scholarly journals Wearable System for Biosignal Acquisition and Monitoring Based on Reconfigurable Technologies

Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1590 ◽  
Author(s):  
Víctor Toral ◽  
Antonio García ◽  
Francisco Romero ◽  
Diego Morales ◽  
Encarnación Castillo ◽  
...  

Wearable monitoring devices are now a usual commodity in the market, especially for the monitoring of sports and physical activity. However, specialized wearable devices remain an open field for high-risk professionals, such as military personnel, fire and rescue, law enforcement, etc. In this work, a prototype wearable instrument, based on reconfigurable technologies and capable of monitoring electrocardiogram, oxygen saturation, and motion, is presented. This reconfigurable device allows a wide range of applications in conjunction with mobile devices. As a proof-of-concept, the reconfigurable instrument was been integrated into ad hoc glasses, in order to illustrate the non-invasive monitoring of the user. The performance of the presented prototype was validated against a commercial pulse oximeter, while several alternatives for QRS-complex detection were tested. For this type of scenario, clustering-based classification was found to be a very robust option.

2020 ◽  
Vol 6 (23) ◽  
pp. eaba5785 ◽  
Author(s):  
Jeonghee Yeom ◽  
Ayoung Choe ◽  
Seongdong Lim ◽  
Youngsu Lee ◽  
Sangyun Na ◽  
...  

Artificial tongues have been receiving increasing attention for the perception of five basic tastes. However, it is still challenging to fully mimic human tongue–like performance for tastes such as astringency. Mimicking the mechanism of astringency perception on the human tongue, we use a saliva-like chemiresistive ionic hydrogel anchored to a flexible substrate as a soft artificial tongue. When exposed to astringent compounds, hydrophobic aggregates form inside the microporous network and transform it into a micro/nanoporous structure with enhanced ionic conductivity. This unique human tongue–like performance enables tannic acid to be detected over a wide range (0.0005 to 1 wt %) with high sensitivity (0.292 wt %−1) and fast response time (~10 s). As a proof of concept, our sensor can detect the degree of astringency in beverages and fruits using a simple wipe-and-detection method, making a powerful platform for future applications involving humanoid robots and taste monitoring devices.


2016 ◽  
Vol 1 (1) ◽  
pp. 4
Author(s):  
Marymol Koshy ◽  
Bushra Johari ◽  
Mohd Farhan Hamdan ◽  
Mohammad Hanafiah

Hypertrophic cardiomyopathy (HCM) is a global disease affecting people of various ethnic origins and both genders. HCM is a genetic disorder with a wide range of symptoms, including the catastrophic presentation of sudden cardiac death. Proper diagnosis and treatment of this disorder can relieve symptoms and prolong life. Non-invasive imaging is essential in diagnosing HCM. We present a review to deliberate the potential use of cardiac magnetic resonance (CMR) imaging in HCM assessment and also identify the risk factors entailed with risk stratification of HCM based on Magnetic Resonance Imaging (MRI).


Author(s):  
Cody Minks ◽  
Anke Richter

AbstractObjectiveResponding to large-scale public health emergencies relies heavily on planning and collaboration between law enforcement and public health officials. This study examines the current level of information sharing and integration between these domains by measuring the inclusion of public health in the law enforcement functions of fusion centers.MethodsSurvey of all fusion centers, with a 29.9% response rate.ResultsOnly one of the 23 responding fusion centers had true public health inclusion, a decrease from research conducted in 2007. Information sharing is primarily limited to information flowing out of the fusion center, with little public health information coming in. Most of the collaboration is done on a personal, informal, ad-hoc basis. There remains a large misunderstanding of roles, capabilities, and regulations by all parties (fusion centers and public health). The majority of the parties appear to be willing to work together, but there but there is no forward momentum to make these desires a reality. Funding and staffing issues seem to be the limiting factor for integration.ConclusionThese problems need to be urgently addressed to increase public health preparedness and enable a decisive and beneficial response to public health emergencies involving a homeland security response.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 10
Author(s):  
Niluka Amarasinghe ◽  
Xavier Boyen ◽  
Matthew McKague

