Chapter 4. The sleep and activities of daily living (ADL) monitoring application

Size: px
Start display at page:

Download "Chapter 4. The sleep and activities of daily living (ADL) monitoring application"

Transcription

1 Authors: Yuchen-Huang ( ); recommended: Yeh-Liang Hsu( ). Chapter 4. The sleep and activities of daily living (ADL) monitoring application Long-term ADL profiles of the older adults acquired at home environment can provide additional comprehensive information related to the living behaviors, and thus their functional abilities can be better understood. Advances in sensors and ICT tools have the potentials to assist ADL measurements in an unobtrusive way without disturbing the daily life of the older adults. This chapter describes the application of the home teleheleath system based on social networking for sleep and ADL monitoring in the home environment. The emphasis is on how to convert the monitoring data into meaningful messages to be conveyed on the social networking sites such as Facebook. Section 4.1 first briefly introduces the monitoring devices used in this research, including the human movement detectors, the temperature / humidity detectors, the appliance usage detectors and WhizPAD for sleep monitoring. In section 4.2 and 4.3, a selection of indices is defined for further assessing sleep and ADL performances, including indices for daily report and long-term life pattern. The indices are implemented in an App which can be installed on the users mobile devices such as tablets and smartphones. The alert messages and monitoring reports can then be sent to Facebook. Finally, in section 4.4 the way to sharing sleep and ADL monitoring report from mobile device to Facebook were described. 4.1 Introduction of the monitoring devices (1) WhizPAD An integrated motion sensing mattress for sleep monitoring For older adults living at home, the bed is an indispensable part of their daily lives. Bed activity monitoring provides valuable information of the status for the older adults. In this home application, WhizPAD (Figure 4-1), the mattress itself is designed into a sensor using textile-based sensing techniques and collects signals of physical activities in bed. 1

2 The signals from WhizPAD can be classified into events such as on/off bed, sleep posture, movement counts, and respiration rate. By integrating with some ICT tools, the system can provides some sleep monitoring and assessing functions, such as real time sleep monitoring, sleep reports etc. Figure 4-1. WhizPAD (2) The human movement / temperature / humidity detector In the home environment, ADL monitoring systems usually consist of a range of simple and low-cost sensors. The passive infrared (PIR) sensor is the most common sensor for detecting human occupancy or for determining active movements within a sensitive range of specific space. Mobility changes can be observed and identified from a multi-sensor monitoring system utilizing PIRs at home [43]. In this application, the human movement detectors sense the changes of human infrared intensity which represent occurrences of active movements within a sensible range. Once activities are detected by the human movement detector, it transmits the signals (activity count) to the Distributed Data Server (DDS) via a ZigBee 2.4GHz wireless protocol. Besides, the human movement detector also measures room temperature and humidity. If an activity is detected, the detector reports the activity count, temperature and humidity. However, if there is no activity, the detector will report the temperature and humidity every one minute. Figure 4-2 is the human movement / temperature / humidity detector. 2

3 Figure 4-2. The human movement / temperature / humidity detector (3) The appliance usage detector The appliance usage detector is used to detect the on/off state of an appliance, such as a TV set. A specific threshold of AC current is given to determine the on/off status of the appliances, indicating whether the appliances are in use or not. The count signals will be sent to the DDS periodically. Figure 4-3 is the appliance usage detector. Figure 4-3. The appliance usage detector 4.2 Information structure of the sleep and ADL monitoring application Figure 4-4 illustrates the home telehealth system structure based on social networking for sleep and ADL monitoring application. All sensors such as WhizPAD, the human movement / temperature / humidity detector and the appliance usage detector are embedded in the home environment, so that the older adults may not be aware of the sensing actions taking place. Distributed data servers (DDS) is the core for sensing data collection. Sensing data from detectors are transmitted via Zigbee to the DDS. The DDS is 3

4 scheduled to report its present IP address to a pairing system in the cloud periodically because its IP may change in the dynamic IP setup. When user logs into the WhizPAD App, the App will generate a pairing system URL connection and send the WhizPAD device ID and password, which are typed by the user via Wifi or 3G. After confirming the information, pairing system will respond the current DDS IP and port to App by URL connection. During this data transmitting process, all of the data are encrypted and transmitted in the form of JavaScript Object Notation (JSON) which is a common and lightweight data interchange format. Figure 4-5 is the simple display interface of the pairing system. Figure 4-6 shows the sleep data in JSON format. For children, family members and caregivers, the monitoring Apps such as WhizPAD App and ADL App can be downloaded from the application platform Google Play and installed on their mobile devices. Mobility changes and monitoring data can be displayed by graphical and tabular way in the App. Figure 4-4. The structure of sleep and ADL monitoring application 4

