Spelling suggestions: "subject:"[een] WEARABLE COMPUTING"" "subject:"[enn] WEARABLE COMPUTING""
1 |
Design of a Wearable Ultrasound SystemCordeiro, Philip Joseph 14 August 2006 (has links)
"Ultrasound imaging is a safe and powerful tool for providing detailed still and moving images of the human body. Most of today’s ultrasound systems are housed on a movable cart and designed for use within a clinical setting, such as in a hospital or doctor’s office. This configuration hinders its use in locations lacking controlled environments and stable power sources. Example locations include ambulances, disaster sights, war zones and rural medicine. A wearable ultrasound system, in the form of a vest worn by a sonographer, has been developed as a complete solution for performing untethered ultrasound examinations. The heart of the system is an enclosure containing an embedded computer running the Windows XP operating system, and a custom power supply. The power supply integrates a battery charger, a switching regulator, two linear regulators, a variable speed fan controller and a microcontroller providing an interface for monitoring and control to the embedded computer. Operation of the system is generally accomplished through the use of voice commands, but it may also be operated using a hand-held mouse. It is capable of operating for a full day, using two batteries contained in the vest. In addition, the system has the capability to wirelessly share live images with remote viewers in real-time, while also permitting full duplex voice communication. An integrated web-server also provides for the wireless retrieval of stored images, image loops and other information using a web-browser. "
|
2 |
A Real-time Mediated Reality Platform for Outdoor Navigation on Mobile Devices and Wearable ComputersTran, Eric 07 April 2010 (has links)
Wearable computing systems have been researched and developed for several decades. With the advent of the head-mounted display, augmented and mediated reality systems became an important example of wearable computing. However, due to certain factors such as computational constraints, cost, obtrusiveness, practicality, and social acceptance, mediated reality systems have been leveraged in only very specific application domains and have yet to see
mainstream adoption.
This dissertation describes the research and development of a real-time mediated reality platform developed for modern mobile devices to provide a more reasonable transition in overcoming the mainstream adoption barrier of mediated reality systems. In particular, an outdoor navigational application that provides contextually-relevant information about a user’s surroundings is developed using the platform as a proof-of-concept for evaluation. In addition, the server
infrastructure required to support the application is discussed, as well as the evaluation of a hybrid orientation tracking approach using sensors and computer vision.
|
3 |
A Real-time Mediated Reality Platform for Outdoor Navigation on Mobile Devices and Wearable ComputersTran, Eric 07 April 2010 (has links)
Wearable computing systems have been researched and developed for several decades. With the advent of the head-mounted display, augmented and mediated reality systems became an important example of wearable computing. However, due to certain factors such as computational constraints, cost, obtrusiveness, practicality, and social acceptance, mediated reality systems have been leveraged in only very specific application domains and have yet to see
mainstream adoption.
This dissertation describes the research and development of a real-time mediated reality platform developed for modern mobile devices to provide a more reasonable transition in overcoming the mainstream adoption barrier of mediated reality systems. In particular, an outdoor navigational application that provides contextually-relevant information about a user’s surroundings is developed using the platform as a proof-of-concept for evaluation. In addition, the server
infrastructure required to support the application is discussed, as well as the evaluation of a hybrid orientation tracking approach using sensors and computer vision.
