Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 10 de 10
Filter
1.
Sustainability ; 15(11):8909, 2023.
Article in English | ProQuest Central | ID: covidwho-20240235

ABSTRACT

This paper examines whether destination cards can simultaneously serve tourists' needs and sustainability goals. It provides useful insights for tourism authorities and policymakers in designing a smart tourist card that meets the needs of tourists while preserving and supporting areas' wellbeing. Taking Thessaloniki city as a case study, a tourist survey, designed based on the key features of European destination cards, was implemented to identify needs and motivations. Interesting insight was revealed: tourists want to self-explore the city, are coming with their families, are history-lovers and gastronomy-keen, and are strongly willing to be provided with a destination card offering unlimited access to public transport. The latter reveals an opportunity for the city;the tourists are willing to use sustainable mobility options, which means that a base of sustainable travelling exists. The proposed Thessaloniki smart card can bring together tourists' needs with the city's sustainability goals;the development of tourist packages, including sustainable mobility provisions, walking-talking tours, and bike rentals, should be the backbone of the card. The next challenge for the city is to build a cooperation network to support this smart destination card implementation and promotion.

2.
Ieee Transactions on Services Computing ; 16(2):1324-1333, 2023.
Article in English | Web of Science | ID: covidwho-2327365

ABSTRACT

Electronic healthcare (e-health) systems have received renewed interest, particularly in the current COVID-19 pandemic (e.g., lockdowns and changes in hospital policies due to the pandemic). However, ensuring security of both data-at-rest and data-in-transit remains challenging to achieve, particularly since data is collected and sent from less insecure devices (e.g., patients' wearable or home devices). While there have been a number of authentication schemes, such as those based on three-factor authentication, to provide authentication and privacy protection, a number of limitations associated with these schemes remain (e.g., (in)security or computationally expensive). In this study, we present a privacy-preserving three-factor authenticated key agreement scheme that is sufficiently lightweight for resource-constrained e-health systems. The proposed scheme enables both mutual authentication and session key negotiation in addition to privacy protection, with minimal computational cost. The security of the proposed scheme is demonstrated in the Real-or-Random model. Experiments using Raspberry Pi show that the proposed scheme achieves reduced computational cost (of up to 89.9% in comparison to three other related schemes).

3.
South African Journal of Information Management ; 25(1), 2023.
Article in English | ProQuest Central | ID: covidwho-2299472

ABSTRACT

Background: Even though the government has set several admirable targets for raising the standard of healthcare, as highlighted by communities and media reports, public health institutions' services continue to fall short of patients' expectations and basic standards of care. For this reason, the general public has lost faith in the healthcare system. The public healthcare system in South Africa is completely dysfunctional and urgently needs to be transformed to serve the majority of those who use public hospitals. Objectives: The study aimed to improve healthcare for the majority of South Africans by investigating the critical success factors (CSFs) that influence the adoption of smart card technology (SCT) in South African public hospitals. Methods: A thorough review of peer-reviewed literature was conducted to determine potential barriers to adopting SCT. Furthermore, a hybrid model that combines the Health Unified Technology of Acceptance Theory (HUTAUT) model, DeLone and McLean IS success model (D&M) and the diffusion of innovation (DOI) theory will be developed, validated and tested to identify the CSFs adoption of SCT in public hospitals in South Africa. Results: The validated research model has been developed to be adopted by nurses at public hospitals. Conclusion: This research will contribute to the development of a new framework that identifies the CSFs for SCT adoption in South African public hospitals. Contribution: The study's results will make a special contribution to the body of knowledge in the fields of health informatics, particularly e-health.

4.
Environment and Planning B: Urban Analytics and City Science ; 2023.
Article in English | Scopus | ID: covidwho-2230232

ABSTRACT

The global COVID-19 crisis has severely affected mass transit in the cities of the global south. Fear of widespread propagation in public spaces and the dramatic decrease in human mobility due to lockdowns have resulted in a significant reduction of public transport options. We analyze the case of TransMilenio in Bogotá, a massive Bus Rapid Transit system that is the main mode of transport for an urban area of roughly 10 million inhabitants. Concerns over social distancing and new health regulations reduced the number of trips to under 20% of its historical values during extended periods of time during the lockdowns. This has sparked a renewed interest in developing innovative data-driven responses to COVID-19 resulting in large corpora of TransMilenio data being made available to the public. In this paper we use a database updated daily with individual passenger card swipe validation microdata including entry time, entry station, and a hash of the card's ID. The opportunity of having daily detailed minute-to-minute ridership information and the challenge of extracting useful insights from the massive amount of raw data (∼1,000,000 daily records) require the development of tailored data analysis approaches. Our objective is to use the natural representation of urban mobility offered by networks to make pairwise quantitative similarity measurements between daily commuting patterns and then use clustering techniques to reveal behavioral disruptions as well as the most affected geographical areas due to the different pandemic stages. This method proved to be efficient for the analysis of large amount of data and may be used in the future to make temporal analysis of similarly large datasets in urban contexts. © The Author(s) 2023.

