Wearable sensor technology has gradually extended its usability into a wide range of well-known applications. Wearable sensors can typically assess and quantify the wearer’s physiology and are commonly employed for human activity detection and quantified self-assessment. Wearable sensors are increasingly utilised to monitor patient health, rapidly assist with disease diagnosis, and help predict and often improve patient outcomes. Clinicians use various self-report questionnaires and well-known tests to report patient symptoms and assess their functional ability. These assessments are time consuming and costly and depend on subjective patient recall. Moreover, measurements may not accurately demonstrate the patient’s functional ability whilst at home. Wearable sensors can be used to detect and quantify specific movements in different applications. The volume of data collected by wearable sensors during long-term assessment of ambulatory movement can become immense in tuple size. This paper discusses current techniques used to track and record various human body movements, as well as techniques used to measure activity and sleep from long-term data collected by wearable technology devices.
Drones, also referred to as UAV's (Unmanned Aerial Vehicle), are an aircraft without a human pilot. Drones have been used by various military organisations for over a decade, but in recent years drones a have been emerging more and more in commercial and recreational capacity. The paper is aimed at drone and UAV technology capabilities and how they could and are currently effecting privacy laws globally in comparison to those currently in the Rep. of Ireland. Being investigated is the collection, retention and purpose of which civilian's information is being gathered. The authors also discuss the laws preventing the development and evolution of drone technology in the US in comparison to the Rep. of Ireland.
IntroductionThe method of interaction between a user and the internet is comprised of more than HTML and JavaScript web pages. There are many background web services in use which provide a new level of interactivity between the user and a web site. These web services allow a business to operate highly functional applications, between different platforms, without the need for a server for each independent platform. There are many different types of web services, using any number of programming languages to perform their functions, which are accessible over the internet. Mobile operating systems have increased in complexity in recent years, growing smarter and faster. Now, mobile devices are closing the gap on PCs in terms of processing power, processing speed, RAM. They possess the ability to connect to the internet, and the operating systems are able to run apps. One such method of calling services remotely is through web services. This paper focuses on consuming web services on mobile operating systems and evaluating and the viability of doing so. It compares the two main web service protocols, SOAP and REST. These comparisons were performed on two operating systems; Android and Windows Phone. These operating systems are popular mobile operating systems for smartphones. Windows Phone was released in September 2010 [1] and Android version 2.3 was released in December 2010 [2]. Testing both REST and SOAP on these limited operating systems can show how the operating systems can be improved in calling web services, and how well they can progress in the future, in terms of memory usage, time taken to complete the web service call and the amount of data sent between the phone and the server. The software artefact for the paper included creating a number of web services in which the mobile operating
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.