10,966 research outputs found

    Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography

    Get PDF
    Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is key management. Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. The results of the system evaluation showed significant improvements in terms of time efficiency of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information. This result also justifies the feasibility of implementing fuzzy key binding scheme in real applications, especially fuzzy vault which demonstrated a better performance during key reconstruction

    Estimating Tropical Forest Structure Using a Terrestrial Lidar

    Get PDF
    Forest structure comprises numerous quantifiable biometric components and characteristics, which include tree geometry and stand architecture. These structural components are important in the understanding of the past and future trajectories of these biomes. Tropical forests are often considered the most structurally complex and yet least understood of forested ecosystems. New technologies have provided novel avenues for quantifying biometric properties of forested ecosystems, one of which is LIght Detection And Ranging (lidar). This sensor can be deployed on satellite, aircraft, unmanned aerial vehicles, and terrestrial platforms. In this study we examined the efficacy of a terrestrial lidar scanner (TLS) system in a tropical forest to estimate forest structure. Our study was conducted in January 2012 at La Selva, Costa Rica at twenty locations in a predominantly undisturbed forest. At these locations we collected field measured biometric attributes using a variable plot design. We also collected TLS data from the center of each plot. Using this data we developed relative vegetation profiles (RVPs) and calculated a series of parameters including entropy, Fast Fourier Transform (FFT), number of layers and plant area index to develop statistical relationships with field data.We developed statistical models using a series of multiple linear regressions, all of which converged on significant relationships with the strongest relationship being for mean crown depth (r2 = 0.88, p \u3c 0.001, RMSE = 1.04 m). Tree density was found to have the poorest significant relationship (r2 = 0.50, p \u3c 0.01, RMSE = 153.28 n ha-1). We found a significant relationship between basal area and lidar metrics (r2 = 0.75, p \u3c 0.001, RMSE = 3.76 number ha-1). Parameters selected in our models varied, thus indicating the potential relevance of multiple features in canopy profiles and geometry that are related to field-measured structure. Models for biomass estimation included structural canopy variables in addition to height metrics. Our work indicates that vegetation profiles from TLS data can provide useful information on forest structure

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Social Aspects of New Technologies - the CCTV and Biometric (Framing Privacy and Data Protection) in the Case of Poland

    Get PDF
    The purpose of this paper is to review the institution responsible for the protection of personal data within the European Union and national example - Polish as a country representing the new Member States. The analysis of institutional system - providing legal security of communication and information institutions, companies and citizens against the dangers arising from the ongoing development of innovative new technologies in the European Union and Poland. This article is an attempt to analyze the possibility of using security systems and Biometry CTTV in Poland in terms of legislation. The results of the analysis indicate that, in terms of institutions Poland did not do badly in relation to the risks arising from the implementation of technology. The situation is not as good when it comes to the awareness of citizens and small businesses. This requires that facilitate greater access to free security software companies from data leakage or uncontrolled cyber-terrorist attacks. With regard to the use of security systems, CCTV and biometrics, Poland in legal terms is still early in the process of adapting to EU Directive. The continuous development of technology should force the legislature to establish clear standards and regulations for the application of CCTV technology and biometrics, as it is of great importance in ensuring the fundamental rights and freedoms of every citizen of the Polish Republic.Wyniki analizy wskazują, ĆŒe pod względem instytucji Polska nie wypada Ćșle w odniesieniu do zagroĆŒeƄ wynikających z wdroĆŒenia technologii. Sytuacja nie jest tak dobra, jeƛli chodzi o ƛwiadomoƛć obywateli i mniejszych firm. Wymaga to uƂatwiania szerszego dostępu do darmowych programĂłw zabezpieczających firmy przed wyciekiem danych lub niekontrolowanych cyber-atakĂłw terrorystycznych. W odniesieniu do stosowania systemĂłw zabezpieczeƄ CCTV oraz biometrii, Polska pod względem prawnym jest wciÄ…ĆŒ na początku procesu dostosowania do dyrektywy UE. CiągƂy rozwĂłj technologii powinien zmusić ustawodawcę do stworzenia jednoznacznych standardĂłw i przepisĂłw obowiązujących w zakresie stosowania technologii CCTV oraz biometrii, gdyĆŒ ma to ogromne znaczenie w zapewnieniu podstawowych praw i wolnoƛci kaĆŒdego obywatela Rzeczypospolitej Polskiej

    Healthy UNH 2014 Annual Report

    Get PDF

    The Role of Test Administrator and Error

    Get PDF
    This study created a framework to quantify and mitigate the amount of error that test administrators introduced to a biometric system during data collection. Prior research has focused only on the subject and the errors they make when interacting with biometric systems, while ignoring the test administrator. This study used a longitudinal data collection, focusing on demographics in government identification forms such as driver\u27s licenses, fingerprint metadata such a moisture and skin temperature, and face image compliance to an ISO best practice standard. Error was quantified from the first visit and baseline test administrator error rates were measured. Additional training, software development, and error mitigation techniques were introduced before a second visit, in which the error rates were measured again. The new system greatly reduced the amount of test administrator error and improved the integrity of the data collected. Findings from this study show how to measure test administrator error and how to reduce it in future data collections

    A sensor technology survey for a stress aware trading process

    Get PDF
    The role of the global economy is fundamentally important to our daily lives. The stock markets reflect the state of the economy on a daily basis. Traders are the workers within the stock markets who deal with numbers, statistics, company analysis, news and many other factors which influence the economy in real time. However, whilst making significant decisions within their workplace, traders must also deal with their own emotions. In fact, traders have one of the most stressful professional occupations. This survey merges current knowledge about stress effects and sensor technology by reviewing, comparing, and highlighting relevant existing research and commercial products that are available on the market. This assessment is made in order to establish how sensor technology can support traders to avoid poor decision making during the trading process. The purpose of this article is: 1) to review the studies about the impact of stress on the decision making process and on biological stress parameters that are applied in sensor design; 2) to compare different ways to measure stress by using sensors currently available in the market according to basic biometric principles under trading context; and 3) to suggest new directions in the use of sensor technology in stock markets

    Retention of mouth-to-mouth, mouth-to-mask and mouth-to-face shield ventilation

    Get PDF
    Background: Retention of mouth-to-mouth, mouth-to-mask and mouth-to-face shield ventilation techniques is poorly understood.Methods: A prospective randomised clinical trial was undertaken in January 2004 in 70 candidates randomly assigned to training in mouth-to-mouth, mouth-to-mask or mouth-to-face shield ventilation. Each candidate was trained for 10 min, after which tidal volume, respiratory rate, minute volume, peak airway pressure and the presence or absence of stomach inflation were measured. 58 subjects were reassessed 1 year later and study parameters were recorded again. Data were analysed with ANOVA, \textgreekq2 and McNemar tests.Results: Tidal volume, minute volume, peak airway pressure, ventilation rate and stomach inflation rate increased significantly at reassessment with all ventilation techniques compared with the initial assessment. However, at reassessment, mean (SD) tidal volume (960 (446) vs 1008 (366) vs 1402 (302) ml; p<0.05), minute volume (12 (5) vs 13 (7) vs 18 (3) l/min; p<0.05), peak airway pressure (14 (8) vs 17 (13) vs 25 (8) cm H2O; p<0.05) and stomach inflation rate (63% vs 58% vs 100%; p<0.05) were significantly lower with mouth-to-mask and mouth-to-face shield ventilation than with mouth-to-mouth ventilation. The ventilation rate at reassessment did not differ significantly between the ventilation techniques.Conclusions: One year after a single episode of ventilation training, lay persons tended to hyperventilate; however, the degree of hyperventilation and resulting stomach inflation were lower when a mouth-to-mask or a face shield device was employed. Regular training is therefore required to retain ventilation skills; retention of skills may be better with ventilation devices
    • 

    corecore