618 research outputs found

    MiPOS - the Mote Indoor Positioning System

    Get PDF
    In the past few years, there have been huge research efforts into ubiquitous and context aware platforms that offer a user a custom level of service based on some known local parameters. The utility of such systems is greatly enhanced if a physical locational area can be determined. Recently, hybrid devices have been developed combining low power micro controllers with short range FM radio transceivers. Some location identification work has been carried out with these systems such as the Matrix Pencil approximation technique[8],however most of these all provide information for an ideal square area with no RF obstructions.Here we present MiPOS, a scalable locationing system based on the MICA mote[11] family of devices.The design goal of MiPOS is to provide a low-power, scalable, distributed locationing system suited to an indoor (office) environment.During the presentation of this paper we will highlight solutions in the areas of security, radio and network management and power awareness for a hybrid context aware wearable locationing device

    Key Factors in E-Government Information System Security

    Get PDF

    ForgetMeNot: Active Reminder Entry Support for Adults with Acquired Brain Injury

    Get PDF
    Smartphone reminding apps can compensate for memory impairment after acquired brain injury (ABI). In the absence of a caregiver, users must enter reminders themselves if the apps are going to help them. Poor memory and apathy associated with ABI can result in failure to initiate such configuration behaviour and the benefits of reminder apps are lost. ForgetMeNot takes a novel approach to address this problem by periodically encouraging the user to enter reminders with unsolicited prompts (UPs). An in situ case study investigated the experience of using a reminding app for people with ABI and tested UPs as a potential solution to initiating reminder entry. Three people with severe ABI living in a post-acute rehabilitation hospital used the app in their everyday lives for four weeks to collect real usage data. Field observations illustrated how difficulties with motivation, insight into memory difficulties and anxiety impact reminder app use in a rehabilitation setting. Results showed that when 6 UPs were presented throughout the day, reminder-setting increased, showing UPs are an important addition to reminder applications for people with ABI. This study demonstrates that barriers to technology use can be resolved in practice when software is developed with an understanding of the issues experienced by the user group

    DOWNHILL DOMINATION IN GRAPHS

    Get PDF
    A path π = (v1, v2, . . . , vk+1) iun a graph G = (V, E) is a downhill path if for every i, 1 ≤ i ≤ k, deg(vi) ≥ deg(vi+1), where deg(vi) denotes the degree of vertex vi ∈ V. The downhill domination number equals the minimum cardinality of a set S ⊆ V having the property that every vertex v ∈ V lies on a downhill path originating from some vertex in S. We investigate downhill domination numbers of graphs and give upper bounds. In particular, we show that the downhill domination number of a graph is at most half its order, and that the downhill domination number of a tree is at most one third its order. We characterize the graphs obtaining each of these bounds

    Moving Towards Information System Security Accreditation within Australian State Government Agencies

    Get PDF
    This paper investigates the current status of Information System Security (ISS) within New South Wales State government agencies in Australia. A 3-year longitudinal survey was used to increase awareness and motivate ISS managers. In addition, the survey was used as a management tool to monitor compliance with ISS standard’s controls (AS/NZS17799:2001). In 2004 an amendment to the standard added critical success factors (CSFs) as being necessary for an agency’s movement to accreditation. An analysis of the CSFs results was undertaken to determine the status of an independently acting agency’s security readiness and they were summarized to then provide an overall measure. This measure provided a ‘benchmark’ for an agency’s security readiness to the standard’s CSFs (AS/NZS17799:2004.AMDT). While the process for improving security based on CSFs is adequate, actual improvement in ISS across government requires further effort. This research contributes to the level of understanding of ISS compliance within e-Government

    Community-based first aid: a program report on the intersection of community-based participatory research and first aid education in a remote Canadian Aboriginal community

