1,149 research outputs found

    Supporting Device Discovery and Spontaneous Interaction with Spatial References

    Get PDF
    The RELATE interaction model is designed to support spontaneous interaction of mobile users with devices and services in their environment. The model is based on spatial references that capture the spatial relationship of a user’s device with other co-located devices. Spatial references are obtained by relative position sensing and integrated in the mobile user interface to spatially visualize the arrangement of discovered devices, and to provide direct access for interaction across devices. In this paper we discuss two prototype systems demonstrating the utility of the model in collaborative and mobile settings, and present a study on usability of spatial list and map representations for device selection

    Context-aware and automatic configuration of mobile devices in cloud-enabled ubiquitous computing

    Get PDF
    This is the author's accepted manuscript. The final publication is available at Springer via http://dx.doi.org/10.1007/s00779-013-0698-3. Copyright @ Springer-Verlag London 2013.Context-sensitive (or aware) applications have, in recent years, moved from the realm of possibilities to that of ubiquity. One exciting research area that is still very much in the realm of possibilities is that of cloud computing, and in this paper, we present our work, which explores the overlap of these two research areas. Accordingly, this paper explores the notion of cross-source integration of cloud-based, context-aware information in ubiquitous computing through a developed prototypical solution. Moreover, the described solution incorporates remote and automatic configuration of Android smartphones and advances the research area of context-aware information by harvesting information from several sources to build a rich foundation on which algorithms for context-aware computation can be based. Evaluation results show the viability of integrating and tailoring contextual information to provide users with timely, relevant and adapted application behaviour and content

    Web Vulnerability Study of Online Pharmacy Sites

    Get PDF
    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems

    Towards formal modelling and verification of pervasive computing systems

    Get PDF
    Smart systems equipped with emerging pervasive computing technologies enable people with limitations to live in their homes independently. However, lack of guarantees for correctness prevent such system to be widely used. Analysing the system with regard to correctness requirements is a challenging task due to the complexity of the system and its various unpredictable faults. In this work, we propose to use formal methods to analyse pervasive computing (PvC) systems. Firstly, a formal modelling framework is proposed to cover the main characteristics of such systems (e.g., context-awareness, concurrent communications, layered architectures). Secondly, we identify the safety requirements (e.g., free of deadlocks and conflicts) and specify them as safety and liveness properties. Furthermore, based on the modelling framework, we propose an approach of verifying reasoning rules which are used in the middleware for perceiving the environment and making adaptation decisions. Finally, we demonstrate our ideas using a case study of a smart healthcare system. Experimental results show the usefulness of our approach in exploring system behaviours and revealing system design flaws such as information inconsistency and conflicting reminder services.No Full Tex

    Smart homes and their users:a systematic analysis and key challenges

    Get PDF
    Published research on smart homes and their users is growing exponentially, yet a clear understanding of who these users are and how they might use smart home technologies is missing from a field being overwhelmingly pushed by technology developers. Through a systematic analysis of peer-reviewed literature on smart homes and their users, this paper takes stock of the dominant research themes and the linkages and disconnects between them. Key findings within each of nine themes are analysed, grouped into three: (1) views of the smart home-functional, instrumental, socio-technical; (2) users and the use of the smart home-prospective users, interactions and decisions, using technologies in the home; and (3) challenges for realising the smart home-hardware and software, design, domestication. These themes are integrated into an organising framework for future research that identifies the presence or absence of cross-cutting relationships between different understandings of smart homes and their users. The usefulness of the organising framework is illustrated in relation to two major concerns-privacy and control-that have been narrowly interpreted to date, precluding deeper insights and potential solutions. Future research on smart homes and their users can benefit by exploring and developing cross-cutting relationships between the research themes identified

    Evaluation of absorbent materials for use as ad hoc dry decontaminants during mass casualty incidents as part of the UK’s Initial Operational Response (IOR)

