921 resultados para bio-medical devices
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Many older people have difficulties using modern consumer products due to increased product complexity both in terms of functionality and interface design. Previous research has shown that older people have more difficulty in using complex devices intuitively when compared to the younger. Furthermore, increased life expectancy and a falling birth rate have been catalysts for changes in world demographics over the past two decades. This trend also suggests a proportional increase of older people in the work-force. This realisation has led to research on the effective use of technology by older populations in an effort to engage them more productively and to assist them in leading independent lives. Ironically, not enough attention has been paid to the development of interaction design strategies that would actually enable older users to better exploit new technologies. Previous research suggests that if products are designed to reflect people's prior knowledge, they will appear intuitive to use. Since intuitive interfaces utilise domain-specific prior knowledge of users, they require minimal learning for effective interaction. However, older people are very diverse in their capabilities and domain-specific prior knowledge. In addition, ageing also slows down the process of acquiring new knowledge. Keeping these suggestions and limitations in view, the aim of this study was set to investigate possible approaches to developing interfaces that facilitate their intuitive use by older people. In this quest to develop intuitive interfaces for older people, two experiments were conducted that systematically investigated redundancy (the use of both text and icons) in interface design, complexity of interface structure (nested versus flat), and personal user factors such as cognitive abilities, perceived self-efficacy and technology anxiety. All of these factors could interfere with intuitive use. The results from the first experiment suggest that, contrary to what was hypothesised, older people (65+ years) completed the tasks on the text only based interface design faster than on the redundant interface design. The outcome of the second experiment showed that, as expected, older people took more time on a nested interface. However, they did not make significantly more errors compared with younger age groups. Contrary to what was expected, older age groups also did better under anxious conditions. The findings of this study also suggest that older age groups are more heterogeneous in their capabilities and their intuitive use of contemporary technological devices is mediated more by domain-specific technology prior knowledge and by their cognitive abilities, than chronological age. This makes it extremely difficult to develop product interfaces that are entirely intuitive to use. However, by keeping in view the cognitive limitations of older people when interfaces are developed, and using simple text-based interfaces with flat interface structure, would help them intuitively learn and use complex technological products successfully during early encounter with a product. These findings indicate that it might be more pragmatic if interfaces are designed for intuitive learning rather than for intuitive use. Based on this research and the existing literature, a model for adaptable interface design as a strategy for developing intuitively learnable product interfaces was proposed. An adaptable interface can initially use a simple text only interface to help older users to learn and successfully use the new system. Over time, this can be progressively changed to a symbols-based nested interface for more efficient and intuitive use.
Resumo:
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.
Resumo:
The Beauty Leaf tree (Calophyllum inophyllum) is a potential source of non-edible vegetable oil for producing future generation biodiesel because of its ability to grow in a wide range of climate conditions, easy cultivation, high fruit production rate, and the high oil content in the seed. This plant naturally occurs in the coastal areas of Queensland and the Northern Territory in Australia, and is also widespread in south-east Asia, India and Sri Lanka. Although Beauty Leaf is traditionally used as a source of timber and orientation plant, its potential as a source of second generation biodiesel is yet to be exploited. In this study, the extraction process from the Beauty Leaf oil seed has been optimised in terms of seed preparation, moisture content and oil extraction methods. The two methods that have been considered to extract oil from the seed kernel are mechanical oil extraction using an electric powered screw press, and chemical oil extraction using n-hexane as an oil solvent. The study found that seed preparation has a significant impact on oil yields, especially in the screw press extraction method. Kernels prepared to 15% moisture content provided the highest oil yields for both extraction methods. Mechanical extraction using the screw press can produce oil from correctly prepared product at a low cost, however overall this method is ineffective with relatively low oil yields. Chemical extraction was found to be a very effective method for oil extraction for its consistence performance and high oil yield, but cost of production was relatively higher due to the high cost of solvent. However, a solvent recycle system can be implemented to reduce the production cost of Beauty Leaf biodiesel. The findings of this study are expected to serve as the basis from which industrial scale biodiesel production from Beauty Leaf can be made.
