• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 5
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 48
  • 48
  • 10
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark January 2015 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
12

Methods of computing in a ubiquitous age

Yeh, Wei Cheng, 1975- 17 September 2010 (has links)
As technology becomes integrated into everyday life, the relationship between the human and machine must be kept in a balance. Not only does the technology have to perform its intended function, but it must do so in accordance with the dynamic parameters of the complex use environment, in a way that does not encumber the user either physically or mentally. The dissertation explores the challenges of such a scenario through an analysis of three core facets: Affordances, or the user interface cues that allow an intuitive means of operating a device; the aspect of simplicity and its effect on the use factors of the technology (while something might seem to be simple, it may actually be complex to use); and cognitive load in terms of user impact, as a result of utilizing the technology. These illustrate the challenges inherent in understanding the facets fundamental to human- machine interaction in a complex environment. The three factors will be explored first through an historical analysis of the work in each aspect. The theories at hand will be utilized to inform the creation of iterative generations of wearable sensory systems. By utilizing the systems in the field of dance, the theoretical aspects of the core factors can be gauged by actual implementation. Each implementation will be compared side by side to gauge differences in terms of movement dynamics and efficacy of execution. The study will reveal that the three core factors of affordance, simplicity and cognitive load combine synergistically to create a foundational methodology for seamless integration of technology in a complex use scenario. Furthermore, the facets of interoperability between devices in a complex use environment will be illustrated through the theory of intra-interactivity. Finally, the dissertation will illustrate the advantages of passive user interaction and its necessity in relation to the factor of cognitive load. / text
13

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
14

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) / Series: Working Papers on Information Systems, Information Business and Operations
15

Don’t Touch: Social Appropriateness of Touch Sensor Placement on Interactive Lumalive E-Textile Shirts

Cheng, Sylvia Hou-Yan 31 August 2011 (has links)
We discuss the design of an e-textile shirt with an interactive Lumalive display featuring a touch-controlled image browser. To determine where to place touch sensors, we investigated which areas of the Lumalive shirt users would be comfortable touching or being touched. We did so by measuring how often participants would opt out of touches. Results show significant differences in opt-outs between touch zones on the front of the shirt. For both touchers and touchees, opt-outs occurred mostly in the upper chest touch zone. We also found significant differences in comfort ratings between touch zones on the front as well as on the back of the shirt. On the front, the upper chest and lower abdominal zones were the least comfortable touch zones. We found no gender effects on overall comfort ratings, suggesting the upper chest area was equally uncomfortable to males as it was to females. Interestingly, touching some areas rated as most uncomfortable produced a significantly greater calming effect on heart rate. Findings suggest participants were less comfortable with touches on the upper chest, the lower abdomen, and the lower back. We conclude that the most appropriate areas for touch sensors on a shirt are on the arms and shoulders, as well as on the upper back. Based on these findings, we created an interactive shirt for a proximity-based game of tag using Lumalive e-textile displays. This custom shirt features touch sensors located on the shoulder and lower arm regions of the shirt. / Thesis (Master, Computing) -- Queen's University, 2011-08-29 16:27:36.37
16

The birth of the cyberkid: a genealogy of the educational arena for assistive technology

Savas, Thomas 26 February 2007 (has links)
No description available.
17

Exploration of Alerting Methods on Vest-Worn Systems

Hines, Kristen Phyllis 08 June 2016 (has links)
This thesis presents the design and analysis of a vest-worn alerting system with the purpose of warning those who wear it. The goal of this thesis has been shaped around roadside construction workers, people who endeavor to build and maintain the roadways in highly noisy and dangerous environments. Our goal is to determine what type of alerting method best interrupts the worker, allowing him or her to know that danger approaches. Multiple alerting methods will be compared via reaction time and user data derived through critical incidents from the Critical Incident Technique (CIT) and notification-focused questionnaires. All testing is done in a simulated noisy environment. Each of these alerting methods involve combinations of auditory, visual, or haptic components. At the end of this thesis, the different alerting methods will be compared and a mode will be suggested for wearable notification activities. The work proposed in this thesis focuses mostly on vest design and alert testing for construction-based scenarios, but the work can be extended to police and highway worker scenarios. / Master of Science
18

Analysis of a self-contained motion capture garment for e-textiles

Lewis, Robert Alan 11 May 2011 (has links)
Wearable computers and e-textiles are becoming increasingly widespread in today's society. Motion capture is one of the many potential applications for on-body electronic systems. Previous work has been performed at Virginia Tech's E-textiles Laboratory to design a framework for a self-contained loose fit motion capture system. This system gathers information from sensors distributed throughout the body on a "smart" garment. This thesis presents the hardware and software components of the framework, along with improvements made to it. This thesis also presents an analysis of both the on-body and off-body network communication to determine how many sensors can be supported on the garment at a given time. Finally, this thesis presents a method for determining the accuracy of the smart garment and shows how it compares against a commercially available motion capture system. / Master of Science
19

