Pub Date : 2015-11-12DOI: 10.1109/ISTAS.2015.7439433
Patrick McAllister, Huiru Zheng, R. Bond, A. Moorhead
Obesity is prevalent worldwide including UK and Ireland, affecting all demographics. Obesity can have a detrimental affect on an individual's health, which can lead to chronic conditions. Different digital interventions have enabled users to photograph food items to be identified using different feature extraction methods. In this research, we proposed a system that allows users to draw a polygon around a food item for segmentation. After segmented, the region is then classified using an automated voting system. Different features will then be extracted from the specified area. Support Vector Machines will be issued for each feature type. This system is a proof-of-concept and is designed to research the effectiveness of employing multiple feature detection algorithms to classify food images. To classify food regions a Bag-of-features (BoFs) approach will be used for each. Speeded Up Robust Features point detection and descriptors was used along with colour spatial features, and also MSER region detection with SURF. Each of these methods will have their own BoF to train an SVM. The aim of this research was to create a voting classification system that utilises each feature detection algorithm to ultimately identify the segmented food region through plurality (or majority) vote. Testing showed that the system achieved 75% accuracy when combining each feature SVM to create a voting system. The system outperforms two of the feature classifiers (SURF and MSER with SURF). LAB colour classifier slightly outperformed the voting mechanism within the developed system. In regards to future work, further development and testing would be completed through increasing the variety of food items used in the training phase and a larger test dataset would also be used.
{"title":"A semi-automated food voting classification system: Combining user interaction and Support Vector Machines","authors":"Patrick McAllister, Huiru Zheng, R. Bond, A. Moorhead","doi":"10.1109/ISTAS.2015.7439433","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439433","url":null,"abstract":"Obesity is prevalent worldwide including UK and Ireland, affecting all demographics. Obesity can have a detrimental affect on an individual's health, which can lead to chronic conditions. Different digital interventions have enabled users to photograph food items to be identified using different feature extraction methods. In this research, we proposed a system that allows users to draw a polygon around a food item for segmentation. After segmented, the region is then classified using an automated voting system. Different features will then be extracted from the specified area. Support Vector Machines will be issued for each feature type. This system is a proof-of-concept and is designed to research the effectiveness of employing multiple feature detection algorithms to classify food images. To classify food regions a Bag-of-features (BoFs) approach will be used for each. Speeded Up Robust Features point detection and descriptors was used along with colour spatial features, and also MSER region detection with SURF. Each of these methods will have their own BoF to train an SVM. The aim of this research was to create a voting classification system that utilises each feature detection algorithm to ultimately identify the segmented food region through plurality (or majority) vote. Testing showed that the system achieved 75% accuracy when combining each feature SVM to create a voting system. The system outperforms two of the feature classifiers (SURF and MSER with SURF). LAB colour classifier slightly outperformed the voting mechanism within the developed system. In regards to future work, further development and testing would be completed through increasing the variety of food items used in the training phase and a larger test dataset would also be used.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439434
C. Soraghan, Gerard Boyle, Luis Dominguez-Villoria, Jennifer Feighan, David Robinson
The Local Asset Mapping Project (LAMP) aims to develop new models of tertiary healthcare delivery by integrating patient care into a hospital's surrounding community. Current models are unsustainable, in particular due to the ageing demographic shift. To date, LAMP has created a database of almost 3,400 `assets' from part (22km2) of the ambulance catchment of the largest acute hospital in Ireland - an area representing ~120,000 citizens. A clinical software GUI called `Community Health Compass' is presented in this paper which uses this database and could potentially produce `social prescriptions' to patients coming to the hospital. This prescription would direct them to the assets and services in their community, near their postal address, and tailored to their condition and preferences, which could help to improve their health and wellbeing. However, there are a number of social implications and challenges associated with technology-mediated social prescribing, which will need to be considered to ensure the success and uptake of the intervention, while preserving personal choice and ensuring social responsibility. Data sharing, governance, accountability for patients, and community sector capacity are some of the main challenges for implementation of the LAMP model. These challenges and potential approaches to meeting them are presented. Forecasting these challenges is an attempt to proactively explore the issues, so as to develop a future technology-mediated social prescription delivery model that integrates with, and provides for, society's needs while reducing potential negative affects.
