90 research outputs found

    mHealth Engineering: A Technology Review

    Get PDF
    In this paper, we review the technological bases of mobile health (mHealth). First, we derive a component-based mHealth architecture prototype from an Institute of Electrical and Electronics Engineers (IEEE)-based multistage research and filter process. Second, we analyze medical databases with regard to these prototypic mhealth system components.. We show the current state of research literature concerning portable devices with standard and additional equipment, data transmission technology, interface, operating systems and software embedment, internal and external memory, and power-supply issues. We also focus on synergy effects by combining different mHealth technologies (e.g., BT-LE combined with RFID link technology). Finally, we also make suggestions for future improvements in mHealth technology (e.g., data-protection issues, energy supply, data processing and storage)

    The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, and I would like to take this opportunity to thank the conference committee for their tireless efforts in this regard. These efforts have included but not been limited to the reviewing and editing of the conference papers, and helping with the planning, organisation and execution of the conference. Particular thanks go to those international reviewers who took the time to review papers for the conference, irrespective of the fact that they are unable to attend this year. To our sponsors and supporters a vote of thanks for both the financial and moral support provided to the conference. Finally, to the student volunteers and staff of the ECU Security Research Institute, your efforts as always are appreciated and invaluable. Yours sincerely, Conference Chair Professor Craig Valli Director, Security Research Institut

    Emerging technologies for learning report (volume 3)

    Get PDF

    Achieving Integrated Street Management in the City of Westminster

    Get PDF
    The purpose of “Achieving Integrated Street Management in the City of Westminster†was threefold: firstly to gain an understanding of the current street cleansing system; secondly to recommend improvements to that system; and thirdly to develop reporting specifications that would be useful for implementation in future handheld technology

    Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy

    Get PDF
    Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level of privacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy

    Personal Privacy Protection within Pervasive RFID Environments

    Get PDF
    Recent advancements in location tracking technologies have increased the threat to an individual\u27s personal privacy. Radio frequency identification (RFID) technology allows for the identification and potentially continuous tracking of an object or individual, without obtaining the individual\u27s consent or even awareness that the tracking is taking place. Although many positive applications for RFID technology exist, for example in the commercial sector and law enforcement, the potential for abuse in the collection and use of personal information through this technology also exists. Location data linked to other types of personal information allows not only the detection of past spatial travel and activity patterns, but also inferences regarding past and future behavior and preferences. Legislative and technological solutions to deal with the increased privacy threat raised by this and similar tracking technologies have been proposed. Such approaches in isolation have significant limitations. This thesis hypothesizes that an approach may be developed with high potential for sufficiently protecting individual privacy in the use of RFID technologies while also strongly supporting marketplace uses of such tags. The research develops and investigates the limits of approaches that might be us,ed to protect privacy in pervasive RFID surveillance environments. The conclusion is ultimately reached that an approach facilitating individual control over the linking of unique RFID tag ID numbers to personal identity implemented though a combination of legal controls and technological capabilities would be a highly desirable option in balancing the interests of both the commercial sector and the information privacy interests of individuals. The specific model developed is responsive to the core ethical principle of autonomy of the individual and as such is also intended to be more responsive to the needs of individual consumers. The technological approach proposed integrated with enabling privacy legislation and private contract law to enable interactive alteration of privacy preferences should result in marketplace solutions acceptable to both potential commercial users and those being tracked

