the costs of institutional care rises and elderly who not able live independently in their own homes without caregivers. Moreover, it restricted their activity area, safety and freedom in their daily life. Hence, a tracking system is worthy for their caregivers to track their real-time location with efficient. Currently tracking and monitoring systems are unable to satisfy the needs of the community. Hence, Indoor-Outdoor Elderly Secure and Tracking care system (IOET) proposed to track and monitor elderly. This Mobile Crowdsensing type of system is using indoor and outdoor positioning system to locate elder which utilizes the RFID, NFC, biometric system and GPS aim to secure the safety of elderly within indoors and outdoors environment. A mobile application and web-based application to be designed for this system. This system able to real-time tracking by combining GPS and NFC for outdoor coverage where ideally in smart city. In indoor coverage, the system utilizes active RFID tracking elderly movement. The system will prompt caregiver wherever elderly movement or request by using the notification service which provided the real-time notify. Caregiver also can review the place that visited by elderly and trace back elderly movement.
Residual Network Data Structures in Android Devices
2011-09-01
Apple’s iOS, Google’s Android, RIM’s Blackberry and Nokia’s Symbian. Each Smartphone presents unique characteristics for forensic examiners. In...another. • Home Agent: A router on mobile node’s home network that tunnels traffic to mobile node when not on home network. Also maintains mobile nodes...Address notification to the Home Agent. When traffic arrives at the Home Agent for the mobile node, the Home Agent tunnels the traffic to the Care-of
5 CFR 180.104 - Allowable claims.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money... claimant's supervisor. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their contents under the provisions of § 180.104(c)(2). Claims for structural damage to mobile homes...
5 CFR 180.104 - Allowable claims.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money... claimant's supervisor. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their contents under the provisions of § 180.104(c)(2). Claims for structural damage to mobile homes...
5 CFR 180.104 - Allowable claims.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money... claimant's supervisor. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their contents under the provisions of § 180.104(c)(2). Claims for structural damage to mobile homes...
5 CFR 180.104 - Allowable claims.
Code of Federal Regulations, 2010 CFR
2010-01-01
... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money... claimant's supervisor. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their contents under the provisions of § 180.104(c)(2). Claims for structural damage to mobile homes...
5 CFR 180.104 - Allowable claims.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money... claimant's supervisor. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their contents under the provisions of § 180.104(c)(2). Claims for structural damage to mobile homes...
Bachmor, T; Schöchlin, J; Bolz, A
2002-01-01
Equipping medical devices with long range telemetry opens completely new possibilities for emergency response, home care and remote diagnosis. Mobile communications nowadays seem to be a generally accepted part of our modern world, but bridging the gap between new (consumer-) technologies and medical devices still is a challenge today. Providing a telemetry link (GSM) is just the trivial part--ensuring security, reliability and service management are the more critical tasks that need to be addressed. Therefore, a complete system concept consists of an automatic fleet management (e.g. periodic device-initiated service calls) as well as customer relationship management (CRM), including technical service and a trouble-ticket system.
7 CFR 1755.509 - Mobile homes.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 11 2014-01-01 2014-01-01 false Mobile homes. 1755.509 Section 1755.509 Agriculture... homes. (a) Customer access location installations at mobile homes shall be treated the same whether the homes are mounted on permanent foundations or temporary foundations and shall be installed as specified...
7 CFR 1755.509 - Mobile homes.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 11 2012-01-01 2012-01-01 false Mobile homes. 1755.509 Section 1755.509 Agriculture... homes. (a) Customer access location installations at mobile homes shall be treated the same whether the homes are mounted on permanent foundations or temporary foundations and shall be installed as specified...
7 CFR 1755.509 - Mobile homes.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 11 2013-01-01 2013-01-01 false Mobile homes. 1755.509 Section 1755.509 Agriculture... homes. (a) Customer access location installations at mobile homes shall be treated the same whether the homes are mounted on permanent foundations or temporary foundations and shall be installed as specified...
7 CFR 1755.509 - Mobile homes.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 11 2011-01-01 2011-01-01 false Mobile homes. 1755.509 Section 1755.509 Agriculture... homes. (a) Customer access location installations at mobile homes shall be treated the same whether the homes are mounted on permanent foundations or temporary foundations and shall be installed as specified...
7 CFR 1755.509 - Mobile homes.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 11 2010-01-01 2010-01-01 false Mobile homes. 1755.509 Section 1755.509 Agriculture... homes. (a) Customer access location installations at mobile homes shall be treated the same whether the homes are mounted on permanent foundations or temporary foundations and shall be installed as specified...
10 CFR 430.32 - Energy and water conservation standards and their effective dates.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (excluding classes noted below) 78 (B) Mobile Home furnaces 75 (C) Small furnaces (other than those designed solely for installation in mobile homes) having an input rate of less than 45,000 Btu/hr (1) Weatherized... including mobile home furnaces) 80 (B) Mobile Home gas furnaces 80 (C) Non-weatherized oil-fired furnaces...
10 CFR 430.32 - Energy and water conservation standards and their compliance dates.
Code of Federal Regulations, 2014 CFR
2014-01-01
... (excluding classes noted below) 78 (B) Mobile Home furnaces 75 (C) Small furnaces (other than those designed solely for installation in mobile homes) having an input rate of less than 45,000 Btu/hr (1) Weatherized... including mobile home furnaces) 80 (B) Mobile Home gas furnaces 80 (C) Non-weatherized oil-fired furnaces...
10 CFR 430.32 - Energy and water conservation standards and their effective dates.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (excluding classes noted below) 78 (B) Mobile Home furnaces 75 (C) Small furnaces (other than those designed solely for installation in mobile homes) having an input rate of less than 45,000 Btu/hr (1) Weatherized... including mobile home furnaces) 80 (B) Mobile Home gas furnaces 80 (C) Non-weatherized oil-fired furnaces...
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
Macias, Elsa; Suarez, Alvaro; Lloret, Jaime
2013-01-01
Rich-sensor smart phones have made possible the recent birth of the mobile sensing research area as part of ubiquitous sensing which integrates other areas such as wireless sensor networks and web sensing. There are several types of mobile sensing: individual, participatory, opportunistic, crowd, social, etc. The object of sensing can be people-centered or environment-centered. The sensing domain can be home, urban, vehicular… Currently there are barriers that limit the social acceptance of mobile sensing systems. Examples of social barriers are privacy concerns, restrictive laws in some countries and the absence of economic incentives that might encourage people to participate in a sensing campaign. Several technical barriers are phone energy savings and the variety of sensors and software for their management. Some existing surveys partially tackle the topic of mobile sensing systems. Published papers theoretically or partially solve the above barriers. We complete the above surveys with new works, review the barriers of mobile sensing systems and propose some ideas for efficiently implementing sensing, fusion, learning, security, privacy and energy saving for any type of mobile sensing system, and propose several realistic research challenges. The main objective is to reduce the learning curve in mobile sensing systems where the complexity is very high. PMID:24351637
Macias, Elsa; Suarez, Alvaro; Lloret, Jaime
2013-12-16
Rich-sensor smart phones have made possible the recent birth of the mobile sensing research area as part of ubiquitous sensing which integrates other areas such as wireless sensor networks and web sensing. There are several types of mobile sensing: individual, participatory, opportunistic, crowd, social, etc. The object of sensing can be people-centered or environment-centered. The sensing domain can be home, urban, vehicular… Currently there are barriers that limit the social acceptance of mobile sensing systems. Examples of social barriers are privacy concerns, restrictive laws in some countries and the absence of economic incentives that might encourage people to participate in a sensing campaign. Several technical barriers are phone energy savings and the variety of sensors and software for their management. Some existing surveys partially tackle the topic of mobile sensing systems. Published papers theoretically or partially solve the above barriers. We complete the above surveys with new works, review the barriers of mobile sensing systems and propose some ideas for efficiently implementing sensing, fusion, learning, security, privacy and energy saving for any type of mobile sensing system, and propose several realistic research challenges. The main objective is to reduce the learning curve in mobile sensing systems where the complexity is very high.
41 CFR 302-10.5 - May I transport a mobile home over water?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false May I transport a mobile home over water? 302-10.5 Section 302-10.5 Public Contracts and Property Management Federal Travel... transport a mobile home over water? Yes, you may transport a mobile home over water when both the points of...
16 CFR Appendix G5 to Part 305 - Mobile Home Furnaces-Oil
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Mobile Home Furnaces-Oil G5 Appendix G5 to... LABELING RULEâ) Appendix G5 to Part 305—Mobile Home Furnaces—Oil Type Range of annual fuel utilization efficiencies (AFUEs) Low High Mobile Home Oil Furnaces Manufactured Before the Compliance Date of DOE Regional...
16 CFR Appendix G4 to Part 305 - Mobile Home Furnaces-Gas
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Mobile Home Furnaces-Gas G4 Appendix G4 to... LABELING RULEâ) Appendix G4 to Part 305—Mobile Home Furnaces—Gas Type Range of annual fuel utilization efficiencies (AFUEs) Low High Mobile Home Gas Furnaces Manufactured Before the Compliance Date of DOE Regional...
41 CFR 302-10.5 - May I transport a mobile home over water?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 41 Public Contracts and Property Management 4 2011-07-01 2011-07-01 false May I transport a mobile home over water? 302-10.5 Section 302-10.5 Public Contracts and Property Management Federal Travel... transport a mobile home over water? Yes, you may transport a mobile home over water when both the points of...
Lumber use trends in mobile home construction
H. E. Dickerhoof
1977-01-01
The mobile home industry is a large and expanding lumber market within the housing industry. A sturdy wood frame lies under the metal wall and roof skin found on most mobile home units. When compared with data compiled in 1970 (1), the latest Forest Service, Department of Agriculture survey findings indicate the average mobile home now uses much more lumber for framing...
77 FR 71610 - Survey of New Manufactured (Mobile) Home Placements
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-03
... (Mobile) Home Placements AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice. SUMMARY... soliciting public comments on the subject proposal. The Survey of Manufactured (Mobile) Home Placements collects data on the characteristics of newly manufactured homes placed for residential use including...
Home Computer and Internet User Security
2005-01-01
Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB
Tornado Safety (Online Tornado FAQ)
, nursing homes, hospitals, sports arenas, stadiums, mobile home communities and offices should have a ; you could be trapped in them if the power is lost. In a mobile home:Get out! Even if your home is tied destroy even tied-down mobile homes; and it is best not to play the low odds that yours will make it. This
25 CFR 256.26 - Can I receive Housing Improvement Program services if I am living in a mobile home?
Code of Federal Regulations, 2010 CFR
2010-04-01
... am living in a mobile home? 256.26 Section 256.26 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE... I am living in a mobile home? Yes. If you meet the eligibility criteria in § 256.6 and there is... § 256.7. If you require Category B services and your mobile home has exterior walls of less than three...
Embodied Germ Cell at Work: Building an Expansive Concept of Physical Mobility in Home Care
ERIC Educational Resources Information Center
Engestrom, Yrjo; Nummijoki, Jaana; Sannino, Annalisa
2012-01-01
This article presents a process of collective formation of a new concept of mobility between home care workers and their elderly clients, who are at risk of losing physical mobility and functional capacity. A new tool called mobility agreement was introduced to facilitate the inclusion of regular mobility exercises in home care visits and in the…
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung
2012-06-01
The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
Ad-Hoc Networks and the Mobile Application Security System (MASS)
2006-01-01
solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems
A most spectrum-efficient duplexing system: CDD
NASA Astrophysics Data System (ADS)
Lee, William C. Y.
2001-10-01
The game to play in wireless communications when it comes to increasing spectrum efficiency is to eliminate interference. Currently, all cellular systems use FDD (Frequency Division Duplexing) in an attempt to eliminate the interference from the adjacent cells. Through the use of many technologies only one type of interference remains and that is the adjacent base-tohome mobile interference. TDD (Time Division Duplexing) has not been used for mobile cellular systems, not only because of the adjacent base-to-home mobile interference, but also because of the additional adjacent base-to-home base interference, and adjacent mobile-to-home mobile interference. Therefore, TDD can only be used for small, confined area systems. CDD (Code Division Duplexing) can eliminate all three kinds of interference; the adjacent base-to-home mobile, the adjacent baseto-home base, and the adjacent mobile- to- home in cellular systems. Eliminating each of these interferences makes CDD the most spectrum efficient duplexing system. This talk will elaborate on a set of smart codes, which will make an efficient CDD system a reality.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
Social security income and the utilization of home care: Evidence from the social security notch.
Tsai, Yuping
2015-09-01
This paper exploits Social Security law changes to identify the effect of Social Security income on the use of formal and informal home care by the elderly. Results from an instrumental variables estimation strategy show that as retirement income increases, elderly individuals increase their use of formal home care and become less likely to rely on informal home care provided to them by their children. This negative effect on informal home care is most likely driven by male children withdrawing from their caregiving roles. The empirical results also suggest that higher Social Security benefits would encourage the use of formal home care by those who would not have otherwise used any type of home care and would also encourage the use of both types of home care services among elderly individuals. Published by Elsevier B.V.
Social security income and the utilization of home care: Evidence from the social security notch☆
Tsai, Yuping
2018-01-01
This paper exploits Social Security law changes to identify the effect of Social Security income on the use of formal and informal home care by the elderly. Results from an instrumental variables estimation strategy show that as retirement income increases, elderly individuals increase their use of formal home care and become less likely to rely on informal home care provided to them by their children. This negative effect on informal home care is most likely driven by male children withdrawing from their caregiving roles. The empirical results also suggest that higher Social Security benefits would encourage the use of formal home care by those who would not have otherwise used any type of home care and would also encourage the use of both types of home care services among elderly individuals. PMID:26184382
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
2018-01-01
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Ali, Bako; Awad, Ali Ismail
2018-03-08
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min
2012-01-01
Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648
16 CFR Appendix G4 to Part 305 - Mobile Home Furnaces
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Mobile Home Furnaces G4 Appendix G4 to Part... CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME APPLIANCES AND OTHER... Appendix G4 to Part 305—Mobile Home Furnaces Manufacturer's rated heating capacities (Btu's/hr.) Range of...
16 CFR Appendix G4 to Part 305 - Mobile Home Furnaces
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Mobile Home Furnaces G4 Appendix G4 to Part... CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME APPLIANCES AND OTHER... Appendix G4 to Part 305—Mobile Home Furnaces Manufacturer's rated heating capacities (Btu's/hr.) Range of...
16 CFR Appendix G4 to Part 305 - Mobile Home Furnaces
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Mobile Home Furnaces G4 Appendix G4 to Part... CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME APPLIANCES AND OTHER... Appendix G4 to Part 305—Mobile Home Furnaces Manufacturer's rated heating capacities (Btu's/hr.) Range of...
16 CFR Appendix G4 to Part 305 - Mobile Home Furnaces
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Mobile Home Furnaces G4 Appendix G4 to Part... CONCERNING DISCLOSURES REGARDING ENERGY CONSUMPTION AND WATER USE OF CERTAIN HOME APPLIANCES AND OTHER... Appendix G4 to Part 305—Mobile Home Furnaces Manufacturer's rated heating capacities (Btu's/hr.) Range of...
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
Short Message Service (SMS) Security Solution for Mobile Devices
2006-12-01
correspondences, all reside on the mobile device . Once the data is compromised, the owner, family members, and friends may be subjected to identity theft ...SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Gurminder Singh Co-Advisor: John Gibson...in military settings are also discussed. 15. NUMBER OF PAGES 113 14. SUBJECT TERMS GSM security, SMS security, mobile device security
Ageing-in-place with the use of ambient intelligence technology: perspectives of older users.
van Hoof, J; Kort, H S M; Rutten, P G S; Duijnstee, M S H
2011-05-01
Ambient intelligence technologies are a means to support ageing-in-place by monitoring clients in the home. In this study, monitoring is applied for the purpose of raising an alarm in an emergency situation, and thereby, providing an increased sense of safety and security. Apart from these technological solutions, there are numerous environmental interventions in the home environment that can support people to age-in-place. The aim of this study was to investigate the needs and motives, related to ageing-in-place, of the respondents receiving ambient intelligence technologies, and to investigate whether, and how, these technologies contributed to aspects of ageing-in-place. This paper presents the results of a qualitative study comprised of interviews and observations of technology and environmental interventions in the home environment among 18 community-dwelling older adults with a complex demand for care. These respondents had a prototype of the Unattended Autonomous Surveillance system, an example of ambient intelligence technology, installed in their homes as a means to age-in-place. The UAS-system offers a large range of functionalities, including mobility monitoring, voice response, fire detection, as well as wandering detection and prevention, which can be installed in different configurations. The respondents had various motives to use ambient intelligence technologies to support ageing-in-place. The most prominent reason was to improve the sense of safety and security, in particular, in case of fall incidents, when people were afraid not to be able to use their existing emergency response systems. The ambient intelligence technologies were initially seen as a welcome addition to strategies already adopted by the respondents, including a variety of home modifications and assistive devices. The systems tested increased the sense of safety and security and helped to postpone institutionalisation. Respondents came up with a set of specifications in terms of the operation and the design of the technology. False alarms were also regarded as a sign that the ambient intelligence technology is functioning. Moreover, a good integration of the new technologies in the provision of health care is indispensable, and installation should be done in an acceptable and unobtrusive manner. Ambient intelligence technologies can contribute to an increased safety and security at home. The technologies alone offer no all encompassing solution as home care and additional environmental interventions are still needed to support ageing-in-place. Results of the study are used to further improve the ambient intelligence technologies and their implementation. 2011 Elsevier Ireland Ltd. All rights reserved.
Occupational health and safety of merchant seafarers from Kiribati and Tuvalu.
Borovnik, Maria
2011-01-01
Intensifying international competition in the shipping industry in response to global pressures makes seafarers' jobs increasingly difficult. Challenging conditions in ship employment are problematic, particularly in a development context where home communities' dependence on seafarers' income is high and social protection is low. Qualitative fieldwork revealed that seafarers from Kiribati and Tuvalu endure exceptionally lengthy work periods at sea to remain competitive. Absence from home while working in constrained and mobile spaces with multinational crews, frequent security controls and speedy turnarounds impacting on sleep deprivation and decreased shore time have implications for physical and emotional health and can become safety matters. Hence, there is a growing need to address mechanisms to protect seafarers from the physical and emotional effects of global demands in the shipping industry.
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
Regularity and predictability of human mobility in personal space.
Austin, Daniel; Cross, Robin M; Hayes, Tamara; Kaye, Jeffrey
2014-01-01
Fundamental laws governing human mobility have many important applications such as forecasting and controlling epidemics or optimizing transportation systems. These mobility patterns, studied in the context of out of home activity during travel or social interactions with observations recorded from cell phone use or diffusion of money, suggest that in extra-personal space humans follow a high degree of temporal and spatial regularity - most often in the form of time-independent universal scaling laws. Here we show that mobility patterns of older individuals in their home also show a high degree of predictability and regularity, although in a different way than has been reported for out-of-home mobility. Studying a data set of almost 15 million observations from 19 adults spanning up to 5 years of unobtrusive longitudinal home activity monitoring, we find that in-home mobility is not well represented by a universal scaling law, but that significant structure (predictability and regularity) is uncovered when explicitly accounting for contextual data in a model of in-home mobility. These results suggest that human mobility in personal space is highly stereotyped, and that monitoring discontinuities in routine room-level mobility patterns may provide an opportunity to predict individual human health and functional status or detect adverse events and trends.
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Saving our backs: safe patient handling and mobility for home care.
Beauvais, Audrey; Frost, Lenore
2014-01-01
Predicted work-related injuries for nurses and home healthcare workers are on the rise given the many risk factors in the home environment and the escalating demands for home healthcare workers in the United States. Fortunately, safe patient handling and mobility programs can dramatically decrease injuries. Despite strides being made to promote safe patient handling and mobility programs in acute care, more can be done to establish such initiatives in the home care setting.
Security Measures to Protect Mobile Agents
NASA Astrophysics Data System (ADS)
Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh
2010-11-01
The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.
33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS Specific Regulated...
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
2010-09-01
secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless
A Web-Based Database for Nurse Led Outreach Teams (NLOT) in Toronto.
Li, Shirley; Kuo, Mu-Hsing; Ryan, David
2016-01-01
A web-based system can provide access to real-time data and information. Healthcare is moving towards digitizing patients' medical information and securely exchanging it through web-based systems. In one of Ontario's health regions, Nurse Led Outreach Teams (NLOT) provide emergency mobile nursing services to help reduce unnecessary transfers from long-term care homes to emergency departments. Currently the NLOT team uses a Microsoft Access database to keep track of the health information on the residents that they serve. The Access database lacks scalability, portability, and interoperability. The objective of this study is the development of a web-based database using Oracle Application Express that is easily accessible from mobile devices. The web-based database will allow NLOT nurses to enter and access resident information anytime and from anywhere.
12 CFR 360.2 - Federal Home Loan banks as secured creditors.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Federal Home Loan banks as secured creditors... OF GENERAL POLICY RESOLUTION AND RECEIVERSHIP RULES § 360.2 Federal Home Loan banks as secured... regulations, the receiver of a borrower from a Federal Home Loan Bank shall recognize the priority of any...
12 CFR 360.2 - Federal Home Loan banks as secured creditors.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Federal Home Loan banks as secured creditors... OF GENERAL POLICY RESOLUTION AND RECEIVERSHIP RULES § 360.2 Federal Home Loan banks as secured... regulations, the receiver of a borrower from a Federal Home Loan Bank shall recognize the priority of any...
12 CFR 360.2 - Federal Home Loan banks as secured creditors.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Federal Home Loan banks as secured creditors... OF GENERAL POLICY RESOLUTION AND RECEIVERSHIP RULES § 360.2 Federal Home Loan banks as secured... regulations, the receiver of a borrower from a Federal Home Loan Bank shall recognize the priority of any...
12 CFR 360.2 - Federal Home Loan banks as secured creditors.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Federal Home Loan banks as secured creditors... OF GENERAL POLICY RESOLUTION AND RECEIVERSHIP RULES § 360.2 Federal Home Loan banks as secured... regulations, the receiver of a borrower from a Federal Home Loan Bank shall recognize the priority of any...
49 CFR 24.501 - Applicability.
Code of Federal Regulations, 2011 CFR
2011-10-01
... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.501 Applicability. (a) General. This...) through (g)(10). (b) Partial acquisition of mobile home park. The acquisition of a portion of a mobile home park property may leave a remaining part of the property that is not adequate to continue the...
49 CFR 24.501 - Applicability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.501 Applicability. (a) General. This...) through (g)(10). (b) Partial acquisition of mobile home park. The acquisition of a portion of a mobile home park property may leave a remaining part of the property that is not adequate to continue the...
49 CFR 24.501 - Applicability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.501 Applicability. (a) General. This...) through (g)(10). (b) Partial acquisition of mobile home park. The acquisition of a portion of a mobile home park property may leave a remaining part of the property that is not adequate to continue the...
49 CFR 24.501 - Applicability.
Code of Federal Regulations, 2012 CFR
2012-10-01
... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.501 Applicability. (a) General. This...) through (g)(10). (b) Partial acquisition of mobile home park. The acquisition of a portion of a mobile home park property may leave a remaining part of the property that is not adequate to continue the...
49 CFR 24.501 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ACQUISITION FOR FEDERAL AND FEDERALLY-ASSISTED PROGRAMS Mobile Homes § 24.501 Applicability. (a) General. This...) through (g)(10). (b) Partial acquisition of mobile home park. The acquisition of a portion of a mobile home park property may leave a remaining part of the property that is not adequate to continue the...
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
44 CFR 11.73 - Allowable claims.
Code of Federal Regulations, 2013 CFR
2013-10-01
... supervisor, but these claims shall be limited to a maximum of $1,000.00. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their content under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes resulting from such structural damage...
44 CFR 11.73 - Allowable claims.
Code of Federal Regulations, 2014 CFR
2014-10-01
... supervisor, but these claims shall be limited to a maximum of $1,000.00. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their content under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes resulting from such structural damage...
44 CFR 11.73 - Allowable claims.
Code of Federal Regulations, 2011 CFR
2011-10-01
... supervisor, but these claims shall be limited to a maximum of $1,000.00. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their content under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes resulting from such structural damage...
44 CFR 11.73 - Allowable claims.
Code of Federal Regulations, 2012 CFR
2012-10-01
... supervisor, but these claims shall be limited to a maximum of $1,000.00. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their content under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes resulting from such structural damage...
44 CFR 11.73 - Allowable claims.
Code of Federal Regulations, 2010 CFR
2010-10-01
... supervisor, but these claims shall be limited to a maximum of $1,000.00. (4) Mobile homes. Claims may be allowed for damage to or loss of mobile homes and their content under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes resulting from such structural damage...
29 CFR 15.22 - Allowable claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
... claimant is a civilian employee who is a local inhabitant; or (iii) Any warehouse, office, working area or...) Mobile homes. Claims may be allowed for damage to, or loss of, mobile homes and their contents under the provisions of paragraph (c)(2) of this section. Claims for structural damage to mobile homes, other than that...
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Rachlis, Beth; Brouwer, Kimberly C; Mills, Edward J; Hayes, Michael; Kerr, Thomas; Hogg, Robert S
2007-10-08
Migration is one of many social factors contributing to the spread of HIV and other blood-borne or sexually transmitted infections (STI). Bringing together large numbers of people from diverse settings, the process of migration moves infected individuals to diverse geographic locations. Injection drug users (IDU) are a relatively mobile group, often moving between cities, smaller communities, and across international borders for reasons of work, security, or access to narcotics. This mobility indicates the potential for IDU who engage in risky behavior outside their home areas to transmit HIV infection to other IDU, their sex partners, and others in the population. The objectives of this review are to examine: (1) the influence of drug trafficking and the spread of drug use on the diffusion of HIV, (2) the influence of migration on drug use and HIV-related risk behaviors among migrants, and (3) the mobility patterns of IDU and its role in the spread of HIV. We also discuss the potential policy implications of addressing prevention and care issues in mobile drug using populations.
