21 research outputs found

    Wearable Devices in Health Monitoring from the Environmental towards Multiple Domains: A Survey

    Get PDF
    The World Health Organization (WHO) recognizes the environmental, behavioral, physiological, and psychological domains that impact adversely human health, well-being, and quality of life (QoL) in general. The environmental domain has significant interaction with the others. With respect to proactive and personalized medicine and the Internet of medical things (IoMT), wearables are most important for continuous health monitoring. In this work, we analyze wearables in healthcare from a perspective of innovation by categorizing them according to the four domains. Furthermore, we consider the mode of wearability, costs, and prolonged monitoring. We identify features and investigate the wearable devices in the terms of sampling rate, resolution, data usage (propagation), and data transmission. We also investigate applications of wearable devices. Web of Science, Scopus, PubMed, IEEE Xplore, and ACM Library delivered wearables that we require to monitor at least one environmental parameter, e.g., a pollutant. According to the number of domains, from which the wearables record data, we identify groups: G1, environmental parameters only; G2, environmental and behavioral parameters; G3, environmental, behavioral, and physiological parameters; and G4 parameters from all domains. In total, we included 53 devices of which 35, 9, 9, and 0 belong to G1, G2, G3, and G4, respectively. Furthermore, 32, 11, 7, and 5 wearables are applied in general health and well-being monitoring, specific diagnostics, disease management, and non-medical. We further propose customized and quantified output for future wearables from both, the perspectives of users, as well as physicians. Our study shows a shift of wearable devices towards disease management and particular applications. It also indicates the significant role of wearables in proactive healthcare, having capability of creating big data and linking to external healthcare systems for real-time monitoring and care delivery at the point of perception

    Task delegation from AI to humans: A principal-agent perspective

    Get PDF
    Increasingly intelligent AI artifacts in human-AI systems perform tasks more autonomously as entities that guide human actions, even changing the direction of task delegation between humans and AI. It has been shown that human-AI systems achieve better results when the AI artifact takes the leading role and delegates tasks to a human rather than the other way around. This study presents phenomena, conflicts, and challenges that arise in this process, explored through the theoretical lens of principal-agent theory (PAT). The findings are derived from a systematic literature review and an exploratory interview study and are placed in the context of existing constructs of PAT. Furthermore, this article paper identifies new causes of tensions that arise specifically in AI-to-human delegation and calls for special mechanisms beyond the classical solutions of PAT. The paper thus contributes to the understanding of autonomous AI and its implications for human-AI delegation

    Malicious UAV detection using integrated audio and visual features for public safety applications

    Get PDF
    RÉSUMÉ: Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently an open research issue for security provisioning companies. Recently, the problem has been addressed by a plethora of schemes. However, each plan has a limitation, such as extreme weather conditions and huge dataset requirements. In this paper, we propose a novel framework consisting of the hybrid handcrafted and deep feature to detect and localize malicious drones from their sound and image information. The respective datasets include sounds and occluded images of birds, airplanes, and thunderstorms, with variations in resolution and illumination. Various kernels of the support vector machine (SVM) are applied to classify the features. Experimental results validate the improved performance of the proposed scheme compared to other related methods

    Quality Properties of Execution Tracing, an Empirical Study

    Get PDF
    The authors are grateful to all the professionals who participated in the focus groups; moreover, they also express special thanks to the management of the companies involved for making the organisation of the focus groups possible.Data are made available in the appendix including the results of the data coding process.The quality of execution tracing impacts the time to a great extent to locate errors in software components; moreover, execution tracing is the most suitable tool, in the majority of the cases, for doing postmortem analysis of failures in the field. Nevertheless, software product quality models do not adequately consider execution tracing quality at present neither do they define the quality properties of this important entity in an acceptable manner. Defining these quality properties would be the first step towards creating a quality model for execution tracing. The current research fills this gap by identifying and defining the variables, i.e., the quality properties, on the basis of which the quality of execution tracing can be judged. The present study analyses the experiences of software professionals in focus groups at multinational companies, and also scrutinises the literature to elicit the mentioned quality properties. Moreover, the present study also contributes to knowledge with the combination of methods while computing the saturation point for determining the number of the necessary focus groups. Furthermore, to pay special attention to validity, in addition to the the indicators of qualitative research: credibility, transferability, dependability, and confirmability, the authors also considered content, construct, internal and external validity

    Prediction model of alcohol intoxication from facial temperature dynamics based on K-means clustering driven by evolutionary computing

