A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secondary care provider attitudes towards patient generated health data from smartwatches
2020
npj Digital Medicine
Wearable devices, like smartwatches, are increasingly used for tracking physical activity, community mobility, and monitoring symptoms. ...
Data generated from smartwatches (PGHD_SW) is a form of patient-generated health data, which can benefit providers by supplying frequent temporal information about patients. ...
Transcripts were then re-read using the codebook and reviewed to identify emerging insights 54 . ...
doi:10.1038/s41746-020-0236-4
pmid:32140569
pmcid:PMC7054258
fatcat:7ar2xnfnc5gldblikz7x5o6hja
The Age of Artificial Intelligence: Use of Digital Technology in Clinical Nutrition
2021
Current Surgery Reports
Of note, smartwatches have been shown to more effectively recognize hand-based activities (e.g., eating, typing, playing catch, etc.) when compared to smartphones, but specific activity tracking recognition ...
Smartwatches for Nutrition Assessment Smartwatches are by far the most popular wearable health monitoring devices [12] . ...
doi:10.1007/s40137-021-00297-3
pmid:34123579
pmcid:PMC8186363
fatcat:5hp2msozybe5jkg6ppd6ow43i4
Authentication in E-learning systems: Challenges and Solutions
2020
Science & Technology Development Journal - Engineering and Technology
While there are many alternatives available such as biometric methods, user-challenging methods, smart card methods, etc. ...
Behavior-Based Authentication The behavior-based authentication uses devices such as smartphones, smartwatches or other IoT devices. ...
Biometric-Based Authentication Authentication based on biometrics or characteristics is done by verifying the physical or behavioral characteristics of an individual 6 . ...
doi:10.32508/stdjet.v3isi1.516
fatcat:tsrgqv4airdwnbkbmtvqpk3btu
Mobile Health Biometrics to Enhance Exercise and Physical Activity Adherence in Type 2 Diabetes (MOTIVATE-T2D): protocol for a feasibility randomised controlled trial
2021
BMJ Open
Mobile health (mHealth) technologies, offering biometric data to patients and healthcare professionals, may bridge the gap between supervised exercise and PA advice, enabling patients to engage in regular ...
This feasibility randomised controlled trial (RCT) will evaluate the use of mHealth technology when incorporated into a structured home-based exercise and PA intervention, in those recently diagnosed with ...
Another potentially useful aspect of mHealth technologies is that they can facilitate support from healthcare providers (HCPs), which is another significant 20 Online cloud-based portals allowing biometric ...
doi:10.1136/bmjopen-2021-052563
pmid:34836904
pmcid:PMC8628337
fatcat:2rubqv7ta5ezjmdytfn4mfm7em
Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension
2022
IEEE Transactions on Software Engineering
The proposed approach utilizes biometric information collected from the reviewer during the review process using non-intrusive biofeedback devices (e.g., smartwatches). ...
Biometric measures such as Heart Rate Variability (HRV) and task-evoked pupillary response are captured as a surrogate of the cognitive state of the reviewer (e.g., mental workload) and inexpensive desktop ...
Various studies (e.g., [59] ) show that it is feasible to use PPG based on bracelets and smartwatches as an alternative to ECG to extract HRV/PRV features. ...
doi:10.1109/tse.2022.3158543
fatcat:llxq3zee6bh3fnckil6f4wafly
Practical Threshold Multi-Factor Authentication
2021
IEEE Transactions on Information Forensics and Security
To bring back usability and flexibility without loss of security, we introduce a new notion of authentication, called (t, n) threshold MFA, that allows a user to actively choose t factors out of n based ...
Fuzzy extractor generates a uniformly random key R and transforms the key to a helper string P based on a biometric input w as (R, P ) ← Gen(w) at initialization. ...
This means their interaction transcripts are matching and the attacker does not launch active attacks. 2) C i outputs the PID pid = S and S j outputs the SID pid = C. ...
doi:10.1109/tifs.2021.3081263
fatcat:l5nn2a53inaqxmj4ama6bfribe
Realize, Analyze, Engage (RAE): A Digital Tool to Support Recovery from Substance Use Disorder
2021
Journal of Psychiatry and Brain Science
The coding structure will initially be developed based on deductive codes from the interview guide, and then inductive codes will be added after review of the interview transcripts. ...