A New mHealth Communication Framework for Use in Wearable WBANs and Mobile Technologies
Hamida, Sana Tmar-Ben; Hamida, Elyes Ben; Ahmed, Beena
2015-01-01
Driven by the development of biomedical sensors and the availability of high mobile bandwidth, mobile health (mHealth) systems are now offering a wider range of new services. This revolution makes the idea of in-home health monitoring practical and provides the opportunity for assessment in “real-world” environments producing more ecologically valid data. In the field of insomnia diagnosis, for example, it is now possible to offer patients wearable sleep monitoring systems which can be used in the comfort of their homes over long periods of time. The recorded data collected from body sensors can be sent to a remote clinical back-end system for analysis and assessment. Most of the research on sleep reported in the literature mainly looks into how to automate the analysis of the sleep data and does not address the problem of the efficient encoding and secure transmissions of the collected health data. This article reviews the key enabling communication technologies and research challenges for the design of efficient mHealth systems. An end-to-end mHealth system architecture enabling the remote assessment and monitoring of patient's sleep disorders is then proposed and described as a case study. Finally, various mHealth data serialization formats and machine-to-machine (M2M) communication protocols are evaluated and compared under realistic operating conditions. PMID:25654718
Turvey, Carolyn L; Roberts, Lisa J
2015-01-01
This review describes recent developments in online and mobile mental health applications, including a discussion of patient portals to support mental health care. These technologies are rapidly evolving, often before there is systematic investigation of their effectiveness. Though there are some reviews of the effectiveness of mental health mobile apps, perhaps the more significant development is innovation in technology evaluation as well as new models of interprofessional collaboration in developing behavioural health technologies. Online mental health programs have a strong evidence base. Their role in population health strategies needs further exploration, including the most effective use of limited clinical staff resources. Patient portals and personal health records serve to enhance mental health treatment also, though concerns specific to mental health must be addressed to support broader adoption of portals. Provider concerns about sharing psychiatric notes with patients hinder support for portals. Health information exchange for mental health information requires thoughtful consent management strategies so mental health patients can benefit. Finally, the broad array of health information technologies may overwhelm patients. User-friendly, well-designed, patient-centred health information technology homes may integrate these functions to promote a holistic approach to care plans and overall wellness. Such technology homes have special security needs and require providers and patients to be well informed about how best to use these technologies to support behavioural health interventions.
A new mHealth communication framework for use in wearable WBANs and mobile technologies.
Hamida, Sana Tmar-Ben; Hamida, Elyes Ben; Ahmed, Beena
2015-02-03
Driven by the development of biomedical sensors and the availability of high mobile bandwidth, mobile health (mHealth) systems are now offering a wider range of new services. This revolution makes the idea of in-home health monitoring practical and provides the opportunity for assessment in "real-world" environments producing more ecologically valid data. In the field of insomnia diagnosis, for example, it is now possible to offer patients wearable sleep monitoring systems which can be used in the comfort of their homes over long periods of time. The recorded data collected from body sensors can be sent to a remote clinical back-end system for analysis and assessment. Most of the research on sleep reported in the literature mainly looks into how to automate the analysis of the sleep data and does not address the problem of the efficient encoding and secure transmissions of the collected health data. This article reviews the key enabling communication technologies and research challenges for the design of efficient mHealth systems. An end-to-end mHealth system architecture enabling the remote assessment and monitoring of patient's sleep disorders is then proposed and described as a case study. Finally, various mHealth data serialization formats and machine-to-machine (M2M) communication protocols are evaluated and compared under realistic operating conditions.
Nunnery, Danielle L; Labban, Jeffrey D; Dharod, Jigna M
2018-03-01
To (i) determine differences in the availability of variety of fruits and vegetables (F&V) at home by food security status; and (ii) examine the inter-associations between food security status, availability of variety of F&V at home and frequency of F&V intake, among low-income pregnant women. Design/Setting Participants were interviewed to collect food security status, home availability of variety of F&V and frequency of F&V intake. Bivariate analyses, multivariate regression and exploratory mediation analyses were conducted using IBM SPSS Statistics version 23.0 and the PROCESS macro. Low-income pregnant women (n 198) were interviewed if they were ≥18 years of age, in the second trimester of pregnancy, and spoke English or Spanish. Low/very low food security was found among 43 % of participants. Compared with fully food-secure participants, very low food-secure participants reported a lower variety of fruits (P=0·028) and vegetables (P=0·058) available at home. Mediation analyses indicated that through home availability of variety of fresh F&V, food security status was associated with the daily intake of F&V (indirect effect (95 % CI): fresh fruits, -0·039 (-0·074, -0·013); fresh vegetables, -0·048 (-0·083, -0·023)). As food security worsened, the available variety of fresh F&V decreased, which was associated with lower intake. The study highlights the interlink between food security, home food environment and diet quality, and the importance of nutrition education intervention to promote a healthy home food environment and improved pregnancy outcomes among low-income women.
Carranza, Noemí; Ramos, Victoria; Lizana, Francisca G; García, Jorge; del Pozo, Alejando; Monteagudo, José Luis
2010-09-01
The objective of this study was to determine already reported cases of transmission/reception failure and interferences to evaluate the safety and security of the new mobile home telemedicine systems. The literature published in the last 10 years (1998-2009) has been reviewed, by searching in several databases. Searches on transmission effectiveness and electromagnetic compatibility were made manually through journals, conference proceedings, and also the healthcare technology assessment agencies' Web pages. Search strategies developed through electronic databases and manual search identified a total of 886 references, with 44 finally being included in the results. They have been divided by technology in the transmission/reception effectiveness studies, and according to the type of medical device in the case of electromagnetic interferences studies. The study reveals that there are numerous publications on telemedicine and home-monitoring systems using wireless networks. However, literature on effectiveness in terms of connectivity and transmission problems and electromagnetic interferences is limited. From the collected studies, it can be concluded that there are transmission failures, low-coverage areas, errors in the transmission of packets, and so on. Moreover, cases of serious interferences in medical instruments have also been reported. These facts highlight the lack of studies and specific recommendations to be followed in the implementation of biomonitoring systems in domestic environments using wireless networks.
ERIC Educational Resources Information Center
Beaulieu, Barbara; And Others
This unit of instruction on selection and living styles for energy conservation in single-family and multi-family housing and mobile homes was designed for use by home economics teachers in Florida high schools and by home economics extension agents as they work with their clientele. It is one of a series of 11 instructional units (see note)…
Biomedical sensor technologies on the platform of mobile phones
NASA Astrophysics Data System (ADS)
Liu, Lin; Liu, Jing
2011-06-01
Biomedical sensors have been widely used in various areas of biomedical practices, which play an important role in disease detection, diagnosis, monitoring, treatment, health management, and so on. However, most of them and their related platforms are generally not easily accessible or just too expensive or complicated to be kept at home. As an alternative, new technologies enabled from the mobile phones are gradually changing such situations. As can be freely available to almost everyone, mobile phone offers a unique way to improve the conventional medical care through combining with various biomedical sensors. Moreover, the established systems will be both convenient and low cost. In this paper, we present an overview on the state-of-art biomedical sensors, giving a brief introduction of the fundamental principles and showing several new examples or concepts in the area. The focus was particularly put on interpreting the technical strategies to innovate the biomedical sensor technologies based on the platform of mobile phones. Some challenging issues, including feasibility, usability, security, and effectiveness, were discussed. With the help of electrical and mechanical technologies, it is expected that a full combination between the biomedical sensors and mobile phones will bring a bright future for the coming pervasive medical care.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-05
... Decree resolves alleged violations of the Clean Water Act and Safe Drinking Water Act at mobile home... provide drinking water at a number of its mobile home parks and illegally discharged sewage, failed to... environmental audits at each mobile home park, implementing corrective measures, conducting regular inspections...
Development of a Secure Mobile GPS Tracking and Management System
ERIC Educational Resources Information Center
Liu, Anyi
2012-01-01
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Gerard, Perry; Kapadia, Neil; Acharya, Jay; Chang, Patricia T; Lefkovitz, Zvi
2013-12-01
The purpose of this article is to review the steps that can be taken to ensure secure transfer of information over public and home networks, given the increasing utilization of mobile devices in radiology. With the rapid technologic developments in radiology, knowledge of various technical aspects is crucial for any practicing radiologist. Utilization of mobile devices, such as laptops, tablets, and even cellular phones, for reading radiologic studies has become increasingly prevalent. With such usage comes a need to ensure that both the user's and the patient's private information is protected. There are several steps that can be taken to protect sensitive information while using public networks. These steps include being diligent in reviewing the networks to which one connects, ensuring encrypted connections to web-sites, using strong passwords, and using a virtual private network and a firewall. As the role of information technology in modern radiology practice becomes more critical, these safety mechanisms must be addressed when viewing studies on any mobile device.
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
Securing electronic health records with novel mobile encryption schemes.
Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin
2007-01-01
Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.
Wiles, C; Newcombe, R; Fuller, K; Shaw, S; Furnival-Doran, J; Pickersgill, T; Morgan, A
2001-01-01
OBJECTIVES—To determine whether physiotherapy can improve mobility in chronic multiple sclerosis and whether there is a difference between treatment at home and as a hospital outpatient? METHODS—A randomised controlled crossover trial was undertaken in patients with chronic multiple sclerosis who had difficulty walking and were referred from neurology clinics: allocation was to one of six permutations of three 8 week treatment periods separated by 8 week intervals: treatments consisted of physiotherapy at home, as an outpatient, or "no therapy". The main outcome measures were based on independent assessments at home and included mobility related disability (primary outcome: the Rivermead mobility index), gait impairments, arm function, mood, and subjective patient and carer ratings. Therapy was assessed by recording delivery, achievement of set targets, patient and carer preference, and cost. RESULTS—On the Rivermead mobility index (scale 0-15) (primary outcome) there was a highly significant (p<0.001) treatment effect of 1.4-1.5 units favouring hospital or home based therapy over no therapy: this was supported by other measures of mobility, gait, balance, and the assessor's global "mobility change" score: there was no major difference between home and hospital. Carers preferred home treatment but neither they nor patients discerned greater benefit there. Estimated costs of home physiotherapy were £25/session and those at hospital were £18 (including £7 patient travel costs). CONCLUSION—A course of physiotherapy is associated with improved mobility, subjective wellbeing, and improved mood in chronic multiple sclerosis compared with no treatment but benefit may only last a few weeks: there is little to choose between home and hospital based therapy but the first is more costly, mainly due to skilled staff travelling time. PMID:11160464
Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang
2017-08-01
Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.
Application of mobile phone technology for managing chemotherapy-associated side-effects.
Weaver, A; Young, A M; Rowntree, J; Townsend, N; Pearson, S; Smith, J; Gibson, O; Cobern, W; Larsen, M; Tarassenko, L
2007-11-01
Novel mobile phone technology linked to a server that communicates patients' symptoms to healthcare professionals has been adapted to register the side- effects of chemotherapy and provide advice on management of toxicity. We report a feasibility study to examine the utility of home monitoring of patients' symptoms via a mobile phone. Six colon cancer patients receiving adjuvant chemotherapy, entered symptom data onto user friendly screens on a mobile phone twice daily. This 'real time' self assessment of nausea, vomiting, mucositis, diarrhoea and hand-foot syndrome and measurement of temperature was sent via a secured connection to a remote computer. In the event of moderate or severe symptoms (generating amber and red alerts respectively), the nurse was immediately alerted by the computer, via a pager. The nurse then contacted the patient to reinforce the automatic advice sent to the patient on their phone and to assess the patient using clinical algorithms. The patient used the mobile phones during the first two cycles of chemotherapy. The data were successfully analysed by the server software and alerts were generated alerting the study nurses to patients' symptoms at the appropriate time. There were 91 alerts-54 red and 37 amber; 54% (29/54) of the red alerts were data delay and transmission problems which were swiftly rectified. The remaining red alerts were managed appropriately by the study nurses. Both patients and staff felt confident in this approach to symptom management. This study demonstrates that the technology for monitoring patients' symptoms worked well. The patients felt secure in the knowledge that their symptoms were being closely monitored and that they were participating effectively in their own care management.
Security Analysis of Yeh-Tsai Security Mechanism
NASA Astrophysics Data System (ADS)
Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong
Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.
Milberg, A; Wåhlberg, R; Jakobsson, M; Olsson, E-C; Olsson, M; Friedrichsen, M
2012-08-01
Attachment theory has received much interest lately in relation to how adults cope with stress and severe illness. The aim of this study was using the experiences of patients and family members to explore palliative home care as a 'secure base' (a central concept within the theory). Twelve patients and 14 family members were interviewed during ongoing palliative home care. The interviews were analysed with deductive qualitative content analysis. Informants expressed the relevance of sensing security during palliative home care because death and dying were threats that contributed to vulnerability. Palliative home care could foster a feeling of security and provide a secure base. This was facilitated when informants had trust in staff (e.g. due to availability and competence in providing symptom relief), felt recognised as individuals and welcomed to contact the team in times of needs. Being comfortable, informed and having an everyday life also contributed to a perception of palliative home care as a secure base. Family members stressed the importance of being relieved from responsibilities that were too heavy. The underlying meanings of experiencing palliative home care as a secure base involved gaining a sense of control and of inner peace, perceiving that despite a demanding and changed life situation, one could continue partially being oneself and having something to hope for, even if this no longer concerned cure for the ill person. Important aspects of palliative home care as providing a secure base were identified and these have implications for clinical practice. Copyright © 2011 John Wiley & Sons, Ltd.
12 CFR 360.2 - Federal Home Loan banks as secured creditors.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Federal Home Loan banks as secured creditors. 360.2 Section 360.2 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY RESOLUTION AND RECEIVERSHIP RULES § 360.2 Federal Home Loan banks as secured...
Activity Learning as a Foundation for Security Monitoring in Smart Homes.
Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo
2017-03-31
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.
24 CFR 232.555 - Security instrument and lien.
Code of Federal Regulations, 2011 CFR
2011-04-01
... AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND... of Fire Safety Equipment Eligible Security Instruments § 232.555 Security instrument and lien. The...
Demiris, G; Thompson, H J
2012-01-01
This paper highlights the potential of smart home applications to not only assess mobility determinants for older adults in the home environment but also provide the opportunity for tailored interventions. We present a theoretical framework for assessing mobility parameters and utilizing this information to enable behavior change based on the Health Belief Model. We discuss examples that showcase the potential of smart home systems to not only measure but also improve mobility for community dwelling older adults. Mobility is a complex construct that cannot be addressed with a single monitoring approach or a single intervention. Instead, tailored interventions that address specific needs and behaviors of individuals and take into consideration preferences of older adults and potentially their social network are needed to effectively enforce positive behavior change. Smart home systems have the ability to capture details of one's daily living that could otherwise not be easily obtained; however, such data repositories alone are not sufficient to improve clinical outcomes if appropriate mechanisms for data mining and analysis, as well as tailored response systems are not in place. Unleashing the potential of smart home applications to measure and improve mobility has the potential of transforming elder care and providing potentially cost-effective tools to support independence for older adults. A technologically driven smart home application can maximize its clinical relevance by pursuing interactive features that can lead to behavior change.
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in this section— Cruise ship means a passenger vessel over 100 gross tons, carrying more than 12...
33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in this section— Cruise ship means a passenger vessel over 100 gross tons, carrying more than 12...
33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in this section— Cruise ship means a passenger vessel over 100 gross tons, carrying more than 12...
33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in this section— Cruise ship means a passenger vessel over 100 gross tons, carrying more than 12...
Security patterns and a weighting scheme for mobile agents
NASA Astrophysics Data System (ADS)
Walker, Jessie J.
The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
24 CFR 232.525 - Note and security form.
Code of Federal Regulations, 2011 CFR
2011-04-01
... MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...
Activity Learning as a Foundation for Security Monitoring in Smart Homes
Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo
2017-01-01
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Security of Mobile Agents on the Internet.
ERIC Educational Resources Information Center
Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare
2001-01-01
Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
2004-11-01
the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Mortazavi, SMJ; Gholampour, M; Haghani, M; Mortazavi, G; Mortazavi, AR
2014-01-01
Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, home blood glucose testing kits are very popular. The main goal of this study was to investigate if radiofrequency radiation emitted from a common GSM mobile phone can alter the accuracy of home blood glucose monitors. Forty five female nondiabetic students aged 17-20 years old participated in this study. For Control-EMF group (30 students), blood glucose concentration for each individual was measured in presence and absence of radiofrequency radiation emitted by a common GSM mobile phone (HTC touch, Diamond 2) while the phone was ringing. For Control- Repeat group (15 students), two repeated measurements were performed for each participant in the absence of electromagnetic fields. The magnitude of the changes between glucose levels in two repeated measurements (|ΔC|) in Control-Repeat group was 1.07 ± 0.88 mg/dl while this magnitude for Control-EMF group was 7.53 ± 4.76 mg/dl (P < 0.001, two-tailed test). To the best of our knowledge, this is the first study to assess the electromagnetic interference in home blood glucose monitors. It can be concluded that electromagnetic interference from mobile phones has an adverse effect on the accuracy of home blood glucose monitors. We suggest that mobile phones should be used at least 50 cm away from home blood glucose monitors. PMID:25505778
Mortazavi, Smj; Gholampour, M; Haghani, M; Mortazavi, G; Mortazavi, Ar
2014-09-01
Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, home blood glucose testing kits are very popular. The main goal of this study was to investigate if radiofrequency radiation emitted from a common GSM mobile phone can alter the accuracy of home blood glucose monitors. Forty five female nondiabetic students aged 17-20 years old participated in this study. For Control-EMF group (30 students), blood glucose concentration for each individual was measured in presence and absence of radiofrequency radiation emitted by a common GSM mobile phone (HTC touch, Diamond 2) while the phone was ringing. For Control- Repeat group (15 students), two repeated measurements were performed for each participant in the absence of electromagnetic fields. The magnitude of the changes between glucose levels in two repeated measurements (|ΔC|) in Control-Repeat group was 1.07 ± 0.88 mg/dl while this magnitude for Control-EMF group was 7.53 ± 4.76 mg/dl (P < 0.001, two-tailed test). To the best of our knowledge, this is the first study to assess the electromagnetic interference in home blood glucose monitors. It can be concluded that electromagnetic interference from mobile phones has an adverse effect on the accuracy of home blood glucose monitors. We suggest that mobile phones should be used at least 50 cm away from home blood glucose monitors.
Device Data Protection in Mobile Healthcare Applications
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
Yang, Y Tony; Silverman, Ross D
2014-02-01
Mobile health (mHealth) technology has facilitated the transition of care beyond the traditional hospital setting to the homes of patients. Yet few studies have evaluated the legal implications of the expansion of mHealth applications, or "apps." Such apps are affected by a patchwork of policies related to medical licensure, privacy and security protection, and malpractice liability. For example, the privacy protections of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 may apply to only some uses of the apps. Similarly, it is not clear what a doctor's malpractice liability would be if he or she injured a patient as the result of inaccurate information supplied by the patient's self-monitoring health app. This article examines the legal issues related to the oversight of health apps, discusses current federal regulations, and suggests strategies to improve the oversight of these apps.
77 FR 58424 - China Mobile Media Technology, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Mobile Media Technology, Inc., Order of Suspension of Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Mobile Media...
Home | www.charlescountymd.gov
Customer Survey Mobile Services Contact Search form Search Search Main menu Home Businesses Tourism Animal Shelter Water and Sewer Billing Mobile Friendly Services Opioid Abuse & Overdose Prevention OFFICIAL WEBSITE OF THE CHARLES COUNTY GOVERNMENT 200 Baltimore Street | La Plata, Maryland 20646 Mobile
NASA Astrophysics Data System (ADS)
Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout
This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
Evaluation of a Home Biomonitoring Autonomous Mobile Robot.
Dorronzoro Zubiete, Enrique; Nakahata, Keigo; Imamoglu, Nevrez; Sekine, Masashi; Sun, Guanghao; Gomez, Isabel; Yu, Wenwei
2016-01-01
Increasing population age demands more services in healthcare domain. It has been shown that mobile robots could be a potential solution to home biomonitoring for the elderly. Through our previous studies, a mobile robot system that is able to track a subject and identify his daily living activities has been developed. However, the system has not been tested in any home living scenarios. In this study we did a series of experiments to investigate the accuracy of activity recognition of the mobile robot in a home living scenario. The daily activities tested in the evaluation experiment include watching TV and sleeping. A dataset recorded by a distributed distance-measuring sensor network was used as a reference to the activity recognition results. It was shown that the accuracy is not consistent for all the activities; that is, mobile robot could achieve a high success rate in some activities but a poor success rate in others. It was found that the observation position of the mobile robot and subject surroundings have high impact on the accuracy of the activity recognition, due to the variability of the home living daily activities and their transitional process. The possibility of improvement of recognition accuracy has been shown too.
[The Explore of the Security Strategy Model in Hospital Mobile Clinic New Mode].
Li, Ke; Xia, Yong; Wang, Wei
2016-03-01
The paper elaborates and analyzes the current status of mobile hospital information security, then puts forward a security new model of the mobile treatment, then its architecture and solutions is elaborated. The use of this model makes the overall security level of hospital information to be further improved and enhanced, it has a positive signifi cance to promote the overal hospital management level.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mumford, J.L.; Williams, R.W.; Walsh, D.B.
1991-01-01
The study was conducted to assess human exposure to air pollutants resulting from the use of kerosene heaters in mobile homes. It has been estimated that 15-17 million unvented kerosene heaters have been sold in the United States, and 33% of these heaters have been sold to mobile home residents. The emissions from kerosene heaters can result in high pollutants levels in mobile homes that have a small air volume and low ventilation rate. Eight totally electric mobile homes with no smokers living in the homes were monitored for indoor air particles < 10 micrometer (PM10), semivolatile organics, carbon monoxidemore » (CO), and mutagenicity of semivolatile and particle-phase organics in Salmonella typhimurium TA98 without S9 using a microsuspension reverse-mutation assay. Each home was monitored for an average of 6.5 h/day, 3 days/week, for 4 weeks (2 weeks with the heater on and 2 weeks with the heater off) during the heating season of 1989. Indoor air exchange rate, temperature, and humidity were measured. Chemical analyses, including polycyclic aromatic hydrocarbon (PAH) and nitro PAH, also were performed on the indoor air samples from a selected home with the kerosene heater on and off. Increases in CO and organic concentrations resulting from the use of kerosene heaters were found in most homes monitored. Chemical analysis data also suggested the presence of evaporated, unburned kerosene fuel present in semivolatile organics collected in the XAD samples. In comparison with the U.S. national ambient air standards, four out of the eight heaters investigated in the study emitted pollutants that exceeded the ambient air standards some days. These data suggested that emissions from unvented kerosene heaters can significantly impact indoor air quality in mobile homes and that these emissions contain carcinogenic compounds and can be potentially carcinogenic in humans.« less
Home Economics Rural Service: Mobile Unit Bibliography.
ERIC Educational Resources Information Center
Farrar, Felicia Casados, Comp.; Roybal, Reina A., Comp.
This bibliography is a complete listing of all materials available to home economics teachers in Northern New Mexico through the Home Economics Rural Service Mobile Unit. Eleven subject areas are included: career education, child growth and development, clothing and crafts, consumer education, food and nutrition, guidance, housing and interior…
Mdege, Noreen Dadirai; Chindove, Stanley
2014-01-01
Home-based antiretroviral therapy (ART) and ART through mobile clinics can potentially increase access to ART for large numbers of people, including hard-to-reach populations. We reviewed literature on the effectiveness and cost implications of the home-based ART and mobile clinic ART models. We searched Medline, Embase, PsycInfo, CINAHL, Cochrane Library, Web of Knowledge and Current Controlled Trials Register for articles published up to March 2012. We included non-randomised and randomised controlled clinical trials that recruited HIV/AIDS positive adults with or without prior exposure to ART. Six studies were included in the review, with only four effectiveness studies (all evaluating home-based ART and none for mobile clinic ART) and four studies reporting on the cost implications. The evidence suggests home-based ART is as effective as health facility-based ART, including on clinical outcomes, viral load and CD4+ count. However, three of these studies were very small. Studies suggest health facility-based ART is the most cost-effective, followed by mobile-clinic ART, with home-based ART being the least cost-effective. Evidence on the effectiveness and cost implications of mobile clinic and home-based ART is currently limited. Although the few available studies suggest home-based ART can potentially be as effective as health facility-based ART, there is need for more research before robust conclusions can be made. Results from the few available studies also suggest that health facility-based ART is the most cost-effective. Copyright © 2013 John Wiley & Sons, Ltd.
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis
2016-08-01
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.
Interpretive flexibility in mobile health: lessons from a government-sponsored home care program.
Nielsen, Jeppe Agger; Mathiassen, Lars
2013-10-30
Mobile technologies have emerged as important tools that health care personnel can use to gain easy access to client data anywhere. This is particularly useful for nurses and care workers in home health care as they provide services to clients in many different settings. Although a growing body of evidence supports the use of mobile technologies, the diverse implications of mobile health have yet to be fully documented. Our objective was to examine a large-scale government-sponsored mobile health implementation program in the Danish home care sector and to understand how the technology was used differently across home care agencies. We chose to perform a longitudinal case study with embedded units of analysis. We included multiple data sources, such as written materials, a survey to managers across all 98 Danish municipalities, and semistructured interviews with managers, care workers, and nurses in three selected home care agencies. We used process models of change to help analyze the overall implementation process from a longitudinal perspective and to identify antecedent conditions, key events, and practical outcomes. Strong collaboration between major stakeholders in the Danish home care sector (government bodies, vendors, consultants, interest organizations, and managers) helped initiate and energize the change process, and government funding supported quick and widespread technology adoption. However, although supported by the same government-sponsored program, mobile technology proved to have considerable interpretive flexibility with variation in perceived nature of technology, technology strategy, and technology use between agencies. What was first seen as a very promising innovation across the Danish home care sector subsequently became the topic of debate as technology use arrangements ran counter to existing norms and values in individual agencies. Government-sponsored programs can have both positive and negative results, and managers need to be aware of this and the interpretive flexibility of mobile technology. Mobile technology implementation is a complex process that is best studied by combining organization-level analysis with features of the wider sociopolitical and interorganizational environment.
NASA Astrophysics Data System (ADS)
Ramalingam, Srikumar
2001-11-01
A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.
Berlin, Lisa J; Martoccio, Tiffany L; Appleyard Carmody, Karen; Goodman, W Benjamin; O'Donnell, Karen; Williams, Janis; Murphy, Robert A; Dodge, Kenneth A
2017-12-01
US government-funded early home visiting services are expanding significantly. The most widely implemented home visiting models target at-risk new mothers and their infants. Such home visiting programs typically aim to support infant-parent relationships; yet, such programs' effects on infant attachment quality per se are as yet untested. Given these programs' aims, and the crucial role of early attachments in human development, it is important to understand attachment processes in home visited families. The current, preliminary study examined 94 high-risk mother-infant dyads participating in a randomized evaluation of the Healthy Families Durham (HFD) home visiting program. We tested (a) infant attachment security and disorganization as predictors of toddler behavior problems and (b) program effects on attachment security and disorganization. We found that (a) infant attachment disorganization (but not security) predicted toddler behavior problems and (b) participation in HFD did not significantly affect infant attachment security or disorganization. Findings are discussed in terms of the potential for attachment-specific interventions to enhance the typical array of home visiting services.
A Test-Bed of Secure Mobile Cloud Computing for Military Applications
2016-09-13
searching databases. This kind of applications is a typical example of mobile cloud computing (MCC). MCC has lots of applications in the military...Release; Distribution Unlimited UU UU UU UU 13-09-2016 1-Aug-2014 31-Jul-2016 Final Report: A Test-bed of Secure Mobile Cloud Computing for Military...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Test-bed, Mobile Cloud Computing , Security, Military Applications REPORT
[Analysis of the security risk in home medical equipment].
Peng, Xiaolong; Xu, Honglei; Tian, Xiaojun
2014-01-01
The popularization of home medical equipment facilitates the treatment and management of many diseases, improving the patient compliance. However, due to the absence of medical background, most of their users have various security risk in the course of reorganization, choosing, using and maintenance of the products. This paper analyzed the property of security risk in home medical equipment, and described the matters needing attention in the using of several common products.
