14 resultados para pervasive computing,home intelligence,context-awareness,domotica,prolog,tuProlog,sensori

em Universit


Relevância:

100.00% 100.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract in English : Ubiquitous Computing is the emerging trend in computing systems. Based on this observation this thesis proposes an analysis of the hardware and environmental constraints that rule pervasive platforms. These constraints have a strong impact on the programming of such platforms. Therefore solutions are proposed to facilitate this programming both at the platform and node levels. The first contribution presented in this document proposes a combination of agentoriented programming with the principles of bio-inspiration (Phylogenesys, Ontogenesys and Epigenesys) to program pervasive platforms such as the PERvasive computing framework for modeling comPLEX virtually Unbounded Systems platform. The second contribution proposes a method to program efficiently parallelizable applications on each computing node of this platform. Résumé en Français : Basée sur le constat que les calculs ubiquitaires vont devenir le paradigme de programmation dans les années à venir, cette thèse propose une analyse des contraintes matérielles et environnementale auxquelles sont soumises les plateformes pervasives. Ces contraintes ayant un impact fort sur la programmation des plateformes. Des solutions sont donc proposées pour faciliter cette programmation tant au niveau de l'ensemble des noeuds qu'au niveau de chacun des noeuds de la plateforme. La première contribution présentée dans ce document propose d'utiliser une alliance de programmation orientée agent avec les grands principes de la bio-inspiration (Phylogénèse, Ontogénèse et Épigénèse). Ceci pour répondres aux contraintes de programmation de plateformes pervasives comme la plateforme PERvasive computing framework for modeling comPLEX virtually Unbounded Systems . La seconde contribution propose quant à elle une méthode permettant de programmer efficacement des applications parallélisable sur chaque noeud de calcul de la plateforme

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose To show that differences in the extent to which firms engage in unrelated diversification can be attributed to differences in ownership structure. Methodology/approach We draw on longitudinal data and use a panel analysis specification to test our hypotheses. Findings We find that unrelated diversification destroys value; pressure-sensitive Anglo-American owners in a firm’s equity reduce unrelated diversification, whereas pressure-resistant domestic owners increase unrelated diversification; the greater the firm’s free cash flow, the greater the negative effect of pressure-sensitive Anglo-American owners on unrelated diversification. Research limitations/implications We contribute to corporate governance and strategy research by bringing in owners’ institutional origin as a shaper of owner preferences in particular with regards to unrelated diversification. Future research may expand our investigation to more than one home institutional context, and theorize on institutional origin effects beyond the dichotomy between Anglo-American and non-Anglo-American (not oriented toward shareholder value maximization) owners. Practical implications Policy makers, financial analysts, owners, and managers may want to reflect about the implications of ownership structure, as well as promoting or joining corporations with particular ownership configurations. Social implications A shareholder value-destroying strategy, such as unrelated diversification has adverse consequences for society at large, in terms of opportunity costs, that is, resources could be allocated to value-creating activities instead. Promoting an ownership configuration that creates value should contribute to social welfare. Originality/value Owners may not be exclusively driven by shareholder value maximization, but can be influenced by normative beliefs (biases) stemming from the institutional context they originate from.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is an increasing awareness that the articulation of forensic science and criminal investigation is critical to the resolution of crimes. However, models and methods to support an effective collaboration between these partners are still poorly expressed or even lacking. Three propositions are borrowed from crime intelligence methods in order to bridge this gap: (a) the general intelligence process, (b) the analyses of investigative problems along principal perspectives: entities and their relationships, time and space, quantitative aspects and (c) visualisation methods as a mode of expression of a problem in these dimensions. Indeed, in a collaborative framework, different kinds of visualisations integrating forensic case data can play a central role for supporting decisions. Among them, link-charts are scrutinised for their abilities to structure and ease the analysis of a case by describing how relevant entities are connected. However, designing an informative chart that does not bias the reasoning process is not straightforward. Using visualisation as a catalyser for a collaborative approach integrating forensic data thus calls for better specifications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A ubiquitous assessment of swimming velocity (main metric of the performance) is essential for the coach to provide a tailored feedback to the trainee. We present a probabilistic framework for the data-driven estimation of the swimming velocity at every cycle using a low-cost wearable inertial measurement unit (IMU). The statistical validation of the method on 15 swimmers shows that an average relative error of 0.1 ± 9.6% and high correlation with the tethered reference system (rX,Y=0.91 ) is achievable. Besides, a simple tool to analyze the influence of sacrum kinematics on the performance is provided.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Elderly people often have multiple chronic diseases, are frequently treated by several physicians, and also use over-the-counter medications. Excessive prescribing, imperfect therapeutic adherence, treatment modifications after hospitalization, and oversized drug packages result in home storage of leftover drugs, resulting in a waste of healthcare resources. PATIENTS AND METHODS: All patients aged >/=75 years hospitalized for >24 hours during a 6-month period in an urban teaching hospital in Switzerland were eligible for inclusion in a study collecting sociodemographics, medical, functional, and psychosocial characteristics. Six months later, a research nurse visited the patients at home and recorded the names, number of tablets, and expiration dates of all open or intact drug packages, and the doses actually taken. Acquisition costs of these drugs were computed. RESULTS: One hundred ninety-five patients were included (127 women; mean age 82.2 +/- 4.8 y, range 75-96). They had a total of 2059 drugs (mean per patient 10.3 +/- 6.7, range per patient 1-42), corresponding to a total cost of (US) $62 826 (mean per patient 322 +/- 275, range per patient 10-1571). Self-reported drug intake was regular for 36% of the drugs (46.5% of total costs) and occasional for 11% (6.1%), whereas 35.7% (30.1%) had been stopped during the last month. Cardiovascular drugs amounted to 36.6% of the drugs and 55.5% of the costs. None of the patients' characteristics was significantly associated with a greater number of drugs and higher costs. CONCLUSIONS: Drugs stored at home by elderly patients were worth about $320 per patient. Only about one-third of these drugs were regularly taken. In the context of resources shortage, innovative solutions should be found to reduce the waste linked with drugs stopped in previous months.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this article, the author provides a framework to guide¦research in emotional intelligence. Studies conducted up¦to the present bear on a conception of emotional intelligence¦as pertaining to the domain of consciousness and¦investigate the construct with a correlational approach.¦As an alternative, the author explores processes underlying¦emotional intelligence, introducing the distinction¦between conscious and automatic processing as a potential¦source of variability in emotionally intelligent¦behavior. Empirical literature is reviewed to support the¦central hypothesis that individual differences in emotional¦intelligence may be best understood by considering¦the way individuals automatically process emotional¦stimuli. Providing directions for research, the author¦encourages the integration of experimental investigation¦of processes underlying emotional intelligence with¦correlational analysis of individual differences and¦fosters the exploration of the automaticity component¦of emotional intelligence.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use by police services and inquiring agencies of forensic data in an intelligence perspective is still fragmentary and to some extent ignored. In order to increase the efficiency of criminal investigation to target illegal drug trafficking organisations and to provide valuable information about their methods, it is necessary to include and interpret objective drug analysis results already during the investigation phase. The value of visual, physical and chemical data of seized ecstasy tablets, as a support for criminal investigation on a strategic and tactical level has been investigated. In a first phase different characteristics of ecstasy tablets have been studied in order to define their relevance, variation, correlation and discriminating power in an intelligence perspective. During 5 years, over 1200 cases of ecstasy seizures (concerning about 150000 seized tablets) coming from different regions of Switzerland (City and Canton of Zurich, Cantons Ticino, Neuchâtel and Geneva) have been systematically recorded. This turned out to be a statistically representative database including large and small cases. During the second phase various comparison and clustering methods have been tested and evaluated, on the type and relevance of tablet characteristics, thus increasing knowledge about synthetic drugs, their manufacturing and trafficking. Finally analytical methodologies have been investigated and formalised, applying traditional intelligence methods. In this context classical tools, which are used in criminal analysis (like the I2 Analyst Notebook, I2 Ibase, ?) have been tested and adapted to address the specific need of forensic drug intelligence. The interpretation of these links provides valuable information about criminal organisations and their trafficking methods. In the final part of this thesis practical examples illustrate the use and value of such information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

