Rehabilitation patient activity is not typically monitored in real-time due to lack of suitable actigraphy devices. We present an open-source actigraphy system with integrated real-time cloud data ...storage based on mobile phones for potential use in patient activity monitoring and quantitation.
An iPhone program was created to stream an actigraphy score to a cloud data storage service, Adafruit IO, in real-time. The actigraphy score is calculated as vector magnitude from three-axis accelerometer data at 2.5 second epochs.
Actigraphy data was successfully streamed to the cloud storage and visualization platform at up to 30Hertz, with 60Hertz possible at a higher cost tier. Data was represented as decimal with two significant digits of precision. No movement at all is normalized to 0. Maximum vector magnitude with moderate walking was 0.39. Maximum vector magnitude with jogging was 1.02 Maximum vector magnitude with the phone in the hand during a throwing motion was 5.47. iOS reported energy draw was low (level 1 out of 20).
In summary, we present an open-source design for a simple and inexpensive real-time cloud-connected actigraphy system for rehabilitation patients. Alternative platforms and devices are discussed, as are security and cost implications The widespread use of mobile devices and the iOS platform, with optional integration of global positioning coordinates and other phone data, are advantageous compared to purpose-built existing actigraphy solutions.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
Mobile devices and apps such as cloud apps are a potential attack vector in an advanced persistent threat (APT) incident, due to their capability to store sensitive data (e.g. backup of private and ...personal data in digital repositories) and access sensitive resources (e.g. compromising the device to access an organisational network). These devices and apps are, thus, a rich source of digital evidence. It is vital to be able to identify artefacts of forensic interest transmitted to/from and stored on the devices. However, security mechanisms in mobile platforms and apps can complicate the forensic acquisition of data. In this paper, we present techniques to circumvent security mechanisms and facilitate collection of artefacts from cloud apps. We then demonstrate the utility of the circumvention techniques using 18 popular iOS cloud apps as case studies. Based on the findings, we present the first iOS cloud app security taxonomy that could be used in the investigation of an APT incident.
•Circumventing iOS security mechanisms for APT forensic investigations.•Advanced persistent threat forensic investigations.•Techniques to circumvent SSL/TLS on iOS devices.•iOS cloud app security taxonomy.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
Critical Infrastructure Systems are highly complex and interdependent. Growing complexity and interdependency between infrastructure systems and frequent exposure to extreme events have inevitably ...increased the probability of cascading failures and the prolonged lack of serviceability in urban communities, especially so for energy systems. The resilience analysis of interdependent infrastructure systems against natural hazards provides stakeholders with a comprehensive outlook on recovery strategies to minimize the damage costs and losses caused by extreme events. This paper introduces the ResQ-IOS, a Resilience Quantification Iterative Optimization-based Simulation (IOS) framework for quantifying the resilience of interdependent infrastructure systems to natural hazards with the capability of considering the real-world conditions for the status of infrastructure systems' components. The ResQ-IOS framework consists of five modules: risk assessment, simulation, optimization, database, and controller. To evaluate the capabilities of this framework, the seismic resilience of interdependent energy infrastructure networks (power, natural gas, and water) in Shelby County (TN), USA, was assessed. The results of the resilience analysis of the case study suggest that the water network is the best candidate for implementing pre-disaster Resilience Enhancement Measures (REMs), like increasing the supply capacity. Due to the controlling role of the power network in the community's recovery process, it is recommended that post-disaster REMs, such as increasing the number of Repair and Maintenance (R&M) teams, should be applied to the power network to speed up the restoration of failed components in that network and consequently, shorten the recovery duration of the community. The ResQ-IOS can be employed as a useful computational tool for planning the resilience-oriented sustainable development of urban communities by, for example, deploying Renewable Energy (RE)-based strategies to enhance their disaster resilience.
•ResQ-IOS can quantify interdependent critical infrastructure systems' resilience.•This framework can consider partial failure and functionality level for components.•ResQ-IOS allows for components' nonlinear properties and time-dependent demands.•ResQ-IOS can be utilized for the resilience-oriented development of communities.•Resilience of interdependent infrastructure systems in Shelby County is assessed.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
To determine and compare how three-dimensionally accurate scan bodies of different geometric shapes are placed over 6 implants (platform or crestal module).
A master plaster model was made with 6 ...INHEX STD implant analogs made by Mozo-Grau S.A and 4 scan body types were compared. Several groups were made: a control group using a DS101 85G20 contact scanner (Renishaw, Gavá, Spain) and 2 experimental groups using optical scanners: Cerec Omnicam (Sirona, Bensheim, Germany) and Trios 3 (3Shape, Copenhagen, Denmark). 3 parameters were measured on the implants: dis-tance between the axial axes, height difference and angulation difference. Two experienced op-erators scanned 10 times using each of the 2 scanners. The STL files were compared using the "Best-Fit" technique and the data was then extrapolated and processed statistically.
The scan bodies PRMG (SB3) and TALL (SB4) lead to smaller errors in distance, projected height and angulation than ELOS (SB1) and MG (SB2).
Despite the results obtained in PRMG (SB3) and TALL (SB4), the scanning errors may still be too large to achieve a good fit in large rehabilitations over implants. Any marginal discrepancy may lead to the failure of the rehabilitation or the implant due to the associated biomechanical problems.