5.
8th Multidisciplinary International Social Networks Conference, MISNC 2021 ; : 43-48, 2022.
Article in English | Scopus | ID: covidwho-2194065

ABSTRACT

In this research, we investigated the recent trend of the diffusion of cashless payment in Japan by using the survey data of students in our institute during 2018 and 2021. Cashless payment has achieved remarkable development with the wide usage of smartphones and the prevalence of consequent smartphone-based system. Before the bar code, either two- and single-dimensional, was introduced in the cashless system, the major technology that was used is a smart card or integrated circuit card-based system. We investigated the behavior of technology adoptions to cashless payment, which we called "Smart Payment System"in 2018[5]. Since 2018, we conducted surveys and found that the effect of COVID-19 resulted in the increase adoption to the cashless payment system among students and the increase usage of credit cards. The survey showed that the use of cashless payment system increased after 2020 in comparison to 2018 and 2019. Since the COVID-19 pandemic in spring of 2020, the usage of online shopping increased, and the usage of real stores decreased. Although we did not use big data, such as the log data of mobile phone usages, the results indicated that our observation of the use of cashless payment system among young users is consistent with the common sense. © 2021 ACM.

6.
25th IEEE International Conference on Intelligent Transportation Systems, ITSC 2022 ; 2022-October:3849-3854, 2022.
Article in English | Scopus | ID: covidwho-2136418

ABSTRACT

The outbreak of COVID-19 has made a profound impact on mobility, especially for public transport users. Extensive research has been conducted on the change of travel patterns in major cities where public transport systems have been well developed and heavily used. However, in small cities, the public transport network is relatively sparse, especially in suburban areas, which makes the corresponding travel patterns differ from those in major cities. Therefore, proper investigation of the public transport usage in such small cities is still needed, especially under the COVID-19 impact. This paper aims to reveal the change of public transport users' travel patterns based on a comparative study of public transport usage Pre-COVID and during the COVID-19 period. The Illawarra, a coastal region close to Sydney in Australia is used as a case study. Smart card data is used to reveal relevant changes in both intraregion (in the Illawarra) and inter-region (between the Illawarra and Sydney) travels in consideration of heterogeneous user groups. The results show a significant decrease (around 47%) in public transport ridership by both train and bus. However, compared to intra-region ridership, the inter-region trips by train drop much more (around 62%). Moreover, heterogeneous age group passengers show different changes after the COVID-19 outbreak. The research findings are expected to provide valuable suggestions for policy making and public transport service adjustment when a similar crisis occurs again. © 2022 IEEE.

7.
Wireless Communications & Mobile Computing (Online) ; 2022, 2022.
Article in English | ProQuest Central | ID: covidwho-2053444

ABSTRACT

A contactless system became necessary for smart mobility during the COVID-19 pandemic. There are many touchpoints in private and public areas where contact is essential, such as intelligent transportation systems for vaccine carriers, patient ambulances, elevators, metros, buses, hospitals, and banks. A secured contactless device reduces the chances of COVID-19 infection spread. Several devices use smart cards, fingerprint identification, or code-based access. Most of these devices require some form of touch. The cost of such devices varies, depending on their capability and intended use. Sensors developed by using artificial intelligence (AI) to provide secured access are an emerging area. This paper presents an AI-powered contactless face recognition system. The solution has the Internet of Things (IoT) enabled access system. To identify a person, it uses AI assistance for face recognition with the help of Python Dlib’s facial recognition network. Dlib offers a wide range of functionality across several machine learning sectors and is open-source. The Arduino Uno (ATmega328P) and STK500 protocol has been used for communication to testify and validate the performance of the proposed technique. The objective is to detect and recognize faces by the proposed contactless approach. The obtained result shows 92% accuracy, 94% sensitivity, 96% precision and FRR 6% for face detection. There is a significant improvement in FRR in our work compared to the published 27.27%. The implemented solution in this paper provides accurate and secure contactless access to conventional, readily available techniques in public health safety.

