The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant p...The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions.展开更多
Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve ...Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments.展开更多
This paper explores the image of the body in physically dependent elderly men and women and the way in which this image reconfigures their identity creating new meanings. In old age, the body becomes related with illn...This paper explores the image of the body in physically dependent elderly men and women and the way in which this image reconfigures their identity creating new meanings. In old age, the body becomes related with illness, with disablement and with its own material finiteness. Representations of the body are thus constructed around pain, deficiency, and fragility. The research was carried out from a qualitative perspective, performing in-depth interviews, with participant observation and a subject ID card as data collecting techniques. The identity of the interviewees who consented to be recorded was protected. The data were analyzed constructing concepts and theoretical and empirical categories with the support of the Etnograph V.5 software for qualitative data. The findings reflect discourses on the body that turn on its deterioration and limitations that prevent old people from functioning adequately in life. Metaphors were identified telling of a sense of"deteriorated identity"; most participants saw themselves as "a burden". They also showed symptoms of annoyance and shame regarding their sick or fragile bodies, as well as a constant memory of the healthy or "ideal" body of the past, which is hegemonic in our culture.展开更多
The article presents the situation in Latvia ahead of the country's adoption of the euro by offering an analysis of the extent to which the country is prepared for the move and of general economic difficulties as wel...The article presents the situation in Latvia ahead of the country's adoption of the euro by offering an analysis of the extent to which the country is prepared for the move and of general economic difficulties as well as indicating possible threats to its future development. The article talks about difficulties caused by the great unemployment connected with the specific economy of the country, political problems of the post-socialistic multinational country and steps done towards the fulfilling of all the convergence criteria. Its aim is to present the moments around the change of the currency which is done by the material's analysis because there are not enough statistical data for the mathematical analysis. It can be concluded that the adoption of the euro will probably be beneficial in the long run for Latvia's economy. The conclusions may be done by comparison with the situation of Estonia and its foreign trade with Poland which is shown in the article because there are a lot of similarities between the two Baltic countries.展开更多
The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The ...The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The respondents of the study were 50, specifically distributed to thirty (30) onboard marine engineering students enrolled for the current school year 2014-2015 and twenty (20) marine officers who had experienced piracy at Somalia and other places. The researchers employed quantitative-qualitative research method design. The questionnaire on "Piracy at Sea" was validated by experts in research, statistics, qualitative research, and maritime international conventions. To test the reliability, this same instrument was pilot-tested among marine officers and students who had been on board international ships. Qualitative data were captured through interviews by using open-ended questions. Frequency count, percentage, and rank were used in this study for descriptive-quantitative statistics. The data were analyzed using appropriate statistics through computer-processed software (SPSS). Qualitative analysis was employed to determine the views of the respondents on piracy so that mitigation measures were elicited for protection of life at sea leading towards international peace among identified HRAs (high-risk areas). Results revealed that seafarers were familiar of piracy. They were aware that piracy usually happens in areas like Somalia water sand other threatening territories. To combat piracy, the participants have pointed out the role of the international community in their concerted effort to help seafarers safeguard their lives specifically during these hard times. Somalia also needs to effectively check their organization by whether or not strict implementation of the Anti Piracy Law was being observed. Full knowledge of piracy, techniques for avoiding it, and surviving pirate attacks are necessary among seafarers. Satellite system called shiplock allows shipping companies to monitor location of ships particularly useful during pirate attacks, hijacks, or ship theft. They also install non-lethal electrical fences around a ship's perimeter to protect them during these times. IMO regulations require ships to send distress signals and warnings covertly in case of pirate attacks.展开更多
基金supported,in part,by Science Foundation Ireland grant 10/CE/I1855 to Lero -the Irish Software Engineering Research Centre(www.lero.ie)
文摘The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions.
文摘Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments.
文摘This paper explores the image of the body in physically dependent elderly men and women and the way in which this image reconfigures their identity creating new meanings. In old age, the body becomes related with illness, with disablement and with its own material finiteness. Representations of the body are thus constructed around pain, deficiency, and fragility. The research was carried out from a qualitative perspective, performing in-depth interviews, with participant observation and a subject ID card as data collecting techniques. The identity of the interviewees who consented to be recorded was protected. The data were analyzed constructing concepts and theoretical and empirical categories with the support of the Etnograph V.5 software for qualitative data. The findings reflect discourses on the body that turn on its deterioration and limitations that prevent old people from functioning adequately in life. Metaphors were identified telling of a sense of"deteriorated identity"; most participants saw themselves as "a burden". They also showed symptoms of annoyance and shame regarding their sick or fragile bodies, as well as a constant memory of the healthy or "ideal" body of the past, which is hegemonic in our culture.
文摘The article presents the situation in Latvia ahead of the country's adoption of the euro by offering an analysis of the extent to which the country is prepared for the move and of general economic difficulties as well as indicating possible threats to its future development. The article talks about difficulties caused by the great unemployment connected with the specific economy of the country, political problems of the post-socialistic multinational country and steps done towards the fulfilling of all the convergence criteria. Its aim is to present the moments around the change of the currency which is done by the material's analysis because there are not enough statistical data for the mathematical analysis. It can be concluded that the adoption of the euro will probably be beneficial in the long run for Latvia's economy. The conclusions may be done by comparison with the situation of Estonia and its foreign trade with Poland which is shown in the article because there are a lot of similarities between the two Baltic countries.
文摘The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The respondents of the study were 50, specifically distributed to thirty (30) onboard marine engineering students enrolled for the current school year 2014-2015 and twenty (20) marine officers who had experienced piracy at Somalia and other places. The researchers employed quantitative-qualitative research method design. The questionnaire on "Piracy at Sea" was validated by experts in research, statistics, qualitative research, and maritime international conventions. To test the reliability, this same instrument was pilot-tested among marine officers and students who had been on board international ships. Qualitative data were captured through interviews by using open-ended questions. Frequency count, percentage, and rank were used in this study for descriptive-quantitative statistics. The data were analyzed using appropriate statistics through computer-processed software (SPSS). Qualitative analysis was employed to determine the views of the respondents on piracy so that mitigation measures were elicited for protection of life at sea leading towards international peace among identified HRAs (high-risk areas). Results revealed that seafarers were familiar of piracy. They were aware that piracy usually happens in areas like Somalia water sand other threatening territories. To combat piracy, the participants have pointed out the role of the international community in their concerted effort to help seafarers safeguard their lives specifically during these hard times. Somalia also needs to effectively check their organization by whether or not strict implementation of the Anti Piracy Law was being observed. Full knowledge of piracy, techniques for avoiding it, and surviving pirate attacks are necessary among seafarers. Satellite system called shiplock allows shipping companies to monitor location of ships particularly useful during pirate attacks, hijacks, or ship theft. They also install non-lethal electrical fences around a ship's perimeter to protect them during these times. IMO regulations require ships to send distress signals and warnings covertly in case of pirate attacks.