691 research outputs found
LIPIcs, Volume 251, ITCS 2023, Complete Volume
LIPIcs, Volume 251, ITCS 2023, Complete Volum
Effects of municipal smoke-free ordinances on secondhand smoke exposure in the Republic of Korea
ObjectiveTo reduce premature deaths due to secondhand smoke (SHS) exposure among non-smokers, the Republic of Korea (ROK) adopted changes to the National Health Promotion Act, which allowed local governments to enact municipal ordinances to strengthen their authority to designate smoke-free areas and levy penalty fines. In this study, we examined national trends in SHS exposure after the introduction of these municipal ordinances at the city level in 2010.MethodsWe used interrupted time series analysis to assess whether the trends of SHS exposure in the workplace and at home, and the primary cigarette smoking rate changed following the policy adjustment in the national legislation in ROK. Population-standardized data for selected variables were retrieved from a nationally representative survey dataset and used to study the policy action’s effectiveness.ResultsFollowing the change in the legislation, SHS exposure in the workplace reversed course from an increasing (18% per year) trend prior to the introduction of these smoke-free ordinances to a decreasing (−10% per year) trend after adoption and enforcement of these laws (β2 = 0.18, p-value = 0.07; β3 = −0.10, p-value = 0.02). SHS exposure at home (β2 = 0.10, p-value = 0.09; β3 = −0.03, p-value = 0.14) and the primary cigarette smoking rate (β2 = 0.03, p-value = 0.10; β3 = 0.008, p-value = 0.15) showed no significant changes in the sampled period. Although analyses stratified by sex showed that the allowance of municipal ordinances resulted in reduced SHS exposure in the workplace for both males and females, they did not affect the primary cigarette smoking rate as much, especially among females.ConclusionStrengthening the role of local governments by giving them the authority to enact and enforce penalties on SHS exposure violation helped ROK to reduce SHS exposure in the workplace. However, smoking behaviors and related activities seemed to shift to less restrictive areas such as on the streets and in apartment hallways, negating some of the effects due to these ordinances. Future studies should investigate how smoke-free policies beyond public places can further reduce the SHS exposure in ROK
Towards trustworthy computing on untrustworthy hardware
Historically, hardware was thought to be inherently secure and trusted due to its
obscurity and the isolated nature of its design and manufacturing. In the last two
decades, however, hardware trust and security have emerged as pressing issues.
Modern day hardware is surrounded by threats manifested mainly in undesired
modifications by untrusted parties in its supply chain, unauthorized and pirated
selling, injected faults, and system and microarchitectural level attacks. These threats,
if realized, are expected to push hardware to abnormal and unexpected behaviour
causing real-life damage and significantly undermining our trust in the electronic and
computing systems we use in our daily lives and in safety critical applications. A
large number of detective and preventive countermeasures have been proposed in
literature. It is a fact, however, that our knowledge of potential consequences to
real-life threats to hardware trust is lacking given the limited number of real-life
reports and the plethora of ways in which hardware trust could be undermined. With
this in mind, run-time monitoring of hardware combined with active mitigation of
attacks, referred to as trustworthy computing on untrustworthy hardware, is proposed
as the last line of defence. This last line of defence allows us to face the issue of live
hardware mistrust rather than turning a blind eye to it or being helpless once it occurs.
This thesis proposes three different frameworks towards trustworthy computing
on untrustworthy hardware. The presented frameworks are adaptable to different
applications, independent of the design of the monitored elements, based on
autonomous security elements, and are computationally lightweight. The first
framework is concerned with explicit violations and breaches of trust at run-time,
with an untrustworthy on-chip communication interconnect presented as a potential
offender. The framework is based on the guiding principles of component guarding,
data tagging, and event verification. The second framework targets hardware elements
with inherently variable and unpredictable operational latency and proposes a
machine-learning based characterization of these latencies to infer undesired latency
extensions or denial of service attacks. The framework is implemented on a DDR3
DRAM after showing its vulnerability to obscured latency extension attacks. The
third framework studies the possibility of the deployment of untrustworthy hardware
elements in the analog front end, and the consequent integrity issues that might arise
at the analog-digital boundary of system on chips. The framework uses machine
learning methods and the unique temporal and arithmetic features of signals at this
boundary to monitor their integrity and assess their trust level
2023- The Twenty-seventh Annual Symposium of Student Scholars
The full program book from the Twenty-seventh Annual Symposium of Student Scholars, held on April 18-21, 2023. Includes abstracts from the presentations and posters.https://digitalcommons.kennesaw.edu/sssprograms/1027/thumbnail.jp
Energy-Sustainable IoT Connectivity: Vision, Technological Enablers, Challenges, and Future Directions
Technology solutions must effectively balance economic growth, social equity,
and environmental integrity to achieve a sustainable society. Notably, although
the Internet of Things (IoT) paradigm constitutes a key sustainability enabler,
critical issues such as the increasing maintenance operations, energy
consumption, and manufacturing/disposal of IoT devices have long-term negative
economic, societal, and environmental impacts and must be efficiently
addressed. This calls for self-sustainable IoT ecosystems requiring minimal
external resources and intervention, effectively utilizing renewable energy
sources, and recycling materials whenever possible, thus encompassing energy
sustainability. In this work, we focus on energy-sustainable IoT during the
operation phase, although our discussions sometimes extend to other
sustainability aspects and IoT lifecycle phases. Specifically, we provide a
fresh look at energy-sustainable IoT and identify energy provision, transfer,
and energy efficiency as the three main energy-related processes whose
harmonious coexistence pushes toward realizing self-sustainable IoT systems.