Resumo:
The issue of carbon sequestration rights has become topical following the United Nations Convention on Climate Change (United Nations 1992 at page 1414) and the subsequent Kyoto Protocol (United Nations Climate Change Secretariat 1998) which identified emissions trading as one of the mechanisms to reduce greenhouse gas emissions. Australian states have responded by creating a legal framework for the recognition of rights to bio-sequestered carbon. There is a lack of uniformity in the approach of each state to the recognition of these rights, which vary from the creation of new and novel interests in land to the adoption of more traditional rights such as a profit a prendre. Rights to bio-sequestered carbon are likely to have an impact on the utility, marketability, value and financing of rural land holdings. Despite the creation of the legal framework for recognition of rights to sequestrated carbon, there has been a delay in the introduction of a formalised carbon trading scheme in Australia. In the absence of an established carbon market, this paper addresses the applicability of contingent valuation theory to assess the value of bio-sequestered carbon rights to a rural land holder. Limitations and potential controversies associated with this application of contingent valuation theory are also addressed in this paper.
Resumo:
Measures of semantic similarity between medical concepts are central to a number of techniques in medical informatics, including query expansion in medical information retrieval. Previous work has mainly considered thesaurus-based path measures of semantic similarity and has not compared different corpus-driven approaches in depth. We evaluate the effectiveness of eight common corpus-driven measures in capturing semantic relatedness and compare these against human judged concept pairs assessed by medical professionals. Our results show that certain corpus-driven measures correlate strongly (approx 0.8) with human judgements. An important finding is that performance was significantly affected by the choice of corpus used in priming the measure, i.e., used as evidence from which corpus-driven similarities are drawn. This paper provides guidelines for the implementation of semantic similarity measures for medical informatics and concludes with implications for medical information retrieval.
Resumo:
This paper is concerned with the optimal path planning and initialization interval of one or two UAVs in presence of a constant wind. The method compares previous literature results on synchronization of UAVs along convex curves, path planning and sampling in 2D and extends it to 3D. This method can be applied to observe gas/particle emissions inside a control volume during sampling loops. The flight pattern is composed of two phases: a start-up interval and a sampling interval which is represented by a semi-circular path. The methods were tested in four complex model test cases in 2D and 3D as well as one simulated real world scenario in 2D and one in 3D.
Resumo:
This qualitative study of women with non-insulin dependent diabetes mellitus (NIDDM) examined constructions of their diabetes management and socio-familial relationships as potential sources of support. Semi-structured interview data was collected from 16 women. The transcripts were analysed with the aim of examining the ways in which Sender relations structured women's accounts of health-related behaviours. Women talked about themselves as wives, mothers, being pregnant and parenting, and friends of other women in ways that demonstrated how caring for others impeded their capacity to care for themselves. Meeting the food preferences of husbands and dietary requirements of diabetic husbands were dominant themes in women's accounts of marriage, and in various ways women justified their husbands' lack of support. Furthermore, the care of others during pregnancy and parenting was also an obstacle to women caring for themselves. An awareness of the gender politics inherent within social and family contexts is crucial to improving the effectiveness of medical advice for diabetes management.
Resumo:
Objective: To explore the range of meanings about the role of support for patients with hepatitis C by examining medical specialists' perceptions. Method: The study employed a qualitative, open-ended interview design and was conducted in four major teaching hospitals in Adelaide, South Australia. Eight participants (three infectious disease physicians, four gastroenterologists, one hepatologist), selected through purposive sampling, were interviewed about general patient support, their role in support provision, the role of non-medical support and their reasons for not using support services. Results: Main themes included a focus on support as information provision and that patient education is best carried out by a medical specialist. The use of support services was defined as the patient's decision. Participants identified four key periods when patients would benefit from support; during diagnosis, failure to meet treatment criteria, during interferon treatment and following treatment failure. Conclusions: It was concluded that while barriers exist to the establishment of partnerships between specialists and other support services, this study has identified clear points at which future partnerships could be established. Implications: A partnership approach to developing support for patients with hepatitis C offers a systematic framework to facilitate the participation of health professionals and the community in an important area of public health.