    Get PDF
    Copyright: © 2017 Kassouf et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.The UK's Initial Operational Response (IOR) is a revised process for the medical management of mass casualties potentially contaminated with hazardous materials. A critical element of the IOR is the introduction of immediate, on-scene disrobing and decontamination of casualties to limit the adverse health effects of exposure. Ad hoc cleansing of the skin with dry absorbent materials has previously been identified as a potential means of facilitating emergency decontamination. The purpose of this study was to evaluate the in vitro oil and water absorbency of a range of materials commonly found in the domestic and clinical environments and to determine the effectiveness of a small, but representative selection of such materials in skin decontamination, using an established ex vivo model. Five contaminants were used in the study: methyl salicylate, parathion, diethyl malonate, phorate and potassium cyanide. In vitro measurements of water and oil absorbency did not correlate with ex vivo measurements of skin decontamination. When measured ex vivo, dry decontamination was consistently more effective than a standard wet decontamination method ("rinse-wipe-rinse") for removing liquid contaminants. However, dry decontamination was ineffective against particulate contamination. Collectively, these data confirm that absorbent materials such as wound dressings and tissue paper provide an effective, generic capability for emergency removal of liquid contaminants from the skin surface, but that wet decontamination should be used for non-liquid contaminants.Peer reviewedFinal Published versio

    DADA: Degree-Aware Algorithms for Network-Based Disease Gene Prioritization

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>High-throughput molecular interaction data have been used effectively to prioritize candidate genes that are linked to a disease, based on the observation that the products of genes associated with similar diseases are likely to interact with each other heavily in a network of protein-protein interactions (PPIs). An important challenge for these applications, however, is the incomplete and noisy nature of PPI data. Information flow based methods alleviate these problems to a certain extent, by considering indirect interactions and multiplicity of paths.</p> <p>Results</p> <p>We demonstrate that existing methods are likely to favor highly connected genes, making prioritization sensitive to the skewed degree distribution of PPI networks, as well as ascertainment bias in available interaction and disease association data. Motivated by this observation, we propose several statistical adjustment methods to account for the degree distribution of known disease and candidate genes, using a PPI network with associated confidence scores for interactions. We show that the proposed methods can detect loosely connected disease genes that are missed by existing approaches, however, this improvement might come at the price of more false negatives for highly connected genes. Consequently, we develop a suite called D<smcaps>A</smcaps>D<smcaps>A</smcaps>, which includes different uniform prioritization methods that effectively integrate existing approaches with the proposed statistical adjustment strategies. Comprehensive experimental results on the Online Mendelian Inheritance in Man (OMIM) database show that D<smcaps>A</smcaps>D<smcaps>A</smcaps> outperforms existing methods in prioritizing candidate disease genes.</p> <p>Conclusions</p> <p>These results demonstrate the importance of employing accurate statistical models and associated adjustment methods in network-based disease gene prioritization, as well as other network-based functional inference applications. D<smcaps>A</smcaps>D<smcaps>A</smcaps> is implemented in Matlab and is freely available at <url>http://compbio.case.edu/dada/</url>.</p

    The Relation Between Cognitive Development and Anxiety Phenomena in Children

    Get PDF
    We examined the relation between cognitive development and fear, anxiety, and behavioral inhibition in a non-clinical sample of 226 Dutch children aged 4–9 years. To assess cognitive development, children were tested with Piagetian conservation tasks and a Theory-of-Mind (TOM) test. Fears were measured by means of a self-report scale completed by the children, while anxiety symptoms and behavioral inhibition were indexed by rating scales that were filled out by parents. Significant age trends were observed for some anxiety phenomena. For example, younger children displayed higher fear scores, whereas older children exhibited higher levels of generalized anxiety. Most importantly, results of regression analyses (in which we controlled for age) indicated that cognitive development, and in particular TOM ability, made a unique and significant contribution to various domains of behavioral inhibition. In all cases, higher levels of TOM were associated with lower levels of behavioral inhibition. In general, percentages of explained variance were rather small (i.e., <6%), indicating that the role of cognitive development in various anxiety phenomena is limited
    corecore