5 Figure 4-5. The simple display interface of the pairing system Figure 4-6. The real-time monitoring data of WhizPAD in JSON format The Facebook Graph API and other official software development kits (SDK) allow developers to integrate their products or services with Facebook. Each service needs to apply a Facebook application ID, and each Facebook application ID represents one service or product. Facebook uses a variant Open Authentication (OAuth) protocol that allows users to approve application to act on their behalf without sharing their passwords. When user connect with a service using Facebook Login, the service will be able to obtain an access token which provides temporary, secure to access user s Facebook public profile. In 2011, Facebook implemented the Secure Socket Layer (SSL) encrypt protocol to provide communication security over the Internet which ensures that the information passing through the other services is not open for access for everyone. In the CDF application structure of Chapter 3, the tablet plays the role of DDS for receiving sensing data. It is also connected to Facebook for data storage and display. However, the DDS in Figure 4-4 is a micro-processor based data server (Raspberry pi in the case of WhizPAD) that cannot be connected with Facebook because it can not offer SSL encrypt protocol. The other possibility is to use pairing system in Figure 4-4 to 5

6 connect to Facebook. However, when the messages are posted to Facebook by the same IP or same application ID at the same time or in short time duration, this service will be blocked. Under these limitations, the next section describes how in this application, children, family members and caregivers set up the rule of alert messages and send to social network automatically via the mobile devices. 4.3 Converting sleep monitoring data into meaningful messages to be conveyed by Facebook The section first describes how the monitoring data is converted into meaningful messages to be conveyed by Facebook. ADL monitoring data has been well studied by Yang et al [44]. Therefore this section focuses on sleep monitoring data. For sleep monitoring, indices for daily report and long-term life pattern are developed. For daily sleep report, three components of Pittsburgh Sleep Quality Indices (PSQI) including sleep latency, sleep duration, habitual sleep efficiency are used. For long-term life pattern, seven-day average of on-off bed status is accumulated. For a given day, the correlation coefficient is presented to describe the strength of correlation of the day with the average on-off bed profile for the seven-day duration Indices for daily report and long-term life pattern for sleep monitoring In this research, five participants (55-90yrs) were recruited for sleep monitoring data collection. Before the experiment, WhizPAD were installed in their rooms to detect and transmit the sensing data to their own DDS. (1) Three components of PSQI The most commonly used measure of sleep quality is the PSQI, which evaluates sleep quality with seven component scores: subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication, and daytime dysfunction. The sum of scores for these seven components yields one global score. Three PSQI components, namely sleep latency, sleep duration, and habitual sleep efficiency, can be estimated through the asleep/awake detection of WhizPAD. Figure 4-7 is an on-off and awake bed status example. The graph was calculated and implemented according to the algorithm, which was first presented by Cheng et al [46]. In this example, the sleep latency is 6 minutes that represents participant spent 6 minutes to lie on the bed 6

7 and fall asleep; the sleep duration is 67 minutes that represents the length of participant when he/she falls asleep. Finally, the habitual sleep efficiency is 67% (sleep duration divided by the length of participant lies on the bed). Figure 4-7. An example of on-off / awake bed status monitoring data (2) On-off bed profile for a single day Figure 4-8 shows sleep monitoring data of participant A (56yrs, employed female) for two different dates (on May 05 and May 07 in 2014). The data logging interval (epoch) is 5 minutes. Therefore there are 288 epochs from 0:00 to 23:59 per day. The value of y axis represents the on-off bed status (1: on-bed / 0: off-bed); x axis represents the time. 7

8 Figure 4-8. The on/off bed status of participant A at two different dates (3) Average on-off bed profile for seven days On-off bed profile can also be observed on a long-term basis. Figure 4-9 shows the average on-off bed profile of participant A for seven days (from May 04 to May 10, in 2014). Standard deviation is Note that the range standard deviation is between 0 to 0.5, and is an indication of whether the in-bed pattern has high regularity (low standard deviation). During the seven days, the average in-bed percentage is 41%, and the average number of movements when in bed is 3.7 times / min, which is a general indication of whether the participant sleeps well. Figure 4-9. The average on-off bed status data of participant A for seven days (May 04 to May 10, 2014) Figure 4-10 shows the average on-off bed profile of participant B (60yrs, employed male, two graveyard shifts in a week) for seven days (from April 1 to April 7, 2014). Standard deviation is 0.08, which is higher than that of participant A, indicating that the in-bed pattern of participant A is more regular than participant B. 8

