38 research outputs found

    CMAG: IoT Baby Monitor

    Get PDF
    Sudden Infant Death Syndrome, also known as SIDS, is the leading cause of mortality in infants from one month to one year of age. We propose a video-based baby monitoring system with Internet of Things (IoT) capabilities to help shorten the response time of SIDS cases. Using a video amplification technique developed at MIT dubbed “Eulerian Magnification” to amplify subtle movements we can compare pixel color differences in frames for breathing detection in a recorded video of a baby. In the event that abnormal movement is detected from the baby an alarm will be generated to notify the parents or guardians

    Smart Cradle: A Technology-Enabled Solution for Safer and Better Infant Sleep

    Get PDF
    The Smart Cradle using Internet of Things (IoT) is a novel and innovative approach to modernize traditional cradle systems by incorporating smart and connected technologies. This IoT-based cradle system offers enhanced safety, comfort, and convenience for both babies and caregivers. The Smart Cradle is equipped with various sensors such as temperature, humidity, motion, and sound sensors that continuously monitor the baby's environment. These sensors collect data in real-time and send it to a cloud-based server for processing and analysis. The caregivers can access this data through a mobile application or a web interface, allowing them to remotely monitor the baby's condition and receive alerts in case of any abnormalities. Furthermore, the Smart Cradle incorporates features like automated rocking, adjustable incline, and soothing lullabies, which can be controlled remotely through the mobile application. The caregivers can customize the cradle's settings based on the baby's preferences and needs, providing a personalized sleeping experience for the baby. Additionally, the Smart Cradle offers seamless integration with other smart home devices, such as smart cameras, smart lights, and smart thermostats, enabling caregivers to create a safe and conducive environment for the baby. The system can also generate insights and recommendations based on the collected data, helping caregivers to make informed decisions about the baby's sleep patterns, health, and well- being

    Review on Smart Electro-Clothing Systems (SeCSs)

    Get PDF
    This review paper presents an overview of the smart electro-clothing systems (SeCSs) targeted at health monitoring, sports benefits, fitness tracking, and social activities. Technical features of the available SeCSs, covering both textile and electronic components, are thoroughly discussed and their applications in the industry and research purposes are highlighted. In addition, it also presents the developments in the associated areas of wearable sensor systems and textile-based dry sensors. As became evident during the literature research, such a review on SeCSs covering all relevant issues has not been presented before. This paper will be particularly helpful for new generation researchers who are and will be investigating the design, development, function, and comforts of the sensor integrated clothing materials

    Wearable Wireless Devices

    Get PDF
    No abstract available

    Wearable Wireless Devices

    Get PDF
    No abstract available

    Exploring the use of conversational agents to improve cyber situational awareness in the Internet of Things (IoT).

    Get PDF
    The Internet of Things (IoT) is an emerging paradigm, which aims to extend the power of the Internet beyond computers and smartphones to a vast and growing range of "things" - devices, processes and environments. The result is an interconnected world where humans and devices interact with each other, establishing a smart environment for the continuous exchange of information and services. Billions of everyday devices such as home appliances, surveillance cameras, wearables and doorbells, enriched with computational and networking capabilities, have already been connected to the Internet. However, as the IoT has grown, the demand for low-cost, easy-to-deploy devices has also increased, leading to the production of millions of insecure Internet-connected smart devices. Many of these devices can be easily exploited and leveraged to perform large-scale attacks on the Internet, such as the recently witnessed botnet attacks. Since these attacks often target consumer-level products, which commonly lack a screen or user interface, it can be difficult for users to identify signs of infection and be aware of devices that have been compromised. This thesis presents four studies which collectively explored how user awareness of threats in consumer IoT networks could be improved. Maintaining situational awareness of what is happening within a home network is challenging, not least because malicious activity often occurs in devices which are not easily monitored. This thesis evaluated the effectiveness of conversational agents to improve Cyber Situational Awareness. In doing so, it presented the first study to investigate their ability to help users improve their perception of smart device activity, comprehend this in the context of their home environment, and project this knowledge to determine if a threat had occurred or may occur in the future. The research demonstrated how a BLSTMRNN with word embedding could be used to extract semantic meaning from packets to perform deep packet inspection and detect IoT botnet activity. Specifically, how the models use of contextual information from both the past and future enabled better predictions to be made about the current state (packet) due to the sequential nature of the network traffic. In addition, a cross-sectional study examined users' awareness and perception of threats and found that, although users value security and privacy, they found it difficult to identify threats and infected devices. Finally, novel cross-sectional and longitudinal studies evaluated the use of conversational agents, and demonstrated them to be an effective and efficient method of improving Cyber Situational Awareness. In particular, this was shown to be true when using a multi-modal approach and combining aural, verbal and visual modalities