{"title":"Challenges of implementing a social prescription service in the clinic: Social prescribing in the LAMP project","authors":"C. Soraghan, Gerard Boyle, Luis Dominguez-Villoria, Jennifer Feighan, David Robinson","doi":"10.1109/ISTAS.2015.7439434","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439434","url":null,"abstract":"The Local Asset Mapping Project (LAMP) aims to develop new models of tertiary healthcare delivery by integrating patient care into a hospital's surrounding community. Current models are unsustainable, in particular due to the ageing demographic shift. To date, LAMP has created a database of almost 3,400 `assets' from part (22km2) of the ambulance catchment of the largest acute hospital in Ireland - an area representing ~120,000 citizens. A clinical software GUI called `Community Health Compass' is presented in this paper which uses this database and could potentially produce `social prescriptions' to patients coming to the hospital. This prescription would direct them to the assets and services in their community, near their postal address, and tailored to their condition and preferences, which could help to improve their health and wellbeing. However, there are a number of social implications and challenges associated with technology-mediated social prescribing, which will need to be considered to ensure the success and uptake of the intervention, while preserving personal choice and ensuring social responsibility. Data sharing, governance, accountability for patients, and community sector capacity are some of the main challenges for implementation of the LAMP model. These challenges and potential approaches to meeting them are presented. Forecasting these challenges is an attempt to proactively explore the issues, so as to develop a future technology-mediated social prescription delivery model that integrates with, and provides for, society's needs while reducing potential negative affects.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439418
Tuomas Tanskanen, Anne-Marie Tuikka, S. Hyrynsalmi, Kai Kimppa
This study focuses on the state of application development in developing countries. The first objective is to estimate the existence of application vendors locating in developing countries. The second objective is to identify some reasons for developing country software vendors to enter mobile application markets rather than more traditional software markets. We argue that app stores offer a possibility for developing countries to pass some of the problems that come with industrialisation by partly post-industrialising directly. This study is divided to two phases which study the existence of application vendors in developing countries and their characteristics from different viewpoints. The first phase focuses on the analysis of the most popular applications in Google Play, Apple Store and Windows Phone Store. The second phase starts by analysing the email addresses of application vendors who sell their products in Google Play marketplace for devices using Android operating system and continues by sending questionnaire to those application vendors whose email addresses has country domain belonging to developing country. Our study shows that mobile applications are developed in developing countries, although, the biggest part of application vendors is located in developed countries. Among developing countries, most important mobile application producers belong to upper-middle income economies, such as China or Russia, or to lower-middle income economies, such as India. However, there appears to be few application vendors who operate from low income economies, such as Bangladesh or Kenya. According to our results, application vendors located in developing countries choose to develop mobile applications largely due to same reasons than application vendors located in developed countries. They prefer mobile application marketplaces, because they offer easy access to large amount of potential customers. Android platform is appreciated for its low development and access cost, however, it is criticized for the wide range of customer interfaces.
{"title":"The potential development impact of mobile application vendors in developing countries","authors":"Tuomas Tanskanen, Anne-Marie Tuikka, S. Hyrynsalmi, Kai Kimppa","doi":"10.1109/ISTAS.2015.7439418","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439418","url":null,"abstract":"This study focuses on the state of application development in developing countries. The first objective is to estimate the existence of application vendors locating in developing countries. The second objective is to identify some reasons for developing country software vendors to enter mobile application markets rather than more traditional software markets. We argue that app stores offer a possibility for developing countries to pass some of the problems that come with industrialisation by partly post-industrialising directly. This study is divided to two phases which study the existence of application vendors in developing countries and their characteristics from different viewpoints. The first phase focuses on the analysis of the most popular applications in Google Play, Apple Store and Windows Phone Store. The second phase starts by analysing the email addresses of application vendors who sell their products in Google Play marketplace for devices using Android operating system and continues by sending questionnaire to those application vendors whose email addresses has country domain belonging to developing country. Our study shows that mobile applications are developed in developing countries, although, the biggest part of application vendors is located in developed countries. Among developing countries, most important mobile application producers belong to upper-middle income economies, such as China or Russia, or to lower-middle income economies, such as India. However, there appears to be few application vendors who operate from low income economies, such as Bangladesh or Kenya. According to our results, application vendors located in developing countries choose to develop mobile applications largely due to same reasons than application vendors located in developed countries. They prefer mobile application marketplaces, because they offer easy access to large amount of potential customers. Android platform is appreciated for its low development and access cost, however, it is criticized for the wide range of customer interfaces.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126929614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439431
David N. Crowley, J. Breslin, E. Curry
Citizen Actuation is a new concept that aims to retain humans in the loop throughout a system's lifecycle. In system design, humans are (generally) just users of a system but both Citizen Sensing and Citizen Actuation rely on users being included in a Cyber Physical Social System. In this paper, we investigate employing profile features from social networks as a method for user selection. These users will then be sent small tasks to complete that might normally be undertaken by actuators. To achieve this, we conducted a survey where users evaluated profiles on a limited number of features and posts. Separately, we collected profile data from the same set of profiles and computed calculated values such as Reply Ratio to compare them with the survey findings. This study has revealed interesting insights in to what the survey participants find important in relation to social media profiles and completing tasks. These include insights such as how they view the number of tweets, the profile description text, and how a user interacts with other users as being important when forming an opinion on a profile.