9 Figure The average on-off bed status data of participant B for seven days (April 01 to April 07, 2014) These observable trends of on-off bed status monitoring profile obtained by the WhizPAD are consistent with the rhythm of daily living of participant A and B. (4) Correlation coefficient of a given day The strength of correlation in in-bed pattern between a single day and a week can also be observed through the correlation coefficient value from the on-off bed status data. Figure 4-11 shows the average on-off bed status data of participant A for seven days (May 04 to May 10, 2014) and a single day (May 11, 2014). The correlation coefficient value of two curves is 0.96, which indicates the in-bed pattern of participant A on this single day is similar to the in-bed pattern of the previous week. Figure The average sleep monitoring data for a week (May 04 to May 10, 2014) and a single day (May 11, 2014) of participant A Sharing sleep and ADL monitoring report to Facebook 9

10 After presenting the detectors, information structure and the selection of indices in this home environment applications, the way to sharing sleep and ADL monitoring report from mobile device to Facebook were described in this section. Figure 4-12 is the simulating user interface of sleep quality function in WhizPAD App. The top graph in this simulation interface displays the average on-off bed status profile of seven days, which is calculated and transmitted from the DDS (server) in order to reduce the calculation loading of mobile devices. In this example, the duration of average on-off bed status data of seven days will start on May 10 (the day before May 11 which is selected by the user) and end on May 04. The second graph displays the on-off bed data of the give-day. Other value of indices which mention in Section 4.3 are listed and displayed below these two graphs. Figure The simulating interface of sleep quality in WhizPAD App When user press the Share information button on the top menu, the information of indices will be sent to the older adult s Facebook timeline automatically. Other family members, caregivers can read this message by using Facebook App on their mobile devices 10

11 or browsing Facebook website if the older adult is one of their Facebook friends. Figure 4-13 shows the message on older adult s Facebook timeline. Figure The message is posted from WhizPAD App to older adult s Facebook timeline Reference [43] Chan, M., Campo, E., & Estève, D. (2005). Assessment of activity of elderly people using a home monitoring system. International Journal of Rehabilitation Research, 28(1), [44] Yang, C. C., & Hsu, Y. L. (2012). Remote monitoring and assessment of daily activities in the home environment. Journal of Clinical Gerontology and Geriatrics, 3(3), [45] Cheng, C. M., Hsu, Y. L., & Young, C. M. (2008). Development of a portable device for telemonitoring of physical activities during sleep. Telemedicine and e-health, 14(10),

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,

More information

AirPatrol WiFi Full Manual V1.0

AirPatrol WiFi Full Manual V1.0 AirPatrol WiFi Full Manual V1.0 Index What AirPatrol WiFi does? 3 Lights and buttons 4 WiFi Network 5 Installing AirPatrol Wifi 6 Quick Setup steps 7 AirPatrol WiFi setup 8 Sending commands (Low heat mode)

More information

FT-1000/GPS-N. System of remote monitoring and control of physical

FT-1000/GPS-N. System of remote monitoring and control of physical FT-1000/GPS-N System of remote monitoring and control of physical Localization of vehicles during transport by sending the values of temperature, RH%, etc.. with relative alarm threshold is exceeded. Send

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

ADLife An Activities of Daily Living (ADL) monitoring

ADLife An Activities of Daily Living (ADL) monitoring ADLife An Activities of Daily Living (ADL) monitoring Solution Sheet For many older people, admittance to residential or nursing home care is often deemed necessary despite client reluctance and the relatively

More information

Alerting, Recording and Motion Detection Guide

Alerting, Recording and Motion Detection Guide Alerting, Recording and Motion Detection Guide This document is intended to be used as a general guide to the set up and use of the motion detection and recording features of the cameras offered in the

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

SYSTEM COMPONENTS. Gateway. Sensors. Repeater. 1-701-475-2361 1-888-475-2361 www.bekspyder.com. Figure 1

SYSTEM COMPONENTS. Gateway. Sensors. Repeater. 1-701-475-2361 1-888-475-2361 www.bekspyder.com. Figure 1 Welcome to BEK SpyderProtect! This quick start guide is designed to give you a basic overview of the system, and help you get the most out of your home automation, monitoring, and alerts experience. For

More information

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode. 1. Introduction TC Monitor is easy to use Windows application for monitoring and control of some Teracom Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B- CM,

More information

VasonaLink TM Product Introduction

VasonaLink TM Product Introduction VasonaLink TM Product Introduction 08/22/14, Inc. VasonaLink Lighting Management lighting management system that is simple to install, provision and manage. It is designed to be both directly integrated

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

Intel Internet of Things (IoT) Developer Kit

Intel Internet of Things (IoT) Developer Kit Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Premium Server Client Software

