Chapter 4. The sleep and activities of daily living (ADL) monitoring application
|
|
- Arron Hoover
- 8 years ago
- Views:
Transcription
1 Authors: Yuchen-Huang ( ); recommended: Yeh-Liang Hsu( ). Chapter 4. The sleep and activities of daily living (ADL) monitoring application Long-term ADL profiles of the older adults acquired at home environment can provide additional comprehensive information related to the living behaviors, and thus their functional abilities can be better understood. Advances in sensors and ICT tools have the potentials to assist ADL measurements in an unobtrusive way without disturbing the daily life of the older adults. This chapter describes the application of the home teleheleath system based on social networking for sleep and ADL monitoring in the home environment. The emphasis is on how to convert the monitoring data into meaningful messages to be conveyed on the social networking sites such as Facebook. Section 4.1 first briefly introduces the monitoring devices used in this research, including the human movement detectors, the temperature / humidity detectors, the appliance usage detectors and WhizPAD for sleep monitoring. In section 4.2 and 4.3, a selection of indices is defined for further assessing sleep and ADL performances, including indices for daily report and long-term life pattern. The indices are implemented in an App which can be installed on the users mobile devices such as tablets and smartphones. The alert messages and monitoring reports can then be sent to Facebook. Finally, in section 4.4 the way to sharing sleep and ADL monitoring report from mobile device to Facebook were described. 4.1 Introduction of the monitoring devices (1) WhizPAD An integrated motion sensing mattress for sleep monitoring For older adults living at home, the bed is an indispensable part of their daily lives. Bed activity monitoring provides valuable information of the status for the older adults. In this home application, WhizPAD (Figure 4-1), the mattress itself is designed into a sensor using textile-based sensing techniques and collects signals of physical activities in bed. 1
2 The signals from WhizPAD can be classified into events such as on/off bed, sleep posture, movement counts, and respiration rate. By integrating with some ICT tools, the system can provides some sleep monitoring and assessing functions, such as real time sleep monitoring, sleep reports etc. Figure 4-1. WhizPAD (2) The human movement / temperature / humidity detector In the home environment, ADL monitoring systems usually consist of a range of simple and low-cost sensors. The passive infrared (PIR) sensor is the most common sensor for detecting human occupancy or for determining active movements within a sensitive range of specific space. Mobility changes can be observed and identified from a multi-sensor monitoring system utilizing PIRs at home [43]. In this application, the human movement detectors sense the changes of human infrared intensity which represent occurrences of active movements within a sensible range. Once activities are detected by the human movement detector, it transmits the signals (activity count) to the Distributed Data Server (DDS) via a ZigBee 2.4GHz wireless protocol. Besides, the human movement detector also measures room temperature and humidity. If an activity is detected, the detector reports the activity count, temperature and humidity. However, if there is no activity, the detector will report the temperature and humidity every one minute. Figure 4-2 is the human movement / temperature / humidity detector. 2
3 Figure 4-2. The human movement / temperature / humidity detector (3) The appliance usage detector The appliance usage detector is used to detect the on/off state of an appliance, such as a TV set. A specific threshold of AC current is given to determine the on/off status of the appliances, indicating whether the appliances are in use or not. The count signals will be sent to the DDS periodically. Figure 4-3 is the appliance usage detector. Figure 4-3. The appliance usage detector 4.2 Information structure of the sleep and ADL monitoring application Figure 4-4 illustrates the home telehealth system structure based on social networking for sleep and ADL monitoring application. All sensors such as WhizPAD, the human movement / temperature / humidity detector and the appliance usage detector are embedded in the home environment, so that the older adults may not be aware of the sensing actions taking place. Distributed data servers (DDS) is the core for sensing data collection. Sensing data from detectors are transmitted via Zigbee to the DDS. The DDS is 3
4 scheduled to report its present IP address to a pairing system in the cloud periodically because its IP may change in the dynamic IP setup. When user logs into the WhizPAD App, the App will generate a pairing system URL connection and send the WhizPAD device ID and password, which are typed by the user via Wifi or 3G. After confirming the information, pairing system will respond the current DDS IP and port to App by URL connection. During this data transmitting process, all of the data are encrypted and transmitted in the form of JavaScript Object Notation (JSON) which is a common and lightweight data interchange format. Figure 4-5 is the simple display interface of the pairing system. Figure 4-6 shows the sleep data in JSON format. For children, family members and caregivers, the monitoring Apps such as WhizPAD App and ADL App can be downloaded from the application platform Google Play and installed on their mobile devices. Mobility changes and monitoring data can be displayed by graphical and tabular way in the App. Figure 4-4. The structure of sleep and ADL monitoring application 4