{"title":"Towards a citizen actuation framework for smart environments","authors":"David N. Crowley, J. Breslin, E. Curry","doi":"10.1109/ISTAS.2015.7439431","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439431","url":null,"abstract":"Citizen Actuation is a new concept that aims to retain humans in the loop throughout a system's lifecycle. In system design, humans are (generally) just users of a system but both Citizen Sensing and Citizen Actuation rely on users being included in a Cyber Physical Social System. In this paper, we investigate employing profile features from social networks as a method for user selection. These users will then be sent small tasks to complete that might normally be undertaken by actuators. To achieve this, we conducted a survey where users evaluated profiles on a limited number of features and posts. Separately, we collected profile data from the same set of profiles and computed calculated values such as Reply Ratio to compare them with the survey findings. This study has revealed interesting insights in to what the survey participants find important in relation to social media profiles and completing tasks. These include insights such as how they view the number of tweets, the profile description text, and how a user interacts with other users as being important when forming an opinion on a profile.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121969620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439406
P. Excell, R. Earnshaw
Increases in the power and capability of collaboration and information exchange point to a trend towards artificial intelligence, at least of a form capable of designing and assembling technological devices, sometime in the present century. The exponential growth of the world's information and the Internet of Things will enable intelligent processing devices to deduce context. This combination of processing power and contextual knowledge appears to be well within the ability of current technology and, further, appears to have the ability to deliver the level of machine intelligence and skill that would lead to the phenomenon of "The Singularity", in which machines could become "cleverer" than human beings. This poses a major challenge for human beings to determine what their role would be after this event and how they would control the machines, including prevention of malevolent control. These developments in technology have significant implications for society whether or not they cause the large scale impact predicted by proponents of the singularity concept, such as Raymond Kurzweil.
{"title":"The future of computing — The implications for society of technology forecasting and the Kurzweil singularity","authors":"P. Excell, R. Earnshaw","doi":"10.1109/ISTAS.2015.7439406","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439406","url":null,"abstract":"Increases in the power and capability of collaboration and information exchange point to a trend towards artificial intelligence, at least of a form capable of designing and assembling technological devices, sometime in the present century. The exponential growth of the world's information and the Internet of Things will enable intelligent processing devices to deduce context. This combination of processing power and contextual knowledge appears to be well within the ability of current technology and, further, appears to have the ability to deliver the level of machine intelligence and skill that would lead to the phenomenon of \"The Singularity\", in which machines could become \"cleverer\" than human beings. This poses a major challenge for human beings to determine what their role would be after this event and how they would control the machines, including prevention of malevolent control. These developments in technology have significant implications for society whether or not they cause the large scale impact predicted by proponents of the singularity concept, such as Raymond Kurzweil.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114483217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439405
Simona Tiuc, M. Marcu, C. Cernazanu-Glavan
This paper shares the results of a study on content rating and security permissions of mobile applications used by the online platform Google Play. Many questions are now raised regarding the age suitability and content for all mobile applications designed for children. More than that, do the users know the security issues they are exposed to when installing a specific application? We undertook a survey with children and teens to obtain information about the knowledge of the content rating and permissions of applications. This study also collected information directly from the market place using an application developed by authors. The information obtained was used to analyze the importance of content rating and security permissions in mobile games and their impact on children. As a final step, we correlated both the data obtained from surveys with the data provided by our application.
