1,758 research outputs found

    Integration of Smart Wearable Devices and Cloud Computing in the Kenyan Public Health Care System

    Get PDF
    The utilization of smart wearable devices and cloud computing in the Kenyan public health care system will facilitate real-time patient monitoring and management. The shortage of certified healthcare professionals and the limited access to quality specialized care for individuals in remote settings has prompted the adoption of wearable devices and cloud computing strategies in Kenya. However, there lacks a clear framework design of integrating the technologies in the public health sector. This article evaluates the current status of healthcare systems in Kenya. It also investigates the existing mobile health and cloud computing services in the country while evaluating the main legal concerns inherent to the utilization of the technologies. The document further outlines a framework design for a mobile application named GB Health. The application incorporates cloud computing and smart wearable devices in the Kenyan public health care system. The design will enhance workflow and patient outcomes in the sector. Keywords: Smart wearable devices, cloud computing, GB Health DOI: 10.7176/IKM/11-4-04 Publication date:June 30th 2021

    A Recent Connected Vehicle - IoT Automotive Application Based on Communication Technology

    Get PDF
    Realizing the full potential of vehicle communications depends in large part on the infrastructure of vehicular networks. As more cars are connected to the Internet and one another, new technological advancements are being driven by a multidisciplinary approach. As transportation networks become more complicated, academic, and automotive researchers collaborate to offer their thoughts and answers. They also imagine various applications to enhance mobility and the driving experience. Due to the requirement for low latency, faster throughput, and increased reliability, wireless access technologies and an appropriate (potentially dedicated) infrastructure present substantial hurdles to communication systems. This article provides a comprehensive overview of the wireless access technologies, deployment, and connected car infrastructures that enable vehicular connectivity. The challenges, issues, services, and maintenance of connected vehicles that rely on infrastructure-based vehicular communications are also identified in this paper

    Analysis of Sustainable Transport for Smart Cities

    Get PDF
    For decades, transportation has been considered as a link to all aspects of life worldwide. In this case, the world's natural environment, social well-being and economic development all usually depend on transportation systems. In most cases, safe, clean, sustainable and equitable transport systems help countries, especially in cities and urban centers, to thrive. However, a wide range of research shows that transportation systems in most of the cities and urban areas are unsustainable. In fact, some of these transportation systems are considered to be a threat to the environmental, social and economical aspects of future generations. In this perspective, therefore, changing such trends in transportation requires the collaboration of various stakeholders at regional, national and international levels. In this paper, therefore, a wide range of definitions of sustainable transport are discussed. More so, some of the aspects of smart transport for modern cities such as cycling and the role of women in sustainable transport were explored. With the aim of getting to the core of the subject, cases of women in bicycle transport, especially in the Netherlands and Germany compared to Kenya and Uganda are equally elucidated. Although not fully outlined, the idea of smart cities and sustainable transport have heterogeneous characteristics globally as discussed herein.O

    Technology\u27s World

    Get PDF

    Attacks on self-driving cars and their countermeasures : a survey

    Get PDF
    Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use the data communications between Vehicle-To-Vehicle (V2V), Vehicle-To-Infrastructure (V2I/I2V) and other on-road entities, and are accelerating the adoption of self-driving cars. The development of cyber-physical systems containing advanced sensors, sub-systems, and smart driving assistance applications over the past decade is equipping unmanned aerial and road vehicles with autonomous decision-making capabilities. The level of autonomy depends upon the make-up and degree of sensor sophistication and the vehicle's operational applications. As a result, self-driving cars are being compromised perceived as a serious threat. Therefore, analyzing the threats and attacks on self-driving cars and ITSs, and their corresponding countermeasures to reduce those threats and attacks are needed. For this reason, some survey papers compiling potential attacks on VANETs, ITSs and self-driving cars, and their detection mechanisms are available in the current literature. However, up to our knowledge, they have not covered the real attacks already happened in self-driving cars. To bridge this research gap, in this paper, we analyze the attacks that already targeted self-driving cars and extensively present potential cyber-Attacks and their impacts on those cars along with their vulnerabilities. For recently reported attacks, we describe the possible mitigation strategies taken by the manufacturers and governments. This survey includes recent works on how a self-driving car can ensure resilient operation even under ongoing cyber-Attack. We also provide further research directions to improve the security issues associated with self-driving cars. © 2013 IEEE

    Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF

    Get PDF
    As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable

    Emerging Technologies

    Get PDF
    This monograph investigates a multitude of emerging technologies including 3D printing, 5G, blockchain, and many more to assess their potential for use to further humanity’s shared goal of sustainable development. Through case studies detailing how these technologies are already being used at companies worldwide, author Sinan Küfeoğlu explores how emerging technologies can be used to enhance progress toward each of the seventeen United Nations Sustainable Development Goals and to guarantee economic growth even in the face of challenges such as climate change. To assemble this book, the author explored the business models of 650 companies in order to demonstrate how innovations can be converted into value to support sustainable development. To ensure practical application, only technologies currently on the market and in use actual companies were investigated. This volume will be of great use to academics, policymakers, innovators at the forefront of green business, and anyone else who is interested in novel and innovative business models and how they could help to achieve the Sustainable Development Goals. This is an open access book

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
    • …
    corecore