5 Figure 4-5. The simple display interface of the pairing system Figure 4-6. The real-time monitoring data of WhizPAD in JSON format The Facebook Graph API and other official software development kits (SDK) allow developers to integrate their products or services with Facebook. Each service needs to apply a Facebook application ID, and each Facebook application ID represents one service or product. Facebook uses a variant Open Authentication (OAuth) protocol that allows users to approve application to act on their behalf without sharing their passwords. When user connect with a service using Facebook Login, the service will be able to obtain an access token which provides temporary, secure to access user s Facebook public profile. In 2011, Facebook implemented the Secure Socket Layer (SSL) encrypt protocol to provide communication security over the Internet which ensures that the information passing through the other services is not open for access for everyone. In the CDF application structure of Chapter 3, the tablet plays the role of DDS for receiving sensing data. It is also connected to Facebook for data storage and display. However, the DDS in Figure 4-4 is a micro-processor based data server (Raspberry pi in the case of WhizPAD) that cannot be connected with Facebook because it can not offer SSL encrypt protocol. The other possibility is to use pairing system in Figure 4-4 to 5
6 connect to Facebook. However, when the messages are posted to Facebook by the same IP or same application ID at the same time or in short time duration, this service will be blocked. Under these limitations, the next section describes how in this application, children, family members and caregivers set up the rule of alert messages and send to social network automatically via the mobile devices. 4.3 Converting sleep monitoring data into meaningful messages to be conveyed by Facebook The section first describes how the monitoring data is converted into meaningful messages to be conveyed by Facebook. ADL monitoring data has been well studied by Yang et al [44]. Therefore this section focuses on sleep monitoring data. For sleep monitoring, indices for daily report and long-term life pattern are developed. For daily sleep report, three components of Pittsburgh Sleep Quality Indices (PSQI) including sleep latency, sleep duration, habitual sleep efficiency are used. For long-term life pattern, seven-day average of on-off bed status is accumulated. For a given day, the correlation coefficient is presented to describe the strength of correlation of the day with the average on-off bed profile for the seven-day duration Indices for daily report and long-term life pattern for sleep monitoring In this research, five participants (55-90yrs) were recruited for sleep monitoring data collection. Before the experiment, WhizPAD were installed in their rooms to detect and transmit the sensing data to their own DDS. (1) Three components of PSQI The most commonly used measure of sleep quality is the PSQI, which evaluates sleep quality with seven component scores: subjective sleep quality, sleep latency, sleep duration, habitual sleep efficiency, sleep disturbances, use of sleeping medication, and daytime dysfunction. The sum of scores for these seven components yields one global score. Three PSQI components, namely sleep latency, sleep duration, and habitual sleep efficiency, can be estimated through the asleep/awake detection of WhizPAD. Figure 4-7 is an on-off and awake bed status example. The graph was calculated and implemented according to the algorithm, which was first presented by Cheng et al [46]. In this example, the sleep latency is 6 minutes that represents participant spent 6 minutes to lie on the bed 6
7 and fall asleep; the sleep duration is 67 minutes that represents the length of participant when he/she falls asleep. Finally, the habitual sleep efficiency is 67% (sleep duration divided by the length of participant lies on the bed). Figure 4-7. An example of on-off / awake bed status monitoring data (2) On-off bed profile for a single day Figure 4-8 shows sleep monitoring data of participant A (56yrs, employed female) for two different dates (on May 05 and May 07 in 2014). The data logging interval (epoch) is 5 minutes. Therefore there are 288 epochs from 0:00 to 23:59 per day. The value of y axis represents the on-off bed status (1: on-bed / 0: off-bed); x axis represents the time. 7