IOS, CAD/CAM, SCAN Bodies.
The economy is recovering in today’s postpandemic phase, but uncertainties such as supply chain disruptions remain a top risk. Environmental uncertainty creates the need for swift supply chain ...adjustments in response to these external changes. Supply chain agility (SCA) has been recognized as a key capability for firms working to achieve superior performance in uncertain business environments. SCA is challenging to achieve, however, because it requires the firm and its supply chain partners to collaborate closely yet flexibly across organizational boundaries. Considering interorganizational systems (IOS) have been widely deployed to establish digital connections across organizational boundaries, this study aims to explore to what extent and how IOS as boundary objects, characterized by standardization and adaptability, affect SCA under different levels of environmental uncertainty. This study provides guidance for information technology (IT) and business directors on how to achieve SCA through the design or implementation of IOS, provides guidance for business directors on how to invest more effectively to capture opportunities and deal with risks, and advises business and IT directors on how to respond appropriately to different levels of environmental uncertainty (e.g., IT directors should design adaptive IOS and business directors should invest in supply chain collaboration when environmental uncertainty is high).
Supply chain agility has been recognized as a key capability for firms working to achieve superior performance in uncertain business environments. Supply chain agility is challenging to achieve, however, because it requires the firm and its supply chain partners to collaborate closely yet flexibly across organizational boundaries. Extending the boundary object literature to the supply chain context, this study unveils the mechanism through which interorganizational systems (IOS), widely deployed to span organizational boundaries through interfirm digital connections, promote supply chain agility in uncertain environments. The concept of supply chain collaboration is introduced as the mediating mechanism between two key IOS characteristics (i.e., standardization and adaptability) and supply chain agility. Environmental uncertainty is incorporated as the contextual condition through contextualized theorization of IOS as boundary objects. The resulting hypotheses are tested via a two-wave, match-paired survey study on business and information technology executives in 156 manufacturing firms. Empirical findings provide general support to most hypotheses, and implications for theory development and professional practice are discussed.
History:
Manju Ahuja, Senior Editor; Robert Gregory, Associate Editor.
Funding:
This work was supported by the National Natural Science Foundation of China Grant 72101259, the National Science Foundation of China Grant 72071171, and the General Research Fund Grant 11509420.
Supplemental Material:
The online appendices are available at
https://doi.org/10.1287/isre.2023.1210
.
El presente artículo muestra el desarrollo de una aplicación para dispositivos móviles con sistema operativo iOS, pensado para la capacitación de diferentes usuarios de equipos especializados. La ...aplicación móvil es capaz de conectarse a la nube y por medio de un sistema de búsqueda manual o a través de un código QR, puede obtener la información del equipo de interés para capacitarse, teniendo acceso a vídeo tutoriales y manuales de operación, logrando una interacción amigable para el usuario. Los servicios de Google Firebase se utilizaron como nube para poder guardar la información de los equipos y el registro de los usuarios.
MAC adresleri sayesinde bir cihazın üretici firmasına, hangi ülkede kime satıldığına kadar tespitler yapılabilir. Cihazların MAC adresleri adli bilişim yazılımları ile tespit edilebilir. Ancak ...işletim sistemlerinin sürekli gelişimine karşın adli bilişim yazılımlarının ilerlemesi, Mac işletim sistemi (macOS) açısından yeteriz kalmaktadır. Bu çalışmanın amacı, macOS’a sahip bir bilgisayara bağlanan telefonların, MAC adresi kayıtlarını analiz etmek, analiz sırasında karşılaşılan problemleri tespit etmek ve bu problemlere çözüm önerisi sunmaktır. Bu amacı gerçekleştirmek için bu makalede çalışma ortamının hazırlanması, verilerin toplanması, verilerin analizi ve sonuçların değerlendirilmesi aşamalarından oluşan bir metodoloji önerilmektedir. Bu metodolojiye uygun olarak iOS ve ANDROID işletim sistemine sahip telefonlar ile toplam on farklı uygulama gerçekleştirilmiştir. Elde edilen sonuçlar; işletim sistemine düşen MAC adresi kayıtlarının her seferinde doğru sonucu vermediğini, bağlantı türünün sonuçları etkilediğini ve bir telefon için birden fazla MAC adresi kaydı olduğunu göstermiştir.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
Traffic Classification (TC), consisting in how to infer applications generating network traffic, is currently the enabler for valuable profiling information, other than being the workhorse for ...service differentiation/blocking. Further, TC is fostered by the blooming of mobile (mostly encrypted) traffic volumes, fueled by the huge adoption of hand-held devices. While researchers and network operators still rely on machine learning to pursue accurate inference, we envision Deep Learning (DL) paradigm as the stepping stone toward the design of practical (and effective) mobile traffic classifiers based on automatically-extracted features, able to operate with encrypted traffic, and reflecting complex traffic patterns. In this context, the paper contribution is fourfold. First, it provides a taxonomy of the key network traffic analysis subjects where DL is foreseen as attractive. Secondly, it delves into the non-trivial adoption of DL to mobile TC, surfacing potential gains. Thirdly, to capitalize such gains, it proposes and validates a general framework for DL-based encrypted TC. Two concrete instances originating from our framework are then experimentally evaluated on three mobile datasets of human users’ activity. Lastly, our framework is leveraged to point to future research perspectives.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP