Matching Items (31)

134719-Thumbnail Image.png

Trusted Trade-in: Building a Startup from Scratch

Description

Smartphones have become an integral component of lifestyles worldwide, acting as mobile computers capable of life organization. They remain the most quickly cycled consumer electronic, owned for no more than

Smartphones have become an integral component of lifestyles worldwide, acting as mobile computers capable of life organization. They remain the most quickly cycled consumer electronic, owned for no more than 3 years on average. Individuals continue to upgrade their smartphones quickly, stemming from the desire for more power and better features. In 2016, there were 1.15 billion smartphone upgrades, resulting in a growing used smartphone market valued at \$18 billion. Individuals continue to invest time and effort to sell their smartphone, receiving payment of less than market value. In regards to value-minded users with solidified schedules, I created Trusted Trade-in. This startup provides the bustling middle class with the ability to upgrade their smartphone in an efficient and valuable manner. Compared to current solutions, Trusted Trade-in offers an all-in-one upgrade system. The creation of this startup involved the complete creation of a business model in addition to the coding of a responsive website. An online-based business, customers will be able to visit the Trusted Trade-in website and be given the options to trade-in or trade-up. Competing against Craigslist, eBay and Verizon, Trusted Trade-in features a combined smartphone resale and upgrade process. If the decision is made to trade-in, the customer will be quoted for their current smartphone according to specific physical criteria. The trade-up option will request the same information from the customer and allow them to select a new model for their upgrade. This exciting and innovative marketplace will completely transform the way people upgrade their smartphones through financial and time-based savings.

Contributors

Agent

Created

Date Created
  • 2017-05

135157-Thumbnail Image.png

The Rest Egg Smartphone Connection: Accessibility, Utility, and Ease of Use via Mobile Application Support

Description

This document introduces the need for the Rest Egg system and defines an accessible method of smartphone integration. Excessive noise can prevent recovering patients and special needs persons from resting

This document introduces the need for the Rest Egg system and defines an accessible method of smartphone integration. Excessive noise can prevent recovering patients and special needs persons from resting correctly. The Rest Egg was designed for these people- people who are in critical need of quality rest but are often unable to eliminate stressors themselves. This system ensures their environment is calm by alerting caretakers' smartphones if noise reaches abrasive levels. Smartphones were the preferred device due to the wide spread of such devices in today's market. After making open sourcing a goal, something ubiquitous and affordable \u2014 yet usable and dependable \u2014 was necessary for the alert system. These requirements lead to the election an online alert service: Pushover, a trademark and product of Superblock, LLC.

Contributors

Agent

Created

Date Created
  • 2016-05

135282-Thumbnail Image.png

Reliability of Real-Time Video Smartphone for Assessing National Institutes of Health Stroke Scale in Stroke Patients: The Next Generation of Telestroke

Description

Telestroke networks reduce disparities in acute stroke care between metropolitan primary stroke centers and remote hospitals. Current technologies used to conduct remote patient assessments have very high start-up costs, yet

Telestroke networks reduce disparities in acute stroke care between metropolitan primary stroke centers and remote hospitals. Current technologies used to conduct remote patient assessments have very high start-up costs, yet they cannot consistently establish quality connection in a timely manner. Smartphgones can be used for high quality video teleconferencing (HQ-VTC). They are relatively inexpensive and widley used among healthcare providers. We aimed to study the reliability of HQ-VTC using smartphones for conducting the NIHSS. Two vascular neurologists (VNs) assessed 83 stroke patients with the NIHSS. The remote VN assessed patients using videoconferencing on a smartphone with the assistance of a bedside medical aide. The bedside VN rated patients ontemporaneously. Each VN was blinded to the other's NIHSS scores. We tested the inter-method agreement and physician satisfaction with the device. We demonstrated high total NIHSS score correlation between the methods (r=0.941, p<0.001). The mean total NIHSS scores for bedside and remote assessments were 7.3 plus or minus 7.9 and 6.7 plus or minus 7.6 with ranges of 0-30 and 0-37, respectively. Seven NIHSS categories had significantly high agreement beyond chance: LOC-questions, LOC-commands, visual fields, motor left arm, motor right arm, motor left leg, motor right leg; seven categories had moderate agreement: LOC-consciousness, best gaze, facial palsy, sensory, best language, dysarthria, extinction/inattention; one category had poor agreement: ataxia. There was high physician satisfaction with the device. The VNs rated 96% of the assessments as good or very good for "image quality," "sound quality," "ease of use," and "ability to assess subject using NIHSS," and 84% of the assesssments as good or very good for "reception in hospital." The smartphones with HQ-VTC is reliable, easy to use, and affordable for telestroke NIHSS administration. This device has high physician satisfaction. With the variety of smartphones and professional medical applications available today, the telestroke practitioner has all the tools necessary for fast clinical decision-makingby accessing electronic medial records, viewing images, and tracking patient vitals.