Weaver, Andrew; Love, Sharon B; Larsen, Mark; Shanyinde, Milensu; Waters, Rachel; Grainger, Lisa; Shearwood, Vanessa; Brooks, Claire; Gibson, Oliver; Young, Annie M; Tarassenko, Lionel
2014-10-01
Real-time symptom monitoring using a mobile phone is potentially advantageous for patients receiving oral chemotherapy. We therefore conducted a pilot study of patient dose adaptation using mobile phone monitoring of specific symptoms to investigate relative dose intensity of capecitabine, level of toxicity and perceived supportive care. Patients with breast or colorectal cancer receiving capecitabine completed a symptom, temperature and dose diary twice a day using a mobile phone application. This information was encrypted and automatically transmitted in real time to a secure server, with moderate levels of toxicity automatically prompting self-care symptom management messages on the screen of the patient's mobile phone or in severe cases, a call from a specialist nurse to advise on care according to an agreed protocol. Patients (n = 26) completed the mobile phone diary on 92.6 % of occasions. Twelve patients had a maximum toxicity grade of 3 (46.2 %). The average dose intensity for all patients as a percentage of standard dose was 90 %. In eight patients, the dose of capecitabine was reduced, and in eight patients, the dose of capecitabine was increased. Patients and healthcare professionals involved felt reassured by the novel monitoring system, in particular, during out of hours. It is possible to optimise the individual dose of oral chemotherapy safely including dose increase and to manage chemotherapy side effects effectively using real-time mobile phone monitoring of toxicity parameters entered by the patient.
A remote data access architecture for home-monitoring health-care applications.
Lin, Chao-Hung; Young, Shuenn-Tsong; Kuo, Te-Son
2007-03-01
With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home-monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home-monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home-monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summarized.
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
de Britto, Felipe A; Martins, Tatiana B; Landsberg, Gustavo A P
2015-01-01
To assess impact of a mobile health solution in the nursing care plan compliance of a home care service. A retrospective cohort study was performed with 3,036 patients. Compliance rates before and after the implementation were compared. After the implementation of a mobile health aplication, compliance with the nursing care plan increased from 53% to 94%. The system reduced IT spending, increased the nursing team efficiency and prevented planned hiring. The use of a mobile health solution with geolocating feature by a nursing home care team increased compliance to the care plan.
Mobile Phone Based System Opportunities to Home-based Managing of Chemotherapy Side Effects.
Davoodi, Somayeh; Mohammadzadeh, Zeinab; Safdari, Reza
2016-06-01
Applying mobile base systems in cancer care especially in chemotherapy management have remarkable growing in recent decades. Because chemotherapy side effects have significant influences on patient's lives, therefore it is necessary to take ways to control them. This research has studied some experiences of using mobile phone based systems to home-based monitor of chemotherapy side effects in cancer. In this literature review study, search was conducted with keywords like cancer, chemotherapy, mobile phone, information technology, side effects and self managing, in Science Direct, Google Scholar and Pub Med databases since 2005. Today, because of the growing trend of the cancer, we need methods and innovations such as information technology to manage and control it. Mobile phone based systems are the solutions that help to provide quick access to monitor chemotherapy side effects for cancer patients at home. Investigated studies demonstrate that using of mobile phones in chemotherapy management have positive results and led to patients and clinicians satisfactions. This study shows that the mobile phone system for home-based monitoring chemotherapy side effects works well. In result, knowledge of cancer self-management and the rate of patient's effective participation in care process improved.
76 FR 29147 - Federal Home Loan Bank Investments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-20
...-AA32 Federal Home Loan Bank Investments AGENCY: Federal Housing Finance Agency; Federal Housing Finance...-adopting existing investment regulations that apply to the Federal Home Loan Banks (Banks) and that were...' investment in mortgage-backed securities (MBS) and certain asset-backed securities (ABS) that were previously...
78 FR 66852 - Housing Assistance Due to Structural Damage
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... have the maximum IHP award for housing assistance, there would be no additional money available to... a mobile home, and reconnecting or resetting mobile home sewer, water, electrical and fuel lines and...
2013-01-01
Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965
Mobile Router Developed and Tested
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2002-01-01
The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP subnetworks. This is essential in many wireless networks. A mobile router, unlike a mobile IP node, allows entire networks to roam. Hence, a device connected to the mobile router does not need to be a mobile node because the mobile router provides the roaming capabilities. There are three basic elements in the mobile IP: the home agent, the foreign agent, and the mobile node. The home agent is a router on a mobile node's home network that tunnels datagrams for delivery to the mobile node when it is away from home. The foreign agent is a router on a remote network that provides routing services to a registered mobile node. The mobile node is a host or router that changes its point of attachment from one network or subnetwork to another. In mobile routing, virtual communications are maintained by the home agent, which forwards all packets for the mobile networks to the foreign agent. The foreign agent passes the packets to the mobile router, which then forwards the packets to the devices on its networks. As the mobile router moves, it will register with its home agent on its whereabouts via the foreign agent to assure continuous connectivity.
Gell, Nancy M; Rosenberg, Dori E; Carlson, Jordan; Kerr, Jacqueline; Belza, Basia
2015-04-01
Understanding factors which may promote walking in mid-life and older adults with mobility impairments is key given the association between physical activity and positive health outcomes. To examine the relationship between active trips and objective measures of the home neighborhood built environment. Global positioning systems (GPS) data collected on 28 adults age 50+ with mobility disabilities were analyzed for active trips from home. Objective and geographic information systems (GIS) derived measures included Walk Score, population density, street connectivity, crime rates, and slope within the home neighborhood. For this cross-sectional observational study, we conducted mean comparisons between participants who took active trips from home and those who did not for the objective measures. Effect sizes were calculated to assess the magnitude of group differences. Nine participants (32%) took active trips from home. Walking in the home neighborhood was significantly associated with GIS derived measures (Walk Score, population density, and street density; effect sizes 0.9-1.2). Participants who used the home neighborhood for active trips had less slope within 1 km of home but the difference was not significant (73.5 m ± 22 vs. 100.8 m ± 38.1, p = 0.06, d = 0.8). There were no statistically significant differences in mean scores for crime rates between those with active trips from home and those without. The findings provide preliminary evidence that more walkable environments promote active mobility among mid-life and older adults with mobility disabilities. The data suggest that this population can and does use active transportation modes when the built environment is supportive. Copyright © 2015 Elsevier Inc. All rights reserved.
Motivating Contributions for Home Computer Security
ERIC Educational Resources Information Center
Wash, Richard L.
2009-01-01
Recently, malicious computer users have been compromising computers en masse and combining them to form coordinated botnets. The rise of botnets has brought the problem of home computers to the forefront of security. Home computer users commonly have insecure systems; these users do not have the knowledge, experience, and skills necessary to…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mumford, J.L.; Lewtas, J.; Burton, R.M.
1990-01-01
The study was conducted to assess human exposure to air pollutants resulting from the use of kerosene heaters in mobile homes. It has been estimated that 15-17 million unvented kerosene heaters have been sold in the United States, and 33% of these heaters have been sold to mobile home residents. The emissions from kerosene heaters can result in high pollutants levels in mobile homes that have a small air volume and low ventilation rate. Indoor air exchange rate, temperature, and humidity were measured. Chemical analyses, including polycyclic aromatic hydrocarbon (PAH) and nitro PAH, also were performed on the indoor airmore » samples from a selected home with the kerosene heater on and off. Increases in CO and organic concentrations resulting from the use of kerosene heaters were found in most homes monitored. Chemical analysis data also suggested the presence of evaporated, unburned kerosene fuel present in semivolatile organics collected in the XAD samples. When kerosene heaters were on, 56% of the sampling days (in all homes) showed dose-response mutagenic activity and 19% showed mutagenic activity on the heater-off days. In comparison with the U.S. national ambient air standards, four out of the eight heaters investigated in this study emitted pollutants that exceeded the ambient air standards some days. These data suggested that emissions from unvented kerosene heaters can significantly impact indoor air quality in mobile homes and that these emissions contain carcinogenic compounds and can be potentially carcinogenic in humans.« less
From the abstract to the concrete - Implementation of an innovative tool in home care.
Kajamaa, Anu; Schulz, Klaus-Peter
2018-02-01
Background The implementation of innovations in practice is a critical factor for change and development processes in health and home care. We therefore analyze how an innovative tool - a mobility agreement to maintain physical mobility of home care clients - was implemented in Finnish home care. Methods Our study involves ethnographic research of 13 home care visits, two years after the mobility agreement was implemented. We analyze the emergence of contradictions, the motives of the actors and the use of artifacts supporting or inhibiting the implementation. Two in-depth cases illustrate the implementation of the mobility agreement in home care visits. Findings Our findings show that, first, to achieve practice change and development, the innovation implementation requires the overcoming of contradictions in the implementation process. Second, it calls for the emergence of a shared motive between the actors to transform the abstract concept of an innovation into a concrete practice. Third, artifacts, customary to the clients are important in supporting the implementation process. Fourth, the implementation brings about a modification of the innovation and the adopting social system. Conclusions Innovation implementation should be seen as a transformation process of an abstract concept into a concrete practice, enabled by the actors involved. Concept design and implementation should be closely linked. In health/home care innovation management, the implementation of innovations needs to be understood as a complex collective learning process. Results can be far reaching - in our case leading to change of home care workers' professional understanding and elderly clients' mobility habits.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Wijsman, Liselotte W; Richard, Edo; Cachucho, Ricardo; de Craen, Anton Jm; Jongstra, Susan; Mooijaart, Simon P
2016-06-13
Mobile phone-assisted technologies provide the opportunity to optimize the feasibility of long-term blood pressure (BP) monitoring at home, with the potential of large-scale data collection. In this proof-of-principle study, we evaluated the feasibility of home BP monitoring using mobile phone-assisted technology, by investigating (1) the association between study center and home BP measurements; (2) adherence to reminders on the mobile phone to perform home BP measurements; and (3) referrals, treatment consequences and BP reduction after a raised home BP was diagnosed. We used iVitality, a research platform that comprises a Website, a mobile phone-based app, and health sensors, to measure BP and several other health characteristics during a 6-month period. BP was measured twice at baseline at the study center. Home BP was measured on 4 days during the first week, and thereafter, at semimonthly or monthly intervals, for which participants received reminders on their mobile phone. In the monthly protocol, measurements were performed during 2 consecutive days. In the semimonthly protocol, BP was measured at 1 day. We included 151 participants (mean age [standard deviation] 57.3 [5.3] years). BP measured at the study center was systematically higher when compared with home BP measurements (mean difference systolic BP [standard error] 8.72 [1.08] and diastolic BP 5.81 [0.68] mm Hg, respectively). Correlation of study center and home measurements of BP was high (R=0.72 for systolic BP and 0.72 for diastolic BP, both P<.001). Adherence was better in participants measuring semimonthly (71.4%) compared with participants performing monthly measurements (64.3%, P=.008). During the study, 41 (27.2%) participants were referred to their general practitioner because of a high BP. Referred participants had a decrease in their BP during follow-up (mean difference final and initial [standard error] -5.29 [1.92] for systolic BP and -2.93 [1.08] for diastolic BP, both P<.05). Mobile phone-assisted technology is a reliable and promising method with good adherence to measure BP at home during a 6-month period. This provides a possibility for implementation in large-scale studies and can potentially contribute to BP reduction.
Boissy, Patrick; Corriveau, Hélène; Michaud, François; Labonté, Daniel; Royer, Marie-Pier
2007-01-01
We examined the requirements for robots in home telecare using two focus groups. The first comprised six healthcare professionals involved in geriatric care and the second comprised six elderly people with disabilities living in the community. The concept of an in-home telepresence robot was illustrated using a photograph of a mobile robot, and participants were then asked to suggest potential health care applications. Interview data derived from the transcript of each group discussion were analyzed using qualitative induction based on content analysis. The analyses yielded statements that were categorized under three themes: potential applications, usability issues and user requirements. Teleoperated mobile robotic systems in the home were thought to be useful in assisting multidisciplinary patient care through improved communication between patients and healthcare professionals, and offering respite and support to caregivers under certain conditions. The shift from a traditional hospital-centred model of care in geriatrics to a home-based model creates opportunities for using telepresence with mobile robotic systems in home telecare.
24 CFR 232.545 - Covenant against liens.
Code of Federal Regulations, 2011 CFR
2011-04-01
... MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.545 Covenant against liens. (a) The security...
Development of protected endorsement for online banking using mobile phones
NASA Astrophysics Data System (ADS)
Narayana, Galla; Venkateswarlu, Tammineni; Kumar, G. S. P.; Padmavathamma, Mokkala; Sreekanth, G.; Delhibabu, K.; Prasad, A. R.
2013-03-01
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
Pippel, Kristina; Meinck, M; Lübke, N
2017-06-01
Mobile geriatric rehabilitation can be provided in the setting of nursing homes, short-term care (STC) facilities and exclusively in private homes. This study analyzed the common features and differences of mobile rehabilitation interventions in various settings. Stratified by setting 1,879 anonymized mobile geriatric rehabilitation treatments between 2011 and 2014 from 11 participating institutions were analyzed with respect to patient, process and outcome-related features. Significant differences between the settings nursing home (n = 514, 27 %), STC (n = 167, 9 %) and private homes (n = 1198, 64 %) were evident for mean age (83 years, 83 years and 80 years, respectively), percentage of women (72 %, 64 % and 55 %), degree of dependency on pre-existing care (92 %, 76 % and 64 %), total treatment sessions (TS, 38 TS, 42 TS and 41 TS), treatment duration (54 days, 61 days and 58 days) as well as the Barthel index at the start of rehabilitation (34 points, 39 points and 46 points) and the gain in the Barthel index (15 points, 21 points and 18 points), whereby the gain in the capacity for self-sufficiency was significant in all settings. The setting-specific evaluation of mobile geriatric rehabilitation showed differences for relevant patient, process and outcome-related features. Compared to inpatient rehabilitation mobile rehabilitation in all settings made an above average contribution to the rehabilitation of patients with pre-existing dependency on care. The gains in the capacity for self-sufficiency achieved in all settings support the efficacy of mobile geriatric rehabilitation under the current prerequisites for applicability.
A security scheme of SMS system
NASA Astrophysics Data System (ADS)
Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck
2005-02-01
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
MCloud: Secure Provenance for Mobile Cloud Users
2016-10-03
Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views
33 CFR 165.836 - Security Zone; Escorted Vessels, Mobile, Alabama, Captain of the Port.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Mobile, Alabama, Captain of the Port. 165.836 Section 165.836 Navigation and Navigable Waters COAST GUARD... § 165.836 Security Zone; Escorted Vessels, Mobile, Alabama, Captain of the Port. (a) Definitions. The following definitions apply to this section: COTP means Captain of the Port Mobile, AL. Designated...
Android Based Mobile Apps for Information Security Hands-On Education
ERIC Educational Resources Information Center
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M.
2017-01-01
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Application of the Quality Functional Deployment Method in Mobility Aid Securement System Design
DOT National Transportation Integrated Search
1992-12-01
The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...
Selfish DNA: homing endonucleases find a home.
Edgell, David R
2009-02-10
Self-splicing group I introns come in two flavours - those with a homing endonuclease to promote mobility of the intron, and those without an endonuclease. How homing endonucleases and self-splicing introns associate to form a composite selfish genetic element is a question of long-standing interest. Recent work has revealed that a shared characteristic of both introns and endonucleases, the targeting of conserved sequences, may provide the impetus for the evolution of composite mobile genetic elements.
Using Bayesian Networks and Decision Theory to Model Physical Security
2003-02-01
Home automation technologies allow a person to monitor and control various activities within a home or office setting. Cameras, sensors and other...components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be...monitored and controlled. These home automation technologies, however, lack the power to reason under uncertain conditions and thus the system can
41 CFR 302-10.403 - What costs must we allow for preparing a mobile home for shipment?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Agency Responsibilities...
41 CFR 302-10.204 - What costs are allowed for preparing a mobile home for shipment?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Computation of Allowances...
41 CFR 302-10.4 - Are there any geographic limitations for transportation of a mobile home?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Eligibility and...
41 CFR 302-10.400 - What policies must we establish for authorizing transportation of a mobile home?
Code of Federal Regulations, 2010 CFR
2010-07-01
... and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE...
Mobility and cognition at admission to the nursing home - a cross-sectional study.
Sverdrup, Karen; Bergh, Sverre; Selbæk, Geir; Røen, Irene; Kirkevold, Øyvind; Tangen, Gro Gujord
2018-01-30
Earlier studies show that the main reasons for admission to long-term nursing home care are cognitive impairment and functional impairments of activities of daily life. However, descriptive evidence of mobility is scant. The aims of this study were to describe mobility at admission to nursing homes and to assess the association between mobility and degree of dementia. We included 696 residents at admission to 47 nursing homes in Norway. Inclusion criteria were expected stay for more than 4 weeks and 65 years or older. In addition, younger residents with dementia were included. Residents with life expectancy shorter than six weeks were excluded. Mobility was assessed using the Short Physical Performance Battery (SPPB) and the Nursing Home Life Space Diameter (NHLSD). The Clinical Dementia Rating Scale (CDR) was used to describe the degree of dementia. The associations between mobility and degree of dementia was analysed using the Chi-square and the Kruskal-Wallis test (KW-test). When the KW-test indicated a statistical significant difference, we proceeded with planned group comparisons with the Mann-Whitney U-test. In addition, we performed multiple linear regression analyses to control for potential confounders. Forty-three percent of the residents were not able to perform the balance test in SPPB. Twenty-four percent of the residents were not able to walk four meters, while only 17.6% had a walking speed of 0.83 m/s or higher. Sixty-two percent of the residents were not able to rise from a chair or spent more than 60 s doing it. The median score on NHLSD area was 22 (IQR 17) and the median score on NHLSD dependency was 36 (IQR 26). Residents with severe dementia had significantly lower levels of mobility than residents with moderate dementia. Cognitive function was associated with SPPB and NHLSD dependency in the adjusted models. Nursing home residents form a frail, but heterogeneous group both in terms of cognition and mobility at admission. Mobility was negatively associated with cognitive function, and residents with severe dementia had significantly lower levels of mobility than residents with moderate dementia.
Association of Home Visitors' and Mothers' Attachment Style with Family Engagement
ERIC Educational Resources Information Center
McFarlane, Elizabeth; Burrell, Lori; Fuddy, Loretta; Tandon, Darius; Derauf, D. Christian; Leaf, Philip; Duggan, Anne
2010-01-01
Family engagement in home visiting (HV) is challenging. This study related attachment security of home visitors (n=48) and mothers (n=328) to family engagement in an HV program to prevent child maltreatment. Attachment security was assessed by using the Attachment Style Questionnaire to measure attachment anxiety and attachment avoidance. Family…
Making grandma's data secure: a security architecture for home telemedicine.
Starren, J.; Sengupta, S.; Hripcsak, G.; Ring, G.; Klerer, R.; Shea, S.
2001-01-01
Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups. PMID:11825267
ERIC Educational Resources Information Center
Access Group, Atlanta, GA.
Two brief fact sheets for people with disabilities provide information on: (1) modifying a trailer to make it accessible for persons with mobility impairments, especially those in wheelchairs, and (2) accessibility considerations for home buyers or home owners with mobility impairments. The first fact sheet identifies inherent problems in…
High-end Home Firewalls CIAC-2326
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W
Networking in most large organizations is protected with corporate firewalls and managed by seasoned security professionals. Attempts to break into systems at these organizations are extremely difficult to impossible for an external intruder. With the growth in networking and the options that it makes possible, new avenues of intrusion are opening up. Corporate machines exist that are completely unprotected against intrusions, that are not managed by a security professional, and that are regularly connected to the company network. People have the option of and are encouraged to work at home using a home computer linked to the company network. Managersmore » have home computers linked to internal machines so they can keep an eye on internal processes while not physically at work. Researchers do research or writing at home and connect to the company network to download information and upload results. In most cases, these home computers are completely unprotected, except for any protection that the home user might have installed. Unfortunately, most home users are not security professionals and home computers are often used by other family members, such as children downloading music, who are completely unconcerned about security precautions. When these computers are connected to the company network, they can easily introduce viruses, worms, and other malicious code or open a channel behind the company firewall for an external intruder.« less
Usable SPACE: Security, Privacy, and Context for the Mobile User
NASA Astrophysics Data System (ADS)
Jutla, Dawn
Users breach the security of data within many financial applications daily as human and/or business expediency to access and use information wins over corporate security policy guidelines. Recognizing that changing user context often requires different security mechanisms, we discuss end-to-end solutions combining several security and context mechanisms for relevant security control and information presentation in various mobile user situations. We illustrate key concepts using Dimitri Kanevskys (IBM Research) early 2000s patented inventions for voice security and classification.
DOT National Transportation Integrated Search
1992-12-01
The Independent Locking Securement System Project (ILS System Project) is a : successful attempt to respond to the transportation community's need for a : "universal" securement/restraint system that will accommodate most wheeled : mobility aids, inc...
75 FR 34286 - Federal Acquisition Regulation; FAR Case 2009-018, Payrolls and Basic Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... removed the requirement to submit complete social security numbers and home addresses of individual... of full social security numbers and home addresses of individual workers from the prime contractor on... for each employee (e.g., the last four digits of the employee's social security number). The...
Interpretive Flexibility in Mobile Health: Lessons From a Government-Sponsored Home Care Program
Mathiassen, Lars
2013-01-01
Background Mobile technologies have emerged as important tools that health care personnel can use to gain easy access to client data anywhere. This is particularly useful for nurses and care workers in home health care as they provide services to clients in many different settings. Although a growing body of evidence supports the use of mobile technologies, the diverse implications of mobile health have yet to be fully documented. Objective Our objective was to examine a large-scale government-sponsored mobile health implementation program in the Danish home care sector and to understand how the technology was used differently across home care agencies. Methods We chose to perform a longitudinal case study with embedded units of analysis. We included multiple data sources, such as written materials, a survey to managers across all 98 Danish municipalities, and semistructured interviews with managers, care workers, and nurses in three selected home care agencies. We used process models of change to help analyze the overall implementation process from a longitudinal perspective and to identify antecedent conditions, key events, and practical outcomes. Results Strong collaboration between major stakeholders in the Danish home care sector (government bodies, vendors, consultants, interest organizations, and managers) helped initiate and energize the change process, and government funding supported quick and widespread technology adoption. However, although supported by the same government-sponsored program, mobile technology proved to have considerable interpretive flexibility with variation in perceived nature of technology, technology strategy, and technology use between agencies. What was first seen as a very promising innovation across the Danish home care sector subsequently became the topic of debate as technology use arrangements ran counter to existing norms and values in individual agencies. Conclusions Government-sponsored programs can have both positive and negative results, and managers need to be aware of this and the interpretive flexibility of mobile technology. Mobile technology implementation is a complex process that is best studied by combining organization-level analysis with features of the wider sociopolitical and interorganizational environment. PMID:24172852
Dozet, Alexander; Ivarsson, Bodil; Eklund, Karin; Klefsgård, Rosemarie; Geijer, Mats
2016-12-01
The process of transferring older, vulnerable adults from an elder care facility to the hospital for medical care can be an emotionally and physically stressful experience. The recent development of modern mobile radiography may help to ease this anxiety by allowing for evaluation in the nursing home itself. Up until this point, no health economic evaluation of the technology has been attempted in a Swedish setting. The objective of this study was to determine whether examinations of patients in elder care facilities with mobile radiography were cost-effective from a societal perspective compared with hospital-based radiological examinations. This prospective study included two groups of nursing home residents in two different areas in southern Sweden. All residents in the nursing homes were targeted for the study. Seventy-one patients were examined with hospital-based radiography at two hospitals, and 312 patients were examined using mobile radiography in nursing homes. Given that the diagnostic effects are regarded as equivalent, a cost minimization method was applied. Direct costs were estimated using prices from the county council, Region Skåne, Sweden. From a societal perspective, mobile radiography was shown to have significantly lower costs per examination compared with hospital-based radiography. The difference in health care-related costs was also significant in favour of mobile radiography. Mobile radiography can be used to examine patients in nursing homes at a lower cost than hospital-based radiography. Patients benefit from not having to transfer to a hospital for radiography, resulting in reduced anxiety for patients. © 2016 John Wiley & Sons, Ltd.
Does activity limitation predict discharge destination for postacute care patients?
Chang, Feng-Hang; Ni, Pengsheng; Jette, Alan M
2014-09-01
This study aimed to examine the ability of different domains of activity limitation to predict discharge destination (home vs. nonhome settings) 1 mo after hospital discharge for postacute rehabilitation patients. A secondary analysis was conducted using a data set of 518 adults with neurologic, lower extremity orthopedic, and complex medical conditions followed after discharge from a hospital into postacute care. Variables collected at baseline include activity limitations (basic mobility, daily activity, and applied cognitive function, measured by the Activity Measure for Post-Acute Care), demographics, diagnosis, and cognitive status. The discharge destination was recorded at 1 mo after being discharged from the hospital. Correlational analyses revealed that the 1-mo discharge destination was correlated with two domains of activity (basic mobility and daily activity) and cognitive status. However, multiple logistic regression and receiver operating characteristic curve analyses showed that basic mobility functioning performed the best in discriminating home vs. nonhome living. This study supported the evidence that basic mobility functioning is a critical determinant of discharge home for postacute rehabilitation patients. The Activity Measure for Post-Acute Care-basic mobility showed good usability in discriminating home vs. nonhome living. The findings shed light on the importance of basic mobility functioning in the discharge planning process.
Rantakokko, Merja; Wilkie, Ross
2017-01-01
Objectives The study examines how environmental factors contribute to the onset of restricted mobility outside the home among older adults with osteoarthritis. Methods This is a prospective cohort study of adults aged 50 years and older with osteoarthritis (n=1802). Logistic regression tested the association between the onset of restricted mobility outside the home and health, sociodemographic and perceived environmental barriers (hills and steep slopes, inaccessible public buildings, poor pavement condition, lack of access to public parks or sport facilities, heavy traffic or speeding cars and poor weather). The potential moderating role of environmental barriers on the association between health factors and onset was examined using interaction terms and stratified analysis. Results Of 1802 participants, 13.5% (n=243) reported the onset of restricted mobility outside the home at 3-year follow-up. Walking disability, anxiety, depression, cognitive impairment and obesity and all environmental barriers were associated with onset after adjustment for confounders. Environmental barriers had an added contribution to the effect of the health conditions on onset of restricted mobility, which was attenuated when adjusted for confounders. The added contribution remained only for walking disability and the presence of hills and steep slopes; in the presence of both, the association with onset of restricted mobility was stronger (OR 7.66, 95% CI 4.64 to 12.64) than in the presence of walking disability (3.60, 2.43 to 5.32) or the presence of hills and steep slopes alone (4.55, 2.89 to 7.16). Conclusion For older adults with osteoarthritis, environmental barriers are associated and add a contribution to that of morbidities and walking disability on the onset of restricted mobility outside the home. Awareness of environmental barriers is important when aiming to maintain mobility and activities outside the home despite health conditions in older adults. PMID:28667194
Code of Federal Regulations, 2013 CFR
2013-07-01
... vehicles (POV's), mobile homes, and boats. (e) Intangible property. Property that has no intrinsic..., baggage checks, insurance policies, money orders, and travelers checks. (f) Vehicles. Include automobiles..., boats, boat trailers, bicycles, and aircraft. Mobile homes and other property used as dwelling places...
Code of Federal Regulations, 2010 CFR
2010-07-01
... vehicles (POV's), mobile homes, and boats. (e) Intangible property. Property that has no intrinsic..., baggage checks, insurance policies, money orders, and travelers checks. (f) Vehicles. Include automobiles..., boats, boat trailers, bicycles, and aircraft. Mobile homes and other property used as dwelling places...
Code of Federal Regulations, 2014 CFR
2014-07-01
... vehicles (POV's), mobile homes, and boats. (e) Intangible property. Property that has no intrinsic..., baggage checks, insurance policies, money orders, and travelers checks. (f) Vehicles. Include automobiles..., boats, boat trailers, bicycles, and aircraft. Mobile homes and other property used as dwelling places...
Code of Federal Regulations, 2012 CFR
2012-07-01
... vehicles (POV's), mobile homes, and boats. (e) Intangible property. Property that has no intrinsic..., baggage checks, insurance policies, money orders, and travelers checks. (f) Vehicles. Include automobiles..., boats, boat trailers, bicycles, and aircraft. Mobile homes and other property used as dwelling places...
Code of Federal Regulations, 2011 CFR
2011-07-01
... vehicles (POV's), mobile homes, and boats. (e) Intangible property. Property that has no intrinsic..., baggage checks, insurance policies, money orders, and travelers checks. (f) Vehicles. Include automobiles..., boats, boat trailers, bicycles, and aircraft. Mobile homes and other property used as dwelling places...
41 CFR 302-10.402 - What costs must we pay a commercial carrier for transporting a mobile home?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Agency...
41 CFR 302-10.1 - May I be reimbursed for transporting my mobile home instead of an HHG shipment?
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Eligibility and...
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
The Need to Address Mobile Device Security in the Higher Education IT Curriculum
ERIC Educational Resources Information Center
Patten, Karen P.; Harris, Mark A.
2013-01-01
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
A secure operational model for mobile payments.
Chang, Tao-Ku
2014-01-01
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.
A Secure Operational Model for Mobile Payments
2014-01-01
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service. PMID:25386607
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
Meeting the challenges--the role of medical informatics in an ageing society.
Koch, Sabine
2006-01-01
The objective of this paper is to identify trends and new technological developments that appear due to an ageing society and to relate them to current research in the field of medical informatics. A survey of the current literature reveals that recent technological advances have been made in the fields of "telecare and home-monitoring", "smart homes and robotics" and "health information systems and knowledge management". Innovative technologies such as wearable devices, bio- and environmental sensors and mobile, humanoid robots do already exist and ambient assistant living environments are being created for an ageing society. However, those technologies have to be adapted to older people's self-care processes and coping strategies, and to support new ways of healthcare delivery. Medical informatics can support this process by providing the necessary information infrastructure, contribute to standardisation, interoperability and security issues and provide modelling and simulation techniques for educational purposes. Research fields of increasing importance with regard to an ageing society are, moreover, the fields of knowledge management, ubiquitous computing and human-computer interaction.
Secure Infrastructure-Less Network (SINET)
2017-06-01
Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the
Nurse's Aid And Housekeeping Mobile Robot For Use In The Nursing Home Workplace
NASA Astrophysics Data System (ADS)
Sines, John A.
1987-01-01
The large nursing home market has several natural characteristics which make it a good applications area for robotics. The environment is already robot accessible and the work functions require large quantities of low skilled services on a daily basis. In the near future, a commercial opportunity for the practical application of robots is emerging in the delivery of housekeeping services in the nursing home environment. The robot systems will assist in food tray delivery, material handling, and security, and will perform activities such as changing a resident's table side drinking water twice a day, and taking out the trash. The housekeeping work functions will generate cost savings of approximately 22,000 per year, at a cost of 6,000 per year. Technical system challenges center around the artificial intelligence required for the robot to map its own location within the facility, to find objects, and to avoid obstacles, and the development of an energy efficient mechanical lifting system. The long engineering and licensing cycles (7 to 12 years) required to bring this type of product to market make it difficult to raise capital for such a venture.
Meloni, Marco; Cesselli, Daniela; Caporali, Andrea; Mangialardi, Giuseppe; Avolio, Elisa; Reni, Carlotta; Fortunato, Orazio; Martini, Stefania; Madeddu, Paolo; Valgimigli, Marco; Nikolaev, Evgeni; Kaczmarek, Leszek; Angelini, Gianni D; Beltrami, Antonio P; Emanueli, Costanza
2015-12-01
Reparative response by bone marrow (BM)-derived progenitor cells (PCs) to ischemia is a multistep process that comprises the detachment from the BM endosteal niche through activation of osteoclasts and proteolytic enzymes (such as matrix metalloproteinases (MMPs)), mobilization to the circulation, and homing to the injured tissue. We previously showed that intramyocardial nerve growth factor gene transfer (NGF-GT) promotes cardiac repair following myocardial infarction (MI) in mice. Here, we investigate the impact of cardiac NGF-GT on postinfarction BM-derived PCs mobilization and homing at different time points after adenovirus-mediated NGF-GT in mice. Immunohistochemistry and flow cytometry newly illustrate the temporal profile of osteoclast and activation of MMP9, PCs expansion in the BM, and liberation/homing to the injured myocardium. NGF-GT amplified these responses and increased the BM levels of active osteoclasts and MMP9, which were not observed in MMP9-deficient mice. Taken together, our results suggest a novel role for NGF in BM-derived PCs mobilization/homing following MI.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less
Code of Federal Regulations, 2010 CFR
2010-07-01
... 302-10.203 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Agency...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE Eligibility and...
41 CFR 302-10.202 - Am I entitled to any other allowances when I transport my mobile home by POV?
Code of Federal Regulations, 2010 CFR
2010-07-01
... and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE...
Code of Federal Regulations, 2010 CFR
2010-07-01
... and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A PRIMARY RESIDENCE...
ERIC Educational Resources Information Center
Panettieri, Joseph C.
2007-01-01
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Security Issues for Mobile Medical Imaging: A Primer.
Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George
2015-10-01
The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A...
Securing Mobile Networks in an Operational Setting
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan
2004-01-01
This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.
Research into telecommunications options for people with physical disabilities.
Nguyen, Toan; Garrett, Rob; Downing, Andrew; Walker, Lloyd; Hobbs, David
2007-01-01
People with a disability do not have equitable access to the modern telecommunication medium. Many experience difficulty typing, handling the phone, dialing, or answering calls. For those who are unable to speak, the only option is to type messages using whatever functional control site exists on their body. The provision of accessible mobile phones for people with disabilities can significantly improve their quality of life through an increased range of accessible activities, and mobile phones can improve their independence, safety, security and self-esteem. This research was aimed at providing practical ways for people with a disability to participate in the extensive community of home and mobile phone users. The outcomes of 10 participants taking part in the evaluation and trial of off-the-shelf telecommunication options are presented. Nine out of 10 participants showed high to very high results in terms of their overall performance and satisfaction with the use of the telecommunication equipment provided. With the processes and support covering equipment matching, education, training, and delivery, current off-the-shelf solutions can help people with disabilities to effectively communicate with other members of our society and to access the same range of information systems and services enjoyed by able-bodied members of the community.
Asirdizer, Mahmut; Turkmen, Nursel; Akan, Okan; Yavuz, Mehmet Sunay
2014-06-01
Injury and death cases caused by booby traps are not common in forensic medicine practice. Besides, installation of booby traps including firearms is generally for suicidal and rarely for homicidal purposes. Although few patents were described about home security alarm system that were created by firearms in the United States, 1 sample of injury with a similar unconventional mechanism of home safety system was reported by Asirdizer and Yavuz in 2009. In the published case report, the story of an electrical technician who was invited to a summer house by the homeowner to check the home security alarm system was reported. In the so-called report, he was stated to be injured by the shotgun attached to the unconventional home security alarm system while checking the system. As a result, the homeowner was convicted of a possible intent to cause a life-threatening injury to the technician.The so-called homeowner and his wife died by the same shotgun attached to the same unconventional home security alarm system 4 years on from the first event. In the present case report, we have aimed to present the findings of the crime scene and the autopsies of these unusual 2 deaths and to discuss individual and legal factors in paving the way for the deaths of 2 people.
Schippinger, W; Hartinger, G; Hierzer, A; Osprian, I; Bohnstingl, M; Pilgram, E H
2012-12-01
Hospital admissions are frequent among long-term residents of nursing homes and can result in detrimental complications affecting the patients' somatic, psychological, and cognitive status. In this prospective controlled study, we investigated the effects of a mobile geriatric consultant service (GECO) offered by specialists in internal medicine on frequency of hospitalizations in nursing home residents. During a 10-month observation period, residents in a control nursing home received medical attendance by general practitioners as is common in Austrian nursing homes. Residents in the intervention nursing home also received the medical service of GECO. Within the group of rest home residents receiving GECO support, a statistically significant lower frequency of acute transports to hospitals was observed in comparison to residents of the control nursing home (mean number of acute transports to hospitals/100 residents/month: 6.1 versus 11.7; p < 0.01). The number of planned non-acute hospital and specialist office presentations was also lower in the intervention nursing home (mean number of hospital and specialist office presentations/100 residents/month: 14.4 versus 18.0); however, this difference did not reach statistical significance. This study shows that a mobile medical geriatric consultant service based on specialists in internal medicine can improve medical care in nursing homes resulting in a statistically significant reduction of acute transports to hospitals.
Wang, Chun-Hua; Chou, Pai-Chien; Joa, Wen-Ching; Chen, Li-Fei; Sheng, Te-Fang; Ho, Shu-Chuan; Lin, Horng-Chyuan; Huang, Chien-Da; Chung, Fu-Tsai; Chung, Kian Fan; Kuo, Han-Pin
2014-08-30
Moderate-intensity exercise training improves skeletal muscle aerobic capacity and increased oxidative enzyme activity, as well as exercise tolerance in COPD patients. To investigate whether the home-based exercise training program can reduce inflammatory biomarkers in patients with COPD, twelve patients using mobile phone assistance and 14 with free walk were assessed by incremental shuttle walk test (ISWT), spirometry, strength of limb muscles, and serum C-reactive protein (CRP) and inflammatory cytokines. Patients in the mobile phone group improved their ISWT walking distance, with decrease in serum CRP after 2 months, and sustained at 6 months. Patients in the control group had no improvement. Serum IL-8 in the mobile phone group was significantly reduced at 2, 3 and 6 months after doing home exercise training compared to baseline. IL-6 and TNF-α were significantly elevated at 3 and 6 months in control group, while there were no changes in mobile phone group. The strength of limb muscles was significantly greater compared to baseline at 3 and 6 months in the mobile phone group. A mobile-phone-based system can provide an efficient home endurance exercise training program with improved exercise capacity, strength of limb muscles and a decrease in serum CRP and IL-8 in COPD patients. Decreased systemic inflammation may contribute to these clinical benefits. (Clinical trial registration No.: NCT01631019).
Research on mobile electronic commerce security technology based on WPKI
NASA Astrophysics Data System (ADS)
Zhang, Bo
2013-07-01
Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.
Taylor, Janice; Sims, Jane; Haines, Terry P
2014-12-01
To explore mobility care as provided by care staff in nursing homes. Care staff regularly assist residents with their mobility. Nurses are increasingly reliant on such staff to provide safe and quality mobility care. However, the nature of care staff decision-making when providing assistance has not been fully addressed in the literature. A focused ethnography. The study was conducted in four nursing homes in Melbourne, Australia. Non-participant observations of residents and staff in 2011. Focus groups with 18 nurses, care and lifestyle staff were conducted at three facilities in 2012. Thematic analysis was employed for focus groups and content analysis for observation data. Cognitive Continuum Theory and the notion of 'situation awareness' assisted data interpretation. Decision-making during mobility care emerged as a major theme. Using Cognitive Continuum Theory as a guide, nursing home staff's decision-making was described as ranging from system-aided, through resident- and peer-aided, to reflective and intuitive. Staff seemed aware of the need for resident-aided decision-making consistent with person-centred care. Habitual mobility care based on shared mental models occurred. It was noted that levels of situation awareness may vary among staff. Care staff may benefit from support via collaborative and reflective practice to develop decision-making skills, situation awareness and person-centred mobility care. Further research is required to explore the connection between staff's skills in mobility care and their decision-making competence as well as how these factors link to quality mobility care. © 2014 John Wiley & Sons Ltd.
Secure steganography designed for mobile platforms
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
2006-05-01
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki
Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.
Danilovich, Margaret K; Diaz, Laura; Saberbein, Gustavo; Healey, William E; Huber, Gail; Corcos, Daniel M
2017-01-01
We describe a community-engaged approach with Medicaid home and community-based services (HCBS), home care aide (HCA), client, and physical therapist stakeholders to develop a mobile application (app) exercise intervention through focus groups and interviews. Participants desired a short exercise program with modification capabilities, goal setting, and mechanisms to track progress. Concerns regarding participation were training needs and feasibility within usual care services. Technological preferences were for simple, easy-to-use, and engaging content. The app was piloted with HCA-client dyads (n = 5) to refine the intervention and evaluate content. Engaging stakeholders in intervention development provides valuable user-feedback on both desired exercise program contents and mobile technology preferences for HCBS recipients.
44 CFR 206.366 - Loan cancellation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... to: (i) Interest paid on money borrowed to pay amounts FEMA does not advance toward completion of... utilities for mobile homes used to meet disaster temporary housing requirements. (iii) Unreimbursed costs required for police and fire protection and other community services for mobile home parks established as...
44 CFR 206.366 - Loan cancellation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... to: (i) Interest paid on money borrowed to pay amounts FEMA does not advance toward completion of... utilities for mobile homes used to meet disaster temporary housing requirements. (iii) Unreimbursed costs required for police and fire protection and other community services for mobile home parks established as...
44 CFR 206.366 - Loan cancellation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... to: (i) Interest paid on money borrowed to pay amounts FEMA does not advance toward completion of... utilities for mobile homes used to meet disaster temporary housing requirements. (iii) Unreimbursed costs required for police and fire protection and other community services for mobile home parks established as...
44 CFR 206.366 - Loan cancellation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... to: (i) Interest paid on money borrowed to pay amounts FEMA does not advance toward completion of... utilities for mobile homes used to meet disaster temporary housing requirements. (iii) Unreimbursed costs required for police and fire protection and other community services for mobile home parks established as...
Secure Location Provenance for Mobile Devices
2015-07-01
SECURE LOCATION PROVENANCE FOR MOBILE DEVICES UNIVERSITY OF ALABAMA AT BIRMINGHAM JULY 2015 FINAL TECHNICAL REPORT...PROVENANCE FOR MOBILE DEVICES 5a. CONTRACT NUMBER FA8750-12-2-0254 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 69220K 6. AUTHOR(S) Ragib Hasan...based services allow mobile device users to access various services based on the users’ current physical location information. Path-critical applications
Morak, Jürgen; Kollmann, Alexander; Schreier, Günter
2007-01-01
Utilization of mobile information and communication technologies in home monitoring applications is becoming more and more common. The mobile phone, acting as a patient terminal for patients suffering from chronic diseases, provides an active link to the caregiver to transmit health status information and receive feedback. In such a concept the usability is still limited by the necessity of entering the values via the mobile phone's small keypad. The near field communication technology (NFC), a touch-based wireless interface that became available recently, may improve the usability level of such applications significantly. The focus of this paper is to describe the development of a prototype application based on this technology embedded in a home monitoring system. The feasibility and usability of this approach are evaluated and compared with concepts used in previous approaches. The high quantifier with respect to overall usability indicates that NFC may be the technology of choice for some tasks in home monitoring applications.
Engineering Software for Interoperability through Use of Enterprise Architecture Techniques
2003-03-01
Response Home/ Business Security . To detect flood conditions (i.e. excess water levels) within the monitored area and alert authorities, as necessary...Response; Fire Detection & Response; and Flood Detection & Response. Functional Area Description Intruder Detection & Response Home/ Business ... Security . To monitor and detect unauthorized entry into the secured area and sound alarms/alert authorities, as necessary. Fire Detection
Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study
ERIC Educational Resources Information Center
Hines, Natasha
2015-01-01
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
Ralston, J D; Cook, A J; Anderson, M L; Catz, S L; Fishman, P A; Carlson, J; Johnson, R; Green, B B
2014-01-01
We evaluated the role of home monitoring, communication with pharmacists, medication intensification, medication adherence and lifestyle factors in contributing to the effectiveness of an intervention to improve blood pressure control in patients with uncontrolled essential hypertension. We performed a mediation analysis of a published randomized trial based on the Chronic Care Model delivered over a secure patient website from June 2005 to December 2007. Study arms analyzed included usual care with a home blood pressure monitor and usual care with home blood pressure monitor and web-based pharmacist care. Mediator measures included secure messaging and telephone encounters; home blood pressure monitoring; medications intensification and adherence and lifestyle factors. Overall fidelity to the Chronic Care Model was assessed with the Patient Assessment of Chronic Care (PACIC) instrument. The primary outcome was percent of participants with blood pressure (BP) <140/90 mm Hg. At 12 months follow-up, patients in the web-based pharmacist care group were more likely to have BP <140/90 mm Hg (55%) compared to patients in the group with home blood pressure monitors only (37%) (p = 0.001). Home blood pressure monitoring accounted for 30.3% of the intervention effect, secure electronic messaging accounted for 96%, and medication intensification for 29.3%. Medication adherence and self-report of fruit and vegetable intake and weight change were not different between the two study groups. The PACIC score accounted for 22.0 % of the main intervention effect. The effect of web-based pharmacist care on improved blood pressure control was explained in part through a combination of home blood pressure monitoring, secure messaging, and antihypertensive medication intensification.
Kjelle, Elin; Lysdahl, Kristin Bakke
2017-03-23
Demographic changes are leading to an ageing population in Europe, and predict an increase in the number of nursing home residents over the next 30 years. Nursing home residents need specialised healthcare services such as radiology due to both chronic and acute illnesses. Mobile radiography, x-ray examinations performed in the nursing homes, may be a good way of providing services to this population. The aim of this systematic review was to identify the outcomes of mobile radiography services for nursing home residents and society. A systematic review based on searches in the Medline, Cochrane, PubMed, Embase and Svemed + databases was performed. Titles and abstracts were screened according to a predefined set of inclusion criteria: empirical studies in the geriatric population, and reports of mobile radiography services in a clinical setting. All publications were quality appraised using MMAT or CASP appraisal tools. Data were extracted using a summary table and results were narratively synthesised. Ten publications were included. Three overarching outcomes were identified: 1) reduced number of hospitalisations and outpatient examinations or treatments, 2) reduced number of transfers between nursing homes and hospitals and 3) increased access to x-ray examinations. These outcomes were interlinked with the more specific outcomes for residents and society reported in the literature. For residents there was a reduction in burdensome transfers and waiting time and adequate treatment and care increased. For society, released resources could be used more efficiently, and overall costs were reduced substantially. This review indicates that mobile radiography services for nursing home residents in the western world are of comparable quality to hospital-based examinations and have clear potential benefits. Mobile radiography reduced transfers to and from hospital, increased the number of examinations carried out and facilitated timely diagnosis and access to treatments. Further research is needed to formally evaluate potential improvements in care quality and cost-effectiveness.
Analysing the diffusion and adoption of mobile IT across social worlds.
Nielsen, Jeppe Agger; Mengiste, Shegaw Anagaw
2014-06-01
The diffusion and adoption of information technology innovations (e.g. mobile information technology) in healthcare organizations involves a dynamic process of change with multiple stakeholders with competing interests, varying commitments, and conflicting values. Nevertheless, the extant literature on mobile information technology diffusion and adoption has predominantly focused on organizations and individuals as the unit of analysis, with little emphasis on the environment in which healthcare organizations are embedded. We propose the social worlds approach as a promising theoretical lens for dealing with this limitation together with reports from a case study of a mobile information technology innovation in elderly home care in Denmark including both the sociopolitical and organizational levels in the analysis. Using the notions of social worlds, trajectories, and boundary objects enables us to show how mobile information technology innovation in Danish home care can facilitate negotiation and collaboration across different social worlds in one setting while becoming a source of tension and conflicts in others. The trajectory of mobile information technology adoption was shaped by influential stakeholders in the Danish home care sector. Boundary objects across multiple social worlds legitimized the adoption, but the use arrangement afforded by the new technology interfered with important aspects of home care practices, creating resistance among the healthcare personnel.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, R.; Walsh, D.; White, J.
1992-01-01
Carbon monoxide (CO) emission levels were continuously monitored in 8 mobile trailer homes less than 10 years old. These homes were monitored in an US EPA study on indoor air quality as affected by unvented portable kerosene heaters. Respondents were asked to operate their heaters in a normal fashion. CO, air exchange and temperature values were measured during the study in each home. Results indicate that consumers using unvented kerosene heaters may be unknowingly exposed to high CO levels without taking proper precautions.
... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
The security of patient identifiable information in doctors' homes.
McLean, Iain; Anderson, C Mary
2004-08-01
Ethically and legally doctors bear a responsibility to ensure the security of patient identifiable information in their possession. Many doctors, especially those in forensic medicine, hold paper or computerised medical records at home. This survey was conducted to assess the level of security for these records and awareness of the issues. Fifty-six forensic physicians (30 male, 26 female) answered a questionnaire. Eighty-nine percent used a computer to write patient notes and reports, but only 26 of these were on the Data Protection Register, and only 24 password-protected their files. Few doctors took steps to protect data on old computers they had stopped using. Of those responding, 88% held paper records at home but only of these had lockable filing cabinets. Burglar alarms were fitted in 77% of homes, yet 36% of homes had been burgled. No participants had written instructions for disposal of records and reports after their death. Older participants were more likely to have been burgled, yet less likely to have antiviral software than their younger counterparts. Participants expressed the need for information, education and training in data security.
Integrating mHealth in Oncology: Experience in the Province of Trento.
Galligioni, Enzo; Piras, Enrico Maria; Galvagni, Michele; Eccher, Claudio; Caramatti, Silvia; Zanolli, Daniela; Santi, Jonni; Berloffa, Flavio; Dianti, Marco; Maines, Francesca; Sannicolò, Mirella; Sandri, Marco; Bragantini, Lara; Ferro, Antonella; Forti, Stefano
2015-05-13
The potential benefits of the introduction of electronic and mobile health (mHealth) information technologies, to support the safe delivery of intravenous chemotherapy or oral anticancer therapies, could be exponential in the context of a highly integrated computerized system. Here we describe a safe therapy mobile (STM) system for the safe delivery of intravenous chemotherapy, and a home monitoring system for monitoring and managing toxicity and improving adherence in patients receiving oral anticancer therapies at home. The STM system is fully integrated with the electronic oncological patient record. After the prescription of chemotherapy, specific barcodes are automatically associated with the patient and each drug, and a bedside barcode reader checks the patient, nurse, infusion bag, and drug sequence in order to trace the entire administration process, which is then entered in the patient's record. The usability and acceptability of the system was investigated by means of a modified questionnaire administered to nurses. The home monitoring system consists of a mobile phone or tablet diary app, which allows patients to record their state of health, the medications taken, their side effects, and a Web dashboard that allows health professionals to check the patient data and monitor toxicity and treatment adherence. A built-in rule-based alarm module notifies health care professionals of critical conditions. Initially developed for chronic patients, the system has been subsequently customized in order to monitor home treatments with capecitabine or sunitinib in cancer patients (Onco-TreC). The STM system never failed to match the patient/nurse/drug sequence association correctly, and proved to be accurate and reliable in tracing and recording the entire administration process. The questionnaires revealed that the users were generally satisfied and had a positive perception of the system's usefulness and ease of use, and the quality of their working lives. The pilot studies with the home monitoring system with 43 chronic patients have shown that the approach is reliable and useful for clinicians and patients, but it is also necessary to pay attention to the expectations that mHealth solutions may raise in users. The Onco-TreC version has been successfully laboratory tested, and is now ready for validation. The STM and Onco-TreC systems are fully integrated with our complex and composite information system, which guarantees privacy, security, interoperability, and real-time communications between patients and health professionals. They need to be validated in order to confirm their positive contribution to the safer administration of anticancer drugs.
A Behaviour Monitoring System (BMS) for Ambient Assisted Living
Eisa, Samih
2017-01-01
Unusual changes in the regular daily mobility routine of an elderly person at home can be an indicator or early symptom of developing health problems. Sensor technology can be utilised to complement the traditional healthcare systems to gain a more detailed view of the daily mobility of a person at home when performing everyday tasks. We hypothesise that data collected from low-cost sensors such as presence and occupancy sensors can be analysed to provide insights on the daily mobility habits of the elderly living alone at home and to detect routine changes. We validate this hypothesis by designing a system that automatically learns the daily room-to-room transitions and permanence habits in each room at each time of the day and generates alarm notifications when deviations are detected. We present an algorithm to process the sensors’ data streams and compute sensor-driven features that describe the daily mobility routine of the elderly as part of the developed Behaviour Monitoring System (BMS). We are able to achieve low detection delay with confirmation time that is high enough to convey the detection of a set of common abnormal situations. We illustrate and evaluate BMS with synthetic data, generated by a developed data generator that was designed to mimic different user’s mobility profiles at home, and also with a real-life dataset collected from prior research work. Results indicate BMS detects several mobility changes that can be symptoms of common health problems. The proposed system is a useful approach for learning the mobility habits at the home environment, with the potential to detect behaviour changes that occur due to health problems, and therefore, motivating progress toward behaviour monitoring and elder’s care. PMID:28837105
Code of Federal Regulations, 2014 CFR
2014-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... be made on the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... be made on the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... be made on the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. ...
NASA Astrophysics Data System (ADS)
Graham, Christopher J.
2012-05-01
Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=
Home equity conversion plans as a source of retirement income.
Springer, P B
1985-09-01
This article describes in detail a variety of home equity conversion plans and discusses their relevance for social security beneficiaries, as well as for the aged in general. Under these plans, a dormant asset--accumulated home equity--is converted into current retirement income. The plans vary: Some are debt instruments; others involve the sale and leaseback of the residence. Some provide income for a fixed term; others offer a lifetime annuity. Some include a public subsidy; others are free of governmental involvement. The advantages and disadvantages of these plans, as well as examples of how they operate and their respective income potential, are discussed in this article. The relevance of home equity conversion plans for social security beneficiaries is illustrated by means of data from the Retirement History Study. These data allow comparison of various demographic groups in terms of their dependence on social security benefits. Each group is examined in terms of available home equity and home equity potential under several conversion plans.
Valdez, Zulema; Dean, Wesley R; Sharkey, Joseph R
2012-01-01
A growing concern with high rates of obesity and overweight among immigrant minority populations in the U.S. has focused attention on the availability and accessibility to healthy foods in such communities. Small-scale vending in rural, impoverished and underserved areas, however, is generally overlooked; yet, this type of informal activity and source for food is particularly important in such environs, or “food desserts,” where traditional forms of work and mainstream food outlets are limited or even absent. This exploratory study investigates two types of small-scale food vending that take place in rural colonias, or Mexican-origin settlements along the South Texas border with Mexico: mobile and home-based. Using a convenience sample of 23 vendors who live and work in Texas colonias, this study identifies the characteristics associated with mobile and home-based food vendors and their businesses and its contributions to the rural food environment. Findings reveal that mobile and home-based vending provides a variety of food and beverage options to colonia residents, and suggests that home-based vendors contribute a greater assortment of food options, including some healthier food items, than mobile food vendors, which offer and sell a limited range of products. Findings may contribute to the development of innovative policy solutions and interventions aimed at increasing healthy food options or reducing health disparities in immigrant communities. PMID:22531289
Rantakokko, Merja; Wilkie, Ross
2017-06-30
The study examines how environmental factors contribute to the onset of restricted mobility outside the home among older adults with osteoarthritis. This is a prospective cohort study of adults aged 50 years and older with osteoarthritis (n=1802). Logistic regression tested the association between the onset of restricted mobility outside the home and health, sociodemographic and perceived environmental barriers (hills and steep slopes, inaccessible public buildings, poor pavement condition, lack of access to public parks or sport facilities, heavy traffic or speeding cars and poor weather). The potential moderating role of environmental barriers on the association between health factors and onset was examined using interaction terms and stratified analysis. Of 1802 participants, 13.5% (n=243) reported the onset of restricted mobility outside the home at 3-year follow-up. Walking disability, anxiety, depression, cognitive impairment and obesity and all environmental barriers were associated with onset after adjustment for confounders. Environmental barriers had an added contribution to the effect of the health conditions on onset of restricted mobility, which was attenuated when adjusted for confounders. The added contribution remained only for walking disability and the presence of hills and steep slopes; in the presence of both, the association with onset of restricted mobility was stronger (OR 7.66, 95% CI 4.64 to 12.64) than in the presence of walking disability (3.60, 2.43 to 5.32) or the presence of hills and steep slopes alone (4.55, 2.89 to 7.16). For older adults with osteoarthritis, environmental barriers are associated and add a contribution to that of morbidities and walking disability on the onset of restricted mobility outside the home. Awareness of environmental barriers is important when aiming to maintain mobility and activities outside the home despite health conditions in older adults. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
30 CFR 57.14211 - Blocking equipment in a raised position.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in a raised position. (a) Persons shall not work on top of, under, or work from mobile equipment in a... of mobile equipment until the component has been blocked or mechanically secured to prevent... must be secured to prevent accidental lowering when persons are working on or around mobile equipment...
... Money & Credit Homes & Mortgages Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Limiting Unwanted Calls and Emails Online Security "Free" Security Scans Computer Security Disposing of Old Computers ...
RESTRICTED HIP MOBILITY: CLINICAL SUGGESTIONS FOR SELF‐MOBILIZATION AND MUSCLE RE‐EDUCATION
Matheson, J.W.
2013-01-01
Restricted hip mobility has shown strong correlation with various pathologies of the hip, lumbar spine and lower extremity. Restricted mobility can consequently have deleterious effects not only at the involved joint but throughout the entire kinetic chain. Promising findings are suggesting benefit with skilled joint mobilization intervention for clients with various hip pathologies. Supervised home program intervention, while lacking specifically for the hip joint, are demonstrating promising results in other regions of the body. Application of an accompanying home program for the purpose of complementing skilled, in clinic intervention is advisable for those clients that respond favorably to such methodology. Level of Evidence: 5 PMID:24175151
Restricted hip mobility: clinical suggestions for self-mobilization and muscle re-education.
Reiman, Michael P; Matheson, J W
2013-10-01
Restricted hip mobility has shown strong correlation with various pathologies of the hip, lumbar spine and lower extremity. Restricted mobility can consequently have deleterious effects not only at the involved joint but throughout the entire kinetic chain. Promising findings are suggesting benefit with skilled joint mobilization intervention for clients with various hip pathologies. Supervised home program intervention, while lacking specifically for the hip joint, are demonstrating promising results in other regions of the body. Application of an accompanying home program for the purpose of complementing skilled, in clinic intervention is advisable for those clients that respond favorably to such methodology. 5.
Zufiria, Pedro J; Pastor-Escuredo, David; Úbeda-Medina, Luis; Hernandez-Medina, Miguel A; Barriales-Valbuena, Iker; Morales, Alfredo J; Jacques, Damien C; Nkwambi, Wilfred; Diop, M Bamba; Quinn, John; Hidalgo-Sanchís, Paula; Luengo-Oroz, Miguel
2018-01-01
We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix). This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories) which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices) to monitor food security.
Practical and secure telemedicine systems for user mobility.
Rezaeibagha, Fatemeh; Mu, Yi
2018-02-01
The application of wireless devices has led to a significant improvement in the quality delivery of care in telemedicine systems. Patients who live in a remote area are able to communicate with the healthcare provider and benefit from the doctor consultations. However, it has been a challenge to provide a secure telemedicine system, which captures users (patients and doctors) mobility and patient privacy. In this work, we present several secure protocols for telemedicine systems, which ensure the secure communication between patients and doctors who are located in different geographical locations. Our protocols are the first of this kind featured with confidentiality of patient information, mutual authentication, patient anonymity, data integrity, freshness of communication, and mobility. Our protocols are based on symmetric-key schemes and capture all desirable security requirements in order to better serve our objectives of research for secure telemedicine services; therefore, they are very efficient in implementation. A comparison with related works shows that our work contributes first comprehensive solution to capture user mobility and patient privacy for telemedicine systems. Copyright © 2018 Elsevier Inc. All rights reserved.
Distributed generation of shared RSA keys in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Liu, Yi-Liang; Huang, Qin; Shen, Ying
2005-12-01
Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.
A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki
Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.
ERIC Educational Resources Information Center
Zahadat, Nima
2016-01-01
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
Evaluation of real-world mobility in age-related macular degeneration.
Sengupta, Sabyasachi; Nguyen, Angeline M; van Landingham, Suzanne W; Solomon, Sharon D; Do, Diana V; Ferrucci, Luigi; Friedman, David S; Ramulu, Pradeep Y
2015-01-30
Previous research has suggested an association between poor vision and decreased mobility, including restricted levels of physical activity and travel away from home. We sought to determine the impact of age-related macular degeneration (AMD) on these measures of mobility. Fifty-seven AMD patients with bilateral, or severe unilateral, visual impairment were compared to 59 controls with normal vision. All study subjects were between the ages of 60 and 80. Subjects wore accelerometers and cellular network-based tracking devices over 7 days of normal activity. Number of steps taken, time spent in moderate-to-vigorous physical activity (MVPA), number of excursions from home, and time spent away from home were the primary outcome measures. In multivariate negative binomial regression models adjusted for age, gender, race, comorbidities, and education, AMD participants took fewer steps than controls (18% fewer steps per day, p = 0.01) and spent significantly less time in MVPA (35% fewer minutes, p < 0.001). In multivariate logistic regression models adjusting for age, sex, race, cognition, comorbidities, and grip strength, AMD subjects showed an increased likelihood of not leaving their home on a given day (odds ratio = 1.36, p = 0.04), but did not show a significant difference in the magnitude of time spent away from home (9% fewer minutes, p = 0.11). AMD patients with poorer vision engage in significantly less physical activity and take fewer excursions away from the home. Further studies identifying the factors mediating the relationship between vision loss and mobility are needed to better understand how to improve mobility among AMD patients.
Code of Federal Regulations, 2010 CFR
2010-07-01
... marketing of products, commodities, and/or any other personal property; or (2) Conducted primarily for the... conditions is not considered to be a displaced person. (viii) A mobile home occupant who owns the site on which the mobile home is located and who voluntarily sells the site to the Postal Service, regardless of...
Martens, Astrid L; Bolte, John F B; Beekhuizen, Johan; Kromhout, Hans; Smid, Tjabe; Vermeulen, Roel C H
2015-10-01
Epidemiological studies on the potential health effects of RF-EMF from mobile phone base stations require efficient and accurate exposure assessment methods. Previous studies have demonstrated that the 3D geospatial model NISMap is able to rank locations by indoor and outdoor RF-EMF exposure levels. This study extends on previous work by evaluating the suitability of using NISMap to estimate indoor RF-EMF exposure levels at home as a proxy for personal exposure to RF-EMF from mobile phone base stations. For 93 individuals in the Netherlands we measured personal exposure to RF-EMF from mobile phone base stations during a 24h period using an EME-SPY 121 exposimeter. Each individual kept a diary from which we extracted the time spent at home and in the bedroom. We used NISMap to model exposure at the home address of the participant (at bedroom height). We then compared model predictions with measurements for the 24h period, when at home, and in the bedroom by the Spearman correlation coefficient (rsp) and by calculating specificity and sensitivity using the 90th percentile of the exposure distribution as a cutpoint for high exposure. We found a low to moderate rsp of 0.36 for the 24h period, 0.51 for measurements at home, and 0.41 for measurements in the bedroom. The specificity was high (0.9) but with a low sensitivity (0.3). These results indicate that a meaningful ranking of personal RF-EMF can be achieved, even though the correlation between model predictions and 24h personal RF-EMF measurements is lower than with at home measurements. However, the use of at home RF-EMF field predictions from mobile phone base stations in epidemiological studies leads to significant exposure misclassification that will result in a loss of statistical power to detect health effects. Copyright © 2015 Elsevier Inc. All rights reserved.
Telemedicine and mHealth odyssey: a journey from the battlefield to academia
NASA Astrophysics Data System (ADS)
Poropatich, Ronald; Presson, Nora; Gilbert, Gary
2016-05-01
Since 1992, military medicine has considered the relevance, sustainability, and promise of telemedicine in the context of its mission and obligations for service members at home and in war zones. The US Army telemedicine program covers 22 time zones and generates over 5000 tele-consults per month for over 20 medical specialties. More recently the advances in mobile computing and increased adoption of the Smartphone with evolving capabilities for imaging and body-worn sensor integration has emerged in the field called mobile health, or mHealth. This presentation highlights the first 10 years of the U.S. Army mHealth program and includes how similar technologies have translated to wide-scale civilian health care implementation, including a relevant project for Veterans at the University of Pittsburgh. Examples include the successful US Army "mCare" program developed to augment soldier rehabilitation management with USbased geographically dispersed providers that utilizes secure mobile messaging and the soldier's own cell phone. Additional research interests will describe the use of smartphones on the battlefield enabling capture of operational medical data to improve casualty evacuation and outcome. A DoD-funded traumatic brain injury research project developed for Veterans at the University of Pittsburgh includes a mobile health application that demonstrates the effectiveness of communicating with patients through their personal mobile devices with care managers. Preliminary data for all the projects presented are encouraging for adoption and utilization of a mobile telemedicine platform to meet the complex needs of casualties injured or recovering from a broad range of injuries in unique geographic settings.
Managing children's postural risk when using mobile technology at home: Challenges and strategies.
Ciccarelli, Marina; Chen, Janice D; Vaz, Sharmila; Cordier, Reinie; Falkmer, Torbjörn
2015-11-01
Maintaining the musculoskeletal health of children using mobile information and communication technologies (ICT) at home presents a challenge. The physical environment influences postures during ICT use and can contribute to musculoskeletal complaints. Few studies have assessed postures of children using ICT in home environments. The present study investigated the Rapid Upper Limb Assessment (RULA) scores determined by 16 novice and 16 experienced raters. Each rater viewed 11 videotaped scenarios of a child using two types of mobile ICT at home. The Grand Scores and Action Levels determined by study participants were compared to those of an ergonomist experienced in postural assessment. All postures assessed were rated with an Action Level of 2 or above; representing a postural risk that required further investigation and/or intervention. The sensitivity of RULA to assess some of the unconventional postures adopted by children in the home is questioned. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Predictors for living at home after geriatric inpatient rehabilitation: A prospective cohort study.
Kool, Jan; Oesch, Peter; Bachmann, Stefan
2017-01-31
To evaluate patient characteristics predicting living at home after geriatric rehabilitation. Prospective cohort study. A total of 210 patients aged 65 years or older receiving inpatient rehabilitation. Candidate predictors evaluated during rehabilitation were: age, vulnerability (Vulnerable Elders Survey), multimorbidity (Cumulative Illness Rating Scale), cognition (Mini-Mental State Examination), depression (Hospital Anxiety and Depression Scale), living alone, previous independence in activities of daily living, fall risk, and mobility at discharge (Timed Up and Go test). Multiple imputation data-sets, bivariate and multiple regression were used to build a predictive model for living at home, which was evaluated at 3-month follow-up. A total of 210 patients (mean age 76.0 years, 46.2% women) were included in the study. Of these, 87.6% had been admitted to geriatric rehabilitation directly from acute hospital care. Follow-up was complete in 75.2% of patients. The strongest predictor for living at home was better mobility at discharge (Timed Up and Go test < 20 s), followed by lower multimorbidity, better cognition, and not living alone. In bivariate regression, living at home was also associated with age, fall risk, vulnerability, depression, and previous independence in activities of daily living. Mobility is the most important predictive factor for living at home after geriatric rehabilitation. Assessment and training of mobility are therefore key aspects in geriatric rehabilitation.
Yang, Hsiang-Yu; Sanford, Jon A.
2012-01-01
This paper describes relationships among home and community environmental features, activity performance in the home, and community participation potential to support aging in place. A subset of data on older adults with functional limitations (N = 122), sixty three (63) with mobility and 59 with other limitations, were utilized in this study from a larger project's subject pool. Results showed significant and positive correlations between environmental barriers, activity dependence and difficulty at home, and less community participation in the mobility limitation group. While kitchen and bathroom features were most limiting to home performance, bathtub or shower was the only home feature, and destination social environment was the only community feature, that explained community participation. Compared to environmental features, home performance explained much more community participation. Study results provide detailed information about environmental features as well as types of home activities that can be prioritized as interventions for aging in place. PMID:22162808
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Along Mobile Technologies, Inc., and China Yingxia International, Inc., Order of Suspension of Trading February 2, 2012. It... concerning the securities of Along Mobile Technologies, Inc. because it has not filed any periodic reports...
Distributed Multihoming Routing Method by Crossing Control MIPv6 with SCTP
NASA Astrophysics Data System (ADS)
Shi, Hongbo; Hamagami, Tomoki
There are various wireless communication technologies, such as 3G, WiFi, used widely in the world. Recently, not only the laptop but also the smart phones can be equipped with multiple wireless devices. The communication terminals which are implemented with multiple interfaces are usually called multi-homed nodes. Meanwhile, a multi-homed node with multiple interfaces can also be regarded as multiple single-homed nodes. For example, when a person who is using smart phone and laptop to connect to the Internet concurrently, we may regard the person as a multi-homed node in the Internet. This paper proposes a new routing method, Multi-homed Mobile Cross-layer Control to handle multi-homed mobile nodes. Our suggestion can provide a distributed end-to-end routing method for handling the communications among multi-homed nodes at the fundamental network layer.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois
2017-07-01
A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.
2012-11-01
that mobile application developers should reconsider implementing garbled circuits due to their extreme resource usage, and instead rely upon our equivalently secure and significantly more efficient alternative.
A Hop-Sensitive Mechanism to Establish Route Optimization in Mobile Networks
NASA Astrophysics Data System (ADS)
Gnanaraj, J. Isac; Newton, P. Calduwel; Arockiam, L.; Kim, Tai-Hoon
The mobile network plays a vital role in mobile communications. It supports both host mobility and network mobility. The mobile network which supports network mobility can be called as NEMO. The NEMO refers to NEtwork MObility or mobile network that moves. Though NEMO provides many supports, it also suffers due to Quality of Service (QoS) issues. One such issue is Route Optimization (RO). When a Mobile Node (MN) is away from Home Network (HN), it will send a binding update to Home Agent (HA) in HN to inform its movement. If the Correspondent Node (CN) wants to send data to MN, it will send data through HA. In this scenario, three networks such as HN, Foreign Network (FN) and Correspondent Network are involved in data transfer. The involvement of these three networks affects the QoS. This paper concentrates on some of the QoS parameters to propose a QoS mechanism to establish RO among these three networks and significantly increases performance of the mobile network.
; Home Fort Belvoir Community Hospital Fort Belvoir Community Hospital Launches Mobile Application for Patients Mobile Application Launches Fort Belvoir Community Hospital Launches Mobile Application for
question, problem or suggestion please open a Service Desk Ticket. Fermilab Home Page ESH&Q Home Page open a Service Desk Ticket. Fermilab Home Page ESH&Q Home Page Fermilab At Work Security, Privacy
Code of Federal Regulations, 2010 CFR
2010-01-01
... building or mobile home that is located or to be located in a special flood hazard area in which flood... Management Agency. (g) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a permanent foundation when attached to the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... building or mobile home that is located or to be located in a special flood hazard area in which flood... Management Agency. (g) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a permanent foundation when attached to the...
12 CFR 614.4925 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... mobile home that is located or to be located in a special flood hazard area in which flood insurance is... Agency. (e) Mobile home means a structure, transportable in one or more sections, that is built on a permanent chassis and designed for use with or without a permanent foundation when attached to the required...
12 CFR 584.2-1 - Prescribed services and activities of savings and loan holding companies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... and operation of storage facilities for microfilm or other duplicate records; and (vii) Advertising... construction, or (iii) Use as mobile home sites; (5) Development, subdivision and construction of improvements...) Acquisition of improved real estate and mobile homes to be held for rental; (7) Acquisition of improved real...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
...) Cause of Loss and Subrogation Report; 086-0- 17 (formerly 81-96) Manufactured (Mobile) Home/Travel Trailer Worksheet; 086-0-18 (formerly 81-96A) Manufactured (Mobile) Home/Travel Trailer Worksheet... collection, the categories of respondents, the estimated burden (i.e., the time, effort and resources used by...
Maurer, Carola; Vosseler, Birgit; Senn, Beate; Gattinger, Heidrun
2018-06-01
Background: Mobility impairment is often seen as a reason for needing long-term care. Thus, promoting mobility becomes increasingly significant in nursing homes. The kinaesthetic approach offers a way to support nursing home residents in using their own resources to maintain or improve their mobility. Aim: The present study intends to identify the characteristics of the interaction between nursing home residents with impaired mobility and kinaesthetic trainers during mobilisation. Methods: This secondary analysis comprises nine video sequences interpreted according to Grounded Theory-principles. The findings are described in a basic model. Results: The interaction with nursing home residents is focused on adapted movement support. This assistance shows a positive effect on residents’ self-activity in the tracking process and in the context of other strategies. Intervening conditions like residents’ daily constitution have an influence on nurses’ kinaesthetic strategies. Thereby, nurses have to be highly competent in self-perception. Conclusion: Adapted movement support proves to be a phenomenon basing on the nurse-resident-interaction and allowing residents to actively participate in collaborative action.
NASA Astrophysics Data System (ADS)
Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.
2002-08-01
This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.
Valdez, Zulema; Dean, Wesley R; Sharkey, Joseph R
2012-10-01
A growing concern with high rates of obesity and overweight among immigrant minority populations in the US has focused attention on the availability and accessibility to healthy foods in such communities. Small-scale vending in rural, impoverished and underserved areas, however, is generally overlooked; yet, this type of informal activity and source for food is particularly important in such environs, or "food desserts," where traditional forms of work and mainstream food outlets are limited or even absent. This exploratory study investigates two types of small-scale food vending that take place in rural colonias, or Mexican-origin settlements along the South Texas border with Mexico: mobile and home-based. Using a convenience sample of 23 vendors who live and work in Texas colonias, this study identifies the characteristics associated with mobile and home-based food vendors and their businesses and its contributions to the rural food environment. Findings reveal that mobile and home-based vending provides a variety of food and beverage options to colonia residents, and suggests that home-based vendors contribute a greater assortment of food options, including some healthier food items, than mobile food vendors, which offer and sell a limited range of products. Findings may contribute to the development of innovative policy solutions and interventions aimed at increasing healthy food options or reducing health disparities in immigrant communities. Copyright © 2012 Elsevier Ltd. All rights reserved.
Privacy and Security in Mobile Health: A Research Agenda
Kotz, David; Gunter, Carl A.; Kumar, Santosh; Weiner, Jonathan P.
2017-01-01
Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges. PMID:28344359
Secure Mobile Distributed File System (MDFS)
2011-03-01
dissemination of data. In a mobile ad - hoc network, there are two classes of devices: content generators and content consumers. One im- plementation of...use of infrastructure mode is necessary because current Android implemen- tations do not support Mobile Ad - Hoc network without modification of the...NUMBER (include area code ) Standard Form 298 (Rev. 8–98) Prescribed by ANSI Std. Z39.18 24–3–2011 Master’s Thesis 2009-03-01—2011-03-31 Secure Mobile
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
Outdoor motivation moderates the effects of accessibility on mobility in old age.
Kamin, Stefan T; Beyer, Anja; Lang, Frieder R
2016-07-01
Mobility plays a major role in healthy aging and social participation. This study explored whether accessibility problems in the housing environment are negatively associated with mobility in old age and whether this association is moderated by differences in an individual's preference for spending time outside the home (outdoor motivation). This article reports the results of a research project on mobility in old age. The project included a survey study of 120 community-dwelling older adults between 59 and 92 years of age (mean = 71.7 years, SD = 7.3 years) living in the metropolitan region of Nuremberg, Germany. Objective assessments were conducted in the participants' housing environment to evaluate the magnitude of accessibility problems. Accessibility problems were negatively associated with mobility. Interaction analyses suggested a buffering effect of outdoor motivation on this association, i.e. participants who reported a preference for spending time outside the home had a higher mobility in the face of accessibility problems as compared with those who preferred staying at home. Outdoor motivation may have protective effects for older adults when accessibility problems challenge mobility. These findings contribute to improving the understanding of how and under what circumstances older adults stay mobile and active in everyday life. Considering interindividual differences in outdoor motivation may binterventions and public health programs that are aimed at enhancing mobility and social participation in old age.
Mobile health requires mobile security: challenges, solutions, and standardization.
Pharow, Peter; Blobel, Bernd
2008-01-01
Extended communication and advanced cooperation in a permanently growing healthcare and welfare domain require a well-defined set of security services provided by an interoperable security infrastructure based on international and European standards. Any communication and collaboration procedure requires a purpose. But such legal purpose-binding is definitely not the only aspect to carefully be observed and investigated. More and more, aspects of security, safety, privacy, ethics, and quality reach importance while discussing about future-proof health information systems and health networks - regardless whether local, regional or even pan-European networks. During the course of the current paradigm change from an organization-centered to a process-related and to a person-centered health system, different new technologies including mobile solutions need to be applied in order to meet challenges arising from both legal and technical circumstances. Beside the typical Information and Communication Technology systems and applications, the extended use of modern technologies includes large medical devices like, e.g., MRI and CT but also small devices like sensors worn by a person or included in clothing. Security and safety are on top of the priority list. The paper addresses the identification of some specific aspects like mobile technology and safety when moving both IT and people towards mobile health aiming at increasing citizens and patients awareness, confidence, and acceptance in future mobile care - a world often still beyond the horizon.
Klous, Gijs; Smit, Lidwien A M; Freidl, Gudrun S; Borlée, Floor; van der Hoek, Wim; IJzermans, C Joris; Kretzschmar, Mirjam E E; Heederik, Dick J J; Coutinho, Roel A; Huss, Anke
2018-06-01
We previously observed an increased incidence of pneumonia in persons living near goat and poultry farms, using animal presence around the home to define exposure. However, it is unclear to what extent individual mobility and time spent outdoors close to home contributes to this increased risk. Therefore, the aim of the current study was to investigate the role of mobility patterns and time spent outdoors in the vicinity of goat or poultry farms in relation to pneumonia risk. In a rural Dutch cohort, 941 members logged their mobility using GPS trackers for 7 days. Pneumonia was diagnosed in 83 subjects (participants reported that pneumonia had been diagnosed by a medical doctor, or recorded in EMR from general practitioners, 2011-2014). We used logistic regression to evaluate pneumonia-risk by presence of goat farms within 500 and 1000 m around the home and around GPS-tracks (only non-motorised mobility), also we evaluated whether more time spent outdoors increased pneumonia-risks. We observed a clearly increased risk of pneumonia among people living in close proximity to goat farms, ORs increased with closer distances of homes to farms (500 m: 6.2 (95% CI 2.2-16.5) 1000 m: 2.5 (1.4-4.3)) The risk increased for individuals who spent more time outdoors close to home, but only if homes were close to goat farms (within 500 m and often outdoors: 12.7 (3.6-45.4) less often: 2.0 (0.3-9.2), no goat farms and often outdoors: 1.0 (0.6-1.6)). For poultry we found no increased risks. Pneumonia-risks increased when people lived near goat farms, especially when they spent more time outdoors, mobility does not seem to add to these risks. Copyright © 2018 Elsevier Ltd. All rights reserved.
Abramsky, Hillary; Kaur, Puneet; Robitaille, Mikale; Taggio, Leanna; Kosemetzky, Paul K; Foster, Hillary; Gibson Bmr Pt MSc PhD, Barbara E; Bergeron, Maggie; Jachyra, Patrick
2018-01-01
Purpose: We explored patients' perspectives on home exercise programmes (HEPs) and their experiences using a mobile application designed to facilitate home exercise. Method: Data were generated using qualitative, semi-structured, face-to-face interviews with 10 participants who were receiving outpatient physiotherapy. Results: Establishing a therapeutic partnership between physiotherapists and patients enabled therapists to customize the HEPs to the patients' lifestyles and preferences. Analysis suggests that using the mobile application improved participants' ability to integrate the HEP into their daily life and was overwhelmingly preferred to traditional paper handouts. Conclusions: The results suggest that efforts to engage patients in HEPs need to take their daily lives into account. To move in this direction, sample exercise prescription questions are offered. Mobile applications do not replace the clinical encounter, but they can be an effective tool and an extension of delivering personalized HEPs in an existing therapeutic partnership.
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2014 CFR
2014-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2013 CFR
2013-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
12 CFR 998.2 - Registration and periodic disclosures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 998.2 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOME LOAN BANK DISCLOSURES REGISTRATION OF FEDERAL HOME LOAN BANK EQUITY SECURITIES § 998.2 Registration and periodic disclosures. (a... class of its equity securities pursuant to the provisions of section 12(g)(1) of the 1934 Act. Each Bank...
Food Insecurity is Related to Home Availability of Fruit, 100% Fruit Juice, and Vegetables
USDA-ARS?s Scientific Manuscript database
Household food security is defined as access to enough food at all times for active, healthy living. Low food security may influence consumption because those households may lack sufficient resources to purchase more healthful items like fruit and vegetables. Because home availability is related to ...
Eslami, J.; Ghafaripour, F.; Mortazavi, S.A.R.; Mortazavi, S.M.J.; Shojaei-fard, M.B.