Overall rates of compliance with the system will be calculated, including the hours per day of use (based on biometric data capture) and the frequency and extent to which participants respond to the RAE ...
doi:10.20900/jpbs.20210002
pmid:33748430
pmcid:PMC7978415
fatcat:jljimyyh5faixcsz7gvubusm5m
Voxento 3.0: A Prototype Voice-Controlled Interactive Search Engine for Lifelog
2022
Proceedings of the 5th Annual on Lifelog Search Challenge
This latest version has been enhanced with the addition of a text-based search feature, new filters based on new metadata provided in lifelog data, rich visual information and features and enhanced speech ...
CCS CONCEPTS • Human-centered computing → Sound-based input / output; • Information systems → Search interfaces; • Computing methodologies → Speech recognition. ...
Also, lifelog data usually contains biometric data such as physical activities, heartbeats, location data including country and semantic names, dates and times. ...
doi:10.1145/3512729.3533009
fatcat:ap76reqezrfmnnpztrpb7lht3i
"Sometimes I feel that I'm being left behind": Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic
2022
CHI Conference on Human Factors in Computing Systems Extended Abstracts
Based on these fndings, we describe future opportunities to make computing devices more accessible for people with UEI to manage the shifts in computing device use introduced by COVID-19. ...
Field notes were inserted at the start of the transcripts. Any personal details about the participants were removed from the transcripts to preserve privacy. ...
For instance, for P5, fngerprint biometrics were easier to use for authentication than passwords. However, the new software did not ofer accessible alternatives like biometrics. ...
doi:10.1145/3491101.3519647
fatcat:hn2hy7atnne25lzm5525ai5vly
What's your pace?
2018
Kommunikation@gesellschaft
Biometric data have become increasingly used in forms of inclusion and exclusion and in the maintenance of borders and other boundaries. ...
Bielefeld. transcript. Zuboff, Shoshana, 2015, Big other: surveillance capitalism and the prospects of an information civilization, Journal of Information Technology 30: 75-89. ...
doi:10.15460/kommges.2018.19.3.604
fatcat:se67emm34fbu5lgzadht73jm5m
The artificial intelligence revolution in primary care: Challenges, dilemmas and opportunities
2024
Atención Primaria
Firstly, it identifies unacceptable risks, such as cognitive manipulation, social scoring, and real-time and remote biometric identification. ...
There are different methodologies and different approaches for implementing AI-based models. ...
doi:10.1016/j.aprim.2023.102820
pmid:38056048
pmcid:PMC10714322
fatcat:7qgmtvvznbevxcr4uegxltlc4u
Towards a taxonomy for health living lab data collection devices
2022
Zenodo
Biometrics: are biological measurementsor physical characteristicsthat can be used to identify individuals, 4. ...
The sessions were also recorded but not transcript. The recording was used to retrieve specific details whenever needed. ...
doi:10.5281/zenodo.7434350
fatcat:xfyhgyu4uzgprbfz2qfazkqf7y
Towards cross-domain and behavior-based user authentication in mobile edge and IoT
2022
., password) or resort to specialized biometric sensors (e.g., fingerprint readers), which add extra burden to end users. ...
In addition, the users may still suffer from various attacks, such as password theft, shoulder surfing, and forged biometrics attacks. ...
Cardiac-biometric-based Authentication via Mobile Cameras. ...
doi:10.7282/t3-h71m-2p25
fatcat:6kidw5zw7bhuzaxnhctolz4whq
Stance4Health Nutritional APP: A Path to Personalized Smart Nutrition
2023
Nutrients
Specific menus were generated for each user based on their preferences and nutritional requirements. ...
In this article, we present and validate a personalized nutrition system based on an application (APP) for smart devices with the capacity to offer an adaptable menu to the user. ...
In research, they also help to decrease workload, and reduce time and the risk of transcription errors [17, 19] . ...
doi:10.3390/nu15020276
pmid:36678148
pmcid:PMC9864275
fatcat:tmupw5eqnfhvzg434d2vm3zczq
Stakeholder Perspectives on Barriers and Facilitators for the Adoption of Virtual Clinical Trials: Qualitative Study
2021
Journal of Medical Internet Research
Methods Based on online semistructured interviews, a qualitative study was conducted with pharmaceutical companies, food and health organizations, and an applied research organization in Europe. ...
The recordings were deleted directly after transcription, and the transcripts were stored as Microsoft Word files (Microsoft Corp) on a secured laptop per proper data and privacy protection measures. ...
A 5% check (1 interview transcript and coding) was done by another researcher to ensure that coding was performed consistently. ...
doi:10.2196/26813
pmid:34255673
pmcid:PMC8294122
fatcat:zflwpffy6jhbfneba2jpj6ia4u
« Previous
Showing results 1 — 15 out of 92 results