Contributors

Agent

Created

Date Created
  • 2012-05

137798-Thumbnail Image.png

Comparing Website Recall on Mobile Devices: Smartphones vs. Tablets

Description

Website usage on both smartphone and tablet devices is rapidly increasing. Website success hinges largely upon how well information on the site is recalled and perceived. The purpose of this

Website usage on both smartphone and tablet devices is rapidly increasing. Website success hinges largely upon how well information on the site is recalled and perceived. The purpose of this study is to explore the question of whether or not the differences in display size and resolution of smartphone versus tablet devices affect the recall of website information. I hypothesize that tablets will produce greater website recall than smartphones, due to their larger screen size and higher resolution which may reduce cognitive strain. During the study, participants viewed a sample website for two minutes on either an iPhone or iPad, and then participated in a brief 20 question memory test to evaluate how well they remembered the website information. Although test scores for the iPad users were about one test point higher than test scores for the iPhone users, the difference was not statistically significant. However, the study was limited by the low sample size (n = 94). This indicates that further research may find that tablets indeed allow for increased recall of certain kinds of website content.

Contributors

Agent

Created

Date Created
  • 2013-05

133511-Thumbnail Image.png

Relationship Satisfaction Across Fourteen Days: A Smartphone-Based Ecological Momentary Assessment Study

Description

Almost sixty percent of adults within the United States are in a married or committed, cohabiting relationship. This study sought to examine the trajectory of relationship satisfaction over 14 consecutive

Almost sixty percent of adults within the United States are in a married or committed, cohabiting relationship. This study sought to examine the trajectory of relationship satisfaction over 14 consecutive days employing an ecological momentary assessment (EMA) method. Daily reports of relationship satisfaction were collected via a smartphone application developed from the LifeData platform. Phone-based interview questions posed one week after the 14-day EMA period afforded evaluation of usability and acceptability, in preparation for a much larger study of couples coping with cancer. Twenty-seven adults in a married or committed, cohabitating relationship served as participants, recruited from researchmatch.org. (These individuals were not coping with cancer.) Participants received a smartphone notification between 7:30pm and 8:30pm each day, with 45 minutes to begin recording their responses. A single item from the Dyadic Adjustment Scale (item #31) was used to assess relationship satisfaction. Findings revealed a marginally significant increase in satisfaction over the course of 14 days (b = 0.04, t = 1.85, p = .077). In addition, an intraclass correlation (ICC) value of 0.59 indicated larger between-person variability than within-person variability, suggesting that satisfaction varies more from one individual to another than it does within individuals over time. Finally, plots of mean relationship satisfaction by the standard deviation of relationship satisfaction showed lower variability in day-to-day satisfaction among those who were on average more satisfied with their relationship compared to those who were on average less satisfied. Feedback regarding convenience and ease of the application indicated favorable attitudes towards smartphone-based data collection.

Contributors

Agent

Created

Date Created
  • 2018-05

136464-Thumbnail Image.png

The Medical Pal: A Smartphone Application to Improve Healthcare Delivery to Palliative Patients

Description

Smartphone-based healthcare. It's becoming more real as technology advances, adding value to healthcare and opening the doors to more personalized medicine. The Medical Pal is a smartphone application that can

Smartphone-based healthcare. It's becoming more real as technology advances, adding value to healthcare and opening the doors to more personalized medicine. The Medical Pal is a smartphone application that can track symptoms and analyze trends in the severity of those symptoms, alerting healthcare providers when there is a significant increase in the symptom severity. This is especially directed to the palliative patient, whose care is focused on managing symptoms and providing comfort. The HIPAA-compliant server used for the smartphone application was Catalyze.io and 40 Mayo Clinic Arizona palliative patients were surveyed on their smartphone usage to test the acceptance of this app in a clinical setting. A trial involving 9 simulated patients was conducted over a two week period to test the functionality of the app. A majority of surveyed patients (85%) expressed favor for the idea of a mobile ESAS, and the app was functioning, with the capability of displaying patient data on a healthcare provider's account. This project is intentionally a door-opener to an open field of opportunity for mobile health, symptom observation, and improvements in healthcare delivery.

Contributors

Agent

Created

Date Created
  • 2015-05

137375-Thumbnail Image.png

Evaluation of Multiplayer Modes in Mobile Apps

Description

Smartphones have become increasingly common over the past few years, and mobile games continue to be the most common type of application (Apple, Inc., 2013). For many people, the social

Smartphones have become increasingly common over the past few years, and mobile games continue to be the most common type of application (Apple, Inc., 2013). For many people, the social aspect of gaming is very important, and thus most mobile games include support for playing with multiple players. However, there is a lack of common knowledge about which implementation of this functionality is most favorable from a development standpoint. In this study, we evaluate three different types of multiplayer gameplay (pass-and-play, Bluetooth, and GameCenter) via development cost and user interviews. We find that pass-and-play, the most easily-implemented mode, is not favored by players due to its inconvenience. We also find that GameCenter is not as well favored as expected due to latency of GameCenter's servers, and that Bluetooth multiplayer is the most well favored for social play due to its similarity to real-life play. Despite there being a large overhead in developing and testing Bluetooth and GameCenter multiplayer due to Apple's development process, this is irrelevant since professional developers must enroll in this process anyway. Therefore, the most effective multiplayer mode to develop is mostly determined by whether Internet play is desirable: Bluetooth if not, GameCenter if so. Future studies involving more complete development work and more types of multiplayer modes could yield more promising results.

