Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








92 Hits in 3.6 sec

Secondary care provider attitudes towards patient generated health data from smartwatches

Jordan M. Alpert, Todd Manini, Megan Roberts, Naga S. Prabhakar Kota, Tonatiuh V. Mendoza, Laurence M. Solberg, Parisa Rashidi
2020 npj Digital Medicine  
Wearable devices, like smartwatches, are increasingly used for tracking physical activity, community mobility, and monitoring symptoms.  ...  Data generated from smartwatches (PGHD_SW) is a form of patient-generated health data, which can benefit providers by supplying frequent temporal information about patients.  ...  Transcripts were then re-read using the codebook and reviewed to identify emerging insights 54 .  ... 
doi:10.1038/s41746-020-0236-4 pmid:32140569 pmcid:PMC7054258 fatcat:7ar2xnfnc5gldblikz7x5o6hja

The Age of Artificial Intelligence: Use of Digital Technology in Clinical Nutrition

Berkeley N. Limketkai, Kasuen Mauldin, Natalie Manitius, Laleh Jalilian, Bradley R. Salonen
2021 Current Surgery Reports  
Of note, smartwatches have been shown to more effectively recognize hand-based activities (e.g., eating, typing, playing catch, etc.) when compared to smartphones, but specific activity tracking recognition  ...  Smartwatches for Nutrition Assessment Smartwatches are by far the most popular wearable health monitoring devices [12] .  ... 
doi:10.1007/s40137-021-00297-3 pmid:34123579 pmcid:PMC8186363 fatcat:5hp2msozybe5jkg6ppd6ow43i4

Authentication in E-learning systems: Challenges and Solutions

Luu Quang Huan, Duy-Minh Nguyen, Hoang-Anh Pham, Nguyen Huynh-Tuong
2020 Science & Technology Development Journal - Engineering and Technology  
While there are many alternatives available such as biometric methods, user-challenging methods, smart card methods, etc.  ...  Behavior-Based Authentication The behavior-based authentication uses devices such as smartphones, smartwatches or other IoT devices.  ...  Biometric-Based Authentication Authentication based on biometrics or characteristics is done by verifying the physical or behavioral characteristics of an individual 6 .  ... 
doi:10.32508/stdjet.v3isi1.516 fatcat:tsrgqv4airdwnbkbmtvqpk3btu

Mobile Health Biometrics to Enhance Exercise and Physical Activity Adherence in Type 2 Diabetes (MOTIVATE-T2D): protocol for a feasibility randomised controlled trial

Katie Hesketh, Jonathan Low, Robert Andrews, Charlotte A Jones, Helen Jones, Mary E Jung, Jonathan Little, Ceu Mateus, Richard Pulsford, Joel Singer, Victoria S Sprung, Alison M McManus (+1 others)
2021 BMJ Open  
Mobile health (mHealth) technologies, offering biometric data to patients and healthcare professionals, may bridge the gap between supervised exercise and PA advice, enabling patients to engage in regular  ...  This feasibility randomised controlled trial (RCT) will evaluate the use of mHealth technology when incorporated into a structured home-based exercise and PA intervention, in those recently diagnosed with  ...  Another potentially useful aspect of mHealth technologies is that they can facilitate support from healthcare providers (HCPs), which is another significant 20 Online cloud-based portals allowing biometric  ... 
doi:10.1136/bmjopen-2021-052563 pmid:34836904 pmcid:PMC8628337 fatcat:2rubqv7ta5ezjmdytfn4mfm7em

Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension

Haytham Hijazi, Joao Duraes, Ricardo Couceiro, Joao Castelhano, Raul Barbosa, Julio Medeiros, Miguel Castelo-Branco, Paulo De Carvalho, Henrique Madeira
2022 IEEE Transactions on Software Engineering  
The proposed approach utilizes biometric information collected from the reviewer during the review process using non-intrusive biofeedback devices (e.g., smartwatches).  ...  Biometric measures such as Heart Rate Variability (HRV) and task-evoked pupillary response are captured as a surrogate of the cognitive state of the reviewer (e.g., mental workload) and inexpensive desktop  ...  Various studies (e.g., [59] ) show that it is feasible to use PPG based on bracelets and smartwatches as an alternative to ECG to extract HRV/PRV features.  ... 
doi:10.1109/tse.2022.3158543 fatcat:llxq3zee6bh3fnckil6f4wafly

Practical Threshold Multi-Factor Authentication

Wenting Li, Haibo Cheng, Ping Wang, Kaitai Liang
2021 IEEE Transactions on Information Forensics and Security  
To bring back usability and flexibility without loss of security, we introduce a new notion of authentication, called (t, n) threshold MFA, that allows a user to actively choose t factors out of n based  ...  Fuzzy extractor generates a uniformly random key R and transforms the key to a helper string P based on a biometric input w as (R, P ) ← Gen(w) at initialization.  ...  This means their interaction transcripts are matching and the attacker does not launch active attacks. 2) C i outputs the PID pid = S and S j outputs the SID pid = C.  ... 
doi:10.1109/tifs.2021.3081263 fatcat:l5nn2a53inaqxmj4ama6bfribe

Realize, Analyze, Engage (RAE): A Digital Tool to Support Recovery from Substance Use Disorder

2021 Journal of Psychiatry and Brain Science  
The coding structure will initially be developed based on deductive codes from the interview guide, and then inductive codes will be added after review of the interview transcripts.  ...  Overall rates of compliance with the system will be calculated, including the hours per day of use (based on biometric data capture) and the frequency and extent to which participants respond to the RAE  ... 
doi:10.20900/jpbs.20210002 pmid:33748430 pmcid:PMC7978415 fatcat:jljimyyh5faixcsz7gvubusm5m

