66,362 research outputs found

    Development and comparison of customized voice-assistant systems for independent living older adults

    Get PDF
    Voice-controlled in-home personal assistants have great potential to assist older adults. This thesis explores the aspects of human-computer interface design, specifically a voice assistant, to help older adults manage their personal health, especially in the case of chronic health conditions. In our previous work, we have built a web interface for caregivers to monitor older adults' health changes based on in-home sensor data from motion sensors, bed sensors, and depth sensors. Data collected from these sensors are stored in servers and processed using several algorithms to obtain health and activity parameters including gait, fall risk, detect fall, motion patterns, sleep, heart rate, and respiration rate, as well as to generate health alerts. The sensor system with automated health alerts and care coordination has been shown to help seniors maintain better functionality. In our current research project, we focus on developing a consumer interface for older adults and their designated trusted others that can provide health information on-demand, based on spoken queries. The health information is presented as both audio and visual displays and uses graphical visualizations and linguistic summaries of the sensor data trends and changes. The goal is to present data in a form that is simple to understand. To accomplish our objective of creating an easy-to-use-and-understand health data interface for older adults, we explore voice-controlled, in-home personal assistants as a solution. Two voice assistant platforms with displays were selected for implementation and testing, namely, the Amazon Echo Show and the Lenovo Smart Display with Google Assistant.by Shradha ShaliniIncludes bibliographical reference

    Analysis of google entry in unified communications from a resource and competence perspective

    Get PDF
    The business communications market has been deeply transformed by technological and product convergence, due to the progressive substitution of traditional TDM-based voice products and services by ToIP (Telephony over IP) based products and services. The adoption of IP and the management of voice applications in the same way as data application has given rise to convergence offerings under the name of Unified Communications, and allowed the entry of data communications vendors, such as Cisco, in a market initially dominated by TDM-based product vendors. The increasing dissociation between hardware and software and the virtualisation of services have induced the entry of new players relying on their position in software and web services, among which Microsoft and Google. In this paper, drawing on the resource-based perspective, we analyse the patterns of entry of Google in this market. In particular, we highlight how Google relies on current specific resources, acquire and/or develop complementary resources in order to be able to compete on this market. In this work in progress paper, we put emphasis on the acquisition strategy of Google --

    Enabling pervasive computing with smart phones

    Get PDF
    The authors discuss their experience with a number of mobile telephony projects carried out in the context of the European Union Information Society Technologies research program, which aims to develop mobile information services. They identify areas where use of smart phones can enable pervasive computing and offer practical advice in terms of lessons learned. To this end, they first look at the mobile telephone as * the end point of a mobile information service,* the control device for ubiquitous systems management and configuration,* the networking hub for personal and body area networks, and* identification tokens.They conclude with a discussion of business and practical issues that play a significant role in deploying research systems in realistic situations

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
    • 

    corecore