|
4 |
A self-contained motion capture platform for e-textilesSimmons, Jacob Ross 17 September 2010 (has links)
Wearable computers and e-textiles are increasingly prevalent in today's society. Motion capture is one of many potential applications for on-body electronic systems. Self-contained motion capture applications require information from sensors distributed throughout the body on a "smart" garment. Therefore, this thesis presents the design of a flexible hardware platform for e-textile motion capture applications. This thesis also presents software for one such application, namely, tracking the pose or relative position of body limbs. The accuracy of this solution is compared to an industrial optical motion capture system. The combined hardware and software design are successful at collecting and processing motion capture data in the context of an e-textile jumpsuit. / Master of Science
|
5 |
Wearable Pulse Oximetry in Construction EnvironmentsForsyth, Jason B. 16 April 2010 (has links)
The goal of this project was to determine the feasibility of non-invasively monitoring the blood gases of construction workers for carbon monoxide exposure via pulse oximetry. In particular, this study sought to understand the impact of motion artifacts caused by the worker's activities and to determine if those activities would prevent the blood gas sensor from detecting the onset of carbon monoxide poisoning. This feasibility study was conducted using a blood oxygen sensor rather than a blood carbon monoxide sensor for several reasons. First, blood gas sensors that measure blood carbon monoxide are not readily available in suitable physical form factors. Second, sensors for blood oxygen and blood carbon monoxide operate on the same physical principles and thus will be affected in the same way by worker motions. Finally, using a blood oxygen sensor allowed the study to be conducted without exposing the human subjects to carbon monoxide. A user study was conducted to determine the distribution of motion artifacts that would be created during a typical work day. By comparing that distribution to a worst-case estimate of time to impairment, the probability that helmet will adequately monitor the worker can be established. The results of the study show that the helmet will provide a measurement capable of warning the user of on setting carbon monoxide poisoning with a probability greater than 99%. / Master of Science
|
6 |
An Ambulatory Monitoring Algorithm to Unify Diverse E-Textile GarmentsBlake, Madison Thomas 11 March 2014 (has links)
In this thesis, an activity classification algorithm is developed to support a human ambulatory monitoring system. This algorithm, to be deployed on an e-textile garment, represents the enabling step in creating a wide range of garments that can use the same classifier without having to re-train for different sensor types. This flexible operation is made possible by basing the classifier on an abstract model of the human body that is the same across all sensor types and subject bodies. In order to support low power devices inherent for wearable systems, the algorithm utilizes regular expressions along with a tree search during classification.
To validate the approach, a user study was conducted using video motion capture to record subjects performing a variety of activities. The subjects were randomly placed into two groups, one used to generate the activities known by the classifier and another to be used as observation to the classifier. These two sets were used to gain insight on the performance of the algorithm. The results of the study demonstrate that the algorithm can successfully classify observations, so as long as precautions are taken to prevent the activities known by the classifier to become too large. It is also shown that the tree search performed by the classification can be utilized to partially classify observations that would otherwise be rejected by the classifier. The user study additionally included subjects that performed activities purely used for observations to the classifier. With this set of recordings, it was demonstrated that the classifier does not over-fit and is capable of halting the classification of an observation. / Master of Science
|
7 |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous ComputingKusen, Ema, Strembeck, Mark January 2015 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview
of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
|
8 |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous ComputingKusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013).
Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems.
Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results.
Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
|
9 |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous ComputingKusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013).
Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems.
Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results.
Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) / Series: Working Papers on Information Systems, Information Business and Operations
|
10 |
Don’t Touch: Social Appropriateness of Touch Sensor Placement on Interactive Lumalive E-Textile ShirtsCheng, Sylvia Hou-Yan 31 August 2011 (has links)
We discuss the design of an e-textile shirt with an interactive Lumalive display featuring a touch-controlled image browser. To determine where to place touch sensors, we investigated which areas of the Lumalive shirt users would be comfortable touching or being touched. We did so by measuring how often participants would opt out of touches. Results show significant differences in opt-outs between touch zones on the front of the shirt. For both touchers and touchees, opt-outs occurred mostly in the upper chest touch zone. We also found significant differences in comfort ratings between touch zones on the front as well as on the back of the shirt. On the front, the
upper chest and lower abdominal zones were the least comfortable touch zones. We found no gender effects on overall comfort ratings, suggesting the upper chest area
was equally uncomfortable to males as it was to females. Interestingly, touching some areas rated as most uncomfortable produced a significantly greater calming effect on heart rate. Findings suggest participants were less comfortable with touches on the upper chest, the lower abdomen, and the lower back. We conclude that the most appropriate areas for touch sensors on a shirt are on the arms and shoulders, as well as on the upper back. Based on these findings, we created an interactive shirt for
a proximity-based game of tag using Lumalive e-textile displays. This custom shirt features touch sensors located on the shoulder and lower arm regions of the shirt. / Thesis (Master, Computing) -- Queen's University, 2011-08-29 16:27:36.37
|
Page generated in 0.0353 seconds