    Analyzing & designing the security of shared resources on smartphone operating systems

    Get PDF
    Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones became the de facto devices users leverage to manage personal information and access external data and other connected devices on a daily basis. To support such multi-faceted functionality, smartphones are designed with a multi-process architecture, which enables third-party developers to build smartphone applications which can utilize smartphone internal and external resources to offer creative utility to users. Unfortunately, such third-party programs can exploit security inefficiencies in smartphone operating systems to gain unauthorized access to available resources, compromising the confidentiality of rich, highly sensitive user data. The smartphone ecosystem, is designed such that users can readily install and replace applications on their smartphones. This facilitates users’ efforts in customizing the capabilities of their smartphones tailored to their needs. Statistics report an increasing number of available smartphone applications— in 2017 there were approximately 3.5 million third-party apps on the official application store of the most popular smartphone platform. In addition we expect users to have approximately 95 such applications installed on their smartphones at any given point. However, mobile apps are developed by untrusted sources. On Android—which enjoys 80% of the smartphone OS market share—application developers are identified based on self-sign certificates. Thus there is no good way of holding a developer accountable for a malicious behavior. This creates an issue of multi-tenancy on smartphones where principals from diverse untrusted sources share internal and external smartphone resources. Smartphone OSs rely on traditional operating system process isolation strategies to confine untrusted third-party applications. However this approach is insufficient because incidental seemingly harmless resources can be utilized by untrusted tenants as side-channels to bypass the process boundaries. Smartphones also introduced a permission model to allow their users to govern third-party application access to system resources (such as camera, microphone and location functionality). However, this permission model is both coarse-grained and does not distinguish whether a permission has been declared by a trusted or an untrusted principal. This allows malicious applications to perform privilege escalation attacks on the mobile platform. To make things worse, applications might include third- party libraries, for advertising or common recognition tasks. Such libraries share the process address space with their host apps and as such can inherit all the privileges the host app does. Identifying and mitigating these problems on smartphones is not a trivial process. Manual analysis on its own of all mobile apps is cumbersome and impractical, code analysis techniques suffer from scalability and coverage issues, ad-hoc approaches are impractical and susceptible to mistakes, while sometimes vulnerabilities are well hidden at the interplays between smartphone tenants and resources. In this work I follow an analytical approach to discover major security and privacy issues on smartphone platforms. I utilize the Android OS as a use case, because of its open-source nature but also its popularity. In particular I focus on the multi-tenancy characteristic of smartphones and identify the re- sources each tenant within a process, across processes and across devices can access. I design analytical tools to automate the discovery process, attacks to better understand the adversary models, and introduce design changes to the participating systems to enable robust fine-grained access control of resources. My approach revealed a new understanding of the threats introduced from third-party libraries within an application process; it revealed new capabilities of the mobile application adversary exploiting shared filesystem and permission resources; and shows how a mobile app adversary can exploit shared communication mediums to compromise the confidentiality of the data collected by external devices (e.g. fitness and medical accessories, NFC tags etc.). Moreover, I show how we can eradicate these problems following an architectural design approach to introduce backward-compatible, effective and efficient modifications in operating systems to achieve fine-grained application access to shared resources. My work has let to security changes in the official release of Android by Google

