30,502 research outputs found

    A review of the use of information and communication technologies for dietary assessment

    Get PDF
    Presently used dietary-assessment methods often present difficulties for researchers and respondents, and misreporting errors are common. Methods using information and communication technologies (ICT) may improve quality and accuracy. The present paper presents a systematic literature review describing studies applying ICT to dietary assessment. Eligible papers published between January 1995 and February 2008 were classified into four assessment categories: computerised assessment; personal digital assistants (PDA); digital photography; smart cards. Computerised assessments comprise frequency questionnaires, 24 h recalls (24HR) and diet history assessments. Self-administered computerised assessments, which can include audio support, may reduce literacy problems, be translated and are useful for younger age groups, but less so for those unfamiliar with computers. Self-administered 24HR utilising computers yielded comparable results as standard methods, but needed supervision if used in children. Computer-assisted interviewer-administered recall results were similar to conventional recalls, and reduced inter-interviewer variability. PDA showed some advantages but did not reduce underreporting. Mobile phone meal photos did not improve PDA accuracy. Digital photography for assessing individual food intake in dining facilities was accurate for adults and children, although validity was slightly higher with direct visual observation. Smart cards in dining facilities were useful for measuring food choice but not total dietary intake. In conclusion, computerised assessments and PDA are promising, and could improve dietary assessment quality in some vulnerable groups and decrease researcher workload. Both still need comprehensive evaluation for micronutrient intake assessment. Further work is necessary for improving ICT tools in established and new methods and for their rigorous evaluatio

    City Data Fusion: Sensor Data Fusion in the Internet of Things

    Full text link
    Internet of Things (IoT) has gained substantial attention recently and play a significant role in smart city application deployments. A number of such smart city applications depend on sensor fusion capabilities in the cloud from diverse data sources. We introduce the concept of IoT and present in detail ten different parameters that govern our sensor data fusion evaluation framework. We then evaluate the current state-of-the art in sensor data fusion against our sensor data fusion framework. Our main goal is to examine and survey different sensor data fusion research efforts based on our evaluation framework. The major open research issues related to sensor data fusion are also presented.Comment: Accepted to be published in International Journal of Distributed Systems and Technologies (IJDST), 201

    AsmetaF: A Flattener for the ASMETA Framework

    Get PDF
    Abstract State Machines (ASMs) have shown to be a suitable high-level specification method for complex, even industrial, systems; the ASMETA framework, supporting several validation and verification activities on ASM models, is an example of a formal integrated development environment. Although ASMs allow modeling complex systems in a rather concise way -and this is advantageous for specification purposes-, such concise notation is in general a problem for verification activities as model checking and theorem proving that rely on tools accepting simpler notations. In this paper, we propose a flattener tool integrated in the ASMETA framework that transforms a general ASM model in a flattened model constituted only of update, parallel, and conditional rules; such model is easier to map to notations of verification tools. Experiments show the effect of applying the tool to some representative case studies of the ASMETA repository.Comment: In Proceedings F-IDE 2018, arXiv:1811.09014. The first two authors are supported by ERATO HASUO Metamathematics for Systems Design Project (No. JPMJER1603), JST. Funding Reference number: 10.13039/501100009024 ERAT

    Time Enough - Consequences of Human Microchip Implantation

    Get PDF
    Dr. Ramesh argues that microchip implantation is both possible and, for some purposes, desirable and suggests that now is the time to consider strategies for preventing potentially grievous intrusion into personal privacy

    A JML-Based strategy for incorporating formal specifications into the software development process

    Get PDF
    This thesis presents a JML-based strategy that incorporates formal specifications into the software development process of object-oriented programs. The strategy evolves functional requirements into a “semi-formal” requirements form, and then expressing them as JML formal specifications. The strategy is implemented as a formal-specification pseudo-phase that runs in parallel with the other phase of software development. What makes our strategy different from other software development strategies used in literature is the particular use of JML specifications we make all along the way from requirements to validation-and-verification.Orientador: Néstor Catañ

    Formal Verification of Security Protocol Implementations: A Survey

    Get PDF
    Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac
    • …
    corecore