Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Social and Behavioral Sciences

Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally Oct 2021

Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally

Information Science Faculty Publications

Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …


A Survey On Long-Range Wide-Area Network Technology Optimizations, Felipe S. Dantas Silva, Emidio P. Neto, Helder Oliveira, Denis Rosário, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Augusto V. Neto May 2021

A Survey On Long-Range Wide-Area Network Technology Optimizations, Felipe S. Dantas Silva, Emidio P. Neto, Helder Oliveira, Denis Rosário, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Augusto V. Neto

Information Science Faculty Publications

Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are widely deployed in urban areas, which leads to interference caused by concurrent transmissions on the same channel. In this context, it is crucial to understand aspects such as the coexistence of IoT devices and applications, resource allocation, Media Access Control (MAC) layer, network planning, and mobility support, that directly affect LoRaWAN’s …


Vehicle-Life Interaction In Fog-Enabled Smart Connected And Autonomous Vehicles, Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah Jan 2021

Vehicle-Life Interaction In Fog-Enabled Smart Connected And Autonomous Vehicles, Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah

Information Science Faculty Publications

Traffic accidents have become a major issue for researchers, academia, government and vehicle manufacturers over the last few years. Many accidents and emergency situations frequently occur on the road. Unfortunately, accidents lead to health injuries, destruction of some infrastructure, bad traffic flow, and more importantly these events cause deaths of hundreds of thousands of people due to not getting treatment in time. Thus, we need to develop an efficient and smart emergency system to ensure the timely arrival of an ambulance service to the place of the accident in order to provide timely medical help to those injured. In addition, …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud

Information Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan Jan 2020

Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan

Information Science Faculty Publications

Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …


Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur May 2019

Sensitive Research, Practice And Design In Hci, Stevie Chancellor, Nazanin Andalibi, Lindsay Blackwell, David Nemer, Wendy Moncur

Information Science Faculty Publications

New research areas in HCI examine complex and sensitive research areas, such as crisis, life transitions, and mental health. Further, research in complex topics such as harassment and graphic content can leave researchers vulnerable to emotional and physical harm. There is a need to bring researchers together to discuss challenges across sensitive research spaces and environments. We propose a workshop to explore the methodological, ethical, and emotional challenges of sensitive research in HCI. We will actively recruit from diverse research environments (industry, academia, government, etc.) and methods areas (qualitative, quantitative, design practices, etc.) and identify commonalities in and encourage relationship-building …


Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber Mar 2019

Examining Medline Search Query Reproducibility And Resulting Variation In Search Results, C. Sean Burns, Robert M. Shapiro Ii, Tyler Nix, Jeffrey T. Huber

Information Science Faculty Publications

The MEDLINE database is publicly available through the National Library of Medicine’s PubMed but the data file itself is also licensed to a number of vendors, who may offer their versions to institutional and other parties as part of a database platform. These vendors provide their own interface to the MEDLINE file and offer other technologies that attempt to make their version useful to subscribers. However, little is known about how vendor platforms ingest and interact with MEDLINE data files, nor how these changes influence the construction of search queries and the results they produce. This poster presents a longitudinal …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally May 2018

Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally

Information Science Faculty Publications

Environmental conditions and air quality monitoring have become crucial today due to the undeniable changes of the climate and accelerated urbanization. To efficiently monitor environmental parameters such as temperature, humidity, and the levels of pollutants, such as fine particulate matter (PM2.5) and volatile organic compounds (VOCs) in the air, and to collect data covering vast geographical areas, the development of cheap energy-autonomous sensors for large scale deployment and fine-grained data acquisition is required. Rapid advances in electronics and communication technologies along with the emergence of paradigms such as Cyber-Physical Systems (CPSs) and the Internet of Things (IoT) have led to …


Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo Apr 2018

Sensor Technologies For Intelligent Transportation Systems, Juan Guerrero-Ibáñez, Sherali Zeadally, Juan Contreras-Castillo

Information Science Faculty Publications

Modern society faces serious problems with transportation systems, including but not limited to traffic congestion, safety, and pollution. Information communication technologies have gained increasing attention and importance in modern transportation systems. Automotive manufacturers are developing in-vehicle sensors and their applications in different areas including safety, traffic management, and infotainment. Government institutions are implementing roadside infrastructures such as cameras and sensors to collect data about environmental and traffic conditions. By seamlessly integrating vehicles and sensing devices, their sensing and communication capabilities can be leveraged to achieve smart and intelligent transportation systems. We discuss how sensor technology can be integrated with the …


A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song Nov 2017

A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song

Information Science Faculty Publications

No abstract provided.


Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur Jun 2017

Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur

Information Science Faculty Publications

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …