Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- MHealth (2)
- AR (1)
- Android Apps (1)
- Augmented Reality (1)
- Authentication (1)
-
- Biometric (1)
- Blockchain (1)
- Child health (1)
- Classifier (1)
- Consensus Mechanism (1)
- Data Integrity (1)
- Data-driven Decision Making (1)
- Detrimental impact (1)
- HIPAA (1)
- IDE plugin (1)
- Infants and toddlers (1)
- Iris (1)
- Presentation attacks (1)
- Privacy (1)
- Privacy & Security (1)
- Proof of Work (PoW) (1)
- QR code (1)
- SHA256 (1)
- Screen time (1)
- ScreenSafeFuture (1)
- Security (1)
- VR (1)
- Virtual Reality (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika
Assessing Blockchain’S Potential To Ensure Data Integrity And Security For Ai And Machine Learning Applications, Aiasha Siddika
Master of Science in Information Technology Theses
The increasing use of data-centric approaches in the fields of Machine Learning and Artificial Intelligence (ML/AI) has raised substantial issues over the security, integrity, and trustworthiness of data. In response to this challenge, Blockchain technology offered a promising and practical solution, as its inherent characteristics as a decentralized distributed ledger, coupled with cryptographic processes, offer an unprecedented level of data confidentiality and immutability. This study examines the mutually beneficial connection between Blockchain technology and ML/AI, using Blockchain's inherent capacity to protect against unauthorized alterations of data during the training phase of ML models. The method involves building valid blocks of …
Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum
Master of Science in Information Technology Theses
The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Analysis Of The Adherence Of Mhealth Applications To Hipaa Technical Safeguards, Bilash Saha
Master of Science in Information Technology Theses
The proliferation of mobile health technology, or mHealth apps, has made it essential to protect individual health details. People now have easy access to digital platforms that allow them to save, share, and access their medical data and treatment information as well as easily monitor and manage health-related issues. It is crucial to make sure that protected health information (PHI) is effectively and securely transmitted, received, created, and maintained in accordance with the rules outlined by the Health Insurance Portability and Accountability Act (HIPAA), as the use of mHealth apps increases. Unfortunately, many mobile app developers, particularly those of mHealth …
A Literature Review On Privacy And Security In Virtual Reality And Augmented Reality, Yunus Gumbo
A Literature Review On Privacy And Security In Virtual Reality And Augmented Reality, Yunus Gumbo
Master of Science in Information Technology Theses
As technologies become more advanced and powerful each day, the progression towards embracing virtual reality environments in our daily activities become more real, and subsequently, the boundaries between virtual and physical worlds more in question. However, several issues continue to persist as the world around us changes – privacy and security. In this paper we are going to analyze in detail, the newer virtual reality (VR) and augmented reality (AR) applications, the privacy risks associated with these environments, current solutions – their benefits and challenges as well as potential newer solutions which can be implemented to increase privacy protection.
There …
A Framework To Detect Presentation Attacks, Laeticia Etienne
A Framework To Detect Presentation Attacks, Laeticia Etienne
Master of Science in Information Technology Theses
Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …