Advertisement

Topics

PubMed Journals Articles About "Army Taps Management Sciences Deliver Mobile Security Systems" RSS

09:34 EDT 20th October 2018 | BioPortfolio

Army Taps Management Sciences Deliver Mobile Security Systems PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Army Taps Management Sciences Deliver Mobile Security Systems articles that have been published worldwide.

More Information about "Army Taps Management Sciences Deliver Mobile Security Systems" on BioPortfolio

We have published hundreds of Army Taps Management Sciences Deliver Mobile Security Systems news stories on BioPortfolio along with dozens of Army Taps Management Sciences Deliver Mobile Security Systems Clinical Trials and PubMed Articles about Army Taps Management Sciences Deliver Mobile Security Systems for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Army Taps Management Sciences Deliver Mobile Security Systems Companies in our database. You can also find out about relevant Army Taps Management Sciences Deliver Mobile Security Systems Drugs and Medications on this site too.

Showing "Army Taps Management Sciences Deliver Mobile Security Systems" PubMed Articles 1–25 of 22,000+

In utero Partial Exchange Transfusion Combined with in utero Blood Transfusion for Prenatal Management of Twin Anemia-Polycythemia Sequence.

Monochorionic twin pregnancies are at risk of unique complications due to placental sharing and vascular connections between placental territories assigned for each twin. Twin anemia-polycythemia sequence (TAPS) is an infrequent but potentially dangerous complication of abnormal placental vascular connections. TAPS occurs due to very-small-caliber (< 1 mm) abnormal placental vascular connections which lead to chronic anemia in the donor twin and polycythemia in the recipient twin. TAPS may occur spontaneous...


Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

Evaluating the Privacy Policies of Mobile Personal Health Records for Pregnancy Monitoring.

A mobile personal health record (mPHR) for pregnancy monitoring allows the pregnant woman to track and manage her personal health data. However, owing to the privacy and security issues that may threaten the exchange of this sensitive data, a privacy policy should be established. The aim of this study is to evaluate the privacy policies of 19 mPHRs for pregnancy monitoring (12 for iOS and 7 for Android) using a template covering the characteristics of privacy, security, and standards and regulations. The fi...


Trusted Operations on Sensor Data .

The widespread use of mobile devices has allowed the development of participatory sensing systems that capture various types of data using the existing or external sensors attached to mobile devices. Gathering data from such anonymous sources requires a mechanism to establish the integrity of sensor readings. In many cases, sensor data need to be preprocessed on the device itself before being uploaded to the target server while ensuring the chain of trust from capture to the delivery of the data. This can b...

An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.

Wireless body area networks (WBANs) comprises a number of sensor nodes and the portable mobile device such as smartphone. It is used to monitor the physical condition and provide a reliable healthcare system. Utilizing the wireless communication network, sensor nodes collect the physiological data of one patient to the portable mobile device and the latter analyzes and transmits them to the application providers. Therefore, the personal data confidentiality and user privacy are cores of WBANs. Recently, She...

Randomized and controlled pilot study of the pragmatic use of mobile phone based follow up of actinic keratoses treated with topical 5-fluorouracil.

Store-and-forward teledermatology involves transmission of a patient's images to a healthcare provider and subsequent response from the provider about the diagnosis or management. Furthermore, teledermatology in which mobile phones (e.g. smartphones) are utilized for communication between the patient and their provider is referred to as mobile-teledermatology. In this study, we investigate the use of mobile-teledermatology in the management of actinic keratoses. We demonstrate that mobile-teledermatology ma...

Emotional security theory: An application to sibling bereavement.

There is a need for guiding theory to understand the experiences and outcomes of bereaved siblings, particularly from a family systems framework. The present study investigated the relevance of emotional security theory in a sample of 72 young adults who experienced sibling bereavement. We investigated (1) whether perceptions of prolonged parental grief predicted key aspects of emotional security (disengagement, preoccupation, and security), and (2) whether emotional security mediated a relation between per...

Putting on a bow-tie to sort out who does what and why in the complex arena of marine policy and management.

Marine policy and management has to cope with a plethora of human activities that cause pressures leading to changes to the natural and human systems. Accordingly, it requires many policy and management responses to address traditional, cultural, social, ecological, technical, and economic policy objectives. Because of this, we advocate that a fully-structured approach using the IEC/ISO 31010 Bow-tie analysis will allow all elements to be integrated for a cost-effective system. This industry-standard system...

Loose-Lipped Mobile Device Intelligent Personal Assistants: A Discussion of Information Gleaned from Siri on Locked iOS Devices.

The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an in...

Keeping secrets in the cloud: Mobile phones, data security and privacy within the context of pregnancy and childbirth in Tanzania.

Growing evidence points to the potential value of mobile phone-based technologies ('mHealth') to help strengthen community health systems in low- and middle-income countries, but mHealth approaches also carry considerable risks with respect to data security, individual privacy, and confidentiality. We examined the perspectives of frontline community health workers and their female clients regarding data security and privacy within the context of an mHealth intervention to improve women's uptake of maternal ...

Medical cyber-physical systems: A survey.

Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD)...

Novel use for the abdominal tourniquet in the management of postpartum haemorrhage.

Exploring "Internet+Recycling": Mass balance and life cycle assessment of a waste management system associated with a mobile application.