    Personal Privacy Protection within Pervasive RFID Environments

    Get PDF
    Recent advancements in location tracking technologies have increased the threat to an individual\u27s personal privacy. Radio frequency identification (RFID) technology allows for the identification and potentially continuous tracking of an object or individual, without obtaining the individual\u27s consent or even awareness that the tracking is taking place. Although many positive applications for RFID technology exist, for example in the commercial sector and law enforcement, the potential for abuse in the collection and use of personal information through this technology also exists. Location data linked to other types of personal information allows not only the detection of past spatial travel and activity patterns, but also inferences regarding past and future behavior and preferences. Legislative and technological solutions to deal with the increased privacy threat raised by this and similar tracking technologies have been proposed. Such approaches in isolation have significant limitations. This thesis hypothesizes that an approach may be developed with high potential for sufficiently protecting individual privacy in the use of RFID technologies while also strongly supporting marketplace uses of such tags. The research develops and investigates the limits of approaches that might be us,ed to protect privacy in pervasive RFID surveillance environments. The conclusion is ultimately reached that an approach facilitating individual control over the linking of unique RFID tag ID numbers to personal identity implemented though a combination of legal controls and technological capabilities would be a highly desirable option in balancing the interests of both the commercial sector and the information privacy interests of individuals. The specific model developed is responsive to the core ethical principle of autonomy of the individual and as such is also intended to be more responsive to the needs of individual consumers. The technological approach proposed integrated with enabling privacy legislation and private contract law to enable interactive alteration of privacy preferences should result in marketplace solutions acceptable to both potential commercial users and those being tracked

    Tantalisingly Close

    Get PDF
    While studies of mobile wireless communication devices usually focus on their social implications, De Vries proposes to venture into a more historical and comparative direction to shed light on our preoccupation with them in the first place. He constructs an archaeological view of the development of communication technologies over the past 200 years, providing a comprehensive account of how persistent hopes and beliefs have come to give mobile wireless media such a prominent position today. Our expectations and uses of them are surprisingly similar to those of older media; consequently, they reconfirm the idea that living in an ‘anyone, anything, anytime, anywhere’ world is both a blessing and a curse, and that the desire for sublime communication is a tragic yet highly powerful regulative principle in our media evolution

    Smart technologies and beyond: exploring how a smart band can assist in monitoring children’s independent mobility & well-being

    Get PDF
    The problem which is being investigated through this thesis is not having a device(s) or method(s) which are appropriate for monitoring a child’s vital and tracking a child’s location. This aspect is being explored by other researchers which are yet to find a viable solution. This work focuses on providing a solution that would consider using the Internet of Things for measuring and improving children’s health. Additionally, the focus of this research is on the use of technology for health and the needs of parents who are concerned about their child’s physical health and well-being. This work also provides an insight into how technology is used during the pandemic. This thesis will be based on a mixture of quantitative and qualitative research, which will have been used to review the following areas covering key aspects and focuses of this study which are (i) Children’s Independent Mobility (ii) Physical activity for children (iii) Emotions of a child (iv) Smart Technologies and (v) Children’s smart wearables. This will allow a review of the problem in detail and how technology can help the health sector, especially for children. The deliverable of this study is to recommend a suitable smart band device that enables location tracking of the child, activity tracking as well as monitoring the health and wellbeing of the child. The research also includes an element of practical research in the form of (i) Surveys, the use of smart technology and a perspective on the solution from parents. (ii) Focus group, in the form of a survey allowing opinions and collection of information on the child and what the parents think of smart technology and how it could potentially help with their fears. (iii) Observation, which allows the collection of data from children who were given six activities to conduct while wearing the Fitbit Charge HR. The information gained from these elements will help provide guidelines for a proposed solution. In this thesis, there are three frameworks which are about (i) Research process for this study (ii) Key Performance Indicators (KPIs) which are findings from the literature review and (iii) Proposed framework for the solution, all three combined frameworks can help health professionals and many parents who want an efficient and reliable device, also deployment of technologies used in the health industry for children in support of independent mobility. Current frameworks have some considerations within the technology and medical field but were not up to date with the latest elements such as parents fears within today’s world and the advanced features of technology

    Advanced Location-Based Technologies and Services

    Get PDF
    Since the publication of the first edition in 2004, advances in mobile devices, positioning sensors, WiFi fingerprinting, and wireless communications, among others, have paved the way for developing new and advanced location-based services (LBSs). This second edition provides up-to-date information on LBSs, including WiFi fingerprinting, mobile computing, geospatial clouds, geospatial data mining, location privacy, and location-based social networking. It also includes new chapters on application areas such as LBSs for public health, indoor navigation, and advertising. In addition, the chapter on remote sensing has been revised to address advancements
    • …
    corecore