{"title":"Study on content rating and security permissions of mobile applications in google play","authors":"Simona Tiuc, M. Marcu, C. Cernazanu-Glavan","doi":"10.1109/ISTAS.2015.7439405","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439405","url":null,"abstract":"This paper shares the results of a study on content rating and security permissions of mobile applications used by the online platform Google Play. Many questions are now raised regarding the age suitability and content for all mobile applications designed for children. More than that, do the users know the security issues they are exposed to when installing a specific application? We undertook a survey with children and teens to obtain information about the knowledge of the content rating and permissions of applications. This study also collected information directly from the market place using an application developed by authors. The information obtained was used to analyze the importance of content rating and security permissions in mobile games and their impact on children. As a final step, we correlated both the data obtained from surveys with the data provided by our application.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439396
B. Hall
This paper describes a content analysis study that analyzed the subject matter of computing ethics. The purpose of the study was to begin the process of providing a coherent concept of the subject matter of computing ethics. The snapshot presented is based on article titles from four prominent journals with a computing ethics scope. This paper discusses subject matter themes that emerged from the article data. The most dominant subject matter themes were privacy, information and communication technologies, and design and development.
{"title":"A snapshot of the subject matter of computing ethics","authors":"B. Hall","doi":"10.1109/ISTAS.2015.7439396","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439396","url":null,"abstract":"This paper describes a content analysis study that analyzed the subject matter of computing ethics. The purpose of the study was to begin the process of providing a coherent concept of the subject matter of computing ethics. The snapshot presented is based on article titles from four prominent journals with a computing ethics scope. This paper discusses subject matter themes that emerged from the article data. The most dominant subject matter themes were privacy, information and communication technologies, and design and development.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126173492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439400
L. Herbst, J. Lalk
Apartheid in South Africa (SA) left a legacy of uneven access to electricity, impacting the quality of the lives of many. Furthermore, the country's economy has been stifled by loadshedding (scheduled power interruptions) since 2008. Two policy documents have been drawn up to address these problems by 2030: the National Development Plan (NDP) and the Integrated Resource Plan for Electricity (IRP). The NDP was developed by a 26-member National Planning Commission, 25 of which are not State-employees. On the other hand, the IRP is reviewed by the country's Department of Energy. The lauded Renewable Energy Independent Power Producer Procurement Programme (REI4P) was subsequently initiated to increase the contribution of renewable energy resources to 20000MW by 2030. REI4P is considered one of the country's "best kept secrets", partly due to the relatively low electricity prices and betterment that it would offer poor communities. In this paper, the authors critique the NDP and IRP, and review investigative reports on some REI4P projects. It is shown that many social problems arose during some REI4P projects including: varied conceptions of roles that government officials, community representatives and foreign developers are expected to play; and few social benefits were created because of a lack of enterprise development skills among local communities. It is concluded that, if the points of departure of critical policy documents were the same, the issues described could have been avoided. Additionally, and perhaps most importantly, poor collaboration between and within governmental departments is suspected as being one of the most prominent underlying causes of socio-economic benefits, job creation, and local development not coming to fruition in REI4P as envisaged. Policy documents at Departmental level should be streamlined with the NDP to discourage "silo-thinking", thus synergizing projects that are put in place to address some of the most pressing issues in SA.
