1,584 research outputs found
Privacy Mining from IoT-based Smart Homes
Recently, a wide range of smart devices are deployed in a variety of
environments to improve the quality of human life. One of the important
IoT-based applications is smart homes for healthcare, especially for elders.
IoT-based smart homes enable elders' health to be properly monitored and taken
care of. However, elders' privacy might be disclosed from smart homes due to
non-fully protected network communication or other reasons. To demonstrate how
serious this issue is, we introduce in this paper a Privacy Mining Approach
(PMA) to mine privacy from smart homes by conducting a series of deductions and
analyses on sensor datasets generated by smart homes. The experimental results
demonstrate that PMA is able to deduce a global sensor topology for a smart
home and disclose elders' privacy in terms of their house layouts.Comment: This paper, which has 11 pages and 7 figures, has been accepted BWCCA
2018 on 13th August 201
Thermodynamic analysis of turbulent combustion in a spark ignition engine. Experimental evidence
A method independent of physical modeling assumptions is presented to analyze high speed flame photography and cylinder pressure measurements from a transparent piston spark ignition research engine. The method involves defining characteristic quantities of the phenomena of flame propagation and combustion, and estimating their values from the experimental information. Using only the pressure information, the mass fraction curves are examined. An empirical burning law is presented which simulates such curves. Statistical data for the characteristics delay and burning angles which show that cycle to cycle fractional variations are of the same order of magnitude for both angles are discussed. The enflamed and burnt mass fractions are compared as are the rates of entrainment and burning
Design and Implementation of a Remote Care Application Based on Microservice Architecture
Microservice Architecture (MSA) is an architectural style for service-based
software systems. MSA puts a strong emphasis on high cohesion and loose
coupling of the services that provide systems' functionalities. As a result of
this, MSA-based software architectures exhibit increased scalability and
extensibility, and facilitate the application of continuous integration
techniques. This paper presents a case study of an MSA-based Remote Care
Application (RCA) that allows caregivers to remotely access smart home devices.
The goal of the RCA is to assist persons being cared in Activities of Daily
Living. Employing MSA for the realization of the RCA yielded several lessons
learned, e.g., (i) direct transferability of domain models based on
Domain-driven Design; (ii) more efficient integration of features; (iii)
speedup of feature delivery due to MSA facilitating automated deployment.Comment: 8 pages, 3 figures, 2 table
SAT based Enforcement of Domotic Effects in Smart Environments
The emergence of economically viable and efficient sensor technology provided impetus to the development of smart devices (or appliances). Modern smart environments are equipped with a multitude of smart devices and sensors, aimed at delivering intelligent services to the users of smart environments. The presence of these diverse smart devices has raised a major problem of managing environments. A rising solution to the problem is the modeling of user goals and intentions, and then interacting with the environments using user defined goals. `Domotic Effects' is a user goal modeling framework, which provides Ambient Intelligence (AmI) designers and integrators with an abstract layer that enables the definition of generic goals in a smart environment, in a declarative way, which can be used to design and develop intelligent applications. The high-level nature of domotic effects also allows the residents to program their personal space as they see fit: they can define different achievement criteria for a particular generic goal, e.g., by defining a combination of devices having some particular states, by using domain-specific custom operators. This paper describes an approach for the automatic enforcement of domotic effects in case of the Boolean application domain, suitable for intelligent monitoring and control in domotic environments. Effect enforcement is the ability to determine device configurations that can achieve a set of generic goals (domotic effects). The paper also presents an architecture to implement the enforcement of Boolean domotic effects, and results obtained from carried out experiments prove the feasibility of the proposed approach and highlight the responsiveness of the implemented effect enforcement architectur
Diagnosing students' difficulties in learning mathematics
