303 research outputs found

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    Mapping the beach beneath the street:digital cartography for the playable city

    Get PDF
    Maps are an important component within many of the playful and gameful experiences designed to turn cities into a playable infrastructures. They take advantage of the fact that the technology used for obtaining accurate spatial information, such as GPS receivers and magnetometers (digital compasses), are now so wide-spread that they are considered as ‘standard’ sensors on mobile phones, which are themselves ubiquitous. Interactive digital maps, therefore, are are widely used by the general public for a variety of purposes. However, despite the rich design history of cartography digital maps typically exhibit a dominant aesthetic that has been de-signed to serve the usability and utility requirements of turn-by-turn urban navigation, which is itself driven by the proliferation of in-car and personal navigation services. The navigation aesthetic is now widespread across almost all spatial applications, even where a be-spoke cartographic product would be better suited. In this chapter we seek to challenge this by exploring novel neo-cartographic ap-proaches to making maps for use within playful and gameful experi-ences designed for the cities. We will examine the potential of de-sign approaches that can producte not only more aesthetically pleasing maps, but also offer the potential for influencing user be-haviour, which can be used to promote emotional engagement and exploration in playable city experiences

    Toward New Ecologies of Cyberphysical Representational Forms, Scales, and Modalities

    Get PDF
    Research on tangible user interfaces commonly focuses on tangible interfaces acting alone or in comparison with screen-based multi-touch or graphical interfaces. In contrast, hybrid approaches can be seen as the norm for established mainstream interaction paradigms. This dissertation describes interfaces that support complementary information mediations, representational forms, and scales toward an ecology of systems embodying hybrid interaction modalities. I investigate systems combining tangible and multi-touch, as well as systems combining tangible and virtual reality interaction. For each of them, I describe work focusing on design and fabrication aspects, as well as work focusing on reproducibility, engagement, legibility, and perception aspects

    Mapping power and jurisdiction on the internet through the lens of government-led surveillance

    Get PDF
    Facing the fragmentation of digital space in the aftermath of the Snowden revelations, this article considers regulatory models available to avoid the balkanisation of the internet. Considering government-led surveillance in particular, available strategies are investigated to create a trustworthy and universal digital space, based on human rights principles and values. After analysis and discussion of salient aspects of two relevant proposals, it is submitted that the lack of a common understanding of concepts makes global regulation unlikely. Nevertheless, a possible alternative to universal frameworks and national regulation might be the creation of ‘blocs of trust’, established through international conventions

    Computational interaction techniques for 3D selection, manipulation and navigation in immersive VR

    Get PDF
    3D interaction provides a natural interplay for HCI. Many techniques involving diverse sets of hardware and software components have been proposed, which has generated an explosion of Interaction Techniques (ITes), Interactive Tasks (ITas) and input devices, increasing thus the heterogeneity of tools in 3D User Interfaces (3DUIs). Moreover, most of those techniques are based on general formulations that fail in fully exploiting human capabilities for interaction. This is because while 3D interaction enables naturalness, it also produces complexity and limitations when using 3DUIs. In this thesis, we aim to generate approaches that better exploit the high potential human capabilities for interaction by combining human factors, mathematical formalizations and computational methods. Our approach is focussed on the exploration of the close coupling between specific ITes and ITas while addressing common issues of 3D interactions. We specifically focused on the stages of interaction within Basic Interaction Tasks (BITas) i.e., data input, manipulation, navigation and selection. Common limitations of these tasks are: (1) the complexity of mapping generation for input devices, (2) fatigue in mid-air object manipulation, (3) space constraints in VR navigation; and (4) low accuracy in 3D mid-air selection. Along with two chapters of introduction and background, this thesis presents five main works. Chapter 3 focusses on the design of mid-air gesture mappings based on human tacit knowledge. Chapter 4 presents a solution to address user fatigue in mid-air object manipulation. Chapter 5 is focused on addressing space limitations in VR navigation. Chapter 6 describes an analysis and a correction method to address Drift effects involved in scale-adaptive VR navigation; and Chapter 7 presents a hybrid technique 3D/2D that allows for precise selection of virtual objects in highly dense environments (e.g., point clouds). Finally, we conclude discussing how the contributions obtained from this exploration, provide techniques and guidelines to design more natural 3DUIs

    Situational awareness through IoT sensors : A smart healthcare system as a use case