2015-01-01
Background People who use home blood glucose monitors may use their mobile phones in the close vicinity of medical devices. This study is aimed at investigating the effect of the signal strength of 900 MHz GSM mobile phones on the accuracy of home blood glucose monitors. Methods Sixty non-diabetic volunteer individuals aged 21 - 28 years participated in this study. Blood samples were analyzed for glucose level by using a common blood glucose monitoring system. Each blood sample was analyzed twice, within ten minutes in presence and absence of electromagnetic fields generated by a common GSM mobile phone during ringing. Blood samples were divided into 3 groups of 20 samples each. Group 1: exposure to mobile phone radiation with weak signal strength. Group2: exposure to mobile phone radiation with strong signal strength. Group3: exposure to a switched–on mobile phone with no signal strength. Results The magnitude of the changes in the first, second and third group between glucose levels of two measurements (׀ΔC׀) were 7.4±3.9 mg/dl, 10.2±4.5 mg/dl, 8.7±8.4 mg/dl respectively. The difference in the magnitude of the changes between the 1st and the 3rd groups was not statistically significant. Furthermore, the difference in the magnitude of the changes between the 2nd and the 3rd groups was not statistically significant. Conclusion Findings of this study showed that the signal strength of 900 MHz GSM mobile phones cannot play a significant role in changing the accuracy of home blood glucose monitors. PMID:26688798
Eslami, J; Ghafaripour, F; Mortazavi, S A R; Mortazavi, S M J; Shojaei-Fard, M B
2015-12-01
People who use home blood glucose monitors may use their mobile phones in the close vicinity of medical devices. This study is aimed at investigating the effect of the signal strength of 900 MHz GSM mobile phones on the accuracy of home blood glucose monitors. Sixty non-diabetic volunteer individuals aged 21 - 28 years participated in this study. Blood samples were analyzed for glucose level by using a common blood glucose monitoring system. Each blood sample was analyzed twice, within ten minutes in presence and absence of electromagnetic fields generated by a common GSM mobile phone during ringing. Blood samples were divided into 3 groups of 20 samples each. Group 1: exposure to mobile phone radiation with weak signal strength. Group2: exposure to mobile phone radiation with strong signal strength. Group3: exposure to a switched-on mobile phone with no signal strength. The magnitude of the changes in the first, second and third group between glucose levels of two measurements (׀ΔC׀) were 7.4±3.9 mg/dl, 10.2±4.5 mg/dl, 8.7±8.4 mg/dl respectively. The difference in the magnitude of the changes between the 1st and the 3rd groups was not statistically significant. Furthermore, the difference in the magnitude of the changes between the 2nd and the 3rd groups was not statistically significant. Findings of this study showed that the signal strength of 900 MHz GSM mobile phones cannot play a significant role in changing the accuracy of home blood glucose monitors.
The application of autostereoscopic display in smart home system based on mobile devices
NASA Astrophysics Data System (ADS)
Zhang, Yongjun; Ling, Zhi
2015-03-01
Smart home is a system to control home devices which are more and more popular in our daily life. Mobile intelligent terminals based on smart homes have been developed, make remote controlling and monitoring possible with smartphones or tablets. On the other hand, 3D stereo display technology developed rapidly in recent years. Therefore, a iPad-based smart home system adopts autostereoscopic display as the control interface is proposed to improve the userfriendliness of using experiences. In consideration of iPad's limited hardware capabilities, we introduced a 3D image synthesizing method based on parallel processing with Graphic Processing Unit (GPU) implemented it with OpenGL ES Application Programming Interface (API) library on IOS platforms for real-time autostereoscopic displaying. Compared to the traditional smart home system, the proposed system applied autostereoscopic display into smart home system's control interface enhanced the reality, user-friendliness and visual comfort of interface.
Shipton, Leah; Lashewicz, Bonnie M
2017-09-01
The purpose of this study was to uncover and understand factors influencing quality of care received by adults with developmental disabilities and/or mental health disorders living in group homes. The present authors conducted a secondary analysis of data from nine focus group discussions with adults with developmental disabilities and/or mental health disorders, and their family and paid caregivers (N = 52). To focus the analysis, the present authors drew on the research literature to craft a model of quality of group home care using concepts of social inclusion and self-determination, and corresponding staff approaches that include active support and person-centred care. Social inclusion and self-determination for adults in group homes are facilitated by staff approaches and manifest in residents being understood and experiencing security and freedom. The present authors offer recommendations for group home resources, training, communication and outcome measures that promote residents' being understood and experiencing security and freedom. © 2016 John Wiley & Sons Ltd.
Usability testing of a mobile robotic system for in-home telerehabilitation.
Boissy, Patrick; Brière, Simon; Corriveau, Hélène; Grant, Andrew; Lauria, Michel; Michaud, François
2011-01-01
Mobile robots designed to enhance telepresence in the support of telehealth services are being considered for numerous applications. TELEROBOT is a teleoperated mobile robotic platform equipped with videoconferencingcapabilities and designed to be used in a home environment to. In this study, learnability of the system's teleoperation interface and controls was evaluated with ten rehabilitation professionals during four training sessions in a laboratory environment and in an unknown home environment while performing the execution of a standardized evaluation protocol typically used in home care. Results show that the novice teleoperators' performances on two of the four metrics used (number of command and total time) improved significantly across training sessions (ANOVAS, p<0.05) and that performance in these metrics in the last training session reflected teleoperation abilities seen in the unknown home environment during navigation tasks (r=0,77 and 0,60). With only 4 hours of training, rehabilitation professionals were able learn to teleoperate successfully TELEROBOT. However teleoperation performances remained significantly less efficient then those of an expert. Under the home task condition (navigating the home environment from one point to the other as fast as possible) this translated to completion time between 350 seconds (best performance) and 850 seconds (worse performance). Improvements in other usability aspects of the system will be needed to meet the requirements of in-home telerehabilitation.
Use of hardwood flooring in mobile homes
David G. Martens; Leonard J. Koenick; Leonard J. Koenick
1970-01-01
The hardwood flooring industry is losing a new and vigorous market by default. The mobile-home industry produced over 250 million square feet of single-family housing space last year, and very little of this floor space was covered with hardwood flooring. A preliminary glance at this situation seems to uncover an industry that offers many opportunities for hardwood...
Code of Federal Regulations, 2010 CFR
2010-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. [54 FR 49715, Nov. 30, 1989, as amended at 61 FR 50984, Sept. 30, 1996...
Code of Federal Regulations, 2013 CFR
2013-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. [54 FR 49715, Nov. 30, 1989, as amended at 61 FR 50984, Sept. 30, 1996...
Code of Federal Regulations, 2012 CFR
2012-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. [54 FR 49715, Nov. 30, 1989, as amended at 61 FR 50984, Sept. 30, 1996...
Code of Federal Regulations, 2011 CFR
2011-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. [54 FR 49715, Nov. 30, 1989, as amended at 61 FR 50984, Sept. 30, 1996...
Code of Federal Regulations, 2014 CFR
2014-01-01
... first lien on a residential mobile home if a creditor covered by this part complies with the consumer... the final scheduled installment. (g) Deferral fees. (1) With respect to mobile home credit... money order; do not send cash. [54 FR 49715, Nov. 30, 1989, as amended at 61 FR 50984, Sept. 30, 1996...
This report documents activities performed for and results obtained from the arsenic removal treatment technology demonstration project at the Hot Springs Mobile Home Park (HSMHP) in Willard, UT. The objectives of the project were to evaluate the effectiveness of Adsorbsia™ GTO™...
A method for improved visual landscape compatibility of mobile home park
Daniel R. Jones
1979-01-01
This paper is a description of a research effort directed to improving the visual image of mobile home parks in the landscape. The study is an application of existing methodologies for measuring scenic quality and visual landscape compatibility to an unsolved problem. The paper summarizes two major areas of investigation: regional location factors based on visual...
Slaughter, Susan E; Estabrooks, Carole A
2013-10-18
Almost 90 percent of nursing home residents have some type of mobility limitation. Many spend most of their waking hours lying in bed or sitting. Such inactivity can negatively affect residents' health and general well-being. This pilot study aimed to assess (1) the effect of the sit-to-stand activity on mobility outcomes of nursing home residents, (2) the effect of an audit-and-feedback intervention on uptake of the sit-to-stand activity by healthcare aides, and (3) the contextual factors influencing uptake of the sit-to-stand activity by healthcare aides. This quasi-experimental pilot study was conducted in two nursing homes in western Canada. Twenty-six residents with dementia completed the sit-to-stand activity with 56 healthcare aides during daily care; separately, 71 healthcare aides completed a research use and context survey. Preliminary mobility feedback was presented to healthcare aides in one site. Resident mobility was measured using the 30-second sit-to-stand test. Healthcare aide uptake of the activity was measured using documentation flowsheets and a survey-based measure. Context was measured using the Alberta Context Tool. Mobility and uptake outcomes were analyzed over time and by site with analysis of covariance. Spearman and Pearson correlations were used to correlate context data with research use. Residents who more frequently completed the sit-to-stand activity were more likely to maintain or improve mobility compared with those who completed it less frequently (F=4.46; p=0.046, after adjustment for age). Uptake for one site was significantly different from the other (t-score=2.67; p=0.01, after adjustment for resident covariates). The audit-and-feedback intervention was associated with increased uptake of the activity from pre-intervention to post-intervention (t-score=-2.48; p=0.02). More context domains correlated significantly with aides' use of conceptual research and information sources in one site than the other. The sit-to-stand activity is a promising means to maintain or improve transfer ability of nursing home residents with dementia. In the nursing home with initially weak uptake, strengthened uptake followed an audit-and-feedback intervention. Activity participation was higher in the site with stronger correlations between context and measured research use. Results are sufficiently promising to warrant proceeding with a full clinical trial.
Operation of remote mobile sensors for security of drinking water distribution systems.
Perelman, By Lina; Ostfeld, Avi
2013-09-01
The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
Temblor, an app focused on your seismic risk and how to reduce it
NASA Astrophysics Data System (ADS)
Stein, R. S.; Sevilgen, V.; Sevilgen, S.; Kim, A.; Madden, E.
2015-12-01
Half of the world's population lives near active faults, and so could suffer earthquake damage. Most do not know they are at risk; many of the rest do too little, too late. So, Temblor is intended to enable everyone in the United States, and eventually the world, to learn their seismic hazard, to determine what most ensures their safety, and to determine the risk reduction measures in their best financial interest. In our free web and mobile app, and Chrome extension for real estate websites, Temblor estimates the likelihood of seismic shaking from all quakes at their occurrence rates, and the consequences of the shaking for home damage. The app then shows how the damage or its costs could be decreased by buying or renting a seismically safer home, securing fragile objects inside your home, retrofitting an older home, or buying earthquake insurance. Temblor uses public data from the USGS in the U.S., SHARE in Europe, and the GEAR model (Bird et al, in press, BSSA) for the globe. Through publicly available modeling methods, the hazard data is combined with public data on homes (construction date and square footage) to make risk calculations. This means that Temblor's results are independently reproducible. The app makes many simplifying assumptions, but users can provide additional information on their site and home for refined estimates. Temblor also lets one see active faults and recent quakes on the screen as they drive through an area. Because fear tends to trigger either panic or denial, Temblor seeks to make the world of earthquakes more fascinating than frightening. We are neither scaring nor soothing people, but rather talking straight. Through maps, globes, push notifications, family connections, and costs and benefit estimates, Temblor emphasizes the personal, local, realtime, and most importantly, rational. Temblor's goal is to distill scientific and engineering information into lucid, trusted, and ideally actionable guidance to renters, home owners, and home buyers, so that we all live more safely in earthquake country.
Changeable HA to improve MIPv6 protocol
NASA Astrophysics Data System (ADS)
Hu, Qing-gui
2015-12-01
For mobile IPv6, home agent (HA) plays an important role. Each mobile node (MN) has a home IP address, it will be not changeable. Also, the home agent (HA) of MN is not changeable. This rule provides the convenient for the ongoing communication without interruption. But it has some obvious drawbacks. Here, the new variable HA scheme is proposed. Every MN has a dynamic cache table, recording the information such as its home address, care-of address, and history address etc. If the accumulated time in one region exceeds that in the hometown, the foreign agent (FA) could become home agent (HA), the home agent could become history agent. Later, the performance of the new protocol is simulated with OPNET software, whose result shows the performance of the new protocol works better than that of the traditional protocol.
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Server-Based and Server-Less Byod Solutions to Support Electronic Learning
2016-06-01
Knowledge Online NSD National Security Directive OS operating system OWA Outlook Web Access PC personal computer PED personal electronic device PDA...mobile devices, institute mobile device policies and standards, and promote the development and use of DOD mobile and web -enabled applications” (DOD...with an isolated BYOD web server, properly educated system administrators must carry out and execute the necessary, pre-defined network security
Childhood Family Structure and Intergenerational Income Mobility in the United States.
Bloome, Deirdre
2017-04-01
The declining prevalence of two-parent families helped increase income inequality over recent decades. Does family structure also condition how economic (dis)advantages pass from parents to children? If so, shifts in the organization of family life may contribute to enduring inequality between groups defined by childhood family structure. Using National Longitudinal Survey of Youth data, I combine parametric and nonparametric methods to reveal how family structure moderates intergenerational income mobility in the United States. I find that individuals raised outside stable two-parent homes are much more mobile than individuals from stable two-parent families. Mobility increases with the number of family transitions but does not vary with children's time spent coresiding with both parents or stepparents conditional on a transition. However, this mobility indicates insecurity, not opportunity. Difficulties maintaining middle-class incomes create downward mobility among people raised outside stable two-parent homes. Regardless of parental income, these people are relatively likely to become low-income adults, reflecting a new form of perverse equality. People raised outside stable two-parent families are also less likely to become high-income adults than people from stable two-parent homes. Mobility differences account for about one-quarter of family-structure inequalities in income at the bottom of the income distribution and more than one-third of these inequalities at the top.
NASA Astrophysics Data System (ADS)
Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.
2006-05-01
This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).
Strategies to use tablet computers for collection of electronic patient-reported outcomes.
Schick-Makaroff, Kara; Molzahn, Anita
2015-01-22
Mobile devices are increasingly being used for data collection in research. However, many researchers do not have experience in collecting data electronically. Hence, the purpose of this short report was to identify issues that emerged in a study that incorporated electronic capture of patient-reported outcomes in clinical settings, and strategies used to address the issues. The issues pertaining to electronic patient-reported outcome data collection were captured qualitatively during a study on use of electronic patient-reported outcomes in two home dialysis units. Fifty-six patients completed three surveys on tablet computers, including the Kidney Disease Quality of Life-36, the Edmonton Symptom Assessment Scale, and a satisfaction measure. Issues that arose throughout the research process were recorded during ethics reviews, implementation process, and data collection. Four core issues emerged including logistics of technology, security, institutional and financial support, and electronic design. Although use of mobile devices for data collection has many benefits, it also poses new challenges for researchers. Advance consideration of possible issues that emerge in the process, and strategies that can help address these issues, may prevent disruption and enhance validity of findings.
InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices
NASA Astrophysics Data System (ADS)
Gupta, Anand; Gupta, Deepank; Gupta, Nidhi
People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).
A Web-based home welfare and care services support system using a pen type image sensor.
Ogawa, Hidekuni; Yonezawa, Yoshiharu; Maki, Hiromichi; Sato, Haruhiko; Hahn, Allen W; Caldwell, W Morton
2003-01-01
A long-term care insurance law for elderly persons was put in force two years ago in Japan. The Home Helpers, who are employed by hospitals, care companies or the welfare office, provide home welfare and care services for the elderly, such as cooking, bathing, washing, cleaning, shopping, etc. We developed a web-based home welfare and care services support system using wireless Internet mobile phones and Internet client computers, which employs a pen type image sensor. The pen type image sensor is used by the elderly people as the entry device for their care requests. The client computer sends the requests to the server computer in the Home Helper central office, and then the server computer automatically transfers them to the Home Helper's mobile phone. This newly-developed home welfare and care services support system is easily operated by elderly persons and enables Homes Helpers to save a significant amount of time and extra travel.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Occupational Home Economics Education Series. Securing Employment. Competency Based Teaching Module.
ERIC Educational Resources Information Center
Lowe, Phyllis; And Others
This module, one of ten competency based modules developed for vocational teachers, focuses on securing employment in home economics. It is designed for a variety of levels of learners (secondary, postsecondary, adult) in both school and nonschool educational settings. Five competencies to be developed with this module deal with the meaning of…
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 1026.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Special Rules Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.59... an annual percentage rate that applies to a credit card account under an open-end (not home-secured... percentage rates applicable to similar new credit card accounts under an open-end (not home-secured) consumer...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... payment for a credit card account under an open-end (not home-secured) consumer credit plan, the card... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... payment for a credit card account under an open-end (not home-secured) consumer credit plan, the card.... When a balance on a credit card account under an open-end (not home-secured) consumer credit plan is...
12 CFR 1026.52 - Limitations on fees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.52 Limitations on... required to pay with respect to a credit card account under an open-end (not home-secured) consumer credit... terms or other requirements of a credit card account under an open-end (not home-secured) consumer...
12 CFR 226.53 - Allocation of payments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...
12 CFR 1026.52 - Limitations on fees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Applicable to Credit Card Accounts and Open-End Credit Offered to College Students § 1026.52 Limitations on... required to pay with respect to a credit card account under an open-end (not home-secured) consumer credit... terms or other requirements of a credit card account under an open-end (not home-secured) consumer...
12 CFR 226.52 - Limitations on fees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... charges any fees to a credit card account under an open-end (not home-secured) consumer credit plan during... of a credit card account under an open-end (not home-secured) consumer credit plan unless the dollar...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Consolidated Energy, Inc., Diamond Home Services, Inc., Goran Capital Inc., Kingsley Coach, Inc. (The), Knockout Holdings, Inc., and Kuhlman Co... securities of Kingsley Coach, Inc. (The) because it has not filed any periodic reports since the period ended...
James, Inger; Ardeman-Merten, Rebecka; Kihlgren, Annica
2014-01-01
Introduction: The Swedish national guidelines for elderly care describe how older persons should be able to trust that their care is permeated with security. Different theoretical perspectives can be found that describe what creates security. Many studies have been done about security. However, few studies have explicitly asked older persons what security in nursing homes means to them. Aim: The aim of the study was to describe how older persons in nursing homes talked and reflected about security in their daily lives. Method: Nine older persons were interviewed in, in-depth interviews one to three times and the resulting data was analysed using content analysis. Results: The older persons adapted to having their own needs and those of the other older persons met and to the staff routines which created a sense of security. At the same time, they longed for security in which they could trust themselves and create their own daily life. Further to have a sense of belonging and of being liked for created an internal, interpersonal and external security. This can be linked to an ontological security which means having a sense of confidence in the continuity of self-identity and order in events, a being in the world. Conclusion: Person-centred instead of institution- centred care can provide the balance of power that allows the older person to obtain ontological security in which the staff's ability to create a relationship with the older persons becomes crucial. PMID:25852785
Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong
Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.
Sino, Carolina Geertruida Maria; Heerdink, Eibert Rob; Schuurmans, Marieke Joanna
2018-01-01
Background Home care patients often use many medications and are prone to drug-related problems (DRPs). For the management of problems related to drug use, home care could add to the multidisciplinary expertise of general practitioners (GPs) and pharmacists. The home care observation of medication-related problems by home care employees (HOME)-instrument is paper-based and assists home care workers in reporting potential DRPs. To facilitate the multiprofessional consultation, a digital report of DRPs from the HOME-instrument and digital monitoring and consulting of DRPs between home care and general practices and pharmacies is desired. Objective The objective of this study was to develop an electronic HOME system (eHOME), a mobile version of the HOME-instrument that includes a monitoring and a consulting system for primary care. Methods The development phase of the Medical Research Council (MRC) framework was followed in which an iterative human-centered design (HCD) approach was applied. The approach involved a Delphi round for the context of use and user requirements analysis of the digital HOME-instrument and the monitoring and consulting system followed by 2 series of pilots for testing the usability and redesign. Results By using an iterative design approach and by involving home care workers, GPs, and pharmacists throughout the process as informants, design partners, and testers, important aspects that were crucial for system realization and user acceptance were revealed. Through the report webpage interface, which includes the adjusted content of the HOME-instrument and added home care practice–based problems, home care workers can digitally report observed DRPs. Furthermore, it was found that the monitoring and consulting webpage interfaces enable digital consultation between home care and general practices and pharmacies. The webpages were considered convenient, clear, easy, and usable. Conclusions By employing an HCD approach, the eHOME-instrument was found to be an easy-to-use system. The systematic approach promises a valuable contribution for the future development of digital mobile systems of paper-based tools. PMID:29514771
Dijkstra, Nienke Elske; Sino, Carolina Geertruida Maria; Heerdink, Eibert Rob; Schuurmans, Marieke Joanna
2018-03-07
Home care patients often use many medications and are prone to drug-related problems (DRPs). For the management of problems related to drug use, home care could add to the multidisciplinary expertise of general practitioners (GPs) and pharmacists. The home care observation of medication-related problems by home care employees (HOME)-instrument is paper-based and assists home care workers in reporting potential DRPs. To facilitate the multiprofessional consultation, a digital report of DRPs from the HOME-instrument and digital monitoring and consulting of DRPs between home care and general practices and pharmacies is desired. The objective of this study was to develop an electronic HOME system (eHOME), a mobile version of the HOME-instrument that includes a monitoring and a consulting system for primary care. The development phase of the Medical Research Council (MRC) framework was followed in which an iterative human-centered design (HCD) approach was applied. The approach involved a Delphi round for the context of use and user requirements analysis of the digital HOME-instrument and the monitoring and consulting system followed by 2 series of pilots for testing the usability and redesign. By using an iterative design approach and by involving home care workers, GPs, and pharmacists throughout the process as informants, design partners, and testers, important aspects that were crucial for system realization and user acceptance were revealed. Through the report webpage interface, which includes the adjusted content of the HOME-instrument and added home care practice-based problems, home care workers can digitally report observed DRPs. Furthermore, it was found that the monitoring and consulting webpage interfaces enable digital consultation between home care and general practices and pharmacies. The webpages were considered convenient, clear, easy, and usable. By employing an HCD approach, the eHOME-instrument was found to be an easy-to-use system. The systematic approach promises a valuable contribution for the future development of digital mobile systems of paper-based tools. ©Nienke Elske Dijkstra, Carolina Geertruida Maria Sino, Eibert Rob Heerdink, Marieke Joanna Schuurmans. Originally published in JMIR Human Factors (http://humanfactors.jmir.org), 07.03.2018.
Code of Federal Regulations, 2011 CFR
2011-01-01
... written request for a home purchase loan, a home improvement loan, or a refinancing that is made in... institution as a home improvement loan. (h) Home purchase loan means a loan secured by and made for the... Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM HOME MORTGAGE DISCLOSURE...
Code of Federal Regulations, 2010 CFR
2010-01-01
... written request for a home purchase loan, a home improvement loan, or a refinancing that is made in... institution as a home improvement loan. (h) Home purchase loan means a loan secured by and made for the... Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM HOME MORTGAGE DISCLOSURE...
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2015-09-01
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
12 CFR 701.21 - Loans to members and lines of credit to members.
Code of Federal Regulations, 2010 CFR
2010-01-01
... credit. A credit union may advance money to a member to cover an account deficit without having a credit... exceeding the 15 percent per year rate, if it determines money market interest rates have risen over the... loan to finance the purchase of a mobile home if the mobile home will be used as the member-borrower's...
12 CFR 701.21 - Loans to members and lines of credit to members.
Code of Federal Regulations, 2013 CFR
2013-01-01
... the decision to make a loan or establish a line of credit. A credit union may advance money to a... determines money market interest rates have risen over the preceding six-month period and prevailing interest... loan to finance the purchase of a mobile home if the mobile home will be used as the member-borrower's...
12 CFR 701.21 - Loans to members and lines of credit to members.
Code of Federal Regulations, 2011 CFR
2011-01-01
... credit. A credit union may advance money to a member to cover an account deficit without having a credit... exceeding the 15 percent per year rate, if it determines money market interest rates have risen over the... loan to finance the purchase of a mobile home if the mobile home will be used as the member-borrower's...
12 CFR 701.21 - Loans to members and lines of credit to members.
Code of Federal Regulations, 2014 CFR
2014-01-01
... the decision to make a loan or establish a line of credit. A credit union may advance money to a... determines money market interest rates have risen over the preceding six-month period and prevailing interest... loan to finance the purchase of a mobile home if the mobile home will be used as the member-borrower's...
12 CFR 701.21 - Loans to members and lines of credit to members.
Code of Federal Regulations, 2012 CFR
2012-01-01
... credit. A credit union may advance money to a member to cover an account deficit without having a credit... exceeding the 15 percent per year rate, if it determines money market interest rates have risen over the... loan to finance the purchase of a mobile home if the mobile home will be used as the member-borrower's...
Moving the Nest: The Impact of Coresidential Children on Mobility in Later Midlife
ERIC Educational Resources Information Center
Bures, Regina M.
2009-01-01
Using data from the 1992-2000 waves of the Health and Retirement Study, this article examines the relationship between the presence and age of children in the home and parental mobility in midlife. Although a substantial literature evaluates the factors affecting the timing of children leaving (and returning) home, less attention has been paid to…
This report documents the activities performed for and the results obtained from the first six months of the arsenic removal treatment technology demonstration project at the Chateau Estates Mobile Home Park at Springfield, OH. The objectives of the project are to evaluate the ef...
This report documents the activities performed and the results obtained from the first six months of the arsenic removal treatment technology demonstration project at the Big Sauk Lake Mobile Home Park (BSLMHP) in Sauk Centre, MN. The objectives of the project are to evaluate the...
This report documents the activities performed during and the results obtained from the first six months of the arsenic removal treatment technology demonstration project at the Spring Brook Mobile Home Park in Wales, ME. The objectives of the project are to evaluate the effectiv...
This report documents the activities performed and the results obtained for the arsenic removal treatment technology demonstration project at Spring Brook Mobile Home Park (SBMHP) in Wales, Maine. The objectives of the project were to evaluate: 1) the effectiveness of an arsenic...
This report documents the activities performed for and the results obtained from the first six months of the arsenic removal treatment technology demonstration project at the Chateau Estates Mobile Home Park at Springfield, OH. The objectives of the project are to evaluate the ef...
ERIC Educational Resources Information Center
Engdahl, Lora
2009-01-01
In the Baltimore region, a successful housing mobility program is providing families living in very disadvantaged inner city communities with a new home and a chance for a new life. Minority voucher holders in the federal Housing Choice Voucher Program (formerly titled Section 8) have often been limited to living in "voucher submarkets"…
Code of Federal Regulations, 2010 CFR
2010-07-01
....200 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES TRANSPORTATION AND STORAGE OF PROPERTY 10-ALLOWANCES FOR TRANSPORTATION OF MOBILE HOMES AND BOATS USED AS A...: (1) Fuel and oil used for propulsion of the boat; (2) Pilots or navigators in the open water; (3) A...