The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes. Bitcoin, despite being considered as the most widespread among all, is claimed to have significant lapses in relation to its anonymity. Unfortunately, studies have shown that many cryptocurrency transactions can be traced back to their corresponding participants through the analysis of publicly available data, to which the cryptographic community has responded by proposing new constructions with improved anonymity claims. Nevertheless, the absence of a common metric for evaluating the level of anonymity achieved by these schemes has led to numerous disparate ad hoc anonymity definitions, making comparisons difficult. The multitude of these notions also hints at the surprising complexity of the overall anonymity landscape. In this study, we introduce such a common framework to evaluate the nature and extent of anonymity in (crypto) currencies and distributed transaction systems, thereby enabling one to make meaningful comparisons irrespective of their implementation. Accordingly, our work lays the foundation for formalizing security models and terminology across a wide range of anonymity notions referenced in the literature, while showing how “anonymity” itself is a surprisingly nuanced concept, as opposed to existing claims that are drawn upon at a higher level, thus missing out on the elemental factors underpinning anonymity.


2014 ◽  
Vol 4 (2) ◽  
pp. 35-45
Author(s):  
Margarita Jaitner

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.


The Analyst ◽  
2016 ◽  
Vol 141 (5) ◽  
pp. 1587-1610 ◽  
Author(s):  
Zou Xiaobo ◽  
Huang Xiaowei ◽  
Malcolm Povey

The main food quality traits of interest using non-invasive sensing techniques are sensory characteristics, chemical composition, physicochemical properties, health-protecting properties, nutritional characteristics and safety. A wide range of non-invasive sensing techniques, from optical, acoustical, electrical, to nuclear magnetic, X-ray, biosensor, microwave and terahertz, are organized according to physical principle.


Information ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 275
Author(s):  
Peter Cihon ◽  
Jonas Schuett ◽  
Seth D. Baum

Corporations play a major role in artificial intelligence (AI) research, development, and deployment, with profound consequences for society. This paper surveys opportunities to improve how corporations govern their AI activities so as to better advance the public interest. The paper focuses on the roles of and opportunities for a wide range of actors inside the corporation—managers, workers, and investors—and outside the corporation—corporate partners and competitors, industry consortia, nonprofit organizations, the public, the media, and governments. Whereas prior work on multistakeholder AI governance has proposed dedicated institutions to bring together diverse actors and stakeholders, this paper explores the opportunities they have even in the absence of dedicated multistakeholder institutions. The paper illustrates these opportunities with many cases, including the participation of Google in the U.S. Department of Defense Project Maven; the publication of potentially harmful AI research by OpenAI, with input from the Partnership on AI; and the sale of facial recognition technology to law enforcement by corporations including Amazon, IBM, and Microsoft. These and other cases demonstrate the wide range of mechanisms to advance AI corporate governance in the public interest, especially when diverse actors work together.


1970 ◽  
Vol 24 (3) ◽  
pp. 479-502 ◽  
Author(s):  
R. L. Friedheim ◽  
J. B. Kadane

International arrangements for the uses of the ocean have been the subject of long debate within the United Nations since a speech made by Ambassador Arvid Pardo of Malta before the General Assembly in 1967. Issues in question include the method of delimiting the outer edge of the legal continental shelf; the spectrum of ocean arms control possibilities; proposals to create a declaration of principles governing the exploration for, and the exploitation of, seabed mineral resources with the promise that exploitation take place only if it “benefits mankind as a whole,” especially the developing states; and consideration of schemes to create international machinery to regulate, license, or own the resources of the seabed and subsoil. The discussions and debates began in the First (Political and Security) Committee of the 22nd General Assembly and proceeded through an ad hoc committee to the 23rd and 24th assembly plenary sessions. The creation of a permanent committee on the seabed as a part of the General Assembly's machinery attests to the importance members of the United Nations attribute to ocean problems. Having established the committee, they will be faced soon with the necessity of reaching decisions. The 24th General Assembly, for example, passed a resolution requesting the Secretary-General to ascertain members' attitudes on the convening of a new international conference to deal with a wide range of law of the sea problems.


Sign in / Sign up

Export Citation Format

Share Document