524 research outputs found

    The enablers and implementation model for mobile KMS in Australian healthcare

    Get PDF
    In this research project, the enablers in implementing mobile KMS in Australian regional healthcare will be investigated, and a validated framework and guidelines to assist healthcare in implementing mobile KMS will also be proposed with both qualitative and quantitative approaches. The outcomes for this study are expected to improve the understanding the enabling factors in implementing mobile KMS in Australian healthcare, as well as provide better guidelines for this process

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    ICCSA 2022

    Get PDF
    Producción CientíficaThe process of economic, social, and cultural development leads to relevant changes in urban areas. Urban transformations usually generate a series of public and private real estate compounds which constitute real obstacles to urban walkability. The growing attention towards the sustainable development goals established on a global scale introduced new contents in urban redevelopment policies, aimed at favoring higher levels of accessibility in the consolidated fabric, particularly that of the pedestrian type. In addition, the recent pandemic has recently reassessed the role of pedestrian mobility as a primary way of moving instead of using other means of transport. As a result, urban walkability has moved at the core of the sustainable city paradigm. More precisely, issues related to accessibility and walkability should be considered when addressing the obstacle generated by those sites that can be properly defined ‘urban enclaves’, especially when abandoned or under redevelopment. These conditions may encourage the gradual reopening of these areas for citizens. Within this framework, the Sustainable Urban Mobility Plan (SUMP) can represent a strategic tool for identifying the critical aspects to face for the creation of a new network of pedestrian routes aimed at improving urban walkability. The objective of this study is to define a set of principles and criteria, both tangible and intangible, for calculating the proximity index (PI). The PI may consequently drive urban regeneration projects also through the design of new paths for crossing the enclaves to improve urban permeability and, therefore, the level of walkabilitySardinia Foundation (CUP F74I19001040007

    Methods for deriving and calibrating privacy-preserving heat maps from mobile sports tracking application data

    Get PDF
    AbstractUtilization of movement data from mobile sports tracking applications is affected by its inherent biases and sensitivity, which need to be understood when developing value-added services for, e.g., application users and city planners. We have developed a method for generating a privacy-preserving heat map with user diversity (ppDIV), in which the density of trajectories, as well as the diversity of users, is taken into account, thus preventing the bias effects caused by participation inequality. The method is applied to public cycling workouts and compared with privacy-preserving kernel density estimation (ppKDE) focusing only on the density of the recorded trajectories and privacy-preserving user count calculation (ppUCC), which is similar to the quadrat-count of individual application users. An awareness of privacy was introduced to all methods as a data pre-processing step following the principle of k-Anonymity. Calibration results for our heat maps using bicycle counting data gathered by the city of Helsinki are good (R2>0.7) and raise high expectations for utilizing heat maps in a city planning context. This is further supported by the diurnal distribution of the workouts indicating that, in addition to sports-oriented cyclists, many utilitarian cyclists are tracking their commutes. However, sports tracking data can only enrich official in-situ counts with its high spatio-temporal resolution and coverage, not replace them

    Efficient and Low-Cost RFID Authentication Schemes

    Get PDF
    Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a secure and low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its target security properties, it is susceptible to timing attacks, where the timestamp to be sent by the reader to the tag can be freely selected by an adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a tag can become inoperative after exceeding its pre-stored threshold timestamp value. In this paper, we propose two mutual RFID authentication protocols that aim to improve YA-TRAP* by preventing timing attack, and by providing reader authentication. Also, a tag is allowed to refresh its pre-stored threshold value in our protocols, so that it does not become inoperative after exceeding the threshold. Our protocols also achieve other security properties like forward security, resistance against cloning, replay, and tracking attacks. Moreover, the computation and communication costs are kept as low as possible for the tags. It is important to keep the communication cost as low as possible when many tags are authenticated in batch-mode. By introducing aggregate function for the reader-to-server communication, the communication cost is reduced. We also discuss different possible applications of our protocols. Our protocols thus capture more security properties and more efficiency than YA-TRAP*. Finally, we show that our protocols can be implemented using the current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201

    Kongresseja ja seminaareja – Congresses and seminars

    Get PDF

    A Panoramic Study of Fall Detection Technologies

    Get PDF
    Falls are a major risk of injury for elderly aged 65 or over, blind people, people with balance disorder and leg weakness. In this regard, assistive technology which aims to identify fall events at real time can reduce the rate of impairments and mortality. This study offer a literature research reference value for bioengineers for further research. Much of the past and the current fall detection research, the vital signals features and the way features are extracted and fed to a classifier are introduced. The study concludes with an assessment of the current technologies highlighting their critical limitations along with suggestions for future research direction in this rapidly developing field of study.http://dx.doi.org/10.20943/01201603.626

    Data mining of biometric data: revisting the concept of private life?

    Get PDF
    Over recent years, a whole new process known as data mining, equivalent to automated techniques processing large sets of data in order to extract patterns, relationships, trends and other information not traceable through usual ‘human’ reading, has been largely gaining in repute. By taking advantage of the seemingly indefinite opportunities enabled by applications of data mining techniques, various fields of scientific or medical research, business transactions, state-related and other security-concerned activities, could gain unprecedented benefits. However, notwithstanding established data protection principles reserved also for biometric information, data mining practices, inherently intrusive in the private sphere of individuals, have generated various concerns and controversy. As these emerging technological developments create new challenges to the protection of personal data, including primarily the most sensitive category of biometric data, the effectiveness of the concept of privacy under the European Convention on Human Rights (ECHR) and of the existing EU data protection legislation in securing an adequate legal framework is facing a new ordeal. This paper seeks to review, especially in the aftermath of the recent Luxembourg Court’s case law, whether evolving data mining practices materialize the need of adjusting the legal treatment of biometric data protection

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities
    • …
    corecore