Search results

1 – 10 of 33
Article
Publication date: 25 July 2020

Saravanan S. and Sudhakar P.

Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist…

Abstract

Purpose

Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist doctors by using mobile internet communication. Some rural areas have slow internet speed because of weak internet signal propagation from mobile towers. A good design of antenna is needed to improve mobile internet speed for big medial data transmission in telemedicine application. Hence, this paper aims to propose economically low-cost design of antenna.

Design/methodology/approach

Telemedicine recommended to design the satellite frequency modulation dish (SAT FMD) antenna ( where in FM radio antenna, dish antenna are combined ) to improve the internet speed at Telemedicine system and Hospitals for purpose of Telemedicine communication and information for emergency treatment.

Findings

In the proposed system, designed SAT FMD satellite-based antenna improved internet speed is achieved at 90.6% accuracy in this research method. Finding latitude and longitude angles to identify the patient location, nearest hospitals location and finding distance, shortest path routing between patient and hospital. Finding elevation, Azimuth, latitude, longitude, skew for alignment dish to focus satellite and mobile cell tower to improve internet speed at telemedicine area and hospitals and reduced transmission delay and nodal delay of big medical data.

Social implications

The social awareness among people can be shared information of accident patient to communicate Hospital and Ambulance driver by internet mobile app tools and help find nearest hospitals to emergency treatment for accident people.

Originality/value

This paper presents SAT FMD antenna model based on satellite dish antenna consisting of FM radio receiver antenna and dish antenna for telemedicine communication.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 August 2020

Prabu S., Balamurugan Velan, Christalin Nelson S., Jayasudha F.V., Visu P. and Janarthanan K.

The purpose of this paper is to review the techniques for versatile advancements in contact tracing for the coronavirus disease 2019 (COVID-19) positive cases in this pandemic and…

Abstract

Purpose

The purpose of this paper is to review the techniques for versatile advancements in contact tracing for the coronavirus disease 2019 (COVID-19) positive cases in this pandemic and to introduce the way of using the mobile location information collected within the country India. As the method, an exploratory review of current measures was conducted for confirmed COVID-19 contact tracing after understanding the current situation of the world. This paper has examined the way of using free locational information in an innovative way to reduce the spread of COVID-19 spread.

Design/methodology/approach

COVID-19 pandemic is the utmost global economic and health challenge of the century. One powerful and consistent procedure to slow down the spread and decrease the effect of COVID-19 is to track the essential and auxiliary contacts of confirmed COVID-19 positive cases by using contact-tracing innovation.

Findings

Although it takes the information from various clients, there are numerous odds in the information. The sincere measures were taken by the authors to avoid the abuse of information by any kind. A portion of the tips for keeping information from getting abused is on the whole, the information ought to be with just higher specialists, and they ought not to have the authorization to impart information to anybody.

Originality/value

This paper helps to track the COVID-19 positive cases as of now by using the field information assortment and outbreak examination stages. At the same time, mobile location information used inside the current guideline, rules for information handlers must incorporate measures to reduce the abusing of information.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 4 July 2019

Benjamin Bricker

We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by even the…

Abstract

We live in an age of unparalleled access to personal data. Technological advances that seem second nature today allow for the mass accumulation of personal information by even the smallest of companies. The same technology also can be used directly by the state to accumulate mass information on its citizens. In the hands of government law enforcement officials, these surveillance advances also can be used to greatly enhance the state’s ability to exercise social control – a circumstance that has both positive and negative connotations. This chapter discusses the increasingly important confluence of privacy rights, surveillance, and social control as seen from a constitutional standpoint.

After years of limiting the expectations of privacy that citizens may have in their day-to-day lives, several recent Supreme Court decisions have attempted to take account of the privacy expectations held by individuals in today’s ever-evolving technological world, and in doing so have limited the ability of law enforcement to engage in surveillance without first obtaining a warrant. Yet more needs to be done. Specifically, the author argues that the law of standing must be updated to permit judicial claims by individuals who challenge the legality and constitutionality of comprehensive surveillance programs.

Details

Political Authority, Social Control and Public Policy
Type: Book
ISBN: 978-1-78756-049-9

Keywords

Case study
Publication date: 15 November 2019

Mohanbir Sawhney, Birju Shah, Ryan Yu, Evgeny Rubtsov and Pallavi Goodman

Uber had pioneered the growth and delivery of modern ridesharing services by leveraging the explosive growth of technology, GPS navigation, and smartphones. Ridesharing services…

Abstract

Uber had pioneered the growth and delivery of modern ridesharing services by leveraging the explosive growth of technology, GPS navigation, and smartphones. Ridesharing services had expanded across the world, growing rapidly in the United States, China, India, Europe, and Southeast Asia. Even as these services expanded and gained popularity, however, the pickup experience for drivers and riders did not always meet the expectations of either party. Pickups were complicated by traffic congestion, faulty GPS signals, and crowded pickup venues. Flawed pickups resulted in rider dissatisfaction and in lost revenues for drivers. Uber had identified the pickup experience as a top strategic priority, and a team at Uber, led by group product manager Birju Shah, was tasked with designing an automated solution to improve the pickup experience. This involved three steps. First, the team needed to analyze the pickup experience for various rider personas to identify problems at different stages in the pickup process. Next, it needed to create a model for predicting the best rider location for a pickup. The team also needed to develop a quantitative metric that would determine the quality of the pickup experience. These models and metrics would be used as inputs for a machine learning.

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

Article
Publication date: 19 October 2012

Bernadette Richardson

The purpose of this paper is to illustrate the outcomes of the RED (Routing on Empirical Data) Project, a three year cross‐jurisdictional collaborative undertaking in the State of…

Abstract

Purpose

The purpose of this paper is to illustrate the outcomes of the RED (Routing on Empirical Data) Project, a three year cross‐jurisdictional collaborative undertaking in the State of California that significantly improved the efficiency of the State's wireless 9‐1‐1 emergency communications system.