8 Figure 4-8. The on/off bed status of participant A at two different dates (3) Average on-off bed profile for seven days On-off bed profile can also be observed on a long-term basis. Figure 4-9 shows the average on-off bed profile of participant A for seven days (from May 04 to May 10, in 2014). Standard deviation is Note that the range standard deviation is between 0 to 0.5, and is an indication of whether the in-bed pattern has high regularity (low standard deviation). During the seven days, the average in-bed percentage is 41%, and the average number of movements when in bed is 3.7 times / min, which is a general indication of whether the participant sleeps well. Figure 4-9. The average on-off bed status data of participant A for seven days (May 04 to May 10, 2014) Figure 4-10 shows the average on-off bed profile of participant B (60yrs, employed male, two graveyard shifts in a week) for seven days (from April 1 to April 7, 2014). Standard deviation is 0.08, which is higher than that of participant A, indicating that the in-bed pattern of participant A is more regular than participant B. 8
9 Figure The average on-off bed status data of participant B for seven days (April 01 to April 07, 2014) These observable trends of on-off bed status monitoring profile obtained by the WhizPAD are consistent with the rhythm of daily living of participant A and B. (4) Correlation coefficient of a given day The strength of correlation in in-bed pattern between a single day and a week can also be observed through the correlation coefficient value from the on-off bed status data. Figure 4-11 shows the average on-off bed status data of participant A for seven days (May 04 to May 10, 2014) and a single day (May 11, 2014). The correlation coefficient value of two curves is 0.96, which indicates the in-bed pattern of participant A on this single day is similar to the in-bed pattern of the previous week. Figure The average sleep monitoring data for a week (May 04 to May 10, 2014) and a single day (May 11, 2014) of participant A Sharing sleep and ADL monitoring report to Facebook 9
10 After presenting the detectors, information structure and the selection of indices in this home environment applications, the way to sharing sleep and ADL monitoring report from mobile device to Facebook were described in this section. Figure 4-12 is the simulating user interface of sleep quality function in WhizPAD App. The top graph in this simulation interface displays the average on-off bed status profile of seven days, which is calculated and transmitted from the DDS (server) in order to reduce the calculation loading of mobile devices. In this example, the duration of average on-off bed status data of seven days will start on May 10 (the day before May 11 which is selected by the user) and end on May 04. The second graph displays the on-off bed data of the give-day. Other value of indices which mention in Section 4.3 are listed and displayed below these two graphs. Figure The simulating interface of sleep quality in WhizPAD App When user press the Share information button on the top menu, the information of indices will be sent to the older adult s Facebook timeline automatically. Other family members, caregivers can read this message by using Facebook App on their mobile devices 10
11 or browsing Facebook website if the older adult is one of their Facebook friends. Figure 4-13 shows the message on older adult s Facebook timeline. Figure The message is posted from WhizPAD App to older adult s Facebook timeline Reference [43] Chan, M., Campo, E., & Estève, D. (2005). Assessment of activity of elderly people using a home monitoring system. International Journal of Rehabilitation Research, 28(1), [44] Yang, C. C., & Hsu, Y. L. (2012). Remote monitoring and assessment of daily activities in the home environment. Journal of Clinical Gerontology and Geriatrics, 3(3), [45] Cheng, C. M., Hsu, Y. L., & Young, C. M. (2008). Development of a portable device for telemonitoring of physical activities during sleep. Telemedicine and e-health, 14(10),
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
More informationAirPatrol WiFi Full Manual V1.0
AirPatrol WiFi Full Manual V1.0 Index What AirPatrol WiFi does? 3 Lights and buttons 4 WiFi Network 5 Installing AirPatrol Wifi 6 Quick Setup steps 7 AirPatrol WiFi setup 8 Sending commands (Low heat mode)
More informationFT-1000/GPS-N. System of remote monitoring and control of physical
FT-1000/GPS-N System of remote monitoring and control of physical Localization of vehicles during transport by sending the values of temperature, RH%, etc.. with relative alarm threshold is exceeded. Send
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationADLife An Activities of Daily Living (ADL) monitoring
ADLife An Activities of Daily Living (ADL) monitoring Solution Sheet For many older people, admittance to residential or nursing home care is often deemed necessary despite client reluctance and the relatively
More informationAlerting, Recording and Motion Detection Guide
Alerting, Recording and Motion Detection Guide This document is intended to be used as a general guide to the set up and use of the motion detection and recording features of the cameras offered in the
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationSYSTEM COMPONENTS. Gateway. Sensors. Repeater. 1-701-475-2361 1-888-475-2361 www.bekspyder.com. Figure 1
Welcome to BEK SpyderProtect! This quick start guide is designed to give you a basic overview of the system, and help you get the most out of your home automation, monitoring, and alerts experience. For
More informationThe data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.
