Results (31)
Search Parameters:
Keyword: Mobile ApplicationA Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques
Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…
Read MoreMeasuring modifiability in model driven development using object oriented metrics
Model driven development is an important role in software engineering. It consists of multiple transformation functions. This development is a paradigm for writing and implementing computer program quickly, effectively, at minimum cost and reducing development efforts because it transforms design model to object-oriented code. Our approach is rule-based model driven development in which textual Umple…
Read MoreSegmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery
The evolution of technology has changed the face of education, especially when combined with appropriate pedagogical bases. This combination has created innovation opportunities in order to add quality to teaching through new perspectives for traditional methods applied in the classroom. In the Health field, particularly, augmented reality and interaction design techniques can assist the teacher…
Read MoreManagement of Health Information in Malawi: Role of Technology
This paper is an extended version of the conference paper presented at IST Africa Week Conference 2016 and it discusses in detail the existing technology gaps using DHIS2 (District Health Information System 2.0) as an example, and how Geographic Information System (GIS) and mobile application, as specific examples of technology, can enhance health management information…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read MoreDetection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System
The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…
Read More
