{"title":"Using data science & big data analytics to make healthcare green","authors":"Nina Godbole, J. Lamb","doi":"10.1109/CEWIT.2015.7338161","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338161","url":null,"abstract":"The environmental impact of the healthcare sector has become an important factor globally and is continuing to draw the attention of regulators. The energy use of the healthcare sector (whose largest sub-segment is 'hospitals') has been growing due to many factors. These factors include the rapid growth and adoption of Information and Communication Technology (ICT) in healthcare. The new IT technologies and applications used in healthcare include 'cloud computing', `mMedicine', i.e. `mobility in Health', eHealth, and tele(health) care for `remote delivery of healthcare services'. The healthcare industry needs to reap the benefits of emerging technologies such as Data Science, Big Data, Analytics, Mobile computing and Cloud computing, along with the use of Health Information Technology (HIT) to help solve the ever growing operating cost problems. A big challenge facing the healthcare sector is how best to improve the energy efficiency and sustainability of this very complex sector. The work done over the past few years to analyze and create very energy efficient data centers presents an excellent opportunity for cost effective green IT at hospitals. Because of the complexity of the healthcare industry, there is a need for an extensive use of data science and Big Data analytics as an ideal way to help determine how the green healthcare outcomes can be improved. Hospitals and healthcare can make significant steps in the green direction by combining big data analytics with cloud computing. Information Technology (IT) is continually being refreshed at hospitals and most organizations as part of the need for the hospitals to keep vital technology up to date. Any electronic waste (eWaste) from this refresh cycle must be recycled as part of a sustainability program. Replacing the IT equipment and upgrading the application architecture with energy efficient systems such as virtual servers, virtual data storage, and efficient application and database structures, can easily reduce IT power consumption for the replaced equipment by 50 percent. A second compelling reason to move to green IT is that virtual server and virtual data storage technology are methods that allow hospitals to reduce equipment and system management costs. Include private cloud computing for both your production and test / development systems, and the savings are even greater. So the latest green technology is based around a very solid business case without even considering the savings due to reduction in energy costs. This paper gives examples of how Data Science, Big Data, and Analytics can be used in healthcare to significantly improve a hospital's IT Energy Efficiency along with information on the best ways to improve energy efficiency for healthcare in a cost effective manner. This paper builds on the work done in other sectors (mainly data centers) in effectively measuring and improving IT energy efficiency.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring online data privacy and controlling anonymity","authors":"C. Axelrod","doi":"10.1109/CEWIT.2015.7338156","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338156","url":null,"abstract":"In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including legislation, which are needed to ensure that everyone's data privacy requirements might be met. We examine who benefits from anonymity and privacy and who do not, and how to take advantage of the benefits of privacy without providing undue opportunities for criminality.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sungtaek Oh, Taekyun Doo, Tae-Hyoung Ko, Jin Kwak, M. Hong
{"title":"Countermeasure of NFC relay attack with jamming","authors":"Sungtaek Oh, Taekyun Doo, Tae-Hyoung Ko, Jin Kwak, M. Hong","doi":"10.1109/CEWIT.2015.7338165","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338165","url":null,"abstract":"Recently released smartphones is equipped with support for Near Field Communication. Near Field Communication (NFC) is a short-range contactless technology allowing smart phones to act primarily as either a reader or a token. NFC on mobile phones presents new opportunities and threats. NFC provides convenient and easier payment service. However, it is vulnerable to relay attacks. Some countermeasure are known, but there are drawbacks. In this paper we introduce NFC technology, relay attack, well-known countermeasure and relay attack case. We proposed countermeasure to prevent NFC relay attack.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128510888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time large-scale big data networks analytics and visualization architecture","authors":"P. Chopade, J. Zhan, Kaushik Roy, K. Flurchick","doi":"10.1109/CEWIT.2015.7338157","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338157","url":null,"abstract":"Big data analytics and visualization emerged as socio-technical needs in this current century as well as will be main dominant workforces in next generation technologies. Today's social and technological operations are centered around massive data transfer. These activities are more predominant for dynamic real-time data handling and operations. Better visualization techniques will help for clear and effective understanding in any real-time dynamic systems. Existing data analytics and visualization environment lacks functional features while operating over wide range real-time dynamic systems. Considering the drawbacks of existing data visualization systems in this paper we put forward 'Large-Scale System Data Visualization' architecture i.e. X-SimViz. This XSimViz framework will allow users for interactive real-time i.e. dynamic data analytics and visualization.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding transformation in cyber-human systems","authors":"S. White","doi":"10.1109/CEWIT.2015.7338172","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338172","url":null,"abstract":"Cyber-human systems support the increasingly complex and coupled relationships between humans and machines. This paper demonstrates that within a state based behavioral view that supports state refinement, the addition of event refinement is a natural way to define complex behavior in these systems. The paper provides a meta-model of terms and relationships which the systems analyst can use to create a behavior model that supports both state and event refinement. The use of extended state tables with this behavior model helps in the discovery of undesirable non-determinism. Allen's Theory of Temporal Intervals is used with the proposed behavioral model to discover temporal relationships and analyze for unwanted situations.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elemental technologies for realizing a fully-controlled artificial light-type plant factory","authors":"M. Sugano","doi":"10.1109/CEWIT.2015.7338169","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338169","url":null,"abstract":"Plant factories are cultivation facilities that enable year-round production of vegetables and other produce by allowing precise control and monitoring of cultivation conditions and plant growth. At Osaka Prefecture University, the Research and Development Center for the Plant Factory has been established as a cutting-edge R&D base specializing in the development of a plant growth facility operated entirely under artificial light. This plant factory is the largest-scale facility of its kind among universities in Japan and can produce 5000 heads of lettuce each day. In this paper, we describe some key technologies for efficient cultivation and energy conservation that have been established in this plant factory.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132572779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Strey, L. Mujica-Parodi, Anar Amgalan, S. Maslov
{"title":"Measuring social networks using proximity sensors","authors":"H. Strey, L. Mujica-Parodi, Anar Amgalan, S. Maslov","doi":"10.1109/CEWIT.2015.7338168","DOIUrl":"https://doi.org/10.1109/CEWIT.2015.7338168","url":null,"abstract":"A significant body of research demonstrates strong connections between social connectedness, stress, and health. However, to date it is unclear whether the beneficial aspects of social connectedness are due to quantity, quality, stability, or role within the network. Here we describe a Bluetooth LE proximity sensor based on the Intel Edison that allows us to track interpersonal distances as function of time while triangulating absolute position. This enables us not only to identify the duration and frequency of social contacts, but also to determine who approaches whom-a feature that is necessary in order to establish social hierarchy structures within the group.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}