• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 282
  • 25
  • 22
  • 8
  • 7
  • 7
  • 6
  • 5
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 509
  • 127
  • 115
  • 82
  • 77
  • 71
  • 64
  • 57
  • 56
  • 56
  • 53
  • 53
  • 50
  • 48
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark January 2015 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
72

Detection of human falls using wearable sensors

Ojetola, O. January 2013 (has links)
Wearable sensor systems composed of small and light sensing nodes have the potential to revolutionise healthcare. While uptake has increased over time in a variety of application areas, it has been slowed by problems such as lack of infrastructure and the functional capabilities of the systems themselves. An important application of wearable sensors is the detection of falls, particularly for elderly or otherwise vulnerable people. However, existing solutions do not provide the detection accuracy required for the technology to gain the trust of medical professionals. This thesis aims to improve the state of the art in automated human fall detection algorithms through the use of a machine learning based algorithm combined with novel data annotation and feature extraction methods. Most wearable fall detection algorithms are based on thresholds set by observational analysis for various fall types. However, such algorithms do not generalise well for unseen datasets. This has thus led to many fall detection systems with claims of high performance but with high rates of False Positive and False Negative when evaluated on unseen datasets. A more appropriate approach, as proposed in this thesis, is a machine learning based algorithm for fall detection. The work in this thesis uses a C4.5 Decision Tree algorithm and computes input features based on three fall stages: pre-impact, impact and post-impact. By computing features based on these three fall stages, the fall detection algorithm can learn patterns unique to falls. In total, thirteen features were selected across the three fall stages out of an original set of twenty-eight features. Further to the identification of fall stages and selection of appropriate features, an annotation technique named micro-annotation is proposed that resolves annotation-related ambiguities in the evaluation of fall detection algorithms. Further analysis on factors that can impact the performance of a machine learning based algorithm were investigated. The analysis defines a design space which serves as a guideline for a machine learning based fall detection algorithm. The factors investigated include sampling frequency, the number of subjects used for training, and sensor location. The optimal values were found to be10Hz, 10 training subjects, and a single sensor mounted on the chest. Protocols for falls and Activities of Daily Living (ADL) were designed such that the developed algorithms are able to cope under a variety of real world activities and events. A total of 50 subjects were recruited to participate in the data gathering exercise. Four common types of falls in the sagittal and coronal planes were simulated by the volunteers; and falls in the sagittal plane were additionally induced by applying a lateral force to blindfolded volunteers. The algorithm was evaluated based on leave one subject out cross validation in order to determine its ability to generalise to unseen subjects. The current state of the art in the literature shows fall detectors with an F-measure below 90%. The commercial Tynetec fall detector provided an F-measure of only 50% when evaluated here. Overall, the fall detection algorithm using the proposed micro-annotation technique and fall stage features provides an F-measure of 93% at 10Hz, exceeding the performance provided by the current state of the art.
73