Their main related technologies, recent advances, challenges, and research
directions are also discussed. Moreover, we overview relevant performance
metrics to assess the energy-sustainability potential of a certain technique,
technology, device, or network and list some target values for the next
generation of wireless systems. Overall, this paper offers insights that are
valuable for advancing sustainability goals for present and future generations.Comment: 25 figures, 12 tables, submitted to IEEE Open Journal of the
Communications Societ
2014 GREAT Day Program
SUNY Geneseo’s Eighth Annual GREAT Day.https://knightscholar.geneseo.edu/program-2007/1008/thumbnail.jp
Recommended from our members
Wearable Technologies to Support Lower Limb Rehabilitation and Clinical Practice: user requirements, design and evaluation
The widespread adoption of wearable technologies in healthcare has the potential to bring about significant improvements. However, these technologies face design challenges when applied in real world settings and must be tailored to specific contexts of use and the needs of a diverse user base. This thesis investigates these issues in two distinct yet related areas of healthcare: neurorehabilitation and clinical movement analysis.
In neurorehabilitation, the research builds on previous work that demonstrated the effectiveness of wearable rhythmic haptic metronomes in improving and measuring the gait of individuals with neurological conditions in laboratory settings. This study takes this approach into the community and care home settings, using a technology probe method to identify the real-life requirements and design considerations of potential end-users and clinicians. This process identified a range of physical, sensory, and cognitive issues that are relevant to the design of the haptic metronomes, including haptic perception ability, wearability, interaction techniques, and individual preferences for body placement.
The second part of the thesis initially focused on the potential of active cueing for musculoskeletal conditions, but formative discussions with specialist physiotherapists and orthopaedic surgeons suggested that wearable clinical movement analysis would be a more suitable focus. Currently, proprietary systems for objectively assessing lower limb movements are either poorly suited or too expensive. To address this gap, non-proprietary software called MoJoXlab, paired with low-cost wearable inertial sensors was validated against high-end commercial software to perform clinical movement analysis. The results of these tests were compared across a range of activities, including walking, squatting, and jumping. MoJoXlab was further validated with a different sensor system, and limitations and nuances of supporting multiple sensor systems were identified.
Overall, this thesis highlights the importance of considering the needs and preferences of diverse users and the specific conditions and contexts in which wearable technologies will be used to effectively design and implement these technologies in healthcare
Hybridization of Energy Optimization Technique for Cluster Based Routing using Various Computational Intelligence Methods in WSN
Approaches in WSN technology has determined by opportunity of tiny and inexpensive sensor nodes with adequacy of sensing multiple kinds of information processing and wireless communication. Network lifetime and energy efficiency are major indexes of WSN. Several clustering techniques are intended to extend the network lifetime but whereas there is an issue of incompetent Cluster Head (CH) election. To overcome this issue, an Integration of Novel Memetic and Brain Storm Optimization approach with Levy Distribution (IoNM-BSOLyD) has been proposed for clustering using fitness function. In the meanwhile, election of CH is done by utilizing fitness function, which incorporates following amplitude such as energy, distance to adjacent nodes, distance to BS, and network load. After clustering, routing techniques decides the detecting and pursuing the route in WSN. In this proposed work, a Water Wave Optimization with Hill Climbing technique (WWO-HCg) is introduced for routing purpose. This proposed methodology deals with ternary QoS aspect such as network delay, energy consumption, packet delivery ratio, network lifetime and security to select optimal path and enhance QoS as well. This proposed protocol provides better performance result than other contemporary protocols
Functional Nanomaterials in Biomedicine
The great success of nanotechnology promotes a tremendous revolution in the biomedical field. Functional nanomaterials have been widely applied for the treatment of various diseases, such as cancer, bacterial infection, diabetes, inflammation, and neurodegenerative disorders. Various therapeutic nanoplatforms have been developed with therapeutic functions and intelligent properties. However, the development of nanomedicine suffers from several challenges prior to their clinical applications. For instance, disease detection in an early stage is a critical challenge for nanomedicine. It is difficult to detect disease markers (e.g., proteins, genes, or cancer circulating cells), so nanoprobes with high sensitivity and selectivity are required. Moreover, to overcome drug resistance, it is highly desirable to develop functional nanomedicines with the combination of multiple therapeutic modalities, such as chemotherapy, photothermal therapy, photodynamic therapy, chemodynamic therapy, radiotherapy, starving therapy, and immunotherapy. Additionally, the stability and degradability of most nanomedicines in biofluids should be carefully evaluated before their administration to humans. This book provides researchers with the latest investigations and findings in this field
- …