2017
DOI: 10.3390/asi1010003
|View full text |Cite
|
Sign up to set email alerts
|

Design, Implementation, and Field Testing of a Privacy-Aware Compliance Tracking System for Bedside Care in Nursing Homes

Abstract: Lower back musculoskeletal disorders are pervasive in workplaces. In the United States alone, the total cost of such injuries exceed $100 billion a year. The lower-back injury rate in the healthcare sector is one of the highest among all industry sectors. A main risk factor for lower-back injuries is the use of improper body mechanics when doing lifting and pulling activities. In healthcare venues, nursing homes in particular, nursing assistants are on the front line to take care of patients. Even in places wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…Step 2 (Generate Parameters): Generate several secret parameters for the later steps, including the initial value of Logistic model x 0 , and two prime numbers k 1 , k 2 . We use the following method to generate these parameters: 1) Require the user to input the password of any length s; 2) Use MD5 hash function to generate the 32-bit digest of s, denoted as a, where all the letters are lowercase; 3) Get the ASCII codes for each letter in a, to form an ASCII code vector a ; 4) Calculate r = i=2k+1 a i , k ∈ N and ∈ [1,15]; 5) Calculate x 0 = r ×10 −n , where n is the smallest natural number that let x 0 be in the range [0.1, 1); 6) Calculate the product of the 4th and the 5th number in a as m 1 . Denote the largest prime number that less than m 1 /24 as k 1 ; calculate the product of the 12nd and the 13rd number in a as m 2 .…”
Section: A Embedding Processmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 2 (Generate Parameters): Generate several secret parameters for the later steps, including the initial value of Logistic model x 0 , and two prime numbers k 1 , k 2 . We use the following method to generate these parameters: 1) Require the user to input the password of any length s; 2) Use MD5 hash function to generate the 32-bit digest of s, denoted as a, where all the letters are lowercase; 3) Get the ASCII codes for each letter in a, to form an ASCII code vector a ; 4) Calculate r = i=2k+1 a i , k ∈ N and ∈ [1,15]; 5) Calculate x 0 = r ×10 −n , where n is the smallest natural number that let x 0 be in the range [0.1, 1); 6) Calculate the product of the 4th and the 5th number in a as m 1 . Denote the largest prime number that less than m 1 /24 as k 1 ; calculate the product of the 12nd and the 13rd number in a as m 2 .…”
Section: A Embedding Processmentioning
confidence: 99%
“…Secondly, we adjust the overflowed pixels in the carrier image and embed the adjustment records with the proposed low distortion overflow processing algorithm (LDOPA). The contributions of this paper include: firstly, the LDOPA represents a new idea of solving the overflow problem for reversible watermarking, with a higher quality and a lower complexity; secondly, with the application of Logistic mapping, MD5 hash function, Torus mapping and Cyclic Redundancy Check (CRC) [15], the proposed scheme also enhances the security of the watermark [16].…”
Section: Introductionmentioning
confidence: 99%
“…1 These hardware systems are made smart by various computational intelligence algorithms and sensing technologies. 2 This development has resulted in many emerging highly multidisciplinary research areas typically termed as smart-* technologies, including smart-healthcare, [3][4][5][6] smart-home, 7,8 smart-grid, 9 as well as smart vehicles and intelligent transportation systems. 10 These new technologies are transforming our society and have enormous economic impact.…”
Section: Intelligent Sensing and Decision Making In Smart Technologiesmentioning
confidence: 99%
“…In the past decades, the number of mobile devices (MDs) has grown at an unprecedented, 1-3 billions of devices (eg, MDs, wearable devices, sensors, and other IoT computing nodes) are connected to the internet for a wide variety of mobile applications. [4][5][6][7] One of the important applications is computation-intensive tasks, such as in-vehicle videos and virtual reality (VR). 8 To process such computation-intensive tasks, many computing capacity and energy supply are required.…”
Section: Introductionmentioning
confidence: 99%
“…[4][5][6][7] One of the important applications is computation-intensive tasks, such as in-vehicle videos and virtual reality (VR). 8 To process such computation-intensive tasks, many computing capacity and energy supply are required. [9][10][11] Unfortunately, due to the limited computation resources such as limited battery life and insufficient computing capacity, the users' quality of experience will be reduced when executing the computation-hungry applications in MDs.…”
mentioning
confidence: 99%