Voxento 3.0: A Prototype Voice-Controlled Interactive Search Engine for Lifelog

Ahmed Alateeq, Mark Roantree, Cathal Gurrin
2022 Proceedings of the 5th Annual on Lifelog Search Challenge  
This latest version has been enhanced with the addition of a text-based search feature, new filters based on new metadata provided in lifelog data, rich visual information and features and enhanced speech  ...  CCS CONCEPTS • Human-centered computing → Sound-based input / output; • Information systems → Search interfaces; • Computing methodologies → Speech recognition.  ...  Also, lifelog data usually contains biometric data such as physical activities, heartbeats, location data including country and semantic names, dates and times.  ... 
doi:10.1145/3512729.3533009 fatcat:ap76reqezrfmnnpztrpb7lht3i

"Sometimes I feel that I'm being left behind": Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic

Brittany Faith Lewis, Paige Courtemanche, Krishna Venkatasubramanian
2022 CHI Conference on Human Factors in Computing Systems Extended Abstracts  
Based on these fndings, we describe future opportunities to make computing devices more accessible for people with UEI to manage the shifts in computing device use introduced by COVID-19.  ...  Field notes were inserted at the start of the transcripts. Any personal details about the participants were removed from the transcripts to preserve privacy.  ...  For instance, for P5, fngerprint biometrics were easier to use for authentication than passwords. However, the new software did not ofer accessible alternatives like biometrics.  ... 
doi:10.1145/3491101.3519647 fatcat:hn2hy7atnne25lzm5525ai5vly

What's your pace?

Barbara Frischling
2018 Kommunikation@gesellschaft  
Biometric data have become increasingly used in forms of inclusion and exclusion and in the maintenance of borders and other boundaries.  ...  Bielefeld. transcript. Zuboff, Shoshana, 2015, Big other: surveillance capitalism and the prospects of an information civilization, Journal of Information Technology 30: 75-89.  ... 
doi:10.15460/kommges.2018.19.3.604 fatcat:se67emm34fbu5lgzadht73jm5m

The artificial intelligence revolution in primary care: Challenges, dilemmas and opportunities

Josep Vidal-Alaball, Robert Panadés Zafra, Anna Escalé-Besa, Antonio Martinez-Millana
2024 Atención Primaria  
Firstly, it identifies unacceptable risks, such as cognitive manipulation, social scoring, and real-time and remote biometric identification.  ...  There are different methodologies and different approaches for implementing AI-based models.  ... 
doi:10.1016/j.aprim.2023.102820 pmid:38056048 pmcid:PMC10714322 fatcat:7qgmtvvznbevxcr4uegxltlc4u

Towards a taxonomy for health living lab data collection devices

Despoina Petsani, Teemu Santonen, Evdokimos Konstantinidis, Leidy Enriquez, Vasileia Petronikolou, Christoniki Maga, Stavroula Makroglou, Panagiotis Bamidis
2022 Zenodo  
Biometrics: are biological measurementsor physical characteristicsthat can be used to identify individuals, 4.  ...  The sessions were also recorded but not transcript. The recording was used to retrieve specific details whenever needed.  ... 
doi:10.5281/zenodo.7434350 fatcat:xfyhgyu4uzgprbfz2qfazkqf7y

Towards cross-domain and behavior-based user authentication in mobile edge and IoT

Cong Shi
2022
., password) or resort to specialized biometric sensors (e.g., fingerprint readers), which add extra burden to end users.  ...  In addition, the users may still suffer from various attacks, such as password theft, shoulder surfing, and forged biometrics attacks.  ...  Cardiac-biometric-based Authentication via Mobile Cameras.  ... 
doi:10.7282/t3-h71m-2p25 fatcat:6kidw5zw7bhuzaxnhctolz4whq

Stance4Health Nutritional APP: A Path to Personalized Smart Nutrition

Daniel Hinojosa-Nogueira, Bartolomé Ortiz-Viso, Beatriz Navajas-Porras, Sergio Pérez-Burillo, Verónica González-Vigil, Silvia Pastoriza de la Cueva, José Ángel Rufián-Henares
2023 Nutrients  
Specific menus were generated for each user based on their preferences and nutritional requirements.  ...  In this article, we present and validate a personalized nutrition system based on an application (APP) for smart devices with the capacity to offer an adaptable menu to the user.  ...  In research, they also help to decrease workload, and reduce time and the risk of transcription errors [17, 19] .  ... 
doi:10.3390/nu15020276 pmid:36678148 pmcid:PMC9864275 fatcat:tmupw5eqnfhvzg434d2vm3zczq

Stakeholder Perspectives on Barriers and Facilitators for the Adoption of Virtual Clinical Trials: Qualitative Study

Romée Melanie Helena Coert, James Kenneth Timmis, André Boorsma, Wilrike J Pasman
2021 Journal of Medical Internet Research  
Methods Based on online semistructured interviews, a qualitative study was conducted with pharmaceutical companies, food and health organizations, and an applied research organization in Europe.  ...  The recordings were deleted directly after transcription, and the transcripts were stored as Microsoft Word files (Microsoft Corp) on a secured laptop per proper data and privacy protection measures.  ...  A 5% check (1 interview transcript and coding) was done by another researcher to ensure that coding was performed consistently.  ... 
doi:10.2196/26813 pmid:34255673 pmcid:PMC8294122 fatcat:zflwpffy6jhbfneba2jpj6ia4u
« Previous Showing results 1 — 15 out of 92 results