دانلود و نمایش مقالات مرتبط با Smart phone::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Smart phone

تعداد مقالات یافته شده: 13
ردیف عنوان نوع
1 GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors
GaitCode: احراز هویت پیوسته مبتنی بر راه رفتن با استفاده از یادگیری چند حالته و حسگرهای پوشیدنی-2021
The ever-growing threats of security and privacy loss from unauthorized access to mobile devices have led to the development of various biometric authentication methods for easier and safer data access. Gait-based authentication is a popular biometric authentication as it utilizes the unique patterns of human locomotion and it requires little cooperation from the user. Existing gait-based biometric authentication methods however suffer from degraded performance when using mobile devices such as smart phones as the sensing device, due to multiple reasons, such as increased accelerometer noise, sensor orientation and positioning, and noise from body movements not related to gait. To address these drawbacks, some researchers have adopted methods that fuse information from multiple accelerometer sensors mounted on the human body at different lo- cations. In this work we present a novel gait-based continuous authentication method by applying multimodal learning on jointly recorded accelerometer and ground contact force data from smart wearable devices. Gait cycles are extracted as a basic authentication element, that can continuously authenticate a user. We use a network of auto-encoders with early or late sensor fusion for feature extraction and SVM and soft max for classification. The effectiveness of the proposed approach has been demonstrated through extensive experiments on datasets collected from two case studies, one with commercial off-the-shelf smart socks and the other with a medical-grade research prototype of smart shoes. The evaluation shows that the proposed approach can achieve a very low Equal Error Rate of 0.01% and 0.16% for identification with smart socks and smart shoes respectively, and a False Acceptance Rate of 0.54%–1.96% for leave-one-out authentication.
Keywords: Biometric authentication | Gait authentication | Autoencoders | Sensor fusion | Multimodal learning | Wearable sensors
مقاله انگلیسی
2 Bundle-of-care interventions to improve self-management of patients with urinary catheters: Study protocol
مداخلات بسته مراقبتی برای بهبود خود مدیریتی بیماران با سوندهای ادراری: پروتکل مطالعه-2021
Background: Community-based urinary catheter-associated complications contribute to avoidable, costly hospital presentations. To minimise catheter-associated complications and improve the quality of life of patients living in the community, it is essential to improve catheter self-management through increasing patients’ and caregivers’ knowledge and self-efficacy.
Aim: To co-design, develop and evaluate a bundle-of-care intervention to improve catheter selfmanagement, reduce catheter-associated complications, and improved quality of life.
Design: Mixed methods design underpinned by the principles of Appreciative Inquiry, micro- and spacedlearning pedagogies. Methods: A co-designed care bundle will be developed, to support both patients and nurses in improving catheter care in both acute and community settings. Intervention bundles for patients will be delivered using “GoShare Healthcare” and for nurses, using QStream. The underpinning pedagogical approaches of these two digital platforms focus on increasing knowledge retention and improving patient health outcomes.
A process evaluation of the intervention will be undertaken using data collected from surveys, electronic medical record audits, and participant interviews. The primary outcome is improved catheter selfmanagement, and secondary outcomes are increased self-efficacy and patients’ knowledge of catheter self-management.
Discussion: The IQ-IDC study applies a two-pronged approach to co-design a bundle-of-care intervention that addresses important gaps in current catheter management. This study will contribute to new knowledge on effective implementation strategies to optimise self-management in urinary catheter care.
keywords: سوند ادرار | بسته های مراقبت | خود مدیریت | خودپرداز | گوشی های هوشمند | پروتکل بالینی | Urinary catheter | Care bundles | Self-management | Self-efficacy | Smart phone | Clinical protocol
مقاله انگلیسی
3 Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices
افشای انتخابی و طرح احراز هویت حفظ حریم خصوصی مبتنی بر yoking-proof برای دستگاه های پوشیدنی پشتیبانی شده ابری-2017
Along with the development of user-centric wireless communications, wearable devices appear to be popular for real-time collecting a user’s private data to provide intelligent service support. Compared with traditional short-range communications, the wearable devices confront more severe system vulnerabili ties and security threats during interactions. Considering the limitations of computational capabilities and communication resources, it brings more challenges to design privacy-preserving authentication schemes for the resource-constrained wearable devices. In this work, local authentication and remote authentica tion are respectively designed for cloud assisted wearable devices. In the local authentication mode, hash based selective disclosure mechanism and Chebyshev chaotic map are jointly applied to achieve mutual authentication between a wearable device and a smart phone. In the remote authentication mode, Merkle hash tree based selective disclosure mechanism is designed to improve the structure of data fields in the certificate, and a yoking-proof is established to realize interactions between two wearable devices and a smart phone, and is further transmitted to the cloud server for simultaneous verification. Meanwhile, security formal analysis is performed based on the BAN logic for proving that the proposed remote authentication protocol has theoretical design correctness. It indicates that the proposed authentication scheme is available and flexible for ubiquitous wearable devices.