8.
Wireless Communications & Mobile Computing (Online) ; 2022, 2022.
Article in English | ProQuest Central | ID: covidwho-1962457

ABSTRACT

Face recognition (FR) is a technique for recognizing individuals through the use of face photographs. The FR technology is widely applicable in a variety of fields, including security, biometrics, authentication, law enforcement, smart cards, and surveillance. Recent advances in deep learning (DL) models, particularly convolutional neural networks (CNNs), have demonstrated promising results in the field of FR. CNN models that have been pretrained can be utilized to extract characteristics for effective FR. In this regard, this research introduces the GWOECN-FR approach, a unique grey wolf optimization with an enhanced capsule network-based deep transfer learning model for real-time face recognition. The proposed GWOECN-FR approach is primarily concerned with reliably and rapidly recognizing faces in input photos. Additionally, the GWOECN-FR approach is preprocessed in two steps, namely, data augmentation and noise reduction by bilateral filtering (BF). Additionally, for feature vector extraction, an expanded capsule network (ECN) model can be used. Additionally, grey wolf optimization (GWO) combined with a stacked autoencoder (SAE) model is used to identify and classify faces in images. The GWO algorithm is used to optimize the SAE model’s weight and bias settings. The GWOECN-FR technique’s performance is validated using a benchmark dataset, and the results are analyzed in a variety of aspects. The GWOECN-FR approach achieved a TST of 0.03 s on the FEI dataset, whereas the AlexNet-SVM, ResNet-SVM, and AlexNet models achieved TSTs of 0.125 s, 0.0051 s, and 0.0062 s, respectively. The experimental results established that the GWOECN-FR technology outperformed more contemporary approaches.

9.
IEEE Transactions on Services Computing ; 2022.
Article in English | Scopus | ID: covidwho-1699226

ABSTRACT

Electronic healthcare (e-health) systems have received renewed interest, particularly in the current COVID-19 pandemic (e.g., lockdowns and changes in hospital policies due to the pandemic). However, ensuring security of both data-at-rest and data-in-transit remains challenging to achieve, particularly since data is collected and sent from less insecure devices (e.g., patients wearable or home devices). While there have been a number of authentication schemes, such as those based on three-factor authentication, to provide authentication and privacy protection, a number of limitations associated with these schemes remain (e.g., (in)security or computationally expensive). In this study, we present a privacy-preserving three-factor authenticated key agreement scheme that is sufficiently lightweight for resource-constrained e-health systems. The proposed scheme enables both mutual authentication and session key negotiation in addition to privacy protection, with minimal computational cost. The security of the proposed scheme is demonstrated in the Real-or-Random model. Experiments using Raspberry Pi show that the proposed scheme achieves reduced computational cost (of up to 89.9\% in comparison to three other related schemes). IEEE

10.
IEEE Access ; 2021.
Article in English | Scopus | ID: covidwho-1612789

ABSTRACT

The rapid proliferation of embedded devices has led to the growth of the Internet of Things (IoT) with applications in numerous domains such as home automation, healthcare, education and agriculture. However, many of the connected devices particularly in smart homes are the target of attacks that try to exploit security vulnerabilities such as hard-coded passwords and insecure data transfer. Recent studies show that there is a considerable surge in the number of phishing attacks targeting smart homes during the COVID-19 pandemic. Moreover, many of the existing user authentication protocols in the literature incur additional computational overhead and need to be made more resilient to smart home targeted attacks. In this paper, we propose a novel lightweight and privacy-preserving remote user authentication protocol for securing smart home applications. Our approach is based on Photo Response Non-Uniformity (PRNU) to make our protocol resilient to smart home attacks such as smartphone capture attacks and phishing attacks. In addition, the lightweight nature of our solution is suitable for deployment on heterogeneous and resource constrained IoT devices. Besides, we leverage geometric secret sharing for establishing mutual authentication among the participating entities. We validate the security of the proposed protocol using the AVISPA formal verification tool and prototype it on a Raspberry Pi to analyze the power consumption. Finally, a comparison with existing schemes reveals that our scheme incurs a 20% reduction in communication overhead on smart devices. Furthermore, our proposed scheme is usable as it absolves users from memorizing passwords and carrying smart cards. Author

SELECTION OF CITATIONS
SEARCH DETAIL