Premium Server Client Software Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management

More information

CRESTRON-APP-ANDROID Control App for Android

CRESTRON-APP-ANDROID Control App for Android 1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and

More information

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5 Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound

More information

Domus, the connected home

Domus, the connected home Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,

More information

Tronico Technology Company Limited. First step of IOT - DIY smart home

Tronico Technology Company Limited. First step of IOT - DIY smart home Tronico Technology Company Limited First step of IOT - DIY smart home What is IOT? 2 The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items that enables

More information

Having Fun with QNAP and your Home Automation

Having Fun with QNAP and your Home Automation Having Fun with QNAP and your Home Automation The popularity of home automation has been increasing greatly in recent years due to much higher affordability and greater simplicity via smartphone and tablet

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

3G Wireless-N Smart Energy Gateway

3G Wireless-N Smart Energy Gateway Join BEsmart Partner Alliance Network at www.smartgrid.com.tw/besmart Ideal for 3G Wireless-N Smart Energy Gateway The, 3G Wireless-N Smart Energy Gateway, is an all-in-one router designed for users to

More information

Edge Configuration Series Reporting Overview

Edge Configuration Series Reporting Overview Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed

More information

CareSentinel Set Up Guide for Android Devices

CareSentinel Set Up Guide for Android Devices CareSentinel Set Up Guide for Android Devices Compatible Devices: Only devices running Android 4.3 or newer support Bluetooth Smart. Any smart phone or tablet running an Android operating system older

More information

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Xopero Backup Build your private cloud backup environment. Getting started

Xopero Backup Build your private cloud backup environment. Getting started Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...

More information

Design of Home Automation Framework With Social Network Integration

Design of Home Automation Framework With Social Network Integration Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University

More information

IOS EYE4 APP User Manual

IOS EYE4 APP User Manual IOS EYE4 APP User Manual Eye4 App can be downloaded from Google Play (Android) and App Store (IOS). Besides, it can be downloaded from http://www.eye4.so/download/ The below user manual is based on Eye4

More information

ITP 140 Mobile Technologies. Mobile Topics

ITP 140 Mobile Technologies. Mobile Topics ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

introducing The BlackBerry Collaboration Service

introducing The BlackBerry Collaboration Service Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

Table of Contents. 3 Setup 6 Home Screen 8 Modes 12 Watch Live & Timeline 17 HomeHealth Technology 21 Emergency Options 24 Settings 26 Plans 28 Help

Table of Contents. 3 Setup 6 Home Screen 8 Modes 12 Watch Live & Timeline 17 HomeHealth Technology 21 Emergency Options 24 Settings 26 Plans 28 Help User Guide Table of Contents 3 Setup 6 Home Screen 8 Modes 12 Watch Live & Timeline 17 HomeHealth Technology 21 Emergency Options 24 Settings 26 Plans 28 Help 2 Setup Divider text Secure Setup 1. Download

More information

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Design for Success: Designing for the Internet of Things with TiWiConnect

Design for Success: Designing for the Internet of Things with TiWiConnect Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next.

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next. Server Type: POP3 or IMAP Incoming(POP3 or IMAP) Mail Server: student.ncnm.edu POP3 Port: 995 (SSL) IMAP Port: 993 (SSL) Outgoing(SMTP) Mail Server: student.ncnm.edu SMTP Port: 587 (TLS) (Users must change

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

A state-of-the-art solution that brings mobility to SCADA alarms

A state-of-the-art solution that brings mobility to SCADA alarms A state-of-the-art solution that brings mobility to SCADA alarms SCADA-Aware Mobile far exceeds the capabilities of SMS, e-mail, and pagers, and delivers alarms to the mobile device in the most reliable

More information

WebIO Internet connected Wireless Temperature Sensor Monitor and Alert Software

WebIO Internet connected Wireless Temperature Sensor Monitor and Alert Software Page1 WebIO Internet connected Wireless Temperature Sensor Monitor and Alert Software Manual WebIO-TM Beta version 1.20 12/29/2009 The WebIO Temperature Monitor PC software (WebIO-TM) will monitor your

More information

Preparing Log-ic 360 USB Loggers for Use

Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

WAM Remote Wireless Asset Monitoring. Website User Guide

WAM Remote Wireless Asset Monitoring. Website User Guide WAM Remote Wireless Asset Monitoring Website User Guide Table of Contents Overview... 2 Login Page... 2 Quick Start Guide...3-4 Locations Page... 5 Devices Page... 5 Register Devices Page... 6 Temp or

More information

MTP. MTP AirWatch Integration Guide. Release 1.0

MTP. MTP AirWatch Integration Guide. Release 1.0 MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One

UC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One Quick Guide For Apps Epik UC-One UC-One is part of our Epik suite enabling you to access all your communication services, telephony, video, IM and presence from any supported device. Contact Integration

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

SYSPRO App Store: Registration Guide

SYSPRO App Store: Registration Guide SYSPRO App Store: Registration Guide SYSPRO App Store Registration Guide 2 Table of Contents What is the SYSPRO App Store?... 3 The SYSPRO App Store URL... 3 Who can use it?... 3 Register as a customer...

