240 research outputs found

    Affective Medicine: a review of Affective Computing efforts in Medical Informatics

    Get PDF
    Background: Affective computing (AC) is concerned with emotional interactions performed with and through computers. It is defined as “computing that relates to, arises from, or deliberately influences emotions”. AC enables investigation and understanding of the relation between human emotions and health as well as application of assistive and useful technologies in the medical domain. Objectives: 1) To review the general state of the art in AC and its applications in medicine, and 2) to establish synergies between the research communities of AC and medical informatics. Methods: Aspects related to the human affective state as a determinant of the human health are discussed, coupled with an illustration of significant AC research and related literature output. Moreover, affective communication channels are described and their range of application fields is explored through illustrative examples. Results: The presented conferences, European research projects and research publications illustrate the recent increase of interest in the AC area by the medical community. Tele-home healthcare, AmI, ubiquitous monitoring, e-learning and virtual communities with emotionally expressive characters for elderly or impaired people are few areas where the potential of AC has been realized and applications have emerged. Conclusions: A number of gaps can potentially be overcome through the synergy of AC and medical informatics. The application of AC technologies parallels the advancement of the existing state of the art and the introduction of new methods. The amount of work and projects reviewed in this paper witness an ambitious and optimistic synergetic future of the affective medicine field

    Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

    Get PDF
    Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)Series: Working Papers on Information Systems, Information Business and Operation

    Eyewear Computing \u2013 Augmenting the Human with Head-Mounted Wearable Assistants

    Get PDF
    The seminar was composed of workshops and tutorials on head-mounted eye tracking, egocentric vision, optics, and head-mounted displays. The seminar welcomed 30 academic and industry researchers from Europe, the US, and Asia with a diverse background, including wearable and ubiquitous computing, computer vision, developmental psychology, optics, and human-computer interaction. In contrast to several previous Dagstuhl seminars, we used an ignite talk format to reduce the time of talks to one half-day and to leave the rest of the week for hands-on sessions, group work, general discussions, and socialising. The key results of this seminar are 1) the identification of key research challenges and summaries of breakout groups on multimodal eyewear computing, egocentric vision, security and privacy issues, skill augmentation and task guidance, eyewear computing for gaming, as well as prototyping of VR applications, 2) a list of datasets and research tools for eyewear computing, 3) three small-scale datasets recorded during the seminar, 4) an article in ACM Interactions entitled \u201cEyewear Computers for Human-Computer Interaction\u201d, as well as 5) two follow-up workshops on \u201cEgocentric Perception, Interaction, and Computing\u201d at the European Conference on Computer Vision (ECCV) as well as \u201cEyewear Computing\u201d at the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)

    INTEGRASI MOBILE LEARNING DAN PROJECT BASED LEARNING UNTUK MENINGKATKAN KOMPETENSI SISWA SEKOLAH MENENGAH KEJURUAN

    Get PDF
    This research is based on the need to improve the quality of learning in improving student's competencies through the development of learning models by utilizing smartphones as learning media. The purpose of this research is to develop an instructional model of integration of mobile learning and project-based learning to improve the competency of Vocational High School students on computer assembly and basic network subject. This research uses the Research and Development method and the experimental method at the stage of realizing the design. The subjects of this study were students majoring in Computer and Network Engineering expertise packages at a public vocational high schools in West Java. The research instrument consisted of a questionnaire to determine the need for model development, a competency test and a questionnaire to determine student responses to the developed model. This model was developed and validated by experts and tested on a limited scale and wide scale. Has successfully developed a learning model of integration of mobile learning and project-based learning with the characteristics of the implementation of project-based learning syntax using mobile learning applications to be accessed online through smartphone devices in learning. The result of the assessment by comparing the competence of learning outcomes with N-gain in the high category, as well as the results of the test of the effect size on the increase competence in the cognitive realm of 77%, 94% psychomotor and 84% more effective compared with the results of limited trials. Significant improvement in psychomotor competence, caused there are the level of active participation of students, the direct participation of students, students who have high curiosity and the achieved progress by learning steps in the phases particular to use mobile media applications (smartphones) as learning resources. Learning uses the integration model of mobile learning and project-based learning shows an increase in student competence caused by effective learning, indicated by positive responses from students

    Networking Architecture and Key Technologies for Human Digital Twin in Personalized Healthcare: A Comprehensive Survey

