scholarly journals Who is wearing me? TinyDL‐based user recognition in constrained personal devices

Author(s):  
Ramon Sanchez‐Iborra ◽  
Antonio Skarmeta
Author(s):  
A.F. Klebanov ◽  
M.V. Kadochnikov ◽  
V.V. Ulitin ◽  
D.N. Sizemov

The article addresses the issues of ensuring safe operation of mining equipment in surface mining. It describes the main factors and situations that pose a high risk to human life and health. The most dangerous incidents are shown to be related to limited visibility and blind spots for operators of mining equipment, which can result in collisions and personnel run over. The main technologies and specific solutions used to design collision avoidance systems are described and their general comparison is provided. A particular focus is placed on monitoring the health of employees at their workplace by means of portable personal devices that promptly inform the dispatcher of emergency situations. General technical requirements are formulated for designing of the system to prevent equipment collisions and personnel run over in surface mining operations. The paper emphasizes the importance of introducing a multifunctional safety system in surface mines in order to minimise the possibility of incidents and accidents throughout the entire production cycle.


Author(s):  
Keith M. Martin

In this chapter, we consider some of the cryptography which can be used to protect data stored on personal devices. We begin by looking at various forms of cryptographic file protection, including full disk encryption. We then consider the cryptography which can be used to support two applications widely used on personal devices, namely, email and asynchronous messaging. To illustrate the latter, we discuss the cryptography deployed by the application WhatsApp. Finally, we obtain a slightly different perspective by providing an overview of the cryptography supported by one particular device platform, Apple’s iOS operating system.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 626
Author(s):  
Ramya Gupta ◽  
Abhishek Prasad ◽  
Suresh Babu ◽  
Gitanjali Yadav

A global event such as the COVID-19 crisis presents new, often unexpected responses that are fascinating to investigate from both scientific and social standpoints. Despite several documented similarities, the coronavirus pandemic is clearly distinct from the 1918 flu pandemic in terms of our exponentially increased, almost instantaneous ability to access/share information, offering an unprecedented opportunity to visualise rippling effects of global events across space and time. Personal devices provide “big data” on people’s movement, the environment and economic trends, while access to the unprecedented flurry in scientific publications and media posts provides a measure of the response of the educated world to the crisis. Most bibliometric (co-authorship, co-citation, or bibliographic coupling) analyses ignore the time dimension, but COVID-19 has made it possible to perform a detailed temporal investigation into the pandemic. Here, we report a comprehensive network analysis based on more than 20,000 published documents on viral epidemics, authored by over 75,000 individuals from 140 nations in the past one year of the crisis. Unlike the 1918 flu pandemic, access to published data over the past two decades enabled a comparison of publishing trends between the ongoing COVID-19 pandemic and those of the 2003 SARS epidemic to study changes in thematic foci and societal pressures dictating research over the course of a crisis.


2020 ◽  
Vol 2 (1) ◽  
pp. 43-49
Author(s):  
Danang Tejo Kumoro ◽  
Uswatun Hasanah

This article is an overview of the website design interface of Lombok travel agencymorotravel.id. This review carried out using a heuristic evaluation introduced by Molich andNielsen that evaluates an interface in an information system. Heuristic evaluation is a guidethat can guide the design or used it as a tool for criticizing a decision taken. The aim is toimprove the model effectively. The evaluation includes visibility of system status, compatibilitybetween the system and the real world, control of user freedom, standards, and consistency,error prevention, user recognition of the system, flexibility and efficiency, aesthetic values andminimum values, system help, help features, and documentation. The purpose of thisevaluation is to measure morotravel.id's interface standard as one of the travel agent websitesin Lombok so that it can become a reference for information systems in the world of tourism.Based on the evaluation, it has stated that overall the morotravel.id site interface is feasible touse because it fulfills the completeness of the principles in the heuristic assessment. Still, ithas some things that need to be improved, especially in the help system and documentation.Heuristic evaluation is pragmatic and easy to do so that it gets quick results. Although thismethod does not produce high certainty, it is a relatively easy method to start an analysis ofinterface design. The hope for the next is the use of more than one way to improve the qualityof the analysis results because it meets the principle of complementarity in each evaluationmethod


2014 ◽  
Vol 3 (6) ◽  
Author(s):  
Geoff Rebbeck

This Case study shows and explains the issues and value of placing a whole Greenwich first degree completed in Jan. 2007 into an e-portfolio. The purpose is to show proof of concept that it is possible and how it looks in basic form, when done retrospectively (6 years later).The completed portfolio was the presentation made at the APT Conference July 2013, audience members also able to access and explore it on personal devices in the session.The Case Study considers whether a degree can be presented inside a portfolio, what the issues are in creating a degree portfolio like this, what limitations may be encountered in the process.It then evaluates the value of this approach, and what might be done with a Greenwich University degree in this form.


2011 ◽  
Vol 2 (3) ◽  
pp. 22-37 ◽  
Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.


Sign in / Sign up

Export Citation Format

Share Document