1. Introduction TC Monitor is easy to use Windows application for monitoring and control of some Teracom Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B- CM,
More informationVasonaLink TM Product Introduction
VasonaLink TM Product Introduction 08/22/14, Inc. VasonaLink Lighting Management lighting management system that is simple to install, provision and manage. It is designed to be both directly integrated
More informationLeonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
More informationIntel Internet of Things (IoT) Developer Kit
Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationSmart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More informationUser Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
More informationZenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationPremium Server Client Software
Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management
More informationCRESTRON-APP-ANDROID Control App for Android
1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and
More information1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
More informationDomus, the connected home
Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,
More informationTronico Technology Company Limited. First step of IOT - DIY smart home
Tronico Technology Company Limited First step of IOT - DIY smart home What is IOT? 2 The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items that enables
More informationHaving Fun with QNAP and your Home Automation
Having Fun with QNAP and your Home Automation The popularity of home automation has been increasing greatly in recent years due to much higher affordability and greater simplicity via smartphone and tablet
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More information3G Wireless-N Smart Energy Gateway
Join BEsmart Partner Alliance Network at www.smartgrid.com.tw/besmart Ideal for 3G Wireless-N Smart Energy Gateway The, 3G Wireless-N Smart Energy Gateway, is an all-in-one router designed for users to
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More informationCareSentinel Set Up Guide for Android Devices
CareSentinel Set Up Guide for Android Devices Compatible Devices: Only devices running Android 4.3 or newer support Bluetooth Smart. Any smart phone or tablet running an Android operating system older
More informationHow To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For
Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com
More informationGadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
More informationCiphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
More informationXopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
More informationDesign of Home Automation Framework With Social Network Integration
Design of Home Automation Framework With Social Network Integration Warodom Werapun, Amatawit Kamhang, Aekawat Wachiraphan Department of Computer Engineering, Faculty of Engineering Prince of Songkla University
More informationIOS EYE4 APP User Manual
IOS EYE4 APP User Manual Eye4 App can be downloaded from Google Play (Android) and App Store (IOS). Besides, it can be downloaded from http://www.eye4.so/download/ The below user manual is based on Eye4
More informationITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationUser's Guide. [Home Network] app. Model No.
User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it
More informationTable of Contents. 3 Setup 6 Home Screen 8 Modes 12 Watch Live & Timeline 17 HomeHealth Technology 21 Emergency Options 24 Settings 26 Plans 28 Help
User Guide Table of Contents 3 Setup 6 Home Screen 8 Modes 12 Watch Live & Timeline 17 HomeHealth Technology 21 Emergency Options 24 Settings 26 Plans 28 Help 2 Setup Divider text Secure Setup 1. Download
More informationIntroducing BEEKS Proximity Solutions. Developer Kit Gets You Started
Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationDesign for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationOpen Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next.
Server Type: POP3 or IMAP Incoming(POP3 or IMAP) Mail Server: student.ncnm.edu POP3 Port: 995 (SSL) IMAP Port: 993 (SSL) Outgoing(SMTP) Mail Server: student.ncnm.edu SMTP Port: 587 (TLS) (Users must change
More informationFig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationEntrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
More informationA state-of-the-art solution that brings mobility to SCADA alarms
A state-of-the-art solution that brings mobility to SCADA alarms SCADA-Aware Mobile far exceeds the capabilities of SMS, e-mail, and pagers, and delivers alarms to the mobile device in the most reliable
More informationWebIO Internet connected Wireless Temperature Sensor Monitor and Alert Software
Page1 WebIO Internet connected Wireless Temperature Sensor Monitor and Alert Software Manual WebIO-TM Beta version 1.20 12/29/2009 The WebIO Temperature Monitor PC software (WebIO-TM) will monitor your
More informationPreparing Log-ic 360 USB Loggers for Use
Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.
More informationFast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
More informationWAM Remote Wireless Asset Monitoring. Website User Guide
WAM Remote Wireless Asset Monitoring Website User Guide Table of Contents Overview... 2 Login Page... 2 Quick Start Guide...3-4 Locations Page... 5 Devices Page... 5 Register Devices Page... 6 Temp or
More informationMTP. MTP AirWatch Integration Guide. Release 1.0
MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of
More informationOpen Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
More informationUC-One. Epik. UC-One Quick Guide. Quick Guide For Apps. Why we love UC-One
Quick Guide For Apps Epik UC-One UC-One is part of our Epik suite enabling you to access all your communication services, telephony, video, IM and presence from any supported device. Contact Integration
More informationCampus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
More informationSYSPRO App Store: Registration Guide
SYSPRO App Store: Registration Guide SYSPRO App Store Registration Guide 2 Table of Contents What is the SYSPRO App Store?... 3 The SYSPRO App Store URL... 3 Who can use it?... 3 Register as a customer...