A multi-modal device for application in microsleep detection

Knopp, Simon James January 2015 (has links)
Microsleeps and other lapses of responsiveness can have severe, or even fatal, consequences for people who must maintain high levels of attention on monotonous tasks for long periods of time, e.g., commercial vehicle drivers, pilots, and air-traffic controllers. This thesis describes a head-mounted system which is the first prototype in the process of creating a system that can detect (and possibly predict) these lapses in real time. The system consists of a wearable device which captures multiple physiological signals from the wearer and an extensible software framework for imple- menting signal processing algorithms. Proof-of-concept algorithms are implemented and used to demonstrate that the system can detect simulated microsleeps in real time. The device has three sensing modalities in order to get a better estimate of the user's cognitive state than by any one alone. Firstly, it has 16 channels of EEG (8 currently in use) captured by 24-bit ADCs sampling at 250 Hz. The EEG is acquired by custom-built dry electrodes consisting of spring-loaded, gold-plated pins. Secondly, the device has a miniature video camera mounted below one eye, providing 320 x 240 px greyscale video of the eye at 60 fps. The camera module includes infrared illumination so that it can operate in the dark. Thirdly, the device has a six-axis IMU to measure the orientation and movement of the head. These sensors are connected to a Gumstix computer-on-module which transmits the captured data to a remote computer via Wi-Fi. The device has a battery life of about 7.4 h. In addition to this hardware, software to receive and analyse data from the head-mounted device was developed. The software is built around a signal processing pipeline that has been designed to encapsulate a wide variety of signal processing algorithms; feature extractors calculate salient properties of the input data and a classifier fuses these features to determine the user's cognitive state. A plug-in system is provided which allows users to write their own signal processing algorithms and to experiment with different combinations of feature extractors and classifiers. Because of this flexible modular design, the system could also be used for applications other than lapse detection‒any application which monitors EEG, eye video, and head movement can be implemented by writing appropriate signal processing plug-ins, e.g., augmented cognition or passive BCIs. The software also provides the ability to configure the device's hardware, to save data to disk, and to monitor the system in real time. Plug-ins can be implemented in C++ or Python. A series of validation tests were carried out to confirm that the system operates as intended. Most of the measured parameters were within the expected ranges: EEG amplifier noise = 0.14 μVRMS input-referred, EEG pass band = DC to 47 Hz, camera focus = 2.4 lp/mm at 40 mm, and total latency < 100 ms. Some parameters were worse than expected but still sufficient for effective operation: EEG amplifier CMRR ≥ 82 dB, EEG cross-talk = -17.4 dB, and IMU sampling rate = 10 Hz. The contact impedance of the dry electrodes, measured to be several hundred kilohms, was too high to obtain clean EEG. Three small-scale experiments were done to test the performance of the device in operation on people. The first two demonstrated that the pupil localization algorithm produces PERCLOS values close to those from a manually-rated gold standard and is robust to changes in ambient light levels, iris colour, and the presence of glasses. The final experiment demonstrated that the system is capable of capturing all three physiological signals, transmitting them to the remote computer in real time, extracting features from each signal, and classifying simulated microsleeps from the extracted features. However, this test was successful only when using conventional wet EEG electrodes instead of the dry electrodes built into the device; it will be necessary to find replacement dry electrodes for the device to be useful. The device and associated software form a platform which other researchers can use to develop algorithms for lapse detection. This platform provides data capture hardware and abstracts away the low-level software details so that other researchers are free to focus solely on developing signal processing techniques. In this way, we hope to enable progress towards a practical real-time, real-world lapse detection system.
74

Methods of computing in a ubiquitous age

Yeh, Wei Cheng, 1975- 17 September 2010 (has links)
As technology becomes integrated into everyday life, the relationship between the human and machine must be kept in a balance. Not only does the technology have to perform its intended function, but it must do so in accordance with the dynamic parameters of the complex use environment, in a way that does not encumber the user either physically or mentally. The dissertation explores the challenges of such a scenario through an analysis of three core facets: Affordances, or the user interface cues that allow an intuitive means of operating a device; the aspect of simplicity and its effect on the use factors of the technology (while something might seem to be simple, it may actually be complex to use); and cognitive load in terms of user impact, as a result of utilizing the technology. These illustrate the challenges inherent in understanding the facets fundamental to human- machine interaction in a complex environment. The three factors will be explored first through an historical analysis of the work in each aspect. The theories at hand will be utilized to inform the creation of iterative generations of wearable sensory systems. By utilizing the systems in the field of dance, the theoretical aspects of the core factors can be gauged by actual implementation. Each implementation will be compared side by side to gauge differences in terms of movement dynamics and efficacy of execution. The study will reveal that the three core factors of affordance, simplicity and cognitive load combine synergistically to create a foundational methodology for seamless integration of technology in a complex use scenario. Furthermore, the facets of interoperability between devices in a complex use environment will be illustrated through the theory of intra-interactivity. Finally, the dissertation will illustrate the advantages of passive user interaction and its necessity in relation to the factor of cognitive load. / text
75

Ego- and Exocentric interaction methods formobile AR conferencing

Bleeker, Timo January 2013 (has links)
Augmented Reality is technology that superimposes virtual content on the real world, typically shown through a see-through head mounted display (HMD) or handheld device. AR has successfully been used for many applications and provides new opportunities for remote collaboration and communication. With the growing availability of commercial HMDs such as Google Glass and the Oculus Rift, more possibilities in the field of AR have opened up. However, interaction with AR content shown on HMDs is still not very well explored. This master's thesis investigates the possibilities of a combined use of head mounted and hand held displays (HHD) for interaction in AR conferencing experiences. Prior research in communication, AR collaboration and HMD-HHD interaction is reviewed before presenting new interaction methods. Two different HHD interfaces and cuing methods were created to support file sharing in an AR conferencing application. A formal evaluation compared four different combinations of the interfaces and cuing methods. The results showed a significant difference between the different conditions where in particular one condition performed better than the others. The results were used to create a set of basic design guidelines for future research and application development.
76