{"title":"A review of the policy documents behind South Africa's Renewable Energy Independent Power Producer Procurement Programme: How its hits and misses impact society","authors":"L. Herbst, J. Lalk","doi":"10.1109/ISTAS.2015.7439400","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439400","url":null,"abstract":"Apartheid in South Africa (SA) left a legacy of uneven access to electricity, impacting the quality of the lives of many. Furthermore, the country's economy has been stifled by loadshedding (scheduled power interruptions) since 2008. Two policy documents have been drawn up to address these problems by 2030: the National Development Plan (NDP) and the Integrated Resource Plan for Electricity (IRP). The NDP was developed by a 26-member National Planning Commission, 25 of which are not State-employees. On the other hand, the IRP is reviewed by the country's Department of Energy. The lauded Renewable Energy Independent Power Producer Procurement Programme (REI4P) was subsequently initiated to increase the contribution of renewable energy resources to 20000MW by 2030. REI4P is considered one of the country's \"best kept secrets\", partly due to the relatively low electricity prices and betterment that it would offer poor communities. In this paper, the authors critique the NDP and IRP, and review investigative reports on some REI4P projects. It is shown that many social problems arose during some REI4P projects including: varied conceptions of roles that government officials, community representatives and foreign developers are expected to play; and few social benefits were created because of a lack of enterprise development skills among local communities. It is concluded that, if the points of departure of critical policy documents were the same, the issues described could have been avoided. Additionally, and perhaps most importantly, poor collaboration between and within governmental departments is suspected as being one of the most prominent underlying causes of socio-economic benefits, job creation, and local development not coming to fruition in REI4P as envisaged. Policy documents at Departmental level should be streamlined with the NDP to discourage \"silo-thinking\", thus synergizing projects that are put in place to address some of the most pressing issues in SA.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439443
E. Conlon
This paper is focused on the teaching of engineering ethics (EE). Through a focus on safety and the lens of what sociologists call the agency/ structure relationship it examines various approaches to this teaching. Drawing on Critical Realism it argues there are deficiencies in both the dominant approach and a number of proposed alternatives as they suffer from various forms of conflationism. By drawing on Critical Realism (CR) a more robust agenda for teaching engineering ethics can be developed. It is argued that CR offers a basis for understanding the range of factors which lead to accidents and disasters. It allows for a fuller consideration of agency/structure relations and the importance of changing the contexts in which engineers work in order to allow them to hold paramount the health, safety and welfare of the public.
{"title":"A critical realist approach to engineering ethics","authors":"E. Conlon","doi":"10.1109/ISTAS.2015.7439443","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439443","url":null,"abstract":"This paper is focused on the teaching of engineering ethics (EE). Through a focus on safety and the lens of what sociologists call the agency/ structure relationship it examines various approaches to this teaching. Drawing on Critical Realism it argues there are deficiencies in both the dominant approach and a number of proposed alternatives as they suffer from various forms of conflationism. By drawing on Critical Realism (CR) a more robust agenda for teaching engineering ethics can be developed. It is argued that CR offers a basis for understanding the range of factors which lead to accidents and disasters. It allows for a fuller consideration of agency/structure relations and the importance of changing the contexts in which engineers work in order to allow them to hold paramount the health, safety and welfare of the public.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-01DOI: 10.1109/ISTAS.2015.7439426
Amoldo Diaz-Ramirez, E. Dominguez, Luís Martínez-Alvarado
Accidental falls are one of the main causes of deaths and severe injuries of people over 65 years old. For this reason, the development of fall detection systems for the elderly has been an important research topic. In this paper, a non-invasive fall detection system for older people, based on the use of a wireless sensor network (WSN), is proposed. It uses the acoustic signal sensed by a node of the WSN, as well as signal processing and pattern recognition techniques to detect a fall. The model uses a signal-processing algorithm based on the use of cross-correlation to measure the similarity between the sampled signal and a reference template signal, which represents a fall event. If these two signals are similar, then the Mel-frequency cepstral coefficients (MFCC) of the fall sound are extracted. Afterwards, the dynamic time warping (DTW) method is used for pattern recognition. The evaluation of the proposed system showed a very good detection rate.
{"title":"A falls detection system for the elderly based on a WSN","authors":"Amoldo Diaz-Ramirez, E. Dominguez, Luís Martínez-Alvarado","doi":"10.1109/ISTAS.2015.7439426","DOIUrl":"https://doi.org/10.1109/ISTAS.2015.7439426","url":null,"abstract":"Accidental falls are one of the main causes of deaths and severe injuries of people over 65 years old. For this reason, the development of fall detection systems for the elderly has been an important research topic. In this paper, a non-invasive fall detection system for older people, based on the use of a wireless sensor network (WSN), is proposed. It uses the acoustic signal sensed by a node of the WSN, as well as signal processing and pattern recognition techniques to detect a fall. The model uses a signal-processing algorithm based on the use of cross-correlation to measure the similarity between the sampled signal and a reference template signal, which represents a fall event. If these two signals are similar, then the Mel-frequency cepstral coefficients (MFCC) of the fall sound are extracted. Afterwards, the dynamic time warping (DTW) method is used for pattern recognition. The evaluation of the proposed system showed a very good detection rate.","PeriodicalId":357217,"journal":{"name":"2015 IEEE International Symposium on Technology and Society (ISTAS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126872153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}