Smartphone-Enabled Aerosol Particle Analysis Device
نویسندگان
چکیده
منابع مشابه
A framework for smartphone-enabled, patient-generated health data analysis
BACKGROUND Digital medicine and smartphone-enabled health technologies provide a novel source of human health and human biology data. However, in part due to its intricacies, few methods have been established to analyze and interpret data in this domain. We previously conducted a six-month interventional trial examining the efficacy of a comprehensive smartphone-based health monitoring program ...
متن کاملButton-enabled Device Association
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-theMiddle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of which involve the user in the pai...
متن کاملTouch Driven Interaction via NFC Enabled Smartphone
Near Field Communication (NFC) is a set of standards for smart phones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, within few inches. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. The NFC is a promisin...
متن کاملSmartphone-Enabled Otoscopy in Neurotology/Otology.
Objective A smartphone-enabled otoscope (SEO) can capture tympanic membrane (TM) images. We sought to compare a SEO to microscopic otoscopy in the detection and evaluation of TM pathology in an otology/neurotology practice. Study Design Prospective single-site study in adults presenting over a 3-month period. Setting Neurotology clinic within a tertiary care academic medical center. Subjects an...
متن کاملButton-enabled Device Pairing
Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2930776