    Get PDF
    Emerging technologies of the Internet of Things are getting increasingly significant and to some extent essential as well to the society we are living in. These technologies have shown ability over the time to be implemented in a number of different fields, for instance, Smart Home, Smart Building, Smart City, Smart Retail, Smart Supply Chain, Smart Farming, Smart Grid, Industrial Internet and many more. Incorporation of Internet of Things technologies in the healthcare sector has potential to benefit not only medical related enterprises but at the same time it can improve the overall health and well-being of individuals as well. The deployment of IoT integrated systems has to deal with fairly heterogeneous environments that consist of a large number of sensors and actuators which all can be quite different from one another in many aspects. For example, they can use different operating systems and can have different hardware architecture. Such sensors are sometimes used for situational awareness of the surrounding and for making the individuals interact better with their environment. Such variety of applications and tasks poses a problem for system designers and developers on the choice of the most suitable technology to be employed to accomplish a specific task. This thesis explores the potential of Internet of Things technologies in the medical sector. We used analytical hierarchical process to have a kind of situational awareness through IoT technologies. As an use case, a healthcare system was considered for elderly people with neurological problems who need special care – people suffering with dementia for example. At the same time we have taken into account for the proposed system that it would enable regular people track and monitor their usual activities with a focus on improving the quality of life and enhancing their overall wellbeing. It is of prime importance for the system designers and developers that they have an idea about the potential IoT technologies and applications that can help this cause. We have considered eleven different IoT technologies to select from for the proposed paradigm. The decision of selecting the most appropriate technology obviously depends upon different criteria. Every IoT technology has its pros and cons. According to the needs of the proposed healthcare system, we have constructed a multi-criteria hierarchical model to assess the potential of those eleven IoT technologies for the healthcare system and chosen the best one based on set criteria and sub criteria. A 4-tier Analytical Hierarchical model is used to compare those technologies in terms of their quality of service or effectiveness, their acceptability and from the cost perspective. These criteria are then further divided into sub-criteria and the technologies are compared with respect to these ten sub-criteria to have a more thorough and comprehensive analysis. For these comparisons, quantitative data were collected from the internet including IEEE articles, and some of the comparisons are purely subjective. The results indicate that wide-area low-power solutions show more potential for the proposed healthcare system than other IoT technologies which we used for comparison, and SigFox tops the table. Also WiFi solutions have shown significant potential. But again, every technology has its shortcomings as well. Further studies are needed to see if we can somehow make a hybrid healthcare system that utilizes multiple IoT technologies and incorporate the plus points of all of them into the system; such future system can prove to be revolutionary in the medical care

    Perspectives and approaches for the internet of things

    Get PDF
    Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de ComputadoresThis thesis was developed based on a scenario in which a CEO of a certain company asked the author to conduct an exploratory work evaluating the potential opportunities and limitations of this emerging area described as the future of the Internet, the Internet of Things (IoT). The objective is thus to provide the reader with a wide view of the vital points for the implementation and exploitation of the IoT, a technology that promises to deliver a new and wider range of applications to the society. In this subject there is a need to gather and organize information produced by several researchers and contributors. Due to the fact of being a new area and researchers work independently of each other, the work is scattered and inconsistencies can be found among different projects and publications. As such, in a first stage some definitions are provided and an attempt to clarify concepts is made. To support and emphasize the exponential growth of IoT, a brief historical overview is provided to the reader. This overview is based on the new trends and expectations that arise every day through news, potential businesses and also in important tools such as Google Trends. Several examples of applications in the context of the IoT, illustrate the benefits, not only in terms of society, but also for business opportunities, safety, and well-being. The main areas of interest to achieve the IoT such as: hardware, software, modeling, methods of connection, security and integration are studied in this work, in order to provide some insight into current strong and weak points. As the Internet of Things become a matter of large interest, various research groups are active in exploring and organizing projects in this area. Some of these projects, namely the ones considered the most important, are also presented in this thesis. Taking into account the facts surrounding this new technology, it becomes quite important to bring them together, clarifying them and trying to open new perspectives for further studies and improvements. Finally, in order to allow a practical evaluation of the technology, a prototype is developed around the connection of an intelligent object – a small mobile robot – to the Internet. A set of conclusions and future work directions are then presented which take into account the findings of the bibliographic analysis as well as the acquired experience with the implementation of the prototype

    Multi-Factor Authentication: A Survey

    Get PDF
    Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Peer reviewe
    • …
    corecore