624 research outputs found

    Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications

    Get PDF
    open access articleThe growing communication and computing capabilities in the devices enlarge the connected world and improve the human life comfort level. The evolution of intelligent sensor networks and smart antennas has led to the development of smart devices and systems for real-time monitoring of various environments. The demand of smart antennas and intelligent sensors significantly increases when dealing with multiuser communication system that needs to be adaptive, especially in unknown adverse environment [1–3]. The smart antennas based arrays are capable of steering the main beam in any desired direction while placing nulls in the unwanted directions. Intelligent sensor networks integration with smart antennas will provide algorithms and interesting application to collect various data of environment to make intelligent decisions [4, 5]. The aim of this special issue is to provide an inclusive vision on the current research in the area of intelligent sensors and smart antenna based systems for enabling various applications and technologies. We cordially invite some researchers to contribute papers that discuss the issues arising in intelligent sensors and smart antenna based system. Hence, this special issue offers the state-of-the-art research in this field

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Usability analysis of contending electronic health record systems

    Get PDF
    In this paper, we report measured usability of two leading EHR systems during procurement. A total of 18 users participated in paired-usability testing of three scenarios: ordering and managing medications by an outpatient physician, medicine administration by an inpatient nurse and scheduling of appointments by nursing staff. Data for audio, screen capture, satisfaction rating, task success and errors made was collected during testing. We found a clear difference between the systems for percentage of successfully completed tasks, two different satisfaction measures and perceived learnability when looking at the results over all scenarios. We conclude that usability should be evaluated during procurement and the difference in usability between systems could be revealed even with fewer measures than were used in our study. © 2019 American Psychological Association Inc. All rights reserved.Peer reviewe

    Enabling Noninvasive Physical Assault Monitoring in Smart School with Commercial Wi-Fi Devices

    No full text
    Monitoring physical assault is critical for the prevention of juvenile delinquency and promotion of school harmony. A large portion of assault events, particularly school violence among teenagers, usually happen at indoor secluded places. Pioneering approaches employ always-on-body sensors or cameras in the limited surveillance area, which are privacy-invasive and cannot provide ubiquitous assault monitoring. In this paper, we present Wi-Dog, a noninvasive physical assault monitoring scheme that enables privacy-preserving monitoring in ubiquitous circumstances. Wi-Dog is based on widely deployed commodity Wi-Fi infrastructures. The key intuition is that Wi-Fi signals are easily distorted by human motions, and motion-induced signals could convey informative characteristics, such as intensity, regularity, and continuity. Specifically, to explicitly reveal the substantive properties of physical assault, we innovatively propose a set of signal processing methods for informative components extraction by selecting sensitive antenna pairs and subcarriers. Then a novel signal-complexity-based segmentation method is developed as a location-independent indicator to monitor targeted movement transitions. Finally, holistic analysis is employed based on domain knowledge, and we distinguish the violence process from both local and global perspective using time-frequency features. We implement Wi-Dog on commercial Wi-Fi devices and evaluate it in real indoor environments. Experimental results demonstrate the effectiveness of Wi-Dog which consistently outperforms the advanced abnormal detection methods with a higher true detection rate of 94% and a lower false alarm rate of 8%

    Human Health Engineering Volume II

    Get PDF
    In this Special Issue on “Human Health Engineering Volume II”, we invited submissions exploring recent contributions to the field of human health engineering, i.e., technology for monitoring the physical or mental health status of individuals in a variety of applications. Contributions could focus on sensors, wearable hardware, algorithms, or integrated monitoring systems. We organized the different papers according to their contributions to the main parts of the monitoring and control engineering scheme applied to human health applications, namely papers focusing on measuring/sensing physiological variables, papers highlighting health-monitoring applications, and examples of control and process management applications for human health. In comparison to biomedical engineering, we envision that the field of human health engineering will also cover applications for healthy humans (e.g., sports, sleep, and stress), and thus not only contribute to the development of technology for curing patients or supporting chronically ill people, but also to more general disease prevention and optimization of human well-being

    The Largest Unethical Medical Experiment in Human History

    Get PDF
    This monograph describes the largest unethical medical experiment in human history: the implementation and operation of non-ionizing non-visible EMF radiation (hereafter called wireless radiation) infrastructure for communications, surveillance, weaponry, and other applications. It is unethical because it violates the key ethical medical experiment requirement for “informed consent” by the overwhelming majority of the participants. The monograph provides background on unethical medical research/experimentation, and frames the implementation of wireless radiation within that context. The monograph then identifies a wide spectrum of adverse effects of wireless radiation as reported in the premier biomedical literature for over seven decades. Even though many of these reported adverse effects are extremely severe, the true extent of their severity has been grossly underestimated. Most of the reported laboratory experiments that produced these effects are not reflective of the real-life environment in which wireless radiation operates. Many experiments do not include pulsing and modulation of the carrier signal, and most do not account for synergistic effects of other toxic stimuli acting in concert with the wireless radiation. These two additions greatly exacerbate the severity of the adverse effects from wireless radiation, and their neglect in current (and past) experimentation results in substantial under-estimation of the breadth and severity of adverse effects to be expected in a real-life situation. This lack of credible safety testing, combined with depriving the public of the opportunity to provide informed consent, contextualizes the wireless radiation infrastructure operation as an unethical medical experiment

    Florida Undergraduate Research Conference

    Get PDF
    FURC serves as a multi-disciplinary conference through which undergraduate students from the state of Florida can present their research. February 16-17, 2024https://digitalcommons.unf.edu/university_events/1006/thumbnail.jp
    • …
    corecore