Contributors

Created

Date Created
  • 2013-12

137724-Thumbnail Image.png

Perceived Confidentiality of Mobile Application Data

Description

Over the past several years, the three major mobile platforms have seen
tremendous growth and success; as a result, the platforms have been the target
of many malicious attacks. These

Over the past several years, the three major mobile platforms have seen
tremendous growth and success; as a result, the platforms have been the target
of many malicious attacks. These attacks often request certain permissions in
order to carry out the malicious activities, and uninformed users usually grant
them. One prevalent example of this type of malware is one that requests
permission  to  the  device’s  SMS  service,  and  once  obtained,  uses  the  SMS
service to accrue charges to the user. This type of attack is one of the most
prevalent on the Android application marketplace, and requires a long-term
solution. Replication of an attack is necessary to fully understand efficient
prevention methods, and due to the open-source nature of Android development,
to determine the likely mechanics of the attack as feasible.
This study uses the Hacker News application, an open source application
that is available for download through GitHub as a basis for creating a malware
application to study the SMS attack and explore prevention methods. From the
results and knowledge gained from both research and experimentation, a
proposition for a more secure operating system architecture was defined to
prevent and mitigate various attacks on mobile systems with a focus on SMS
attacks.

Contributors

Agent

Created

Date Created
  • 2013-05

Graphical representations of security settings in Android

Description

On Android, existing security procedures require apps to request permissions for access to sensitive resources.

Only when the user approves the requested permissions will the app be installed.

However, permissions are an

On Android, existing security procedures require apps to request permissions for access to sensitive resources.

Only when the user approves the requested permissions will the app be installed.

However, permissions are an incomplete security mechanism.

In addition to a user's limited understanding of permissions, the mechanism does not account for the possibility that different permissions used together have the ability to be more dangerous than any single permission alone.

Even if users did understand the nature of an app's requested permissions, this mechanism is still not enough to guarantee that a user's information is protected.

Applications can potentially send or receive sensitive information from other applications without the required permissions by using intents.

In other words, applications can potentially collaborate in ways unforeseen by the user, even if the user understands the permissions of each app independently.

In this thesis, we present several graph-based approaches to address these issues.

We determine the permissions of an app and generate scores based on our assigned value of certain resources.

We analyze these scores overall, as well as in the context of the app's category as determined by Google Play.

We show that these scores can be used to identify overzealous apps, as well as apps that do not properly fit within their category.

We analyze potential interactions between different applications using intents, and identify several promiscuous apps with low permission scores, showing that permissions alone are not sufficient to evaluate the security risks of an app.

Our analyses can form the basis of a system to assist users in identifying apps that can potentially compromise user privacy.

Contributors

Agent

Created

Date Created
  • 2015

154095-Thumbnail Image.png

Toward monitoring, assessing, and confining mobile applications in modern mobile platforms

Description

Smartphones are pervasive nowadays. They are supported by mobile platforms that allow users to download and run feature-rich mobile applications (apps). While mobile apps help users conveniently process personal data

Smartphones are pervasive nowadays. They are supported by mobile platforms that allow users to download and run feature-rich mobile applications (apps). While mobile apps help users conveniently process personal data on mobile devices, they also pose security and privacy threats and put user's data at risk. Even though modern mobile platforms such as Android have integrated security mechanisms to protect users, most mechanisms do not easily adapt to user's security requirements and rapidly evolving threats. They either fail to provide sufficient intelligence for a user to make informed security decisions, or require great sophistication to configure the mechanisms for enforcing security decisions. These limitations lead to a situation where users are disadvantageous against emerging malware on modern mobile platforms. To remedy this situation, I propose automated and systematic approaches to address three security management tasks: monitoring, assessment, and confinement of mobile apps. In particular, monitoring apps helps a user observe and record apps' runtime behaviors as controlled under security mechanisms. Automated assessment distills intelligence from the observed behaviors and the security configurations of security mechanisms. The distilled intelligence further fuels enhanced confinement mechanisms that flexibly and accurately shape apps' behaviors. To demonstrate the feasibility of my approaches, I design and implement a suite of proof-of-concept prototypes that support the three tasks respectively.

Contributors

Agent

Created

Date Created
  • 2015