Design/methodology/approach

The Project's approach looked at historical wireless call data over a three‐year period and created accurate jurisdictional shapefiles to identify actual call origination and determine statistically which Public Safety Answering Point (PSAP) should receive wireless 9‐1‐1 calls routed to a particular wireless sector.

Findings

The findings or outcomes of the project were that busy signals previously in the 9‐1‐1 system were dramatically reduced to 2.3 per cent of total call volume in 2011 from 42.4 per cent of total call volume in 2007. This occurred with a concurrent 29 per cent increase in call volume over the same time period.

Practical implications

The practical and social implications for improvement in public safety are significant given the improvements in emergency response time that the project's outcome provides. Exponential increases in wireless phone usage over the past decade makes review of emergency communication infrastructure essential to ensure expeditious delivery of emergency services to the 9‐1‐1 calling public. Whether fire, ambulance or law enforcement response is required, when delay is inserted into the process of answering 9‐1‐1 calls, a reduction in the likelihood of a positive outcome occurs.

Originality/value

The outcomes of the RED Project show that Local and State government collaboration using empirical data studies can ensure emergency communication systems are optimized and ready for Next Generation technologies.

Article
Publication date: 13 March 2017

Sreedhar Madhavaram, Victor Matos, Ben A. Blake and Radha Appan

This paper aims to focus on the role of information and communication technologies (ICTs) in preparation for and management of human and/or nature induced disasters.

Abstract

Purpose

This paper aims to focus on the role of information and communication technologies (ICTs) in preparation for and management of human and/or nature induced disasters.

Design/methodology/approach

Drawing from the phenomenal growth of ICTs, initiatives aimed at disaster management, stakeholder theory, prior research and the successful development and implementation of 9-1-1 (emergency telephone service of the USA), this paper explores ICTs in the context of human and/or nature induced disasters.

Findings

This paper discusses a new ICT for mitigating disaster management, scans, using stakeholder theory, relevant initiatives and prior research to identify the stakeholders relevant for successful preparation for and management of disasters, and draws from the 9-1-1 example to discuss how ICTs can be successfully developed and adopted.

Research limitations/implications

There are opportunities for researchers to develop ICTs that can make countries, developing and developed, more efficient and effective in their preparation for and management of nature and human induced disasters. In addition, researchers can investigate the role of stakeholders in facilitating the adoption of new ICTs developed for disaster management. Researchers could also help public policy in designing the most efficient and effective programs for the adoption of new ICTs.

Practical/implications

As an example of new ICTs that can potentially mitigate the effect of disasters, this paper discusses the E711 text-message mobile phone service (named “I am OK”) and provides a description of how this protocol operates and can be implemented. There are tremendous opportunities to develop new ICTs in the context of disaster management.

Social/implications

This paper argues that ICTs such as E711 can have a major impact on all countries in general and poor and developing nations in particular. Specifically, in the bottom of the pyramid (BOP) markets, developing ICTs for BOP market in the context of managing human and nature induced disasters and ensuring the diffusion of such ICT innovations is both critical and challenging.

Originality/value

This paper discusses the role and importance of ICTs in disaster management, identifies relevant stakeholders, discusses how ICTs can be diffused and implemented and calls on and hopes to provide an impetus to research on ICTs that can aid in the preparation for and the management of disasters.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 01
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 22 March 2021

Qiwei Han, Margarida Abreu Novais and Leid Zejnilovic

The purpose of this paper is to propose and demonstrate how Tourism2vec, an adaptation of a natural language processing technique Word2vec, can serve as a tool to investigate…

Abstract

Purpose

The purpose of this paper is to propose and demonstrate how Tourism2vec, an adaptation of a natural language processing technique Word2vec, can serve as a tool to investigate tourism spatio-temporal behavior and quantifying tourism dynamics.

Design/methodology/approach

Tourism2vec, the proposed destination-tourist embedding model that learns from tourist spatio-temporal behavior is introduced, assessed and applied. Mobile positioning data from international tourists visiting Tuscany are used to construct travel itineraries, which are subsequently analyzed by applying the proposed algorithm. Locations and tourist types are then clustered according to travel patterns.

Findings

Municipalities that are similar in terms of their scores of their neural embeddings tend to have a greater number of attractions than those geographically close. Moreover, clusters of municipalities obtained from the K-means algorithm do not entirely align with the provincial administrative segmentation.

Details

International Journal of Contemporary Hospitality Management, vol. 33 no. 6
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 30 March 2012

Ingrid Burbey and Thomas L. Martin

Location‐prediction enables the next generation of location‐based applications. The purpose of this paper is to provide a historical summary of research in personal…

Abstract

Purpose

Location‐prediction enables the next generation of location‐based applications. The purpose of this paper is to provide a historical summary of research in personal location‐prediction. Location‐prediction began as a tool for network management, predicting the load on particular cellular towers or WiFi access points. With the increasing popularity of mobile devices, location‐prediction turned personal, predicting individuals' next locations given their current locations.

Design/methodology/approach

This paper includes an overview of prediction techniques and reviews several location‐prediction projects comparing the raw location data, feature extraction, choice of prediction algorithms and their results.

Findings

A new trend has emerged, that of employing additional context to improve or expand predictions. Incorporating temporal information enables location‐predictions farther out into the future. Appending place types or place names can improve predictions or develop prediction applications that could be used in any locale. Finally, the authors explore research into diverse types of context, such as people's personal contacts or health activities.

Originality/value

This overview provides a broad background for future research in prediction.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

1 – 10 of 33