QUESTION: In the ageing European population, the proportion of interventions by the emergency medical services (EMS) for elderly patients is increasing, but little is known about the recent trend of EMS interventions in nursing homes. The aim of this analysis was to describe the evolution of the incidence of requests for prehospital EMS interventions for nursing home residents aged 65 years and over between 2004 and 2013. METHODS: A prospective population-based register of routinely collected data for each EMS intervention in the Canton of Vaud. Linear time trends of incidence of requests to the EMS in nursing homes were calculated and stratified by age categories. RESULTS: The number of ambulance interventions in nursing homes for people aged 65 years and over (65+) increased by 68.9% (1124‒1898) between 2004 and 2013. A significant linear increase of the annual incidence of requests to EMS per 1,000 nursing home residents was found for people aged 65-79 (10.2, 95% confidence interval [CI] 6.2-14.2), 80-89 (16.5, 95% CI 14.0-19.0) and over 90 (12.1, 95% CI 5.8-18.4). EMS interventions in nursing home residents who required an emergency physician increased during the same period by 205.6% (from 106 to 324), representing an increase from 2% to 7% of all emergency physician interventions in the Canton. CONCLUSIONS: Our results confirmed an important increase in the incidence of EMS interventions in nursing homes during the last decade, far exceeding the actual increase of the nursing home population during the same period. This evolution represents an important opportunity to reconsider the EMS missions in the context of an ageing society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

From recent calls for positioning forensic scientists within the criminal justice system, but also policing and intelligence missions, this paper emphasizes the need for the development of educational and training programs in the area of forensic intelligence, It is argued that an imbalance exists between perceived and actual understanding of forensic intelligence by police and forensic science managers, and that this imbalance can only be overcome through education. The challenge for forensic intelligence education and training is therefore to devise programs that increase forensic intelligence awareness, firstly for managers to help prevent poor decisions on how to develop information processing. Two recent European courses are presented as examples of education offerings, along with lessons learned and suggested paths forward. It is concluded that the new focus on forensic intelligence could restore a pro-active approach to forensic science, better quantify its efficiency and let it get more involved in investigative and managerial decisions. A new educational challenge is opened to forensic science university programs around the world: to refocus criminal trace analysis on a more holistic security problem solving approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Forensic intelligence has recently gathered increasing attention as a potential expansion of forensic science that may contribute in a wider policing and security context. Whilst the new avenue is certainly promising, relatively few attempts to incorporate models, methods and techniques into practical projects are reported. This work reports a practical application of a generalised and transversal framework for developing forensic intelligence processes referred to here as the Transversal model adapted from previous work. Visual features present in the images of four datasets of false identity documents were systematically profiled and compared using image processing for the detection of a series of modus operandi (M.O.) actions. The nature of these series and their relation to the notion of common source was evaluated with respect to alternative known information and inferences drawn regarding respective crime systems. 439 documents seized by police and border guard authorities across 10 jurisdictions in Switzerland with known and unknown source level links formed the datasets for this study. Training sets were developed based on both known source level data, and visually supported relationships. Performance was evaluated through the use of intra-variability and inter-variability scores drawn from over 48,000 comparisons. The optimised method exhibited significant sensitivity combined with strong specificity and demonstrates its ability to support forensic intelligence efforts.