The Story of Wearable Technology: A Framing Analysis

Baumann, Lindsey Michelle 14 July 2016 (has links)
The global wearable technology market is forecasted for strong growth over the next five years with revenue expected to reach $14 billion in 2016 and grow to $34.2 billion by 2020 (CCS Insight, 2016). The wearable industry has undergone a long metamorphosis and growth and is presently becoming more mainstream with the popularization of fitness trackers and smartwatches. Because media portrayals influence public perception of topics covered by the media, exploring media portrayals of wearables is an important component part of understanding trends in growth and popularity of wearables. No other study has analyzed how the media has talked about wearable technology. This study examines newspaper coverage of wearable technology from 1988-2016 using the news framing perspective. A systematic content analysis was conducted on 182 articles from the Wall Street Journal, The New York Times, USA Today, New York Daily News, New York Post and The Washington Post analyzing issue frames, interview sources, episodic vs thematic frames, and type of wearable. This study found that among the four issue frames (progress, regulation, conflict, and generic risk) progress was the dominant frame. Episodic news frames emphasizing individual or specific examples were heavily relied on over thematic frames. The frequency of mentioning sources was not related to episodic/thematic coverage except for professor as an interview source. This study also found a significant relationship between interview source and year for no source. The results of this research provides useful insight into how wearable technology has been framed over the past 28 years by the news media which is helpful for companies creating and marketing these technologies, journalists writing about this type of technology, and scholars interested in understanding how the media talks about a new technology while it is in the process of diffusion. / Master of Arts
20

Exploring In-Home Monitoring of Rehabilitation and Creating an Authoring Tool for Physical Therapists

Huang, Kevin 01 December 2015 (has links)
Physiotherapy is a key part of treatment for neurological and musculoskeletal disorders, which affect millions in the U.S. each year. Physical therapy treatments typically consist of an initial diagnostic session during which patients’ impairments are assessed and exercises are prescribed to improve the impaired functions. As part of the treatment program, exercises are often assigned to be performed at home daily. Patients return to the clinic weekly or biweekly for check-up visits during which the physical therapist reassesses their condition and makes further treatment decisions, including readjusting the exercise prescriptions. Most physical therapists work in clinics or hospitals. When patients perform their exercises at home, physical therapists cannot supervise them and lack quantitative exercise data reflecting the patients’ exercise compliance and performance. Without this information, it is difficult for physical therapists to make informed decisions or treatment adjustments. To make informed decisions, physical therapists need to know how often patients exercise, the duration and/or repetitions of each session, exercise metrics such as the average velocities and ranges of motion for each exercise, patients’ symptom levels (e.g. pain or dizziness) before and after exercise, and what mistakes patients make. In this thesis, I evaluate and work towards a solution to this problem. The growing ubiquity of mobile and wearable technology makes possible the development of “virtual rehabilitation assistants.” Using motion sensors such as accelerometers and gyroscopes that are embedded in a wearable device, the “assistant” can mediate between patients at home and physical therapists in the clinic. Its functions are to:  use motion sensors to record home exercise metrics for compliance and performance and report these metrics to physical therapists in real-time or periodically;  allow physical therapists and patients to quantify and see progress on a fine-grain level;  record symptom levels to further help physical therapists gauge the effectiveness of exercise prescriptions;  offer real-time mistake recognition and feedback to the patients during exercises; One contribution of this thesis is an evaluation of the feasibility of this idea in real home settings. Because there has been little research on wearable virtual assistants in patient homes, there are many unanswered questions regarding their use and usefulness: Q1. What patient in-home data could wearable virtual assistants gather to support physical therapy treatments? Q2. Can patient data gathered by virtual assistants be useful to physical therapists? 3 Q3. How is this wearable in-home technology received by patients? I sought to answer these questions by implementing and deploying a prototype called “SenseCap.” SenseCap is a small mobile device worn on a ball cap that monitors patients’ exercise movements and queries them about their symptoms. A technology probe study showed that the virtual assistant could gather important compliance, performance, and symptom data to assist physical therapists’ decision-making, and that this technology would be feasible and acceptable for in-home use by patients. Another contribution of this thesis is the development of a tool to allow physical therapists to create and customize virtual assistants. With current technology, virtual assistants require engineering and programming efforts to design, implement, configure and deploy them. Because most physical therapists do not have access to an engineering team they and their patients would be unable to benefit from this technology. With the goal of making virtual assistants accessible to any physical therapist, I explored the following research questions: Q4. Would a user-friendly rule-specification interface make it easy for physical therapists to specify correct and incorrect exercise movements directly to a computer? What are the limitations of this method of specifying exercise rules? Q5. Is it possible to create a CAD-type authoring tool, based on a usable interface, that physical therapists could use to create their own customized virtual assistant for monitoring and coaching patients? What are the implementation details of such a system and the resulting virtual assistant? Q6. What preferences do PTs have regarding the delivery of coaching feedback for patients? Q7. What is the recognition accuracy of a virtual rehabilitation assistant created by this tool? This dissertation research aims to improve our understanding of the barriers to rehabilitation that occur because of the invisibility of home exercise behavior, to lower these barriers by making it possible for patients to use a widely-available and easily-used wearable device that coaches and monitors them while they perform their exercises, and improve the ability of physical therapists to create an exercise regime for their patients and to learn what patients have done to perform these exercises. In doing so, treatment should be better suited to each patient and more successful.

Page generated in 0.0555 seconds