scholarly journals An Easily Customized Gesture Recognizer for Assisted Living Using Commodity Mobile Devices

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Antigoni Mezari ◽  
Ilias Maglogiannis

Automatic gesture recognition is an important field in the area of human-computer interaction. Until recently, the main approach to gesture recognition was based mainly on real time video processing. The objective of this work is to propose the utilization of commodity smartwatches for such purpose. Smartwatches embed accelerometer sensors, and they are endowed with wireless communication capabilities (primarily Bluetooth), so as to connect with mobile phones on which gesture recognition algorithms may be executed. The algorithmic approach proposed in this paper accepts as the input readings from the smartwatch accelerometer sensors and processes them on the mobile phone. As a case study, the gesture recognition application was developed for Android devices and the Pebble smartwatch. This application allows the user to define the set of gestures and to train the system to recognize them. Three alternative methodologies were implemented and evaluated using a set of six 3-D natural gestures. All the reported results are quite satisfactory, while the method based on SAX (Symbolic Aggregate approXimation) was proven the most efficient.

2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2021 ◽  
Vol 11 (4) ◽  
pp. 1438
Author(s):  
Sebastián Risco ◽  
Germán Moltó

Serverless computing has introduced scalable event-driven processing in Cloud infrastructures. However, it is not trivial for multimedia processing to benefit from the elastic capabilities featured by serverless applications. To this aim, this paper introduces the evolution of a framework to support the execution of customized runtime environments in AWS Lambda in order to accommodate workloads that do not satisfy its strict computational requirements: increased execution times and the ability to use GPU-based resources. This has been achieved through the integration of AWS Batch, a managed service to deploy virtual elastic clusters for the execution of containerized jobs. In addition, a Functions Definition Language (FDL) is introduced for the description of data-driven workflows of functions. These workflows can simultaneously leverage both AWS Lambda for the highly-scalable execution of short jobs and AWS Batch, for the execution of compute-intensive jobs that can profit from GPU-based computing. To assess the developed open-source framework, we executed a case study for efficient serverless video processing. The workflow automatically generates subtitles based on the audio and applies GPU-based object recognition to the video frames, thus simultaneously harnessing different computing services. This allows for the creation of cost-effective highly-parallel scale-to-zero serverless workflows in AWS.


2021 ◽  
Vol 6 (2) ◽  
pp. 17-41
Author(s):  
Ondicho Machuki ◽  
Joan Mutua

Purpose: The study sought to examine the influence of mobile phone use on sexual behaviour of university students: a case study of Jomo Kenyatta University of Agriculture and Technology, Kenya. The study specifically, sought to examine the effect of characteristics of mobile phones users, uses and gratification of mobile phones and the frequency of using mobile phones on sexual behaviour of university students in Jomo Kenyatta University of Agriculture and Technology, Kenya. Methodology: The research design that was adopted was descriptive in nature. The study also used both quantitative and qualitative data obtained from the respondents using questionnaires and Focus Group Discussions (FGDs) guides. Quantitative data was collected using questionnaires while qualitative data was collected using Focus Group Discussions. The study adopted a stratified random sampling technique to select the sample size from the three strata, which are the various Faculties in JKUAT. The study then used Fisher’s formula to arrive at an adequate scientific sample size of 384 students who were targeted using convenient sampling, that is those that are ready to respond to the questionnaires and the Focus Group Discussions (FGDs). The quantitative data in this research was analyzed using descriptive statistics and inferential statistics using SPSS v22.0. Results: It was concluded that male students are more likely to use protection consistently compared to female students. In addition, the findings imply that consistency in condom use is a factor that is dependent on the age of the individual. In addition, relationship status is a contributor to the behaviour of the students sexually. For those that are in serious relationships, their use of protection declines due to the build-up of emotional and intimate trust towards each other. The findings likewise indicate that the student’s usage of mobile phones correlates significantly with the consistent use of protection for safe sex. Those students who have had their phones since they joined Campus are more likely to practice safe sex. In addition, heavy users of mobile phones are likely to practice safe sex including those who browse the internet for news updates. Unique contribution to theory, policy and practice: The study recommends the media practitioners need to step up the production of morally acceptable media content and offer a platform for advertising and campaigning for sexual conduct by encouraging and stressing the use of protection. The Ministry of Health and Ministry of Education should actively involve the undergraduate students in reproductive information awareness campaigns for ensuring positive attitudes towards responsible sexual behaviour and promoting best sexual practices.         


Author(s):  
Eva Masero Rubio ◽  
Pedro Miguel Baptista Torres ◽  
Rogério Pais Dionísio

This book chapter proposes a description of smart gateways and cyber-physical systems (CPS) for the industrial internet of things (I-IOT). It also presents a case study where a smart gateway is developed to be used in different types of industrial equipment for the shop floor. The case study is developed under the specifications of different industries in the region of Castelo Branco. It is a proof that the 4th industrial revolution will be the engine for SME innovation, independence of the regions and their financial strength. It is also proof that the cooperation between universities, industries and startups can evolve to break barriers and add value in the improvement of regional industries competitiveness. Topics that will be addressed on the chapter can be used for developers, students, researchers and enthusiasts to learn topics related to I-IOT, such as data acquisitions systems, wired and wireless communication devices and protocols, OPC servers and LabVIEW programming.


Sign in / Sign up

Export Citation Format

Share Document