The hybronaut and the Umwelt : wearable technology as artistic strategy

Beloff, Laura Maria January 2013 (has links)
This dissertation explores the use of irony in networked wearable technology art as a strategy to emphasise the complexity of conjunction between techno-organic human and the techno-organic world. The research addresses the relationship between technologically enhanced human and networked hybrid environment, and speculates on the impact of technological enhancements to the subjective construction of Umwelt through ironic interventions. The project employs both artistic practice and critical theory. The practice-based part of the dissertation is comprised of three wearable technology artworks produced during the study. These concrete artefacts employ irony as a means to expose the techno-organic relationship between humans and their environment under scrutiny. The works highlight the significance of technological modifications of the human for the formation of subjective worldview in an everyday hybrid environment. The theoretical part navigates between the fields of art, design, technology, science and cultural studies concerning the impact of technology and networks on human experience and perception of the world. In the background of this research is biologist Jakob von Uexküll’s concept of the Umwelt, which is a subjective perception created by an organism through its active engagement with the everyday living environment. This dissertation focuses on the Umwelt that is formed in an interaction between hybrid environment and the technologically enhanced human, the Hybronaut. 4 Hybrid environment is a physical reality merged with technologically enabled virtual reality. The Hybronaut is an artistic strategy developed during the research based on four elements: wearable technology, network ability, irony and contextualised experience for the public. Irony is one of the prominent characteristics of the Hybronaut. Irony functions as a way to produce multiple paradoxical perspectives that enable a critical inquiry into our subjective construction of Umwelt. The research indicates that ironic networked wearable technology art presents an opportunity to re-examine our perception concerning the human and his environment.
77

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)
78

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) / Series: Working Papers on Information Systems, Information Business and Operations
79

Tactile displays for pedestrian navigation

Srikulwong, Mayuree January 2012 (has links)
Existing pedestrian navigation systems are mainly visual-based, sometimes with an addition of audio guidance. However, previous research has reported that visual-based navigation systems require a high level of cognitive efforts, contributing to errors and delays. Furthermore, in many situations a person’s visual and auditory channels may be compromised due to environmental factors or may be occupied by other important tasks. Some research has suggested that the tactile sense can effectively be used for interfaces to support navigation tasks. However, many fundamental design and usability issues with pedestrian tactile navigation displays are yet to be investigated. This dissertation investigates human-computer interaction aspects associated with the design of tactile pedestrian navigation systems. More specifically, it addresses the following questions: What may be appropriate forms of wearable devices? What types of spatial information should such systems provide to pedestrians? How do people use spatial information for different navigation purposes? How can we effectively represent such information via tactile stimuli? And how do tactile navigation systems perform? A series of empirical studies was carried out to (1) investigate the effects of tactile signal properties and manipulation on the human perception of spatial data, (2) find out the effective form of wearable displays for navigation tasks, and (3) explore a number of potential tactile representation techniques for spatial data, specifically representing directions and landmarks. Questionnaires and interviews were used to gather information on the use of landmarks amongst people navigating urban environments for different purposes. Analysis of the results of these studies provided implications for the design of tactile pedestrian navigation systems, which we incorporated in a prototype. Finally, field trials were carried out to evaluate the design and address usability issues and performance-related benefits and challenges. The thesis develops an understanding of how to represent spatial information via the tactile channel and provides suggestions for the design and implementation of tactile pedestrian navigation systems. In addition, the thesis classifies the use of various types of landmarks for different navigation purposes. These contributions are developed throughout the thesis building upon an integrated series of empirical studies.
80

Tangram Race Mathematical Game: Combining Wearable Technology and Traditional Games for Enhancing Mathematics Learning

Liu, Yuting 05 December 2014 (has links)
"The public in general and educational communities are aware of the importance of elementary math education in students' lives, as it establishes a cognitive and motivational foundation to reach higher levels of schooling. However, students usually learn passively in traditional instructivist modes, and tend to get bored and disengaged. In contrast, games can be a useful way to assist education and engage students. This thesis reports on a novel game learning environment for mathematics learning, the Tangrams Race, which attempts to inspire students to learn math, by combining traditional outdoor games and wearable technology in the form of Cyber Watches. The Tangrams Race, a physical game designed for elementary school students to play outdoors, is examined and tested in two studies to show that the game-based learning environment and the technology can enhance learning gains and inspire students interest to learn mathematics."

Page generated in 0.0296 seconds