More informationAdRadionet to IBM Bluemix Connectivity Quickstart User Guide
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things
More informationAdministrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationNAS 243 Using AiData on Your Mobile Devices
NAS 243 Using AiData on Your Mobile Access and manage files on your NAS with ios and Android devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to:
More informationHow To Use Titanium Studio
Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 alessandro.grazioli81@gmail.com 2015 Parma Outline Introduction Installation and Configuration
More informationProtected Trust Setup Guide for Brother MFC Devices
Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationReport of Research Results
Report of Research Results Scaling and Deployment of e-guardian to Eldercare Centers and Single Elderly Homes Primary Researcher: Prof. Tan Kok Kiong, Department of Electrical and Computer Engineering
More informationBlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...
Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting
More informationAndroid App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it
Android App for SAP Business One Z3moB1le App Version 1.00 Pagina 1 di 12 Z3 Mobile for SAP Business One (Z3moB1le) Contents Overview... 3 Phone requirements... 3 Available modules... 4 Settings before
More informationVL Touchscreen Alarm. A Brilliantly Crafted Touchscreen Security System that Revolutionizes Your World
VL Touchscreen Alarm A Brilliantly Crafted Touchscreen Security System that Revolutionizes Your World Crafted with Incredible Intelligence Introducing the new VL touchscreen panel A modern security panel
More informationMy Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationUsing the owncloud Android App
Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special
More informationDecember 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
More informationMOBILE BANKING USER GUIDE
MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees
More informationRecommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router
Recommended QoS Configuration Settings for TP-LINK Archer C3200 Wireless Router Recommended QoS Configuration TP-LINK Archer C3200 Contents Contents Introduction.......................................
More informationWALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world
WALL TABLET W I T H WA L L C H A R G I N G S TAT I O N Smart Home Controller Control your home from anywhere in the world WALL TABLET Connect everything Makes every home safe, comfortable and energy efficient
More informationPRIVACY POLICY. The Policy is incorporated into Terms of Use and is subject to the terms laid down therein.
PRIVACY POLICY This Privacy Policy ( Policy ) applies to the website Creditseva.com which is an online internet portal ( Creditseva ), offering credit repair, credit monitoring and credit consulting services
More informationSemantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
More informationFairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
More informationTrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationInitial Setup of Mac Mail with IMAP for OS X Lion
Concept Initial Setup of Mac Mail This document describes the procedures for setting up the Mac Mail client to receive messages from Google Mail using Internet Message Access Protocol (IMAP) with the Mac
More informationCRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios
1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide
More informationCARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
More informationUltimate Server Client Software
Ultimate Server Client Software GPRS NET Data Logger Ul mate Server is dedicatedly developed for high volume data applica on. 1. Receive data from Data Loggers in UDP or TCP via GPRS, Ethernet and SMS
More informationVehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
More informationEyeOn Baby Camera User Guide for Android smartphone and tablet
EyeOn Baby Camera User Guide for Android smartphone and tablet Important safety information Inside the box Minimum requirements The EyeOn Baby Camera at a glance Let s get started Start monitoring Don
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationCloud-based Data Logging, Monitoring and Analysis
Industry 4.0, Internet of Things (IoT), Cloud Computing Cloud-based Data Logging, Monitoring and Analysis Measurement System Using Windows Azure, SQL Server, LabVIEW and Visual Studio/C# Hans-Petter Halvorsen,
More informationPI Cloud Connect Overview
PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI
More informationSpring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
More informationConfiguration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
More informationCOPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM)
COPYRIGHT RESERVED TEAM MYSTERIOUS MANIACS http://www.mysteriousmaniacs.tk/ HOME AUTOMATION via BLUETOOTH (Using ANDROID PLATFORM) 0 TEAM MEMBERS SYED HUSSAIN RAZA NAQVI SYED MUHAMMAD TAHIR RAZA MUHAMMAD
More informationHome Internet Filter User Guide
Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter
More information