Keywords: Authentication protocol | Security | Wearable device | Yoking-proof | Selective disclosure
مقاله انگلیسی
4 G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things
G-SPAMINE: یک رویکرد برای کشف الگوهای انجمنی موقت و روندها در اینترنت اشیاء -2017
Temporal data is one of the most common form of data in internet of things. Data from various sources such as sensors, smart phones, smart homes and smart vehicles in near future shall be of temporal nature with generated information recorded at different timestamps. We call all such data as time stamped temporal data. Discovery of temporal patterns and temporal trends from such temporal data requires new algorithms and methodologies as most of the existing algorithms do not reveal emerging, seasonal and diminishing patterns. In this paper, the objective is to find temporal patterns whose true prevalence values vary similar to a reference support time sequence satisfying subset constraints through estimating temporal pattern support bounds and using a novel fuzzy dissimilarity measure. We name our approach as G-SPAMINE. Experiment results show that G-SPAMINE out performs naive and sequential approaches and comparatively better to or atleast same as SPAMINE. In addition, the stamped temporal data adds extra level of privacy for temporal patterns in the IoT.
Keywords: Temporal data | Seasonal pattern | Support bounds | Temporal trend | Web of things
مقاله انگلیسی
5 Lightweight distributed secure data management system for health internet of things
مدیریت سیستم داده های سبک وزن توزیع شده امن برای سلامت اینترنت اشیاء -2017
Internet of Things (IoT) connects various kinds of sensors and smart devices using the internet to collect data. The adoption of IoT in medical care field will bring great convenient to both doctors and patients for effective illness monitoring and diagnosis. Due to the high value of medical data and the openness character of health IoT, the protection of data confidentiality is of crucial importance. In this paper, we propose a novel distributed secure data management with keyword search system for health IoT. Since the patients are usually managed by diverse medical institutions, the proposed system enables distributed access control of protected health information (PHI) among different medical domains. On the other hand, the accumulation of electronic health records (EHR) makes effective data retrieval a challenge task. Our scheme could provide efficient keyword search function on cross-domain PHI. For the resource limited devices in health IoT, it is an essential requirement to design lightweight algorithms in the secure data management system. The proposed system realizes lightweight data encryption, lightweight keyword trapdoor generation and lightweight data recovery, which leaves very few computations to users terminal. The security of this system is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison analysis is made between this scheme and other existing systems. The extensive experiments on both laptop and smart phone platforms show that the proposed scheme has greatly improved the computation efficiency and requires much less communication cost.
Keywords: Health Internet of Things | Searchable encryption | Distributed access control | Attribute based encryption | Lightweight computation
مقاله انگلیسی
6 Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC
سیستم امن مینیاتوری در بسته بدون تماس و احراز هویت دستگاه های غیر فعال دارای NFC-2017
RFID/NFC technology is widely spread nowadays and applications can be found in our everyday life, for example, in payment, transportation, logistics, healthcare, and access control. State-of-the-art contactless and passive authentication solutions implement relatively large coils outside of the chip. Therefore, the minimum size is in the order of a few square centimeters, which limits their use for tagging of certain small-sized goods. On top of that, those miniaturized solutions which are available today provide only limited security measures. Here we introduce miniaturized system-in-package contactless authentication devices. This novel solution integrates Infineon Technologies’ CIPURSETMmove IC, which is a state-of-the-art security solution featur ing an open security standard, into embedded Wafer Level Ball Grid Array (eWLB) packages, together with HF-antennas, ferrites, as well as discrete elements that improve HF-coupling characteristics. The presented devices provide better HF-coupling characteristics than Coil-on-Chip approaches, which also enable verification of authenticity of tagged products through NFC-enabled smart phones. Thanks to the miniaturized package sizes of 3 × 3 mm, integration into high-priced products, casings, consumable materials, etc., can be achieved in a discreet way. Furthermore, the integrated CIPURSETM chip enables not only the anti-counterfeiting use-case, but also micropayment, ticketing, access control, and password storage in a secured way. Therefore, this miniaturized contactless authentication solution will open up whole new fields of applications.
Keywords: Security | System-in-package | eWLB | RFID | NFC | CIPURSETM
مقاله انگلیسی
7 A matter of perspective: Design newness and its performance effects
یک موضوع از منظر: طراحی نوآوری و اثرات عملکرد آن-2017
Several studies suggest that products with a distinctive exterior design outperform products without differentiating aesthetics. So far, a products design newness has been assessed by a comparison to the design of competing products. Drawing on categorization theory, we argue that two additional perspectives are important: design newness with respect to the products brand portfolio and that with respect to the products predecessor. Results of an em pirical study in the domain of cars confirm that all three perspectives of design newness have different and significant sales effects. Consumers tolerance for newness is found to be most conservative within the predecessor perspective, followed by moderate levels of newness in the brand portfolio perspective and high levels in the competitor perspective. To maximize per formance, manufacturers should therefore develop designs that have high novelty compared to the competitive set and are moderately novel compared to the brands product portfolio and to the preceding model generation. A second empirical application in the context of smart phones confirms these findings.
Keywords: Design newness | Product design | Design management | Car sales
مقاله انگلیسی
8 Engineering Democratization in Internet of Things Data Analytics
مهندسی دموکراتیزاسیون در اینترنت اشیاء و تجزیه و تحلیل داده ها-2017
The pervasiveness of Internet of Things devices in techno-socio-economic domains such as Smart Cities and Smart Grids results in a massive scale of data about our society. Decision-making by system operators or policy-makers requires a sophisticated understanding of these data with real-time data analytics methods. However, common data analytics methods often serve exclusively corporate and commercial interests and result in privacy-intrusion, surveillance, profiling and discriminatory actions. This paper illustrates an alternative data analytics approach that relies on participatory citizens to contribute Internet of Things data and crowdsourced computational resources in order to compute aggregation functions in a collective fashion. This democratization calls for a fully decentralized and privacypreserving system design with which a local data management mechanism implemented in smart phones can guarantee highly accurate computations under highly dynamic data streams. Experimental evaluation with real-world Smart Grid data illustrates the performance trade-offs and shows how they can be managed in an automated and empirical way using decision trees.
مقاله انگلیسی
9 An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
احراز هویت کاربر کارا و طرح توافق کلیدی برای شبکه حسگر بیسیم ناهمگن برای محیط اینترنت اشیا-2016
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic ´ et al.’s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the IOT notion. Their scheme presented a novel approach where a user from the IOT can authenticate with a specific sen sor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfor tunately we have found that Turkanovic et al.’s scheme has some security shortcomings and ´ is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanovic et al.’s scheme, by proposing a new and improved UAKAS. The pro- ´ posed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the pro posed scheme.
Keywords: Internet of Things | Wireless sensor networks | Key agreement | Authentication | BAN-logic | AVISPA tools
مقاله انگلیسی
10 Smart Phone Based Data Mining for Human Activity Recognition
تلفن های هوشمند مبتنی بر داده کاوی برای به رسمیت شناختن فعالیت انسانی-2015
Automatic activity recognition systems aim to capture the state of the user and its environment by exploiting heterogeneous sensors, and permit continuous monitoring of numerous physiological signals, where these sensors are attached to the subject's body. This can be immensely useful in healthcare applications, for automatic and intelligent daily activity monitoring for elderly people. In this paper, we present novel data analytic scheme for intelligent Human Activity Recognition (AR) using smartphone inertial sensors based on information theory based feature ranking algorithm and classifiers based on random forests, ensemble learning and lazy learning. Extensive experiments with a publicly available database1 of human activity with smart phone inertial sensors show that the proposed approach can indeed lead to development of intelligent and automatic real time human activitymonitoring for eHealth application scenarios for elderly, disabled and people with special needs.© 2014 The Authors. Published by Elsevier B.V.Peer-review under responsibility of organizing committee of the International Conference on Information and Communication Technologies (ICICT 2014).© 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Peer-review under responsibility of organizing committee of the International Conference on Information and Communication Technologies (ICICT 2014)
smart phone | activity recognition | machine learning | assisted living
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2317 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 36584 :::::::: افراد آنلاین: 38