Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra Nov 2020

Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra

Research Collection School Of Computing and Information Systems

We present ERICA, a digital personal trainer for users performing free weights exercises, with two key differentiators: (a) First, unlike prior approaches that either require multiple on-body wearables or specialized infrastructural sensing, ERICA uses a single in-ear "earable" device (piggybacking on a form factor routinely used by millions of gym-goers) and a simple inertial sensor mounted on each weight equipment; (b) Second, unlike prior work that focuses primarily on quantifying a workout, ERICA additionally identifies a variety of fine-grained exercising mistakes and delivers real-time, in-situ corrective instructions. To achieve this, we (a) design a robust approach for user-equipment association that …


Gym Usage Behavior & Desired Digital Interventions: An Empirical Study, Meeralakshmi Radhakrishnan, Archan Misra, Rajesh Krishna Balan, Youngki Lee Oct 2020

Gym Usage Behavior & Desired Digital Interventions: An Empirical Study, Meeralakshmi Radhakrishnan, Archan Misra, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

Understanding individual’s exercise motives, participation patterns in a gym and reasons for dropout are essential for designing strategies to help gym-goers with long-term exercise adherence. In this work, we derive insights on various exercise-related behaviors of gymgoers, including evidence of a significant number of individuals exhibiting early dropout and also describing their attitudes towards digital technologies for sustained gym participation. By utilizing gym visitation data logs of 6513 individuals over a longitudinal period of 16 months in a campus gym, we show the retention and dropout rates of gym-goers. Our data indicates that 32% of the people quit their gym …


Camps: Efficient And Privacy-Preserving Medical Primary Diagnosis Over Outsourced Cloud, Jianfeng Hua, Guozhen Shi, Hui Zhu, Fengwei Wang, Ximeng Liu, Hao Li Jul 2020

Camps: Efficient And Privacy-Preserving Medical Primary Diagnosis Over Outsourced Cloud, Jianfeng Hua, Guozhen Shi, Hui Zhu, Fengwei Wang, Ximeng Liu, Hao Li

Research Collection School Of Computing and Information Systems

With the flourishing of ubiquitous healthcare and cloud computing technologies, medical primary diagnosis system, which forms a critical capability to link big data analysis technologies with medical knowledge, has shown great potential in improving the quality of healthcare services. However, it still faces many severe challenges on both users' medical privacy and intellectual property of healthcare service providers, which deters the wide adoption of medical primary diagnosis system. In this paper, we propose an efficient and privacy-preserving medical primary diagnosis framework (CAMPS). Within CAMPS framework, the precise diagnosis models are outsourced to the cloud server in an encrypted manner, and …


Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng Jul 2020

Lightweight And Privacy-Aware Fine-Grained Access Control For Iot-Oriented Smart Health, Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng

Research Collection School Of Computing and Information Systems

With the booming of Internet of Things (IoT), smart health (s-health) is becoming an emerging and attractive paradigm. It can provide an accurate prediction of various diseases and improve the quality of healthcare. Nevertheless, data security and user privacy concerns still remain issues to be addressed. As a high potential and prospective solution to secure IoT-oriented s-health applications, ciphertext policy attribute-based encryption (CP-ABE) schemes raise challenges, such as heavy overhead and attribute privacy of the end users. To resolve these drawbacks, an optimized vector transformation approach is first proposed to efficiently transform the access policy and user attribute set into …


Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-Pink Tan, Hwee Xian Tan, Tih-Shih Lee, Tze Pin Ng May 2020

Early Detection Of Mild Cognitive Impairment With In-Home Sensors To Monitor Behavior Patterns In Community-Dwelling Senior Citizens In Singapore: Cross-Sectional Feasibility Study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-Pink Tan, Hwee Xian Tan, Tih-Shih Lee, Tze Pin Ng

