Copyright © 2007, UCD Dublin School of Computer Science and Informatics UCD Dublin Belfield, Dublin 4, Ireland ODCSSS Summer School,

Slides:



Advertisements
Similar presentations
[Biomedical Telemedicine ] Usability, Privacy and Security CSCI E-170 Fall 2004 Final Project Lee & Oghra.
Advertisements

Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Technology Solutions. There are a variety of technologies—old and new—that have been developed to warn drivers and operators when workers on foot are.
D u k e S y s t e m s Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas.
Internet of Things with Intel Edison Presentation Paul Guermonprez Intel Software
ITEC 810 Overview of Micropayment Technology
Part 2c: Requirements Chapter 2: How to Gather Requirements: Some Techniques to Use Chapter 3: Finding Out about the Users and the Domain Chapter 4: Finding.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Will McHenry Maladau Mou Michael Overstreet Gi Jung Park Embedded Systems Design February 1, 2008.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
IN YOUR FACE Anish Mathur Brian Thompson Sunny Atluri Rushikesh Sheth.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
SAVI Andrew Ebaugh Saurav Chatterjee Shopping assistant for the visually impaired.
R F I D - Introductory Presentation - - Introductory Presentation -
1 Chapter 16 Assistive Environments for Individuals with Special Needs.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
MICROCONTROLLER BASED PARKING GARAGE Kevin Reynolds EKU, Dept. of Technology Computer Electronic Networking.
Copyright © Wondershare Software Java Ring By D.Pradeep kumar(07241A0587) CSE Gokaraju Rangaraju institute of Engineering and Technology.
Waseda Univ Nakajima Lab Interaction Group Computer-supported knowledge sharing in co-located environments Yasufumi Hirakawa, Harumi Mase, Eiji Tokunaga.
System Overview The Perfect Solution For Small ‘Entry Level’ Access Control Applications August 2014.
1 Barriers to Enum What VoIP providers ask about Enum Dr. Dorgham Sisalem.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Hosted by: June 23-26, 2003 New York City Copyright Managing Multiple Access & Entry Points.
Major Misconceptions about Student Tracking Major Misconceptions about Student Tracking.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
What is Talking Points? A system which integrates an internet connected mobile device, Radio Frequency Identification (RFID) Tags, and a socially driven.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
Marko Matulin University of Zagreb Faculty of Transport and Traffic Sciences Zagreb, 21 October 2013 CIVITAS-ELAN Measure 4.4: Mobility management for.
Wearable RFID for Play Yevgeniy Medynskiy Susan Gov.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium, 2006 * Presented by Justin Miller.
Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland
Mobile Phone Based Environment Control/Security System Christopher Carroll B.E. Electronic and Computer Engineering.
Prepared by : Ala’ Bzour & Ayam Bzour Introduced to: Dr.Ashraf Armoush.
Short Range Networks Mark Green School of Creative Media.
Copyright © 2015, SAS Institute Inc. All rights reserved. RIDING THE DATA EXPLOSION SIMON TILLEY SAS.
AUTOMATED STUDENT ATTENDANCE SYSTEM
Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas D. Lane†, Kristóf.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
RAPT RFID based Asset and Personnel Tracker Team 24.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
1 Interaction in Pervasive Computing Settings using Bluetooth-enabled Active tags and passive RFID Technology tegether with Mobile Phones PerCom 2003 F.
Assisted Cognition Systems Henry Kautz Department of Computer Science.
Date of download: 9/17/2016 Copyright © ASME. All rights reserved. From: Modeling an Radio Frequency Identification Asset Management Solution Hosted on.
Smart Parking Application
English for Advance Learners I
PARKING AUTOMATION SYSTEM
RFID Based Student Tracking
Fang-Lin Chao and Ja-Der Lin
Chris Kibler, Quinn Calvert, and Mike Duong
Long-range capacitive sensors for indoor person location
Sunnytek sensor networks
R F I G : RFID + Geometry Photosensing Wireless Tags for Precise Location and Complex Geometric Procedures Ramesh Raskar, Paul Dietz, Paul Beardsley,
Elecbits.
2N Access Unit 2.0 Multi-technology access control readers.
Key Facts-Ireland’s Transportation
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
COMP755 Advanced Operating Systems
The Hinthouse Purple B October 5th, 2006
Presentation transcript:

Copyright © 2007, UCD Dublin School of Computer Science and Informatics UCD Dublin Belfield, Dublin 4, Ireland ODCSSS Summer School, UCD, DCU Using Colocation to Support Human Memory Caitlin Lustig, Hristo Novatchkov, Lucy E. Dunne, Mike McHugh, and Lorcan Coyle

Using Colocation to Support Human Memory2 Motivation short term memory loss aging population or injury helping people live independently in their homes technological solution? research themes smart homes wearable sensors sensor technology

Using Colocation to Support Human Memory3 Technology Requirements cheap easy to install low cognitive load ambient must work implicitly comfortable maintain privacy

Using Colocation to Support Human Memory4 Radio Frequency Identification commercially available technology security, transport, asset tracking passive/active tags magnetically induced very short range (~5cm) small tags - stickers static/mobile readers reader is worn by the user tags are embedded in the environment less convenient for the user cheaper, easier solution

Using Colocation to Support Human Memory5 The RFID Glove

Using Colocation to Support Human Memory6 The RFID Reader

Using Colocation to Support Human Memory7 The Gumstix Computer Gumstix Linux OS serial ports WiFi CF Card

Using Colocation to Support Human Memory8 The RFID Glove

Using Colocation to Support Human Memory9 Application Scenarios detecting routine behaviour interruptions reminding users to complete routine tasks spot a routine in progress issue a warning if the task was incomplete after a delay reminding users to take medicine learning an activity model of medicine taking ensuring that a policy is followed

Using Colocation to Support Human Memory10 Evaluation placement of tags hard to ensure good read spout, bowl, plate, knife uncomfortable too hot, too tight, too bulky, too delicate impossible to make a fist properly battery life very short RFID reader - 100mA, Gumstix - much higher

Using Colocation to Support Human Memory11 Future Work more complex and robust routine detector remembering where you left something “where did I leave my car keys?” colocation rather than location “you last had them with your mobile” “you last had them yesterday” alternative wearable solutions pocket or purse RFID reader

Using Colocation to Support Human Memory12 Conclusion working prototype that tackles the application scenarios simple small-scale evaluation prototype implementaion was poorly received alternative to a glove? technology has merit cheap simple to use works within limitations private

Using Colocation to Support Human Memory13 Questions/Discussion Thank you for your attention. Lorcan Coyle ODCSSS Website: Project Wiki: