115,029 research outputs found
A Hypervisor-Based Bus System for Usage Control
Data usage control is concerned with requirements on data after access has been granted. In order to enforce usage control requirements, it is necessary to track the different representations that the data may take (among others, file, window content, network packet). These representations exist at different layers of abstraction. As a consequence, in order to enforce usage control requirements, multiple data flow tracking and usage control enforcement monitors must exist, one at each layer. If a new representation is created at some layer of abstraction, e.g., if a cache file is created for a picture after downloading it with a browser, then the initiating layer (in the example, the browser) must notify the layer at which the new representation is created (in the example, the operating system). We present a bus system for system-wide usage control that, for security and performance reasons, is implemented in a hypervisor. We evaluate its security and performance
Accessing on-chip temperature health monitors using the IEEE 1687 standard
The IEEE 1687 (IJTAG) is a newly IEEE approved standard to access embedded instruments. The usage of these embedded instruments (health monitors) is increasing in order to perform different online measurements for testing purposes as dependability is becoming a key concern in today’s electronics. Aging and intermittent resistive faults (IRF) are two threats to a highly dependable system, and temperature can accelerate these two phenomena. In this paper, the work carried out for enabling online IJTAG control, observation and reconfiguration of the health monitors will be discussed. Three temperature monitors along with an IJTAG controller are used to demonstrate online temperature measurements using an IJTAG network interface. The simulation results show that the proposed (on-chip)methodology can reduce the dependency on the PC while observing the (static) embedded instruments in the field
Relationships Among Heart Rate Monitor Usage, Neuroticism, and Performance in Triathletes
Triathlon, a sport that consists of swimming, biking and running, is growing in popularity throughout the country and the world. There is a large percentage of athletes that rely on the use of a heart rate monitor to gauge effort, but there is also a group of athletes that do not use this technology. The purpose of this research was to determine if personality, specifically neuroticism, played a role in determining which athletes use heart rate monitors and whether these variables had any effect on performance. Ninety-eight triathletes were surveyed from 2 half iron distance triathlons in the summer of 2010. There proved to be no interaction effect between neuroticism and heart rate monitor usage on performance [F 2 = 1.830, p = 0.168]. Interestingly, the data showed that there was no significant relationship between heart rate monitor usage and performance. This finding is interesting because heart rate monitors are widely used in the triathlon community, and these data show that perhaps heart rate monitors are not the best tool for gauging effort
Designing an Adaptive Interface: Using Eye Tracking to Classify How Information Usage Changes Over Time in Partially Automated Vehicles
While partially automated vehicles can provide a range of benefits, they also bring about new Human Machine Interface (HMI) challenges around ensuring the driver remains alert and is able to take control of the vehicle when required. While humans are poor monitors of automated processes, specifically during ‘steady state’ operation, presenting the appropriate information to the driver can help. But to date, interfaces of partially automated vehicles have shown evidence of causing cognitive overload. Adaptive HMIs that automatically change the information presented (for example, based on workload, time or physiologically), have been previously proposed as a solution, but little is known about how information should adapt during steady-state driving. This study aimed to classify information usage based on driver experience to inform the design of a future adaptive HMI in partially automated vehicles. The unique feature of this study over existing literature is that each participant attended for five consecutive days; enabling a first look at how information usage changes with increasing familiarity and providing a methodological contribution to future HMI user trial study design. Seventeen participants experienced a steady-state automated driving simulation for twenty-six minutes per day in a driving simulator, replicating a regularly driven route, such as a work commute. Nine information icons, representative of future partially automated vehicle HMIs, were displayed on a tablet and eye tracking was used to record the information that the participants fixated on. The results found that information usage did change with increased exposure, with significant differences in what information participants looked at between the first and last trial days. With increasing experience, participants tended to view information as confirming technical competence rather than the future state of the vehicle. On this basis, interface design recommendations are made, particularly around the design of adaptive interfaces for future partially automated vehicles
Device-Centric Monitoring for Mobile Device Management
The ubiquity of computing devices has led to an increased need to ensure not
only that the applications deployed on them are correct with respect to their
specifications, but also that the devices are used in an appropriate manner,
especially in situations where the device is provided by a party other than the
actual user. Much work which has been done on runtime verification for mobile
devices and operating systems is mostly application-centric, resulting in
global, device-centric properties (e.g. the user may not send more than 100
messages per day across all applications) being difficult or impossible to
