Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic Theses and Dissertations

Computer and Systems Architecture

East Tennessee State University

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury Dec 2019

Design And Development Of A Comprehensive And Interactive Diabetic Parameter Monitoring System - Betictrack, Nusrat Chowdhury

Electronic Theses and Dissertations

A novel, interactive Android app has been developed that monitors the health of type 2 diabetic patients in real-time, providing patients and their physicians with real-time feedback on all relevant parameters of diabetes. The app includes modules for recording carbohydrate intake and blood glucose; for reminding patients about the need to take medications on schedule; and for tracking physical activity, using movement data via Bluetooth from a pair of wearable insole devices. Two machine learning models were developed to detect seven physical activities: sitting, standing, walking, running, stair ascent, stair descent and use of elliptical trainers. The SVM and decision …


Categorization Of Security Design Patterns, Jeremiah Y. Dangler May 2013

Categorization Of Security Design Patterns, Jeremiah Y. Dangler

Electronic Theses and Dissertations

Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, …