    Full text link
    Digital twin (DT), refers to a promising technique to digitally and accurately represent actual physical entities. One typical advantage of DT is that it can be used to not only virtually replicate a system's detailed operations but also analyze the current condition, predict future behaviour, and refine the control optimization. Although DT has been widely implemented in various fields, such as smart manufacturing and transportation, its conventional paradigm is limited to embody non-living entities, e.g., robots and vehicles. When adopted in human-centric systems, a novel concept, called human digital twin (HDT) has thus been proposed. Particularly, HDT allows in silico representation of individual human body with the ability to dynamically reflect molecular status, physiological status, emotional and psychological status, as well as lifestyle evolutions. These prompt the expected application of HDT in personalized healthcare (PH), which can facilitate remote monitoring, diagnosis, prescription, surgery and rehabilitation. However, despite the large potential, HDT faces substantial research challenges in different aspects, and becomes an increasingly popular topic recently. In this survey, with a specific focus on the networking architecture and key technologies for HDT in PH applications, we first discuss the differences between HDT and conventional DTs, followed by the universal framework and essential functions of HDT. We then analyze its design requirements and challenges in PH applications. After that, we provide an overview of the networking architecture of HDT, including data acquisition layer, data communication layer, computation layer, data management layer and data analysis and decision making layer. Besides reviewing the key technologies for implementing such networking architecture in detail, we conclude this survey by presenting future research directions of HDT

    Five Facets of 6G: Research Challenges and Opportunities

    Full text link
    Whilst the fifth-generation (5G) systems are being rolled out across the globe, researchers have turned their attention to the exploration of radical next-generation solutions. At this early evolutionary stage we survey five main research facets of this field, namely {\em Facet~1: next-generation architectures, spectrum and services, Facet~2: next-generation networking, Facet~3: Internet of Things (IoT), Facet~4: wireless positioning and sensing, as well as Facet~5: applications of deep learning in 6G networks.} In this paper, we have provided a critical appraisal of the literature of promising techniques ranging from the associated architectures, networking, applications as well as designs. We have portrayed a plethora of heterogeneous architectures relying on cooperative hybrid networks supported by diverse access and transmission mechanisms. The vulnerabilities of these techniques are also addressed and carefully considered for highlighting the most of promising future research directions. Additionally, we have listed a rich suite of learning-driven optimization techniques. We conclude by observing the evolutionary paradigm-shift that has taken place from pure single-component bandwidth-efficiency, power-efficiency or delay-optimization towards multi-component designs, as exemplified by the twin-component ultra-reliable low-latency mode of the 5G system. We advocate a further evolutionary step towards multi-component Pareto optimization, which requires the exploration of the entire Pareto front of all optiomal solutions, where none of the components of the objective function may be improved without degrading at least one of the other components

    End-of-life implications of electronic textiles - Assessment of a converging technology

    Get PDF
    Contemporary innovation in the converging technology sectors of electronics and textile aims at augmenting functionality of textiles, making them “smart”. That is, integrating electronic functions such as sensing, data processing, and networking into wearable products. Embedding electronic devices into textiles results in a novel category of products: electronic textiles (e-textiles). Whereas researchers and innovators are pushing forward technological development little attention has been paid to the end-of-life implications of such future products. E-textiles may not only entail promising business opportunities but also adverse environmental impacts. This study examines potential end-of-life implications, which could emerge once future e-textiles are disposed of. Using the methodological framework of technology assessment an overview of current innovation processes for e-textiles is established and an outlook on future applications areas is provided. Further, information on technologies and materials composition of e-textiles is mapped as a basis for assessing the prospective implications at the end of their useful life. The findings suggest that widespread application of e-textiles could result in the emergence of a new waste stream. There are various parallels to electronic waste, which causes profound environmental problems nowadays. Risks include potential release of toxic substances during the disposal phase. And, loss of scarce materials is to be expected if no recycling takes place. This would accelerate the depletion of resources. Recycling of textile integrated electronic devices will be difficult. From the analysis it can be deduced that today’s schemes for takeback, recycling and disposal would not be sufficient to cope with waste e-textiles in an environmentally benign manner. Instead, discarded e-textiles would find their way into solid waste and increase the existing environmental problems of waste disposal. The study concludes with recommendations for policy makers and technology developers on how a waste preventative technology design could be achieved
    • …
    corecore