Resumo:
This paper presents material and gas sensing properties of Pt/SnO2 nanowires/SiC metal oxide semiconductor devices towards hydrogen. The SnO2 nanowires were deposited onto the SiC substrates by vapour-liquid-solid growth mechanism. The material properties of the sensors were investigated using scanning electron microscopy, transmission electron microscopy and X-ray photoelectron spectroscopy. The current-voltage characteristics have been analysed. The effective change in the barrier height for 1% hydrogen was found to be 142.91 meV. The dynamic response of the sensors towards hydrogen at different temperatures has also been studied. At 530°C, voltage shift of 310 mV for 1% hydrogen was observed.
Resumo:
In this work, we present an investigation on Pt/graphene/GaN devices for hydrogen gas sensing applications. The graphene layer was deposited on GaN substrate using a chemical vapour deposition (CVD) technique and was characterised via Raman and X-ray photoelectron spectroscopy. The current-voltage (I-V) and dynamic response of the developed devices were investigated in forward and reverse bias operation at an optimum temperature of 160°C. Voltage shifts of 661.1 and 484.9 mV were recorded towards 1% hydrogen at forward and reverse constant bias current of 1 mA, respectively.
Resumo:
Meanings and descriptions of menopause have shifted focus over the past century and a half; more particularly the past sixty years has seen a shift from descriptions of hormone decline and its relation to ageing, femininity and symptoms of menopause since the 1960's to the possibility for preventive medicine afforded by menopause. Medicine is not a static field in its construction of menopause. It has changed, not least by its engagement (positively or negatively) with critique from both within (epidemiological) and without (feminist and social sciences). In this review we identify three recent changes: (1) Increasing concern with women's decision-making. (2) The emergence from within medicine of the rejection of the use of language which defines menopause as a condition of deficiency. (3) New insights from postmodern and poststructural analyses of menopause that examine the epistemological foundations of medical and feminist concepts of menopause and contest fixed descriptions of the experience of menopause. Key aspects of a ‘medical menopause’ nevertheless remain constant: menopause is a loss of hormones that results in predictable effects and risks and may be ameliorated by hormone replacement therapy. A question therefore emerges about how and to what effect medical practitioners have engaged with critiques of the medical menopause?
Resumo:
The construction of menopause as a long-term risk to health and the adoption of discourses of prevention has made necessary a decision by women about medical treatment; specifically regarding the use of hormone replacement therapy. In a study of general practitioners’ accounts of menopause and treatment in Australia, women's ‘choice’, ‘informed decision-making’ and ‘empowerment’ were key themes through which primary medical care for women at menopause was presented. These accounts create a position for women defined by the concept of individual choice and an ethic of autonomy. These data are a basis for theorising more generally in this paper. We critically examine the construct of ‘informed decision-making’ in relation to several approaches to ethics including bioethics and a range of feminist ethics. We identify the intensification of power relations produced by an ethic of autonomy and discuss the ways these considerations inform a feminist ethics of decision-making by women. We argue that an ‘ethic of autonomy’ and an ‘offer of choice’ in relation to health care for women at menopause, far from being emancipatory, serves to intensify power relations. The dichotomy of choice, to take or not to take hormone replacement therapy, is required to be a choice and is embedded in relations of power and bioethical discourse that construct meanings about what constitutes decision-making at menopause. The deployment of the principle of autonomy in medical practice limits decision-making by women precisely because it is detached from the construction of meaning and the self and makes invisible the relations of power of which it is a part.
Resumo:
This thoughtful book is a much needed contribution to feminist ethics that is brimming with detailed and insightful analyses of the positioning of women in contemporary health care and particularly in relation to new reproductive technologies (NRTs). The clearly written and structured chapters provide accessible points to modern ethics, post-modernism, and feminist ethics. Margrit Shildrick takes on these areas with authority and vigour, building an argument for women to enter the relations of reproduction on terms more expressive of feminine desire...