This study considers the results of a diagnostic test of student difficulty and contrasts the difference in performance between the lower attaining quartile and the higher quartile. It illustrates a difference in qualitative thinking between those who succeed and those who fail in mathematics, illustrating a theory that those who fail are performing a more difficult type of mathematics (coordinating procedures) than those who succeed (manipulating concepts). Students who have to coordinate or reverse processes in time will encounter far greater difficulty than those who can manipulate symbols in a flexible way. The consequences of such a dichotomy and implications for remediation are then considered
Holographic Dark Energy from a Modified GBIG Scenario
We construct a holographic dark energy model in a braneworld setup that
gravity is induced on the brane embedded in a bulk with Gauss-Bonnet curvature
term. We include possible modification of the induced gravity and its coupling
with a canonical scalar field on the brane. Through a perturbational approach
to calculate the effective gravitation constant on the brane, we examine the
outcome of this model as a candidate for holographic dark energy.Comment: 13 pages, accepted for publication in IJMP
EmLog:Tamper-Resistant System Logging for Constrained Devices with TEEs
Remote mobile and embedded devices are used to deliver increasingly impactful
services, such as medical rehabilitation and assistive technologies. Secure
system logging is beneficial in these scenarios to aid audit and forensic
investigations particularly if devices bring harm to end-users. Logs should be
tamper-resistant in storage, during execution, and when retrieved by a trusted
remote verifier. In recent years, Trusted Execution Environments (TEEs) have
emerged as the go-to root of trust on constrained devices for isolated
execution of sensitive applications. Existing TEE-based logging systems,
however, focus largely on protecting server-side logs and offer little
protection to constrained source devices. In this paper, we introduce EmLog --
a tamper-resistant logging system for constrained devices using the
GlobalPlatform TEE. EmLog provides protection against complex software
adversaries and offers several additional security properties over past
schemes. The system is evaluated across three log datasets using an
off-the-shelf ARM development board running an open-source,
GlobalPlatform-compliant TEE. On average, EmLog runs with low run-time memory
overhead (1MB heap and stack), 430--625 logs/second throughput, and five-times
persistent storage overhead versus unprotected logs.Comment: Accepted at the 11th IFIP International Conference on Information
Security Theory and Practice (WISTP '17
Religious faith and psychosocial adaptation among stroke patients in Kuwait: A mixed method study
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2012 Springer Science+Business Media.Religious faith is central to life for Muslim patients in Kuwait, so it may influence adaptation and rehabilitation. This study explored quantitative associations among religious faith, self-efficacy, and life satisfaction in 40 female stroke patients and explored the influence of religion within stroke rehabilitation through qualitative interviews with 12 health professionals. The quantitative measure of religious faith did not relate to life satisfaction or self-efficacy in stroke patients. However, the health professionals described religious coping as influencing adaptation post-stroke. Fatalistic beliefs were thought to have mixed influences on rehabilitation. Measuring religious faith among Muslims through a standardized scale is debated. The qualitative accounts suggest that religious beliefs need to be acknowledged in stroke rehabilitation in Kuwait
Smart homes and their users:a systematic analysis and key challenges
Published research on smart homes and their users is growing exponentially, yet a clear understanding of who these users are and how they might use smart home technologies is missing from a field being overwhelmingly pushed by technology developers. Through a systematic analysis of peer-reviewed literature on smart homes and their users, this paper takes stock of the dominant research themes and the linkages and disconnects between them. Key findings within each of nine themes are analysed, grouped into three: (1) views of the smart home-functional, instrumental, socio-technical; (2) users and the use of the smart home-prospective users, interactions and decisions, using technologies in the home; and (3) challenges for realising the smart home-hardware and software, design, domestication. These themes are integrated into an organising framework for future research that identifies the presence or absence of cross-cutting relationships between different understandings of smart homes and their users. The usefulness of the organising framework is illustrated in relation to two major concerns-privacy and control-that have been narrowly interpreted to date, precluding deeper insights and potential solutions. Future research on smart homes and their users can benefit by exploring and developing cross-cutting relationships between the research themes identified
- …