    Get PDF
    Community-based first aid training is the collaborative development of locally relevant emergency response training. The Sachigo Lake Wilderness Emergency Response Education Initiative was developed, delivered, and evaluated through two intensive five-day first aid courses. Sachigo Lake First Nation is a remote aboriginal community of 450 people in northern Ontario, Canada with no local paramedical services. These courses were developed in collaboration with the community, with a goal of building community capacity to respond to medical emergencies. Issue. Most first aid training programs rely on standardized curriculum developed for urban & rural contexts with established emergency response systems. Delivering effective community-based first aid training in remote aboriginal communities required specific adaptations to conventional first aid educational content and pedagogy. Lessons Learned. Three key lessons emerged during this program that used collaborative principles to adapt conventional first aid concepts and curriculum. (1) 15 Standard algorithmic approaches may not be relevant nor appropriate. Relationships between course participants and the people they help are relevant and important. Curriculum must be attentive to existing informal and formal emergency response systems. These lessons may be instructive for the development of other programs in similar settings

    Technological memory aid use by people with acquired brain injury

    Get PDF
    Evans, Wilson, Needham, and Brentnall (2003) investigated memory aid use by people with acquired brain injury (ABI) and found little use of technological memory aids. The present study aims to investigate use of technological and other memory aids and strategies 10 years on, and investigate what predicts use. People with ABI and self-reported memory impairments (n = 81) completed a survey containing a memory aid checklist, demographic questions and memory questionnaires. Chi-square analysis showed that 10 of 18 memory aids and strategies were used by significantly more people in the current sample than in Evans et al. (2003). The most commonly used strategies were leaving things in noticeable places (86%) and mental retracing of steps (77%). The most commonly used memory aids were asking someone to remind you (78%), diaries (77%), lists (78%), and calendars (79%) and the most common technologies used were mobile phone reminders (38%) and alarms/timers (38%). Younger people who used more technology prior to their injury and who use more non-technological memory aids currently were more likely to use technology. Younger people who used more memory aids and strategies prior to their injury and who rated their memory as poorer were more likely to use all types of memory aids and strategies

    Bayesian Inference of Initial Conditions from Non-Linear Cosmic Structures using Field-Level Emulators

    Full text link
    Analysing next-generation cosmological data requires balancing accurate modeling of non-linear gravitational structure formation and computational demands. We propose a solution by introducing a machine learning-based field-level emulator, within the Hamiltonian Monte Carlo-based Bayesian Origin Reconstruction from Galaxies (BORG) inference algorithm. Built on a V-net neural network architecture, the emulator enhances the predictions by first-order Lagrangian perturbation theory to be accurately aligned with full NN-body simulations while significantly reducing evaluation time. We test its incorporation in BORG for sampling cosmic initial conditions using mock data based on non-linear large-scale structures from NN-body simulations and Gaussian noise. The method efficiently and accurately explores the high-dimensional parameter space of initial conditions, fully extracting the cross-correlation information of the data field binned at a resolution of 1.95h11.95h^{-1} Mpc. Percent-level agreement with the ground truth in the power spectrum and bispectrum is achieved up to the Nyquist frequency kN2.79h  Mpc1k_\mathrm{N} \approx 2.79h \; \mathrm{Mpc}^{-1}. Posterior resimulations - using the inferred initial conditions for NN-body simulations - show that the recovery of information in the initial conditions is sufficient to accurately reproduce halo properties. In particular, we show highly accurate M200cM_{200\mathrm{c}} halo mass function and stacked density profiles of haloes in different mass bins [0.853,16]×1014Mh1[0.853,16]\times 10^{14}M_{\odot}h^{-1}. As all available cross-correlation information is extracted, we acknowledge that limitations in recovering the initial conditions stem from the noise level and data grid resolution. This is promising as it underscores the significance of accurate non-linear modeling, indicating the potential for extracting additional information at smaller scales.Comment: 16 pages, 11 figure

    Information Security in an Identity Management Lifecycle: Mitigating Identity Crimes

    Get PDF
    Identity management is a wide area that deals with identifying individuals or entities in a system (such as a nation, community, network, or organization) and controlling access to resources or use and flow of transactions (e.g., financial) within systems by associating user rights and restrictions with the established identity (identifiers). A qualitative interpretive methodology was adopted with industry and government organizational experts interviewed. In addition, secondary data were collected and analyzed. We used a lifecycle frame to interpret themes and issues from interview transcripts and other collated secondary data. The paper\u27s contribution is to make sense of ‘identity’ in offline and/or online channels and to extend a 3- stage identity management lifecycle framework (IDSP, 2008) to four which includes: initial ‘enrolment’, ‘transacting’ ‘database’, and ‘purging’
    corecore