11,347 research outputs found

    Implementation of MD5 Framework for Privacy-Preserving Support for Mobile Healthcare

    Get PDF
    The improvement of science and technology has made life so easy and fast that smartphones and other touch-screen minicomputers have become the most trusted personal storage and communication devices for individuals. Comparable to the rich enhancement in wireless body sensor networks, it is valuable to the development of medical treatment to be exceptionally adaptable and become very flexible by means of smartphones through 2G and 3G system bearers. This has made treatment simple even to the common individual in the general public with less payable cash. In this paper, we introduce privacy-preserving support for mobile healthcare using message digest where we have used an MD5 algorithm instead of AES, which can certainly achieve an efficient way and minimizes the memory consumed and the large amount of PHI data of the medical user (patient) is reduced to a fixed amount of size compared to AES which in parallel increases the speed of the data to be sent to TA without any delay which in-turn. This study implements a secure and privacy-preserving opportunistic computing framework (SPOC) for mobile-health care emergency. Utilizing smartphones and SPOC, assets like computing power and energy can be gathered to reliably to take care of intensive personal health information (PHI) of the medicinal client when he/she is in critical situation with minimal privacy disclosure. With these, the healthcare authorities can treat the patients (restorative clients) remotely, where the patients live at home or at different spots they run. This sort of a treatment can be done under mHealth (Mobile-Healthcare). In malice of the fact that in them-medicinal services administration, there are numerous security and information protection issues to be succeed. The main aim of this paper is to bring medical health to patients in remote locations by providing the basic triage of an emergency to increase the patient’s body acceptance until they can reach a proper medical facility, in addition to providing emergency care in minimal payable cash

    Temporal and spatial distributions of delphinid species in Massachusetts Bay (USA) using passive acoustics from ocean gliders

    Get PDF
    © The Author(s), 2020. This article is distributed under the terms of the Creative Commons Attribution License. The definitive version was published in Silva, T. L., Mooney, T. A., Sayigh, L. S., & Baumgartner, M. F. Temporal and spatial distributions of delphinid species in Massachusetts Bay (USA) using passive acoustics from ocean gliders. Marine Ecology Progress Series, 631, (2019): 1-17, doi:10.3354/meps13180.Knowledge about marine mammal habitat use is necessary for informing ecosystem-based management and mitigating human impacts. Massachusetts Bay is an important marine mammal foraging area in the Gulf of Maine and an area of substantial human activity, but delphinid habitat use is poorly understood. The goals of this work were to (1) document temporal and spatial occurrence of delphinid species in Massachusetts Bay using passive acoustic monitoring from ocean gliders and (2) explore the potential influences of environmental conditions on delphinid distributions. Gliders were deployed in late fall and early winter of 2014 and 2015-2016 and were equipped with a digital acoustic recorder and conductivity-temperature-depth instrument. Gliders surveyed an area of approximately 1000 km2. Delphinid whistles were detected on 93 of 128 (73%) deployment days. Animals were detected more often at night. Presence was consistent over 2 years, although detection rates showed annual and monthly variability. Spatial distribution differed between years, but most detections occurred close to Stellwagen Bank. Visual assessment of spectrograms suggests the presence of 2 species, Atlantic white-sided dolphins and common dolphins. The reoccurrence of 2 probable signature whistles over several weeks and consecutive winter seasons suggests prolonged occupancy during winter and possible annual site fidelity. These data show a consistent and frequent presence of delphinids near a known marine mammal foraging area (Stellwagen Bank) during late fall and winter and are a first step towards understanding both how odontocetes influence the Massachusetts Bay/Gulf of Maine ecosystem and how they may be impacted by human activities.We gratefully acknowledge the NOAA Northeast Fisheries Science Center, Stellwagen Bank National Marine Sanctuary, The Nature Conservancy, Massachusetts Division of Marine Fisheries, and the University of Massachusetts Dartmouth for their collaboration and support for this project. We thank Susan Parks, Julie Oswald, Sofie Van Parijs, and Danielle Cholewiak for helpful discussionsand sharing acoustic recordings for species comparisons. We are grateful to Ben Hodges for critical assistance with preparing, deploying, and recovering gliders. Thanks to Michael Thompson for assistance with spatial analysis and Dave Wiley for support and insights into the Stellwagen Bank ecosystem. The WHOI Marine Mammal Center provided additional funding for this work. Funding support for T.L.S. was provided by the NOAA Dr. Nancy Foster Scholarship. Finally, we thank the 3 anonymous re viewers for their comments and suggestions that improved this manuscript

    The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events

    Get PDF
    Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes

    Advanced Protocols for Peer-to-Peer Data Transmission in Wireless Gigabit Networks

    Get PDF
    This thesis tackles problems on IEEE 802.11 MAC layer, network layer and application layer, to further push the performance of wireless P2P applications in a holistic way. It contributes to the better understanding and utilization of two major IEEE 802.11 MAC features, frame aggregation and block acknowledgement, to the design and implementation of opportunistic networks on off-the-shelf hardware and proposes a document exchange protocol, including document recommendation. First, this thesis contributes a measurement study of the A-MPDU frame aggregation behavior of IEEE 802.11n in a real-world, multi-hop, indoor mesh testbed. Furthermore, this thesis presents MPDU payload adaptation (MPA) to utilize A-MPDU subframes to increase the overall throughput under bad channel conditions. MPA adapts the size of MAC protocol data units to channel conditions, to increase the throughput and lower the delay in error-prone channels. The results suggest that under erroneous conditions throughput can be maximized by limiting the MPDU size. As second major contribution, this thesis introduces Neighborhood-aware OPPortunistic networking on Smartphones (NOPPoS). NOPPoS creates an opportunistic, pocket-switched network using current generation, off-the-shelf mobile devices. As main novel feature, NOPPoS is highly responsive to node mobility due to periodic, low-energy scans of its environment, using Bluetooth Low Energy advertisements. The last major contribution is the Neighborhood Document Sharing (NDS) protocol. NDS enables users to discover and retrieve arbitrary documents shared by other users in their proximity, i.e. in the communication range of their IEEE 802.11 interface. However, IEEE 802.11 connections are only used on-demand during file transfers and indexing of files in the proximity of the user. Simulations show that NDS interconnects over 90 \% of all devices in communication range. Finally, NDS is extended by the content recommendation system User Preference-based Probability Spreading (UPPS), a graph-based approach. It integrates user-item scoring into a graph-based tag-aware item recommender system. UPPS utilizes novel formulas for affinity and similarity scoring, taking into account user-item preference in the mass diffusion of the recommender system. The presented results show that UPPS is a significant improvement to previous approaches

    User-Relative Names for Globally Connected Personal Devices

    Full text link
    Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" devices to each other on a common local-area network, but these names remain securely bound to their target as devices migrate. Multiple devices owned by the same user, once introduced, automatically merge their namespaces to form a distributed "personal cluster" that the owner can access or modify from any of his devices. Instead of requiring users to allocate globally unique names from a central authority, UIA enables users to assign their own "user-relative" names both to their own devices and to other users. With UIA, for example, Alice can always access her iPod from any of her own personal devices at any location via the name "ipod", and her friend Bob can access her iPod via a relative name like "ipod.Alice".Comment: 7 pages, 1 figure, 1 tabl

    De-ossifying the Internet Transport Layer : A Survey and Future Perspectives

    Get PDF
    ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher PD
    corecore