Research Collection School Of Computing and Information Systems

Background: Dementia is a global epidemic and incurs substantial burden on the affected families and the health care system. A window of opportunity for intervention is the predementia stage known as mild cognitive impairment (MCI). Individuals often present to services late in the course of their disease and more needs to be done for early detection; sensor technology is a potential method for detection.Objective: The aim of this cross-sectional study was to establish the feasibility and acceptability of utilizing sensors in the homes of senior citizens to detect changes in behaviors unobtrusively.Methods: We recruited 59 community-dwelling seniors (aged >65 years …


Who And When To Screen: Multi-Round Active Screening For Network Recurrent Infectious Diseases Under Uncertainty, Han-Ching Ou, Arunesh Sinha, Sze-Chuan Suen, Andrew Perrault, Alpan Raval, Milind Tambe May 2020

Who And When To Screen: Multi-Round Active Screening For Network Recurrent Infectious Diseases Under Uncertainty, Han-Ching Ou, Arunesh Sinha, Sze-Chuan Suen, Andrew Perrault, Alpan Raval, Milind Tambe

Research Collection School Of Computing and Information Systems

Controlling recurrent infectious diseases is a vital yet complicated problem in global health. During the long period of time from patients becoming infected to finally seeking treatment, their close contacts are exposed and vulnerable to the disease they carry. Active screening (or case finding) methods seek to actively discover undiagnosed cases by screening contacts of known infected people to reduce the spread of the disease. Existing practice of active screening methods often screen all contacts of an infected person, requiring a large budget. In cooperation with a research institute in India, we develop a model of the active screening problem …


The Search For Optimal Oxygen Saturation Targets In Critically Ill: Patients Observational Data From Large Icu Databases, Willem Van Den Boom, Michael Hoy, Jagadish Sankaran, Mengru Liu, Haroun Chahed, Mengling Feng, Kay Choong See Mar 2020

The Search For Optimal Oxygen Saturation Targets In Critically Ill: Patients Observational Data From Large Icu Databases, Willem Van Den Boom, Michael Hoy, Jagadish Sankaran, Mengru Liu, Haroun Chahed, Mengling Feng, Kay Choong See

Research Collection School Of Computing and Information Systems

Background: Although low oxygen saturations are generally regarded as deleterious, recent studies in ICU patients have shown that a liberal oxygen strategy increases mortality. However, the optimal oxygen saturation target remains unclear. The goal of this study was to determine the optimal range by using real-world data. Methods: Replicate retrospective analyses were conducted of two electronic medical record databases: the eICU Collaborative Research Database (eICU-CRD) and the Medical Information Mart for Intensive Care III database (MIMIC). Only patients with at least 48 h of oxygen therapy were included. Nonlinear regression was used to analyze the association between median pulse oximetry-derived …


Key Regeneration-Free Ciphertext-Policy Attribute-Based Encryption And Its Application, Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng Jan 2020

Key Regeneration-Free Ciphertext-Policy Attribute-Based Encryption And Its Application, Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE) provides a promising solution for enabling scalable access control over encrypted data stored in the untrusted servers (e.g., cloud) due to its ability to perform data encryption and decryption defined over descriptive attributes. In order to bind different components which correspond to different attributes in a user's attribute-based decryption key together, key randomization technique has been applied in most existing ABE schemes. This randomization method, however, also empowers a user the capability of regenerating a newly randomized decryption key over a subset of the attributes associated with the original decryption key. Because key randomization breaks the linkage …


Lightweight Sharable And Traceable Secure Mobile Health System, Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li Jan 2020

Lightweight Sharable And Traceable Secure Mobile Health System, Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li

Research Collection School Of Computing and Information Systems

Mobile health (mHealth) has emerged as a new patient centric model which allows real-time collection of patient data via wearable sensors, aggregation and encryption of these data at mobile devices, and then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers. However, efficient and scalable sharing of encrypted data has been a very challenging problem. In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient’s mobile device to data users. LiST enables efficient keyword search and finegrained access …