verify. In this paper we present a device-centric approach to runtime verify
the device behaviour against a device policy with the different applications
acting as independent components contributing to the overall behaviour of the
device. We also present an implementation for Android devices, and evaluate it
on a number of device-centric policies, reporting the empirical results
obtained.Comment: In Proceedings FESCA 2016, arXiv:1603.0837
The Beauty Industry\u27s Influence on Women in Society
There has been a significant amount of research done on the effect that advertising in the fashion and beauty industry has on women. By creating advertisements with unrealistic images of beauty, it has resulted in anxiety, low self-esteem, and low self-confidence in many women. Most of these negative emotions stems from unhappiness among body and appearance. Less research has been performed relating to cosmetics and how this can have an influence on women, and how women can use cosmetics to manipulate their appearance. This paper first discusses the existing research that focuses on the cosmetic industry’s influence on women. From this research, a general survey was created in order to gather general information about a group of college student’s cosmetic usage, habits, and beliefs. The results indicate that college women are high users of cosmetics, are very aware of the cosmetic industry, and that some individual differences can have an effect on the choices a woman makes regarding cosmetics
Recommended from our members
Role Of Digital Health Wearables In The Wellbeing And Quality Of Life Of Older People And Carers
The number of adults aged 65 and over has increased by 2% across Europe in the past 15 years, and in Northern Ireland by 22% between 2003-2013. The proportion of the population in this age group is projected to increase by 63% to just under 0.5 million by 2033 – which will be a quarter of the population in Northern Ireland. Given Northern Ireland’s Active Ageing Strategy (2015-2021), there is an increasing focus on encouraging physical activity as we get older to preserve mobility and motor skills, and to enjoy the benefits of living longer and to minimise health problems associated with ageing. Over the last two years, we have been investigating the role of wearable activity tracking technologies in self-monitoring of activity by people aged over 55. Example technologies include activity trackers from Fitbit, Garmin and Samsung, and smart watches. Typically, these devices record steps walked, sleep patterns, calories expended and heart rate.
Based on empirical investigations, this policy paper describes the benefits of activity monitors for people aged over 55 for self-monitoring of physical activity, for adopting healthy lifestyles, and for increasing or maintaining physical activity as a way to avoid high blood pressure, obesity, diabetes, and other medical conditions associated with weight or lower physical activity. It outlines the role of activity trackers in post-operative monitoring of mobility during rehabilitation, in caring, and for possible use of the data for diagnosis and medical interventions. It then discusses the challenges for adoption of these technologies, given currently, off-the-shelf devices are designed and calibrated for use by physically fit (typically young active people) with unrealistic fitness targets for the older generation
A practical review of energy saving technology for ageing populations
Fuel poverty is a critical issue for a globally ageing population. Longer heating/cooling requirements combine with declining incomes to create a problem in need of urgent attention. One solution is to deploy technology to help elderly users feel informed about their energy use, and empowered to take steps to make it more cost effective and efficient. This study subjects a broad cross section of energy monitoring and home automation products to a formal ergonomic analysis. A high level task analysis was used to guide a product walk through, and a toolkit approach was used thereafter to drive out further insights. The findings reveal a number of serious usability issues which prevent these products from successfully accessing an important target demographic and associated energy saving and fuel poverty outcomes. Design principles and examples are distilled from the research to enable practitioners to translate the underlying research into high quality design-engineering solutions
Sensor data to measure Hawthorne effects in cookstove evaluation.
This data in brief article includes estimated time cooking based on temperature sensor data taken every 30 min from three stone fires and introduced fuel-efficient Envirofit stoves in approximately 168 households in rural Uganda. These households were part of an impact evaluation study spanning about six months to understand the effects of fuel-efficient cookstoves on fuel use and pollution. Daily particulate matter (pollution) and fuelwood use data are also included. This data in brief file only includes the weeks prior to, during, and after an in-person measurement team visited each home. The data is used to analyze whether households change cooking patterns when in-person measurement teams are present versus when only the temperature sensor is in the home
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots
The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring
system whose goal is to measure, detect, characterize, and track threats such
as distribute denial of service(DDoS) attacks and worms. To block the
monitoring system in the internet the attackers are targeted the ITM system. In
this paper we address flooding attack against ITM system in which the attacker
attempt to exhaust the network and ITM's resources, such as network bandwidth,
computing power, or operating system data structures by sending the malicious
traffic. We propose an information-theoretic frame work that models the
flooding attacks using Botnet on ITM. Based on this model we generalize the
flooding attacks and propose an effective attack detection using Honeypots
- …