    Get PDF
    Alcohol intoxication is a significant phenomenon, affecting many social areas, including work procedures or car driving. Alcohol causes certain side effects including changing the facial thermal distribution, which may enable the contactless identification and classification of alcohol-intoxicated people. We adopted a multiregional segmentation procedure to identify and classify symmetrical facial features, which reliably reflects the facial-temperature variations while subjects are drinking alcohol. Such a model can objectively track alcohol intoxication in the form of a facial temperature map. In our paper, we propose the segmentation model based on the clustering algorithm, which is driven by the modified version of the Artificial Bee Colony (ABC) evolutionary optimization with the goal of facial temperature features extraction from the IR (infrared radiation) images. This model allows for a definition of symmetric clusters, identifying facial temperature structures corresponding with intoxication. The ABC algorithm serves as an optimization process for an optimal cluster's distribution to the clustering method the best approximate individual areas linked with gradual alcohol intoxication. In our analysis, we analyzed a set of twenty volunteers, who had IR images taken to reflect the process of alcohol intoxication. The proposed method was represented by multiregional segmentation, allowing for classification of the individual spatial temperature areas into segmentation classes. The proposed method, besides single IR image modelling, allows for dynamical tracking of the alcohol-temperature features within a process of intoxication, from the sober state up to the maximum observed intoxication level.Web of Science118art. no. 99

    An enhanced fuzzy commitment scheme in biometric template protection

    Get PDF
    Biometric template protection consists of two approaches; Feature Transformation (FT) and Biometric Cryptography (BC). This research focuses on Key-Binding Technique based on Fuzzy Commitment Scheme (FCS) under BC approach. In FCS, the helper data should not disclose any information about the biometric data. However, literatures showed that it had dependency issue in its helper data which jeopardize security and privacy. Moreover, this also increases the probability of privacy leakage which lead to attacks such as brute-force and cross-matching attack. Thus, the aim of this research is to reduce the dependency of helper data that can caused privacy leakage. Three objectives have been set such as (1) to identify the factors that cause dependency on biometric features (2) to enhance FCS by proposing an approach that reduces this dependency, and (3) to evaluate the proposed approach based on parameters such as security, privacy, and biometric performance. This research involved four phases. Phase one, involved research review and analysis, followed by designing conceptual model and algorithm development in phase two and three respectively. Phase four, involved with the evaluation of the proposed approach. The security and privacy analysis shows that with the additional hash function, it is difficult for adversary to perform brute‐force attack on information stored in database. Furthermore, the proposed approach has enhanced the aspect of unlinkability and prevents cross-matching attack. The proposed approach has achieved high accuracy of 95.31% with Equal Error Rate (EER) of 1.54% which performs slightly better by 1.42% compared to the existing approach. This research has contributed towards the key-binding technique of biometric fingerprint template protection, based on FCS. In particular, this research was designed to create a secret binary feature that can be used in other state-of-the-art cryptographic systems by using an appropriate error-correcting approach that meets security standards

    Comparative Analysis of Classification Performance for U.S. College Enrollment Predictive Modeling Using Four Machine Learning Algorithms (Artificial Neural Network, Decision Tree, Support Vector Machine, Logistic Regression)

    Get PDF
    Every year, the national high school graduation rate is declining and impacting the number of students applying to colleges. Moreover, the majority of students are applying to more than one college. This makes a lot of colleges to be highly competitive in student recruitment for enrollment and thus, the necessity for institutions to anticipate uncertainties related to budgets expected from student enrollment has increased. Hence enrollment management has become a pivotal sector in higher education institutions. Data and analytics are now a crucial part of enhancing enrollment management. Through big data analytics-driven solutions, institutions expect to improve enrollment by identifying students who are most likely to enroll in college. Machine learning can unlock significant value for colleges by allocating resources effectively to improve enrollment and budgeting. Therefore, a machine learning method is a vital tool for analyzing a large amount of data, and predictive analytics using this method has become a high demand in higher education. Yet higher education is still in the early stages of utilizing machine learning for enrollment management. In this study, I applied four machine learning algorithms to seven years of data on 108,798 students, each with 50 associated features, admitted to a 4-year, non-profit university in Midwest urban area to predict students\u27 college enrollment decisions. By treating the question of whether students offered admission will accept it as a binary classification problem, I implemented four machine learning algorithm classifiers and then evaluate the performance of these algorithms using the metrics of accuracy, sensitivity, specificity, precision, F-score, and area under the ROC and PR curves. The results from this study will indicate the best-performed prediction modeling of students’ college enrollment decisions. This research will expand the case and knowledge of utilizing machine learning methods in the higher education sector, focused on the U.S. College enrollment management field. Moreover, it will expand the knowledge of how the machine learning prediction model can be pragmatically used to support institutions in setting up student enrollment management strategies

    Acta Polytechnica Hungarica 2019

    Get PDF
    corecore