More information

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

NAS 243 Using AiData on Your Mobile Devices

NAS 243 Using AiData on Your Mobile Devices NAS 243 Using AiData on Your Mobile Access and manage files on your NAS with ios and Android devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to:

More information

How To Use Titanium Studio

How To Use Titanium Studio Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 alessandro.grazioli81@gmail.com 2015 Parma Outline Introduction Installation and Configuration

More information

Protected Trust Setup Guide for Brother MFC Devices

Protected Trust Setup Guide for Brother MFC Devices Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Report of Research Results

Report of Research Results Report of Research Results Scaling and Deployment of e-guardian to Eldercare Centers and Single Elderly Homes Primary Researcher: Prof. Tan Kok Kiong, Department of Electrical and Computer Engineering

More information

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory... Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting

More information

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it Android App for SAP Business One Z3moB1le App Version 1.00 Pagina 1 di 12 Z3 Mobile for SAP Business One (Z3moB1le) Contents Overview... 3 Phone requirements... 3 Available modules... 4 Settings before

More information

VL Touchscreen Alarm. A Brilliantly Crafted Touchscreen Security System that Revolutionizes Your World

VL Touchscreen Alarm. A Brilliantly Crafted Touchscreen Security System that Revolutionizes Your World VL Touchscreen Alarm A Brilliantly Crafted Touchscreen Security System that Revolutionizes Your World Crafted with Incredible Intelligence Introducing the new VL touchscreen panel A modern security panel

More information

My Stuff Everywhere Your Content On Any Screen

My Stuff Everywhere Your Content On Any Screen Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router

Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router Recommended QoS Configuration TP-LINK Archer C3200 Contents Contents Introduction.......................................

More information

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world WALL TABLET W I T H WA L L C H A R G I N G S TAT I O N Smart Home Controller Control your home from anywhere in the world WALL TABLET Connect everything Makes every home safe, comfortable and energy efficient

More information

PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.

PRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein. PRIVACY POLICY This Privacy Policy ( Policy ) applies to the website Creditseva.com which is an online internet portal ( Creditseva ), offering credit repair, credit monitoring and credit consulting services

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

TrustedX: eidas Platform

TrustedX: eidas Platform TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Initial Setup of Mac Mail with IMAP for OS X Lion

Initial Setup of Mac Mail with IMAP for OS X Lion Concept Initial Setup of Mac Mail This document describes the procedures for setting up the Mac Mail client to receive messages from Google Mail using Internet Message Access Protocol (IMAP) with the Mac

More information

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios 1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide

More information

CARRIOTS TECHNICAL PRESENTATION

CARRIOTS TECHNICAL PRESENTATION CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM

More information

Ultimate Server Client Software

Ultimate Server Client Software Ultimate Server Client Software GPRS NET Data Logger Ul mate Server is dedicatedly developed for high volume data applica on. 1. Receive data from Data Loggers in UDP or TCP via GPRS, Ethernet and SMS

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

EyeOn Baby Camera User Guide for Android smartphone and tablet

EyeOn Baby Camera User Guide for Android smartphone and tablet EyeOn Baby Camera User Guide for Android smartphone and tablet Important safety information Inside the box Minimum requirements The EyeOn Baby Camera at a glance Let s get started Start monitoring Don

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Cloud-based Data Logging, Monitoring and Analysis

Cloud-based Data Logging, Monitoring and Analysis Industry 4.0, Internet of Things (IoT), Cloud Computing Cloud-based Data Logging, Monitoring and Analysis Measurement System Using Windows Azure, SQL Server, LabVIEW and Visual Studio/C# Hans-Petter Halvorsen,

More information

PI Cloud Connect Overview

PI Cloud Connect Overview PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

Configuration Guide - OneDesk to SalesForce Connector

Configuration Guide - OneDesk to SalesForce Connector Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce

More information

COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM)

COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM) COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM) 0 TEAM MEMBERS SYED HUSSAIN RAZA NAQVI SYED MUHAMMAD TAHIR RAZA MUHAMMAD

More information

Home Internet Filter User Guide

Home Internet Filter User Guide Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter

More information