Home security system using internet of things
NASA Astrophysics Data System (ADS)
Anitha, A.
2017-11-01
IoT refers to the infrastructure of connected physical devices which is growing at a rapid rate as huge number of devices and objects are getting associated to the Internet. Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontroller known as Arduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.
mCare: using secure mobile technology to support soldier reintegration and rehabilitation.
Poropatich, Ronald K; Pavliscsak, Holly H; Tong, James C; Little, Jeanette R; McVeigh, Francis L
2014-06-01
The U.S. Army Medical Department conducted a pilot mobile health project to determine the requirements for coordination of care for "Wounded Warriors" using mobile messaging. The primary objective was to determine if a secure mobile health (mhealth) intervention provided to geographically dispersed patients would improve contact rates and positively impact the military healthcare system. Over 21 months, volunteers enrolled in a Health Insurance Portability and Accountability Act-compliant, secure mobile messaging initiative called mCare. The study included males and females, 18-61 years old, with a minimum of 60 days of outpatient recovery. Volunteers were required to have a compatible phone. The mhealth intervention included appointment reminders, health and wellness tips, announcements, and other relevant information to this population exchanged between care teams and patients. Provider respondents reported that 85% would refer patients to mCare, and 56% noted improvement in appointment attendance (n=90). Patient responses also revealed high acceptability of mCare and refined the frequency and delivery times (n=114). The pilot project resulted in over 84,000 outbound messages and improved contact rates by 176%. The mCare pilot project demonstrated the feasibility and administrative effectiveness of a scalable mhealth application using secure mobile messaging and information exchanges, including personalized patient education.
Smartphone and mobile phone security for the clinician.
Barber, Harry
2016-08-02
Smartphones are near ubiquitous and widely used by doctors in discussing patients. In all communication doctors should take steps to protect confidentiality, yet there is a paucity of available information on how clinicians can bolster cyber security and minimize risk when using their mobile phone.
Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)
Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products
Huang, Fanpin; Chang, Polun; Hou, I-Ching; Tu, Ming-Hsiang; Lan, Chung-Fu
2015-01-01
Long-term-care comprehensive geriatric assessments, such as the Minimum Data Set 3.0, are used to evaluate the clinical, psychological, and personal status of residents in long-term-care nursing facilities. Nursing staff conducts assessment interviews, thereby increasing the workload of nurses and the cost of patient care. This study explored the ability of nursing home residents to use two different mobile devices for a geriatric self-assessment. Study participants were residents of long-term-care nursing homes. A modified Minimum Data Set 3.0 was converted to a format for use with a 6-inch mobile pad and a 3.7-inch mobile smartphone. The survey completion rate and the response time were measured. A Technology Assessment Model questionnaire analyzed the participants' experience. All participants were able to use a 6-inch pad, with an average completion rate of 92.9% and an average time for completion of 21 minutes. Only 20% of the participants could complete the assessment with the 3.7-inch smartphone. The participants found the 6-inch pad easier to use than the 3.7-inch smartphone. This exploratory study suggests that nursing home residents are able to use a mobile device to perform a geriatric self-assessment and delineates the importance of the ergonomics of the device.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Paulsen, Phillip E.
2004-01-01
The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and mitigation of potential equipment malfunctions. As an additional benefit, team advancements were incorporated into open standards, ensuring technology transfer. Low-cost, commercial products incorporating the new technology are already available. Furthermore, these products are fully interoperable with legacy network technology equipment currently being used throughout the world.
Manufactured Housing--The Modular Home in Texas.
ERIC Educational Resources Information Center
Sindt, Roger P.
This report deals principally with modular homes (permanently sited structures) although it also presents some recent information on mobile homes. In 1976, modular home construction companies were surveyed in Texas and across the United States to assess the extent of their construction activity and market penetration and to gather some insight…
The sense of security in care--Relatives' Evaluation instrument: its development and presentation.
Krevers, Barbro; Milberg, Anna
2015-03-01
Relatives' sense of security in their family members' palliative home care is important, and a valid and reliable instrument is needed to measure this. The aim of this article is to report the development, structure, and psychometric properties of a new instrument, the Sense of Security in Care--Relatives' Evaluation (SEC-R), in palliative home care. Instrument development was based on a previous study and review of the literature; 213 relatives (55% women) of patients in palliative home care were recruited (response rate 73%) and participated in a structured interview based on a questionnaire. Principal component analysis (PCA) was used to identify subscales. The construction was tested in correlation with other scales and questions representing concepts expected to be related to sense of security in care. The PCA resulted in three subscales, namely care interaction, mastery and patient situation, which had an explained variance of 53%. Internal consistency of the subscales ranged from 0.76 to 0.78. The final instrument comprises 17 items. The scales were associated with the quality-of-care process and the relatives' situation, perceived health, quality of life, stress, general sense of security, and general sense of security in care. The SEC-R provides a three-component assessment of palliative home care settings using valid and reliable scales associated with other concepts. The SEC-R is a manageable means of assessment that may contribute to quality-of-care measures and to further research on relatives' sense of security in care. Copyright © 2015 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.
Telemedicine in Neonatal Home Care: Identifying Parental Needs Through Participatory Design.
Garne, Kristina; Brødsgaard, Anne; Zachariassen, Gitte; Clemensen, Jane
2016-07-08
For the majority of preterm infants, the last weeks of hospital admission mainly concerns tube feeding and establishment of breastfeeding. Neonatal home care (NH) was developed to allow infants to remain at home for tube feeding and establishment of breastfeeding with regular home visits from neonatal nurses. For hospitals covering large regions, home visits may be challenging, time consuming, and expensive and alternative approaches must be explored. To identify parental needs when wanting to provide neonatal home care supported by telemedicine. The study used participatory design and qualitative methods. Data were collected from observational studies, individual interviews, and focus group interviews. Two neonatal units participated. One unit was experienced in providing neonatal home care with home visits, and the other planned to offer neonatal home care with telemedicine support. A total of 9 parents with preterm infants assigned to a neonatal home care program and 10 parents with preterm infants admitted to a neonatal unit participated in individual interviews and focus group interviews, respectively. Three overall themes were identified: being a family, parent self-efficacy, and nurse-provided security. Parents expressed desire for the following: (1) a telemedicine device to serve as a "bell cord" to the neonatal unit, giving 24-hour access to nurses, (2) video-conferencing to provide security at home, (3) timely written email communication with the neonatal unit, and (4) an online knowledge base on preterm infant care, breastfeeding, and nutrition. Our findings highlight the importance of neonatal home care. NH provides parents with a feeling of being a family, supports their self-efficacy, and gives them a feeling of security when combined with nursing guidance. Parents did not request hands-on support for infant care, but instead expressed a need for communication and guidance, which could be met using telemedicine.
Daily mood and out-of-home mobility in older adults: does cognitive impairment matter?
Kaspar, Roman; Oswald, Frank; Wahl, Hans-Werner; Voss, Elke; Wettstein, Markus
2015-02-01
This study explores the relationship between out-of-home behavior and daily mood of community-dwelling older adults with different levels of cognitive impairment across four consecutive weeks. The sample included 16 persons with early stage Alzheimer's disease (AD), 30 persons with mild cognitive impairment (MCI), and 95 cognitively healthy persons (CH). Using a multi-method approach, GPS tracking and daily-diary data were combined on a day-to-day basis. AD and MCI adults showed lower mood than the CH group. Whereas stronger positive links between mood and out-of-home behavior were found for AD compared to the total sample on an aggregate level, predicting daily mood by person (i.e., cognition) and occasion-specific characteristics (i.e., mobility and weekday), using multilevel regression analysis revealed no corresponding effect. In conclusion, cognitive status in old age appears to impact on mobility and mood as such, rather than on the mood and out-of-home behavior connection. © The Author(s) 2012.
20 CFR 416.428 - Eligible individual without an eligible spouse has an essential person in his home.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Eligible individual without an eligible spouse has an essential person in his home. 416.428 Section 416.428 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.428...
20 CFR 416.428 - Eligible individual without an eligible spouse has an essential person in his home.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Eligible individual without an eligible spouse has an essential person in his home. 416.428 Section 416.428 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.428...
20 CFR 416.428 - Eligible individual without an eligible spouse has an essential person in his home.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Eligible individual without an eligible spouse has an essential person in his home. 416.428 Section 416.428 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.428...
20 CFR 416.428 - Eligible individual without an eligible spouse has an essential person in his home.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Eligible individual without an eligible spouse has an essential person in his home. 416.428 Section 416.428 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.428...
20 CFR 416.428 - Eligible individual without an eligible spouse has an essential person in his home.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Eligible individual without an eligible spouse has an essential person in his home. 416.428 Section 416.428 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.428...
Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.
Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon
2016-06-01
Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.
Towards a virtual health record for mobile home care of elderly citizens.
Koch, Sabine; Hägglund, Maria; Scandurra, Isabella; Moström, Dennis
2004-01-01
Mobile work situations within home care of the elderly require immediate and ubiquitous access to patient-oriented data. The ongoing Swedish research project "Technical support for Mobile CloseCare" focuses on the development and evaluation of work-scenario oriented ICT support for enhanced home care of elderly citizens. The aim of the project is to provide a seamless and consistent information flow between different health care providers and to give intuitive access to information services for the elderly and their relatives. For that purpose, different independent software components are connected through a mobile communication platform. Flexible access to prioritized information for different users in different work situations will be given through a virtual health record. In order to obtain both usable and clinically relevant results, a user centered system development approach is followed. Evaluation of the project results will be based on usability tests and quasi-experimental studies on how system implementation influences quality of care and job- and life satisfaction for care providers, patients and relatives.
School Security and Crisis Preparedness: Make It Your Business.
ERIC Educational Resources Information Center
Trump, Kenneth S.
1999-01-01
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mumford, J.L.; Burton, R.M.; Svendsgaard, D.J.
1991-10-01
This study assessed human exposure to air pollutants from unvented kerosene heaters in mobile homes. Eight electric homes with no smokers were monitored for airborne particles of < 10 {mu}m in diameter (PM{sub 10}), semivolatile organics, and carbon monoxide with the kerosene heaters on and off. The organic emissions were assayed for polycyclic aromatic hydrocarbon (PAH), nitro-PAH, and for mutagenicity in a Salmonella typhimurium reverse mutation assay. Usage of kerosene heaters resulted in (a) a significant increase in CO and organic levels (including carcinogenic PAH and nitro-PAH), (b) no significant effect on PM{sub 10} levels, except in two homes, (c)more » the presence of unburned kerosene fuel, (d) an increase in mutagenicity (in TA98) of particle-phase organics in five homes, and (e) little mutagenicity in the semivolatile organics in TA98 and TA100. Four of the eight heaters investigated emitted pollutants that exceeded the US ambient air standards for the 24-h PM{sub 10} standard and/or CO standards (the 1-h peak or 8-h average standard). This study showed that kerosene heater emissions can significantly impact indoor air quality in mobile homes.« less
Burns in mobile home fires--descriptive study at a regional burn center.
Mullins, Robert F; Alarm, Badrul; Huq Mian, Mohammad Anwarul; Samples, Jancie M; Friedman, Bruce C; Shaver, Joseph R; Brandigi, Claus; Hassan, Zaheed
2009-01-01
Death from fires and burns are the sixth most common cause of unintentional injury death in the United States. More than (3/4) of burn deaths occurring in the United States are in the home. Mobile home fires carry twice the death rate as other dwellings. The aim of the study was to describe the characteristics of deaths and injuries in mobile home fire admitted in a regional Burn Center and to identify possible risk factors. A cross-sectional retrospective study was carried out among all burn patients admitted to a regional Burn Center between January 2002 and December 2004 (3469 patients). The study included patients who suffered a burn injury from a mobile home fire. The demographic characteristics of the patients, location of mobile home, associated inhalation injury, source of fire, comorbidity of the victims, employment status, insurance status, family history of burns, and outcomes of the treatment were incorporated in a data collection record. There were 65 burn patients in mobile home fires admitted to the Burn Center during the studied period. The average age of the patients was 39 years (ranging from 2 to 81 years, SD=16.06), 77% were male, 67% were white, and 79% were the residents in the suburban areas of Georgia, South Carolina, North Carolina, and Florida. The average TBSA of burns was about 21% (ranging from 1 to 63%, SD=17.66), 63% of the patients had associated inhalation, three inhalation injury only, and 69% patients required ventilator support. The average length of stay per TBSA percentage of burn was 1.01 days (P=0.00), controlling for age, preexisting medical comorbidities, and inhalation injury. About 88% of the patients had preexisting medical comorbid conditions, 74% were smokers, 64% reported as alcoholic, and 72% had at least some form of health insurance coverage. In 40% of the cases, the cause of the fire was unknown, 31% were caused by accidental explosions, such as electric, gasoline, or kerosene appliances, and 29% were due to other causes. About 40% of burns took place between December and February. Among the studied cohorts, 32% were unemployed, 15% were disabled, and 14% did not have any information about their employment status. One in every four patients had a family history of a burn. Eight (12%) died in the hospital during treatment. There was a higher prevalence of inhalation injury and higher case fatality among the burn patients in mobile home fires compared with the statistics of the Burn Center. Observation showed a higher number of smokers and alcoholics among the burn patients. The main sources of fire were from home appliances. Fewer people had health insurance coverage than the national standard and more people suffered from some sort of chronic illness compared with the national morbidity data.
Time Delay Measurements of Key Generation Process on Smart Cards
2015-03-01
random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase
2015-06-01
words) Attempting different approaches to explore the best practice of optimizing mobile security and productivity is necessary to improve the...INTENTIONALLY LEFT BLANK iv ABSTRACT Attempting different approaches to explore the best practice of optimizing mobile security and productivity is...incredible kindness and unfathomable generosity. I am grateful to have watched Super Bowl XLIX in your living room, washed dirty clothes in your laundry room
This report documents the activities performed and the results obtained from the one-year arsenic removal treatment technology demonstration project at the Big Sauk Lake Mobile Home Park (BSLMHP) in Sauk Centre, MN. The objectives of the project are to evaluate (1) the effective...
Portegijs, Erja; Rantakokko, Merja; Viljanen, Anne; Rantanen, Taina; Iwarsson, Susanne
We studied whether entrance-related environmental barriers, perceived and objectively recorded, were associated with moving out-of-home daily in older people with and without limitations in lower extremity performance. Cross-sectional analyses of the "Life-space mobility in old age" cohort including 848 community-dwelling 75-90-year-old of central Finland. Participants reported their frequency of moving out-of-home (daily vs. 0-6 times/week) and perceived entrance-related environmental barriers (yes/no). Lower extremity performance was assessed (Short Physical Performance Battery) and categorized as poorer (score 0-9) or good (score 10-12). Environmental barriers at entrances and in exterior surroundings were objectively registered (Housing Enabler screening tool) and divided into tertiles. Logistic regression analyses were adjusted for age, sex, number of chronic diseases, cognitive function, month of assessment, type of neighborhood, and years lived in the current home. At home entrances a median of 6 and in the exterior surroundings 5 environmental barriers were objectively recorded, and 20% of the participants perceived entrance-related barriers. The odds for moving out-of-home less than daily increased when participants perceived entrance-related barrier(s) or when they lived in homes with higher numbers of objectively recorded environmental barriers at entrances. Participants with limitations in lower extremity performance were more susceptible to these environmental barriers. Objectively recorded environmental barriers in the exterior surroundings did not compromise out-of-home mobility. Entrance-related environmental barriers may hinder community-dwelling older people to move out-of-home daily especially when their functional capacity is compromised. Potentially, reducing entrance-related barriers may help to prevent confinement to the home. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Childhood Family Structure and Intergenerational Income Mobility in the United States
2018-01-01
The declining prevalence of two-parent families helped increase income inequality over recent decades. Does family structure also condition how economic (dis)advantages pass from parents to children? If so, shifts in the organization of family life may contribute to enduring inequality between groups defined by childhood family structure. Using National Longitudinal Survey of Youth data, I combine parametric and nonparametric methods to reveal how family structure moderates intergenerational income mobility in the United States. I find that individuals raised outside stable two-parent homes are much more mobile than individuals from stable two-parent families. Mobility increases with the number of family transitions but does not vary with children’s time spent coresiding with both parents or stepparents conditional on a transition. However, this mobility indicates insecurity, not opportunity. Difficulties maintaining middle-class incomes create downward mobility among people raised outside stable two-parent homes. Regardless of parental income, these people are relatively likely to become low-income adults, reflecting a new form of perverse equality. People raised outside stable two-parent families are also less likely to become high-income adults than people from stable two-parent homes. Mobility differences account for about one-quarter of family-structure inequalities in income at the bottom of the income distribution and more than one-third of these inequalities at the top. PMID:28315158
Klyachkin, Yuri M.; Karapetyan, Anush V.; Ratajczak, Mariusz Z.; Abdel-Latif, Ahmed
2014-01-01
Despite significant advances in medical therapy and interventional strategies, the prognosis of millions of patients with acute myocardial infarction (AMI) and ischemic heart disease (IHD) remains poor. Currently, short of heart transplantation with all of its inherit limitations, there are no available treatment strategies that replace the infarcted myocardium. It is now well established that cardiomyocytes undergo continuous renewal, with contribution from bone marrow (BM)-derived stem/progenitor cells (SPCs). This phenomenon is upregulated during AMI by initiating multiple innate reparatory mechanisms through which BMSPCs are mobilized towards the ischemic myocardium and contribute to myocardial regeneration. While a role for the SDF-1/CXCR4 axis in retention of BMSPCs in bone marrow is undisputed, its exclusive role in their mobilization and homing to a highly proteolytic microenvironment, such as the ischemic/infarcted myocardium, is currently being challenged. Recent evidence suggests a pivotal role for bioactive lipids in the mobilization of BMSPCs at the early stages following AMI and their homing towards ischemic myocardium. This review highlights the recent advances in our understanding of the mechanisms of stem cell mobilization, provides newer evidence implicating bioactive lipids in BMSPC mobilization and differentiation, and discusses their potential as therapeutic agents in the treatment of IHD. PMID:24672794
mHealth Clinic Appointment PC Tablet: Implementation, Challenges and Solutions
Smith, Carol E.; Spaulding, Ryan; Piamjariyakul, Ubolrat; Werkowitch, Marilyn; Yadrich, Donna Macan; Hooper, Dedrick; Moore, Tyson; Gilroy, Richard
2015-01-01
Background Patients requiring daily intravenous (IV) home parenteral nutrition (HPN) would benefit from in-home professional observation to improve self-care, to assess, detect and prevent serious complications. Aims The study aims are to assess the viability and utility of conducting mobile healthcare (mHealth) videoconference assessments with patients managing lifelong daily 12-hour IV nutrition infusions in their homes. The challenges and solutions to implementing mobile personal computer (PC) tablet based clinic appointments are described. Methods A wireless Apple iPad Mini™ mobile touch-screen tablet computer with 5 mega-pixel camera was loaned to patients. Each tablet had Polycom RealPresence software and a fourth generation (4G) mobile telecommunications data plan. These supported audio-visual mobile videoconferencing encrypted connections between health professionals in their offices and HPN patients and their family members in their homes. Patients’ and professionals’ evaluations of their mHealth clinic experiences are collected. Results Patients (mean age = 41.9, SD = 2.8 years) had been prescribed 12-hour home parenteral nutrition (HPN) infusions daily due short bowel disorders. Patients had been on HPN from 1 to 10 years (M=4, SD=3.6). Evaluation of clinic appointments revealed that 100% of the patients (n=45) and the professionals (n=6) indicated that they can clearly hear and easily see one another. The mHealth audio-visual interactions were highly rated by patients and family members. Professionals highly rated their ability to obtain a medical history and visual inspection of patients. Several challenges were identified and recommendations for resolutions are described. Discussion All patients and professionals highly rated the iPad mHealth clinic appointments for convenience and ease of communicating between homes and offices. An important challenge for all mHealth visits is the clinical professional’s ability to make clinically accurate judgments about what they observed and heard from the patients. Following our solutions for obtaining clear visuals with the iPad can improve ability to make clinical assessments. PMID:26604991
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology
Winata, Doni
2018-01-01
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Yohan, Alexander; Lo, Nai-Wei; Winata, Doni
2018-03-25
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
Immune Inspired Security Approach for Manets: a Case Study
NASA Astrophysics Data System (ADS)
Mohamed, Yasir Abdelgadir
2011-06-01
This paper extends the work that has earlier been established. Immune inspired approach for securing mobile ad hoc networks is specified there. Although it is clearly indicated there that the research scope is the wireless networks in general and hybrid mobile ad hoc networks in particular, we have seen that specifying the security system in one of the communications applications that need further security approach may help to understand how effectively the system can contribute to this vital and important networks sector. Security in this type of networks is important and controversial as it plays a key role in users' eagerness or reluctance for the services provided by these networks. In this paper, the immune inspired security system is specified to secure web services in converged networks.
... of mobility) Scarring after traumatic injury or burns Home Care Follow your health care provider's instructions for treating contracture at home. Treatments may include: Doing exercises and stretches Using ...
Work, family and daily mobility: a new approach to the problem through a mobility survey.
Olabarria, Marta; Pérez, Katherine; Santamariña-Rubio, Elena; Aragay, Josep Maria; Capdet, Mayte; Peiró, Rosana; Rodríguez-Sanz, Maica; Artazcoz, Lucía; Borrell, Carme
2013-01-01
To analyze gender inequalities in socioeconomic factors affecting the amount of time spent travelling for work-related and home-related reasons among working individuals aged between 30 and 44 years old during a weekday in Catalonia (Spain). A cross-sectional study was conducted. Data were obtained from employed individuals aged between 30 and 44 years of age who reported travelling on the day prior to the interview in the Catalan Mobility Survey 2006 (N = 23,424). Multivariate logistic regression models were adjusted to determine the factors associated with longer time spent travelling according to the reason for travelling (work- or home-related journeys). Odds ratios and 95% confidence intervals are presented. A higher proportion of men travelled and spent more time travelling for work-related reasons, while a higher proportion of women travelled and spend more time travelling for home-related reasons. A higher educational level was associated with greater time spent travelling for work-related reasons in both men and women but was related to an increase in travelling time for home-related reasons only in men. In women, a larger household was associated with greater travel time for home-related reasons and with less travel time for work-related reasons. This study confirms the different mobility patterns in men and women, related to their distinct positions in the occupational, family and domestic spheres. Gender inequalities in mobility within the working population are largely determined by the greater responsibility of women in the domestic and family sphere. This finding should be taken into account in the design of future transport policies. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage
Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-01-01
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query. PMID:29652810
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Guo, Yeting; Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-04-13
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330
Security analysis and improvement of an anonymous authentication scheme for roaming services.
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.
Kerckhoffs, Jules; Hoek, Gerard; Vlaanderen, Jelle; van Nunen, Erik; Messier, Kyle; Brunekreef, Bert; Gulliver, John; Vermeulen, Roel
2017-11-01
Land-use regression (LUR) models for ultrafine particles (UFP) and Black Carbon (BC) in urban areas have been developed using short-term stationary monitoring or mobile platforms in order to capture the high variability of these pollutants. However, little is known about the comparability of predictions of mobile and short-term stationary models and especially the validity of these models for assessing residential exposures and the robustness of model predictions developed in different campaigns. We used an electric car to collect mobile measurements (n = 5236 unique road segments) and short-term stationary measurements (3 × 30min, n = 240) of UFP and BC in three Dutch cities (Amsterdam, Utrecht, Maastricht) in 2014-2015. Predictions of LUR models based on mobile measurements were compared to (i) measured concentrations at the short-term stationary sites, (ii) LUR model predictions based on short-term stationary measurements at 1500 random addresses in the three cities, (iii) externally obtained home outdoor measurements (3 × 24h samples; n = 42) and (iv) predictions of a LUR model developed based upon a 2013 mobile campaign in two cities (Amsterdam, Rotterdam). Despite the poor model R 2 of 15%, the ability of mobile UFP models to predict measurements with longer averaging time increased substantially from 36% for short-term stationary measurements to 57% for home outdoor measurements. In contrast, the mobile BC model only predicted 14% of the variation in the short-term stationary sites and also 14% of the home outdoor sites. Models based upon mobile and short-term stationary monitoring provided fairly high correlated predictions of UFP concentrations at 1500 randomly selected addresses in the three Dutch cities (R 2 = 0.64). We found higher UFP predictions (of about 30%) based on mobile models opposed to short-term model predictions and home outdoor measurements with no clear geospatial patterns. The mobile model for UFP was stable over different settings as the model predicted concentration levels highly correlated to predictions made by a previously developed LUR model with another spatial extent and in a different year at the 1500 random addresses (R 2 = 0.80). In conclusion, mobile monitoring provided robust LUR models for UFP, valid to use in epidemiological studies. Copyright © 2017 Elsevier Inc. All rights reserved.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
Mobile Phone Messaging During Unobserved "Home" Induction to Buprenorphine.
Tofighi, Babak; Grossman, Ellie; Sherman, Scott; Nunes, Edward V; Lee, Joshua D
2016-01-01
The deployment of health information technologies promises to optimize clinical outcomes for populations with substance use disorders. Electronic health records, web-based counseling interventions, and mobile phone applications enhance the delivery of evidence-based behavioral and pharmacological treatments, with minimal burden to clinical personnel, infrastructure, and work flows. This clinical case shares a recent experience utilizing mobile phone text messaging between an office-based buprenorphine provider in a safety net ambulatory clinic and a patient seeking buprenorphine treatment for opioid use disorder. The case highlights the use of text message-based physician-patient communication to facilitate unobserved "home" induction onto buprenorphine.
Sherrington, Catherine; Lord, Stephen R.; Vogler, Constance M.; Close, Jacqueline C. T.; Howard, Kirsten; Dean, Catherine M.; Heller, Gillian Z.; Clemson, Lindy; O'Rourke, Sandra D.; Ramsay, Elisabeth; Barraclough, Elizabeth; Herbert, Robert D.; Cumming, Robert G.
2014-01-01
Background Home exercise can prevent falls in the general older community but its impact in people recently discharged from hospital is not known. The study aimed to investigate the effects of a home-based exercise program on falls and mobility among people recently discharged from hospital. Methods and Findings This randomised controlled trial (ACTRN12607000563460) was conducted among 340 older people. Intervention group participants (n = 171) were asked to exercise at home for 15–20 minutes up to 6 times weekly for 12 months. The control group (n = 169) received usual care. Primary outcomes were rate of falls (assessed over 12 months using monthly calendars), performance-based mobility (Lower Extremity Summary Performance Score, range 0–3, at baseline and 12 months, assessor unaware of group allocation) and self-reported ease of mobility task performance (range 0–40, assessed with 12 monthly questionaries). Participants had an average age of 81.2 years (SD 8.0) and 70% had fallen in the past year. Complete primary outcome data were obtained for at least 92% of randomised participants. Participants in the intervention group reported more falls than the control group (177 falls versus 123 falls) during the 12-month study period and this difference was statistically significant (incidence rate ratio 1.43, 95% CI 1.07 to 1.93, p = 0.017). At 12-months, performance-based mobility had improved significantly more in the intervention group than in the control group (between-group difference adjusted for baseline performance 0.13, 95% CI 0.04 to 0.21, p = 0.004). Self-reported ease in undertaking mobility tasks over the 12-month period was not significantly different between the groups (0.49, 95% CI −0.91 to 1.90, p = 0.488). Conclusions An individualised home exercise prescription significantly improved performance-based mobility but significantly increased the rate of falls in older people recently discharged from hospital. Trial Registration Australian New Zealand Clinical Trials Registry ACTRN12607000563460 PMID:25180702
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Secure Military Communications on 3G, 4G and WiMAX
2013-09-01
per bit, low latency, good quality of service, good coverage and support for mobility at high speeds. Thus, 4G wireless technologies are based on 3G ...security for military communications. 87 LIST OF REFERENCES [1] C. Blanchard, “Security for the third generation ( 3G ) mobile system,” Elsevier Science...COMMUNICATIONS ON 3G , 4G AND WIMAX by Panagiotis Schoinas September 2013 Thesis Advisor: Gurminder Singh Co-Advisor: John H. Gibson
[Data security and the handling of patient data in home monitoring systems].
