30 research outputs found
Wearable and BAN Sensors for Physical Rehabilitation and eHealth Architectures
The demographic shift of the population towards an increase in the number of elderly citizens, together with the sedentary lifestyle we are adopting, is reflected in the increasingly debilitated physical health of the population. The resulting physical impairments require rehabilitation therapies which may be assisted by the use of wearable sensors or body area network sensors (BANs). The use of novel technology for medical therapies can also contribute to reducing the costs in healthcare systems and decrease patient overflow in medical centers. Sensors are the primary enablers of any wearable medical device, with a central role in eHealth architectures. The accuracy of the acquired data depends on the sensors; hence, when considering wearable and BAN sensing integration, they must be proven to be accurate and reliable solutions. This book is a collection of works focusing on the current state-of-the-art of BANs and wearable sensing devices for physical rehabilitation of impaired or debilitated citizens. The manuscripts that compose this book report on the advances in the research related to different sensing technologies (optical or electronic) and body area network sensors (BANs), their design and implementation, advanced signal processing techniques, and the application of these technologies in areas such as physical rehabilitation, robotics, medical diagnostics, and therapy
Counter-Terrorism, Ethics and Technology
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world
Multiple and replicated random walkers analysis for service discovery in fog computing IoT environments
The multiple random walkers mechanism is revisited in this paper for service discovery purposes considering modern dynamic network environments like the Internet of Things (IoT), where there is a need for certain services (e.g., virtual network functions) to be available to the end users through fog computing devices. Network coverage is analytically investigated here considering multiple random walkers in soft random geometric graph topologies of various densities. It is shown that as the number of random walkers increases, then coverage linearly increases in the considered topologies. The analytical findings of this work are shown to be in accordance with other results in the literature (e.g., coverage under multiple random walkers for fully connected network topologies). Moreover, for certain coverage and time constraints (i.e., the minimum fraction of network nodes to be covered within a certain time period that is of practical importance in the considered environment), the required minimum number of random walkers satisfying these constraints is also analytically derived. A replication mechanism that allows random walkers to replicate themselves after a fixed number of time steps is also analytically investigated here with respect to coverage for various topology densities. Simulation results demonstrate the effectiveness of multiple random walkers for service discovery purposes in the considered fog computing IoT environment and support the claims and expectations of the analysis for both the multiple random walkers and the replicated multiple random walkers mechanism. © 2019 Elsevier B.V
Counter-Terrorism, Ethics and Technology
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world
Feature Papers "Age-Friendly Cities & Communities: State of the Art and Future Perspectives"
The "Age-Friendly Cities & Communities: States of the Art and Future Perspectives" publication presents contemporary, innovative, and insightful narratives, debates, and frameworks based on an international collection of papers from scholars spanning the fields of gerontology, social sciences, architecture, computer science, and gerontechnology. This extensive collection of papers aims to move the narrative and debates forward in this interdisciplinary field of age-friendly cities and communities
Metafore mobilnih komunikacija ; Метафоры мобильной связи.
Mobilne komunikacije su polje informacione i komunikacione tehnologije koje karakteriše brzi
razvoj i u kome se istraživanjem u analitičkim okvirima kognitivne lingvistike, zasnovanom na
uzorku od 1005 odrednica, otkriva izrazito prisustvo metafore, metonimije, analogije i
pojmovnog objedinjavanja. Analiza uzorka reči i izraza iz oblasti mobilnih medija, mobilnih
operativnih sistema, dizajna korisničkih interfejsa, terminologije mobilnih mreža, kao i slenga
i tekstizama koje upotrebljavaju korisnici mobilnih naprava ukazuje da pomenuti kognitivni
mehanizmi imaju ključnu ulogu u olakšavanju interakcije između ljudi i širokog spektra
mobilnih uređaja sa računarskim sposobnostima, od prenosivih računara i ličnih digitalnih
asistenata (PDA), do mobilnih telefona, tableta i sprava koje se nose na telu. Ti mehanizmi
predstavljaju temelj razumevanja i nalaze se u osnovi principa funkcionisanja grafičkih
korisničkih interfejsa i direktne manipulacije u računarskim okruženjima. Takođe je analiziran
i poseban uzorak od 660 emotikona i emođija koji pokazuju potencijal za proširenje značenja,
imajući u vidu značaj piktograma za tekstualnu komunikaciju u vidu SMS poruka i razmenu
tekstualnih sadržaja na društvenim mrežama kojima se redovno pristupa putem mobilnih
uređaja...Mobile communications are a fast-developing field of information and communication
technology whose exploration within the analytical framework of cognitive linguistics, based
on a sample of 1005 entries, reveals the pervasive presence of metaphor, metonymy analogy
and conceptual integration. The analysis of the sample consisting of words and phrases
related to mobile media, mobile operating systems and interface design, the terminology of
mobile networking, as well as the slang and textisms employed by mobile gadget users shows
that the above cognitive mechanisms play a key role in facilitating interaction between people
and a wide range of mobile computing devices from laptops and PDAs to mobile phones,
tablets and wearables. They are the cornerstones of comprehension that are behind the
principles of functioning of graphical user interfaces and direct manipulation in computing
environments. A separate sample, featuring a selection of 660 emoticons and emoji, exhibiting
the potential for semantic expansion was also analyzed, in view of the significance of
pictograms for text-based communication in the form of text messages or exchanges on social
media sites regularly accessed via mobile devices..