    Emerging Technologies

    Get PDF
    This monograph investigates a multitude of emerging technologies including 3D printing, 5G, blockchain, and many more to assess their potential for use to further humanity’s shared goal of sustainable development. Through case studies detailing how these technologies are already being used at companies worldwide, author Sinan Küfeoğlu explores how emerging technologies can be used to enhance progress toward each of the seventeen United Nations Sustainable Development Goals and to guarantee economic growth even in the face of challenges such as climate change. To assemble this book, the author explored the business models of 650 companies in order to demonstrate how innovations can be converted into value to support sustainable development. To ensure practical application, only technologies currently on the market and in use actual companies were investigated. This volume will be of great use to academics, policymakers, innovators at the forefront of green business, and anyone else who is interested in novel and innovative business models and how they could help to achieve the Sustainable Development Goals. This is an open access book

    Diseño y desarrollo de un dispositivo electrónico portátil no invasivo para prevenir los casos de muerte súbita en neonatos y lactantes

    Get PDF
    El presente prototipo consiste en el diseño y desarrollo de un dispositivo electrónico portátil no invasivo para prevenir los casos de muerte súbita en neonatos y lactantes, tomando en cuenta aquellos factores que pueden ocasionar la muerte súbita del lactante, tales como el apnea de sueño, posición al dormir del lactante, sobrecalentamiento, entre otros. Como componentes para el sistema, se emplearon un sensor de fuerza resistiva, electrodos superficiales, un termistor para la temperatura, un acelerómetro digital, un sensor ambiental y micromotores. A partir de los componentes utilizados se obtienen la frecuencia respiratoria, la frecuencia cardiaca, el posicionamiento del lactante, la temperatura del lactante, la humedad relativa y temperatura ambientales, junto a una etapa de realimentación que permitirá despertar al lactante cuando capte una disminución de la frecuencia respiratoria (menor a 20 respiraciones por minuto), a través de los micromotores. Posteriormente, los sensores son incorporados a una chaqueta para lactantes, donde las señales obtenidas son procesadas a través de un microcontrolador y enviadas mediante el módulo Bluetooth (BT) correspondiente a una PC, en el cual, se observarán las señales y valores numéricos por medio de una interfaz gráfica de usuario (GUI) desarrollada mediante el uso de software orientado a objetos y técnicas de programación. El prototipo fue probado en tres lactantes, con edades de 3 meses, 12 meses y 18 meses de edad. En ese sentido, se utilizó la chaqueta en cada lactante para captar las mediciones de los sensores utilizados durante el estado de sueño profundo en cada uno de ellos, donde el prototipo tuvo la capacidad de detectar los eventos adversos a la salud del paciente, accionando los micromotores a fin de que el propio lactante pueda adoptar una posición correcta al dormir y así mantenerlo a salvo.The present prototype consists of the design and development of a non-invasive portable electronic device to prevent cases of sudden death in neonates and infants, taking into account those factors that can cause sudden infant death, such as sleep apnea, position infant sleep, overheating, among others. As components for the system, a resistive force sensor, surface electrodes, an integrated temperature circuit, a digital accelerometer, an environmental sensor and micromotors were used. From the components used we obtain the respiratory rate, heart rate, infant positioning, infant temperature, and relative humidity and ambient temperature and the feedback stage that will allow the infant to wake up when it captures a decrease in respiratory rate (less than 20 breaths per minute), through the micromotors. Subsequently the sensors are incorporated into a jacket for infants, then the signals are processed through the microcontroller and sent via the Bluetooth module (BT) to a PC which, we will observe the signals and numerical values through a graphical user interface (GUI) developed by object-oriented software and programming techniques. The prototype was tested in three infants with the following ages 3 months, 12 months and 18 months of age. In this sense, the jacket was used in each infant to capture the measurements of the sensors used during the deep sleep state in each one of them, where the prototype had the ability to detect adverse events in the patient's health, activating the micromotors so that the infant can adopt a correct position when sleeping and thus keep the infant safe.Campus Lima Centr

    Undergraduate engineering and built environment project conference 2017: book of abstracts - Toowoomba, Australia, 18-22 September 2017

    Get PDF
    Book of Abstracts of the USQ Undergraduate Engineering and Built Environment Conference 2017, held Toowoomba, Australia, 18-22 September 2017. These proceedings include extended abstracts of the verbal presentations that are delivered at the project conference. The work reported at the conference is the research undertaken by students in meeting the requirements of courses ENG4111/ENG4112 Research Project
    corecore