Individual users cannot readily access the collection channels is a persistent problem in municipal solid waste (MSW) management, resulting in low MSW collection rates. A new waste management model, "Internet+Recycling", has come into being; this model enables individuals to arrange collection appointment through various online platforms, then the collectors pick up the waste on-site. It is believed that "Internet+Recycling" can be a solution to mitigate the collection barrier in MSW management, as it provi...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

A Systematic Review on Promoting Adherence to Antiretroviral Therapy in HIV-infected Patients Using Mobile Phone Technology.

 Adherence to antiretroviral therapy (ART) is paramount to successful long-term suppression of human immunodeficiency virus (HIV). For poorly adherent patients with HIV, barriers to remaining adherent may be overcome by the implementation of targeted interventions delivered via mobile devices. This systematic review is focused specifically on mobile phone technologies to deliver adherence interventions in HIV/acquired immunodeficiency syndrome (AIDS) populations.

The CJOrtho app: a mobile clinical and educational tool for orthopedics.

The need for modern patient evaluation tools continues to grow. A dependable and reproducible assessment provides objective follow-up and increases the validity of collected data. This is where mobile apps come into play, as they provide a link between surgeons and patients. They also open the possibility of interacting with other healthcare staff to exchange common scientific reference systems and databases. The CJOrtho app provides fast access to 65 classification systems in orthopedics or trauma surgery,...

m-Health 2.0: New perspectives on mobile health, Machine Learning and Big Data Analytics.

Mobile health (m-Health) has been repeatedly called the biggest technological breakthrough of our modern times. Similarly, the concept of big data in the context of healthcare is considered one of the transformative drivers for intelligent healthcare delivery systems. In recent years, big data has become increasingly synonymous with mobile health, however key challenges of 'Big Data and mobile health', remain largely untackled. This is becoming particularly important with the continued deluge of the structu...

Developing Medical Surveillance Examination Guidance for New Occupational Hazards: The IMX-101 Experience.

New materials are constantly being created to address the operational needs of the US Army. These materials provide challenges to occupational health practitioners by presenting unknown health risks and possible effects to workers they evaluate. The responsibility for developing a medical surveillance exam, as part of a comprehensive workplace surveillance program, may become the responsibility of the provider working in a clinic on a military installation where manufacturing, testing, and/or use of the mat...

Clinical practice guideline for the evaluation and management of upper gastrointestinal bleeding for the Peruvian Social Security (EsSalud).

To provide evidence-based clinical recommendations for the evaluation and management of patients with upper gastrointestinal bleeding (UGB) in the Peruvian Social Security (EsSalud).

Lessons Learned from Implementation of the Food Insecurity Screening and Referral Program at Kaiser Permanente Colorado.

Traditionally, health care systems have addressed gaps in patients' diet quality with programs that provide dietary counseling and education, without addressing food security. However, health care systems increasingly recognize the need to address food security to effectively support population health and the prevention and management of diet-sensitive chronic illnesses. Numerous health care systems have implemented screening programs to identify food insecurity in their patients and to refer them to commun...

Egocentric Temporal Action Proposals.

We present an approach to localize generic actions in egocentric videos, called temporal action proposals (TAPs), for accelerating the action recognition step. An egocentric TAP refers to a sequence of frames that may contain a generic action performed by the wearer of a head-mounted camera, e.g., taking a knife, spreading jam, pouring milk, or cutting carrots. Inspired by object proposals, this paper aims at generating a small number of TAPs, thereby replacing the popular sliding window strategy, for local...

Adjusting Suicide Rates in a Military Population: Methods to Determine the Appropriate Standard Population.

The choice of the standard population is important when calculating adjusted rates for a military population: results can influence policies and funding allocations for programs and initiatives for suicide prevention. We describe the methodological considerations and decision-making process used in choosing a standard population for adjusting rates to compare suicide among US Army soldiers and the general US population. We examined 5 different standard populations, using the direct method to adjust annual s...

Building capacity in health and education systems to deliver interventions that strengthen early child development.

Building capacity within health and education systems of low- and middle-income countries in order to deliver high-quality early childhood services requires coordinated efforts across sectors, effective governance, sufficient funding, an adequate workforce, reliable data systems, and continuous monitoring, evaluation, and improvement cycles; it also requires partnerships with the private sector, communities, and parents. In addition, building capacity requires leadership, innovation of strategies to fit int...

Failure modes and effects analysis (FMEA) for the security of the supply chain system of the gas station in China.

With the popularity of automobiles, gas stations carry more gas supply and security risks. In order to effectively analyze the security of the supply chain system of the gas station, this study set the gas station as the center, then the upstream suppliers and downstream consumers were classified into three sub-systems, and the whole system was analyzed by using the method of failure modes and effects analysis (FMEA). A total of 50 typical cases of accidents at gas stations in China in the past 20 years hav...

Patients' use of mobile health applications: what general practitioners think.

Chronic disease patients are adopting self-management techniques, such as using mobile health applications (apps). As GPs are the main caregivers of chronic disease patients, obtaining GP perspectives regarding patient use of mobile health apps is vital in understanding longer term value and feasibility of these apps.


Advertisement
Quick Search
Advertisement
Advertisement