Heydenreich, F; Jürgens, C; Tost, F
2009-09-01
Data security must be considered seriously in the context of telemedical home monitoring because of the transmission and communication of patients' personal data. The contract governing medical treatment allows the ophthalmologist to process all data relevant to treatment. In Germany the legal framework for this purpose is provided by the Data Protection Act, various German hospital acts, and codes of medical professional conduct. In principle, these rules apply to telemedical home monitoring as well as to common physician-patient relationships. The patient must be informed extensively in an understandable manner and must give his or her written consent. However, the advanced options of new IT technologies demand the development of technical and organizational concepts that guarantee compliance with legal and regulatory affairs, assure data security, and prevent data abuse.
Home Telehealth Video Conferencing: Perceptions and Performance
Morris, Greg; Pech, Joanne; Rechter, Stuart; Carati, Colin; Kidd, Michael R
2015-01-01
Background The Flinders Telehealth in the Home trial (FTH trial), conducted in South Australia, was an action research initiative to test and evaluate the inclusion of telehealth services and broadband access technologies for palliative care patients living in the community and home-based rehabilitation services for the elderly at home. Telehealth services at home were supported by video conferencing between a therapist, nurse or doctor, and a patient using the iPad tablet. Objective The aims of this study are to identify which technical factors influence the quality of video conferencing in the home setting and to assess the impact of these factors on the clinical perceptions and acceptance of video conferencing for health care delivery into the home. Finally, we aim to identify any relationships between technical factors and clinical acceptance of this technology. Methods An action research process developed several quantitative and qualitative procedures during the FTH trial to investigate technology performance and users perceptions of the technology including measurements of signal power, data transmission throughput, objective assessment of user perceptions of videoconference quality, and questionnaires administered to clinical users. Results The effectiveness of telehealth was judged by clinicians as equivalent to or better than a home visit on 192 (71.6%, 192/268) occasions, and clinicians rated the experience of conducting a telehealth session compared with a home visit as equivalent or better in 90.3% (489/540) of the sessions. It was found that the quality of video conferencing when using a third generation mobile data service (3G) in comparison to broadband fiber-based services was concerning as 23.5% (220/936) of the calls failed during the telehealth sessions. The experimental field tests indicated that video conferencing audio and video quality was worse when using mobile data services compared with fiber to the home services. As well, statistically significant associations were found between audio/video quality and patient comfort with the technology as well as the clinician ratings for effectiveness of telehealth. Conclusions These results showed that the quality of video conferencing when using 3G-based mobile data services instead of broadband fiber-based services was less due to failed calls, audio/ video jitter, and video pixilation during the telehealth sessions. Nevertheless, clinicians felt able to deliver effective services to patients at home using 3G-based mobile data services. PMID:26381104
Development of a Smart Mobile Data Module for Fetal Monitoring in E-Healthcare.
Houzé de l'Aulnoit, Agathe; Boudet, Samuel; Génin, Michaël; Gautier, Pierre-François; Schiro, Jessica; Houzé de l'Aulnoit, Denis; Beuscart, Régis
2018-03-23
The fetal heart rate (FHR) is a marker of fetal well-being in utero (when monitoring maternal and/or fetal pathologies) and during labor. Here, we developed a smart mobile data module for the remote acquisition and transmission (via a Wi-Fi or 4G connection) of FHR recordings, together with a web-based viewer for displaying the FHR datasets on a computer, smartphone or tablet. In order to define the features required by users, we modelled the fetal monitoring procedure (in home and hospital settings) via semi-structured interviews with midwives and obstetricians. Using this information, we developed a mobile data transfer module based on a Raspberry Pi. When connected to a standalone fetal monitor, the module acquires the FHR signal and sends it (via a Wi-Fi or a 3G/4G mobile internet connection) to a secure server within our hospital information system. The archived, digitized signal data are linked to the patient's electronic medical records. An HTML5/JavaScript web viewer converts the digitized FHR data into easily readable and interpretable graphs for viewing on a computer (running Windows, Linux or MacOS) or a mobile device (running Android, iOS or Windows Phone OS). The data can be viewed in real time or offline. The application includes tools required for correct interpretation of the data (signal loss calculation, scale adjustment, and precise measurements of the signal's characteristics). We performed a proof-of-concept case study of the transmission, reception and visualization of FHR data for a pregnant woman at 30 weeks of amenorrhea. She was hospitalized in the pregnancy assessment unit and FHR data were acquired three times a day with a Philips Avalon® FM30 fetal monitor. The prototype (Raspberry Pi) was connected to the fetal monitor's RS232 port. The emission and reception of prerecorded signals were tested and the web server correctly received the signals, and the FHR recording was visualized in real time on a computer, a tablet and smartphones (running Android and iOS) via the web viewer. This process did not perturb the hospital's computer network. There was no data delay or loss during a 60-min test. The web viewer was tested successfully in the various usage situations. The system was as user-friendly as expected, and enabled rapid, secure archiving. We have developed a system for the acquisition, transmission, recording and visualization of RCF data. Healthcare professionals can view the FHR data remotely on their computer, tablet or smartphone. Integration of FHR data into a hospital information system enables optimal, secure, long-term data archiving.
O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi
2017-08-01
Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.
McFarlane, Elizabeth; Burrell, Lori; Crowne, Sarah; Cluxton-Keller, Fallon; Fuddy, Loretta; Leaf, Philip J; Duggan, Anne
2013-02-01
There is variability in home visiting program impacts on the outcomes achieved by high risk families. An understanding of how effects vary among families is important for refining service targeting and content. The current study assessed whether and how maternal attributes, including relationship security, moderate short- and long-term home visiting impacts on maternal psychosocial functioning. In this multisite RCT of home visiting in a population-based, ethnically-diverse sample of families at risk for maltreatment of their newborns (n = 643), families were randomly assigned to home visited (HV) and control groups. HV families were to receive intensive services by trained paraprofessionals from birth-3 years. Outcome data were collected when children were 1, 2, and 3 years old and 7, 8, and 9 years old. Overall, short- and long-term outcomes for HV and control mothers did not differ significantly. Demographic attributes, a general measure of overall maternal risk, and partner violence did not moderate program impact on psychosocial functioning outcomes. Maternal relationship security did moderate program impact. Mothers who scored high on relationship anxiety but not on relationship avoidance showed the greatest benefits, particularly at the long-term follow-up. Mothers scoring high for both relationship anxiety and avoidance experienced some adverse consequences of home visiting. Further research is needed to determine mediating pathways and to inform and test ways to improve the targeting of home visiting and the tailoring of home visit service models to extend positive home visiting impacts to targeted families not benefiting from current models.
Global Security Sciences Home - Global Security Sciences
Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
Benizri, F; Balladur, E; Darse, J; Guérin, J; Boudy, V; Echard, M; Brodin, M; Hagenmüller, J B; Prognon, P; Bonan, B
2010-09-01
While home-based chemotherapy improves comfort and quality of life of patients, quality and safety conditions must be equivalent to hospital settings. In addition, organization is much more complex. At the hospital at home "Assistance publique-Hôpitaux de Paris", prescribers are potentially spread across 21 health facilities. The administration of chemotherapy is performed by about 300 nurses at the patient's home in Paris and its suburbs. Centralized preparations of chemotherapy began in September 2009 by the pharmacy department of Georges-Pompidou European hospital, with a progressive increase of the activity. This article describes the quality insurance system established with this new organization to meet the specific challenges of home therapy: choice of eligible anticancer drugs, computerized information systems and networking with other heath facilities, secure transport conditions, traceability from the prescription to the administration, security of administration. This experience can offer an important support for other centres in their approach of quality insurance for home chemotherapy.
Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility †
Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao
2016-01-01
Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination’s home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination’s home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609
77 FR 35336 - Privacy and Security of Information Stored on Mobile Communications Devices
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
.... ACTION: Proposed rule. SUMMARY: This document seeks comment on the privacy and data security practices of... Practice and Procedure and Part 0 Rules of Commission Organization, Notice of Proposed Rulemaking, 25 FCC... practices of mobile wireless service providers with respect to customer information stored on their users...
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-12-17
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
2015-01-01
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409
Sarmento, Vera P; Gysels, Marjolein; Higginson, Irene J; Gomes, Barbara
2017-12-01
To understand patients and family caregivers' experiences with home palliative care services, in order to identify, explore and integrate the key components of care that shape the experiences of service users. We performed a meta-ethnography of qualitative evidence following PRISMA recommendations for reporting systematic reviews. The studies were retrieved in 5 electronic databases (MEDLINE, EMBASE, PsycInfo, BNI, CINAHL) using 3 terms and its equivalents ('Palliative', 'Home care', 'Qualitative research') combined with 'AND', complemented with other search strategies. We included original qualitative studies exploring experiences of adult patients and/or their family caregivers (≥18 years) facing life-limiting diseases with palliative care needs, being cared for at home by specialist or intermediate home palliative care services. 28 papers reporting 19 studies were included, with 814 participants. Of these, 765 were family caregivers and 90% were affected by advanced cancer. According to participants' accounts, there are 2 overarching components of home palliative care: presence (24/7 availability and home visits) and competence (effective symptom control and skilful communication), contributing to meet the core need for security. Feeling secure is central to the benefits experienced with each component, allowing patients and family caregivers to focus on the dual process of living life and preparing death at home. Home palliative care teams improve patients and caregivers experience of security when facing life-limiting illnesses at home, by providing competent care and being present. These teams should therefore be widely available and empowered with the resources to be present and provide competent care. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Designing a social and assistive robot for seniors.
Eftring, H; Frennert, S
2016-06-01
The development of social assistive robots is an approach with the intention of preventing and detecting falls among seniors. There is a need for a relatively low-cost mobile robot with an arm and a gripper which is small enough to navigate through private homes. User requirements of a social assistive robot were collected using workshops, a questionnaire and interviews. Two prototype versions of a robot were designed, developed and tested by senior citizens (n = 49) in laboratory trials for 2 h each and in the private homes of elderly persons (n = 18) for 3 weeks each. The user requirement analysis resulted in a specification of tasks the robot should be able to do to prevent and detect falls. It was a challenge but possible to design and develop a robot where both the senior and the robot arm could reach the necessary interaction points of the robot. The seniors experienced the robot as happy and friendly. They wanted the robot to be narrower so it could pass through narrow passages in the home and they also wanted it to be able to pass over thresholds without using ramps and to drive over carpets. User trials in seniors' homes are very important to acquire relevant knowledge for developing robots that can handle real life situations in the domestic environment. Very high reliability of a robot is needed to get feedback about how seniors experience the overall behavior of the robot and to find out if the robot could reduce falls and improve the feeling of security for seniors living alone.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pigg, Scott; Cautley, Dan; Francisco, Paul
2014-09-01
This report summarizes findings from a national field study of indoor air quality parameters in homes treated under the Weatherization Assistance Program (WAP). The study involved testing and monitoring in 514 single-family homes (including mobile homes) located in 35 states and served by 88 local weatherization agencies.
Interrogating medical tourism: Ireland, abortion, and mobility rights.
Gilmartin, Mary; White, Allen
2011-01-01
Medical tourism in Ireland, like in many Western states, is built around assumptions about individual agency, choice, possibility, and mobility. One specific form of medical tourism—the flow of women from Ireland traveling in order to secure an abortion—disrupts and contradicts these assumptions. One legacy of the bitter, contentious political and legal battles surrounding abortion in Ireland in the 1980s and 1990s has been securing the right of mobility for all pregnant Irish citizens to cross international borders to secure an abortion. However, these mobility rights are contingent upon nationality, social class, and race, and they have enabled successive Irish governments to avoid any responsibility for providing safe, legal, and affordable abortion services in Ireland. Nearly twenty years after the X case discussed here, the pregnant female body moving over international borders—entering and leaving the state—is still interpreted as problematic and threatening to the Irish state.
Richardson, Joshua E.; Ancker, Jessica S.
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246
Richardson, Joshua E; Ancker, Jessica S
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.
Handedness helps homing in swimming and flying animals.
Bandyopadhyay, Promode R; Leinhos, Henry A; Hellum, Aren M
2013-01-01
Swimming and flying animals rely on their ability to home on mobile targets. In some fish, physiological handedness and homing correlate, and dolphins exhibit handedness in their listening response. Here, we explore theoretically whether the actuators, sensors, and controllers in these animals follow similar laws of self-regulation, and how handedness affects homing. We find that the acoustic sensor (combined hydrophone-accelerometer) response maps are similar to fin force maps-modeled by Stuart-Landau oscillators-allowing localization by transitional vortex-propelled animals. The planar trajectories of bats in a room filled with obstacles are approximately reproduced by the states of a pair of strong and weak olivo-cerebellar oscillators. The stereoscopy of handedness reduces ambiguity near a mobile target, resulting in accelerated homing compared to even-handedness. Our results demonstrate how vortex-propelled animals may be localizing each other and circumventing obstacles in changing environments. Handedness could be useful in time-critical robot-assisted rescues in hazardous environments.
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
Photonic sensor applications in transportation security
NASA Astrophysics Data System (ADS)
Krohn, David A.
2007-09-01
There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.
Neurology diagnostics security and terminal adaptation for PocketNeuro project.
Chemak, C; Bouhlel, M-S; Lapayre, J-C
2008-09-01
This paper presents new approaches of medical information security and terminal mobile phone adaptation for the PocketNeuro project. The latter term refers to a project created for the management of neurological diseases. It consists of transmitting information about patients ("desk of patients") to a doctor's mobile phone during a visit and examination of a patient. These new approaches for the PocketNeuro project were analyzed in terms of medical information security and adaptation of the diagnostic images to the doctor's mobile phone. Images were extracted from a DICOM library. Matlab and its library were used as software to test our approaches and to validate our results. Experiments performed on a database of 30 256 x 256 pixel-sized neuronal medical images indicated that our new approaches for PocketNeuro project are valid and support plans for large-scale studies between French and Swiss hospitals using secured connections.
1983-03-01
have both a Federal and a State mission. The State mission is to provide protection of life and property and to preserve peace and public safety. The...logistics system is basically the same and will be integrated into the active system in wartime. Financial man- agement support consists of financial...the entire system is security. ErS is on contract to furnish basic security as well as a higher type of security known as the enhanced version
12 CFR 160.35 - Adjustments to home loans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Adjustments to home loans. 160.35 Section 160.35 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY LENDING AND INVESTMENT § 160.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Adjustments to home loans. 560.35 Section 560.35... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 160.35 - Adjustments to home loans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Adjustments to home loans. 160.35 Section 160.35 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY LENDING AND INVESTMENT § 160.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Adjustments to home loans. 560.35 Section 560.35... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 160.35 - Adjustments to home loans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Adjustments to home loans. 160.35 Section 160.35 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY LENDING AND INVESTMENT § 160.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
...,702B] Electrolux Home Care Products, Inc., a Subsidiary of Electrolux North America, Inc., Electrolux... On-Site at Electrolux Home Care Products, Inc., Webster City, Iowa; Electrolux Home Care Products... Leased Workers From Per Mar Security, 400 Des Moines Street, Webster City, Iowa; Amended Certification...
Sackley, Catherine M; van den Berg, Maayken E; Lett, Karen; Patel, Smitaa; Hollands, Kristen; Wright, Christine C; Hoppitt, Thomas J
2009-09-01
To compare the clinical effectiveness of a programme of physiotherapy and occupational therapy with standard care in care home residents who have mobility limitations and are dependent in performing activities of daily living. Cluster randomised controlled trial, with random allocation at the level of care home. Care homes within the NHS South Birmingham primary care trust and the NHS Birmingham East and North primary care trust that had more than five beds and provided for people in the care categories "physical disability" and "older people." Care home residents with mobility limitations, limitations in activities of daily living (as screened by the Barthel index), and not receiving end of life care were eligible to take part in the study. A targeted three month occupational therapy and physiotherapy programme. Scores on the Barthel index and the Rivermead mobility index. 24 of 77 nursing and residential homes that catered for residents with mobility limitations and dependency for activities of daily living were selected for study: 12 were randomly allocated to the intervention arm (128 residents, mean age 86 years) and 12 to the control arm (121 residents, mean age 84 years). Participants were evaluated by independent assessors blind to study arm allocation before randomisation (0 months), three months after randomisation (at the end of the treatment period for patients who received the intervention), and again at six months after randomisation. After adjusting for home effect and baseline characteristics, no significant differences were found in mean Barthel index scores at six months post-randomisation between treatment arms (mean effect 0.08, 95% confidence interval -1.14 to 1.30; P=0.90), across assessments (-0.01, -0.63 to 0.60; P=0.96), or in the interaction between assessment and intervention (0.42, -0.48 to 1.32; P=0.36). Similarly, no significant differences were found in the mean Rivermead mobility index scores between treatment arms (0.62, -0.51 to 1.76; P=0.28), across assessments (-0.15, -0.65 to 0.35; P=0.55), or interaction (0.71, -0.02 to 1.44; P=0.06). The three month occupational therapy and physiotherapy programme had no significant effect on mobility and independence. On the other hand, the variation in residents' functional ability, the prevalence of cognitive impairment, and the prevalence of depression were considerably higher in this sample than expected on the basis of previous work. Further research to clarify the efficacy of occupational therapy and physiotherapy is required if access to therapy services is to be recommended in this population. ISRCTN79859980.
KernPaeP - a web-based pediatric palliative documentation system for home care.
Hartz, Tobias; Verst, Hendrik; Ueckert, Frank
2009-01-01
KernPaeP is a new web-based on- and offline documentation system, which has been developed for pediatric palliative care-teams supporting patient documentation and communication among health care professionals. It provides a reliable system making fast and secure home care documentation possible. KernPaeP is accessible online by registered users using any web-browser. Home care teams use an offline version of KernPaeP running on a netbook for patient documentation on site. Identifying and medical patient data are strictly separated and stored on two database servers. The system offers a stable, enhanced two-way algorithm for synchronization between the offline component and the central database servers. KernPaeP is implemented meeting highest security standards while still maintaining high usability. The web-based documentation system allows ubiquitous and immediate access to patient data. Sumptuous paper work is replaced by secure and comprehensive electronic documentation. KernPaeP helps saving time and improving the quality of documentation. Due to development in close cooperation with pediatric palliative professionals, KernPaeP fulfils the broad needs of home-care documentation. The technique of web-based online and offline documentation is in general applicable for arbitrary home care scenarios.
Park, Jung-Ho; Park, Sung-Ae; Yoon, Soon-Nyoung; Kang, Sung-Rye
2004-04-01
The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method/1 and Prototyping were adopted to develop the main network system. The detailed research process is as follows : 1)home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorithm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.
2011-09-01
LAI Location Area Identity MANET Mobile Ad - hoc Network MCC Mobile Country Code MCD Mobile Communications Device MNC Mobile Network Code ...tower or present within a geographical area. These conditions relate directly to users who often operate with mobile ad - hoc networks. These types of...infrastructures. First responders can use these mobile base stations to set up their own networks on the fly, similar to mobile ad - hoc networks
Shorey, Shefaly; Ng, Yvonne Peng Mei; Danbjørg, Dorthe Boe; Dennis, Cindy-Lee; Morelius, Evalotte
2017-01-01
The aim of this study was to describe a study protocol that evaluates the effectiveness of the 'Home-but not Alone' educational programme delivered via a mobile health application in improving parenting outcomes. The development in mobile-based technology gives us the opportunity to develop an accessible educational programme that can be potentially beneficial to new parents. However, there is a scarcity of theory-based educational programmes that have incorporated technology such as a mobile health application in the early postpartum period. A randomized controlled trial with a two-group pre-test and post-test design. The data will be collected from 118 couples. Eligible parents will be randomly allocated to either a control group (receiving routine care) or an intervention group (routine care plus access to the 'Home-but not Alone' mobile health application. Outcome measures comprise of parenting self-efficacy, social support, parenting satisfaction and postnatal depression. Data will be collected at the baseline (on the day of discharge) and at four weeks postpartum. This will be an empirical study that evaluates a theory-based educational programme delivered via an innovative mobile health application on parental outcomes. Results from this study will enhance parenting self-efficacy, social support and parenting satisfaction, which may then reduce parental risks of postnatal depression. © 2016 John Wiley & Sons Ltd.
24 CFR 3282.8 - Applicability.
Code of Federal Regulations, 2010 CFR
2010-04-01
... approval of manufactured home designs. (3) Procedures by which a manufacturer obtains approval of... designed and produced as an integral part of a manufactured home when assembled on site, is governed by the.... Mobile homes designed and manufactured with more than one separate living unit are not covered by the...
24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...
Assistant Secretary of Defense for Homeland Defense and Global Security
Defense for Policy ASD for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security Special Operations/Low-Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian HomeOUSDP OfficesASD for Homeland Defense Global Security Assistant Secretary of Defense for Homeland
12 CFR 1270.14 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Creation of Participant's Security Entitlement; security interests. 1270.14 Section 1270.14 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS LIABILITIES Book-Entry Procedure for Consolidated Obligations § 1270.14 Creation of...
12 CFR 1270.14 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Creation of Participant's Security Entitlement; security interests. 1270.14 Section 1270.14 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS LIABILITIES Book-Entry Procedure for Consolidated Obligations § 1270.14 Creation of...
12 CFR 1270.14 - Creation of Participant's Security Entitlement; security interests.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1270.14 Section 1270.14 Banks and Banking FEDERAL HOUSING FINANCE AGENCY FEDERAL HOME LOAN BANKS LIABILITIES Book-Entry Procedure for Consolidated Obligations § 1270.14 Creation of...
24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...
24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...
24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...
24 CFR 201.6 - Disclosure and verification of Social Security and Employer Identification Numbers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Social Security and Employer Identification Numbers. 201.6 Section 201.6 Housing and Urban Development... HOME LOANS General § 201.6 Disclosure and verification of Social Security and Employer Identification... the disclosure and verification of Social Security and Employer Identification Numbers, as provided by...
Integrity mechanism for eHealth tele-monitoring system in smart home environment.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2009-01-01
During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.
An enhanced performance through agent-based secure approach for mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Bisen, Dhananjay; Sharma, Sanjeev
2018-01-01
This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.
Trust recovery model of Ad Hoc network based on identity authentication scheme
NASA Astrophysics Data System (ADS)
Liu, Jie; Huan, Shuiyuan
2017-05-01
Mobile Ad Hoc network trust model is widely used to solve mobile Ad Hoc network security issues. Aiming at the problem of reducing the network availability caused by the processing of malicious nodes and selfish nodes in mobile Ad Hoc network routing based on trust model, an authentication mechanism based on identity authentication mobile Ad Hoc network is proposed, which uses identity authentication to identify malicious nodes, And trust the recovery of selfish nodes in order to achieve the purpose of reducing network congestion and improving network quality. The simulation results show that the implementation of the mechanism can effectively improve the network availability and security.
ERIC Educational Resources Information Center
Bauer, R. D.; Schaadt, M. S.
1984-01-01
Calfiornia State University (Long Beach) purchased a motor home and converted it into a mobile marine science display unit, outfitting it with built-in display racks inside and an awning to provide shelter displays suited to outdoor use. School activities and programs using the mobile museum are described. (JN)
Parents' Mobile Technology Adoption Influences on Elementary Children's Use
ERIC Educational Resources Information Center
Eutsler, Lauren
2018-01-01
Purpose: With a high rate of mobile technology ownership in the home, it is unknown how parents' behavioral intention influences mobile technology adoption and children's informal use to support reading. The purpose of this paper is to identify 120 parents' intentions to adopt mobile technology and gather in-depth perceptions about mobile…
Code of Federal Regulations, 2014 CFR
2014-07-01
... borrower, other than a purchase money transaction described in paragraph (b)(2)(ii) of this section. (iii... unit, cooperative unit, mobile home, and manufactured home. (g) Electronic fund transfer (EFT) has the...
Code of Federal Regulations, 2010 CFR
2010-07-01
... borrower, other than a purchase money transaction described in paragraph (b)(2)(ii) of this section. (iii... unit, cooperative unit, mobile home, and manufactured home. (g) Electronic fund transfer (EFT) has the...
Code of Federal Regulations, 2012 CFR
2012-07-01
... borrower, other than a purchase money transaction described in paragraph (b)(2)(ii) of this section. (iii... unit, cooperative unit, mobile home, and manufactured home. (g) Electronic fund transfer (EFT) has the...
Code of Federal Regulations, 2013 CFR
2013-07-01
... borrower, other than a purchase money transaction described in paragraph (b)(2)(ii) of this section. (iii... unit, cooperative unit, mobile home, and manufactured home. (g) Electronic fund transfer (EFT) has the...
Code of Federal Regulations, 2011 CFR
2011-07-01
... borrower, other than a purchase money transaction described in paragraph (b)(2)(ii) of this section. (iii... unit, cooperative unit, mobile home, and manufactured home. (g) Electronic fund transfer (EFT) has the...
Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan
2016-01-01
Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.
Practical Pocket PC Application w/Biometric Security
NASA Technical Reports Server (NTRS)
Logan, Julian
2004-01-01
I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.
Design of automatic curtain controlled by wireless based on single chip 51 microcomputer
NASA Astrophysics Data System (ADS)
Han, Dafeng; Chen, Xiaoning
2017-08-01
In order to realize the wireless control of the domestic intelligent curtains, a set of wireless intelligent curtain control system based on 51 single chip microcomputer have been designed in this paper. The intelligent curtain can work in the manual mode, automatic mode and sleep mode and can be carried out by the button and mobile phone APP mode loop switch. Through the photosensitive resistance module and human pyroelectric infrared sensor to collect the indoor light value and the data whether there is the person in the room, and then after single chip processing, the motor drive module is controlled to realize the positive inversion of the asynchronous motor, the intelligent opening and closing of the curtain have been realized. The operation of the motor can be stopped under the action of the switch and the curtain opening and closing and timing switch can be controlled through the keys and mobile phone APP. The optical fiber intensity, working mode, curtain state and system time are displayed by LCD1602. The system has a high reliability and security under practical testing and with the popularity and development of smart home, the design has broad market prospects.