Als relatief nieuw begrip in de context van e-learning krijgt ‘mobile learning’ steeds meer aandacht, wat ten dele kan worden verklaard door de ontwikkeling en verspreiding van mobiele technologie. Als we de pleitbezorgers van ‘mobile learning’ moeten geloven, dan wordt deze vorm van leren belangrijker en is het denkbaar dat sommige leerprocessen in de toekomst volledig op die wijze vormgegeven zullen worden. Probleem is dat een eenduidige definitie van ‘mobile learning’ nog altijd ontbreekt, dat er meningsverschillen zijn over de technologie die tot het domein van ‘mobile learning’ behoort, en dat er betrekkelijk weinig resultaten zijn van succesvolle inzet van mobiele technologie in leerprocessen. Daarbij wordt onder succesvol verstaan dat het heeft bijgedragen aan de effectiviteit van het leren, en daarmee aan een beter leerresultaat en een efficiënter leerproces, waarbij onder het laatste verstaan wordt dat het maximale leereffect wordt bereikt met een beperkte inzet van mensen en middelen. Deze notitie beoogt enige duidelijkheid te scheppen in de definitiekwestie en in de visies op leren die een rol spelen bij ‘mobile learning’. Vanuit dat perspectief wordt vervolgens ingegaan op kenmerken van mobiele technologie en ontwikkelingen die daarin verwacht worden. Aansluitend wordt er dieper ingegaan op leerprocessen en de rol die mobiele technologie daarin zou kunnen vervullen, waarna de notitie wordt afgesloten met een kijkkader om de mogelijke inzet en betekenis van ‘mobile learning’ in onderwijssituaties te kunnen duiden en beoordelen.
Background: Being able to care for and cope with one’s stoma adequately may significantly impact patient’s wellbeing. A well-designed mobile application (app) may improve and solve some of the difficulties patients encounter. This study aims to gain a better understanding of the problems patients face in ostomy care and to determine how to improve these problems by an app. Method: A qualitative study using six focus group interviews was conducted between March and April 2020. Patients with a stoma, representatives of patient associations and stoma-related healthcare providers participated to provide insights. A thematic content analysis method was used to analyse the transcripts. Results: Participants indicated that perioperative information could be improved, information should be applicable for all patients and the amount of stoma materials to be overwhelming. Moreover, the contact with fellow peers could be utilised more and it was unclear which healthcare provider should be contacted. All participants expected an app would be beneficial. The app should provide reliable and up-to-date information which is presented in a visually attractive manner, and facilitate peer contact in which patients can support each other. Conclusion: Adequate self-care and coping is essential for patients’ quality of life. A personalised, mobile app may be promising to overcome some of the problems related to adequate self-provision of stoma care at home, improving self-efficacy and overall well-being.
In mobile robotics, LASER scanners have a wide spectrum of indoor and outdoor applications, both in structured and unstructured environments, due to their accuracy and precision. Most works that use this sensor have their own data representation and their own case-specific modeling strategies, and no common formalism is adopted. To address this issue, this manuscript presents an analytical approach for the identification and localization of objects using 2D LiDARs. Our main contribution lies in formally defining LASER sensor measurements and their representation, the identification of objects, their main properties, and their location in a scene. We validate our proposal with experiments in generic semi-structured environments common in autonomous navigation, and we demonstrate its feasibility in multiple object detection and identification, strictly following its analytical representation. Finally, our proposal further encourages and facilitates the design, modeling, and implementation of other applications that use LASER scanners as a distance sensor.
Drones have been verified as the camera of 2024 due to the enormous exponential growth in terms of the relevant technologies and applications such as smart agriculture, transportation, inspection, logistics, surveillance and interaction. Therefore, the commercial solutions to deploy drones in different working places have become a crucial demand for companies. Warehouses are one of the most promising industrial domains to utilize drones to automate different operations such as inventory scanning, goods transportation to the delivery lines, area monitoring on demand and so on. On the other hands, deploying drones (or even mobile robots) in such challenging environment needs to enable accurate state estimation in terms of position and orientation to allow autonomous navigation. This is because GPS signals are not available in warehouses due to the obstruction by the closed-sky areas and the signal deflection by structures. Vision-based positioning systems are the most promising techniques to achieve reliable position estimation in indoor environments. This is because of using low-cost sensors (cameras), the utilization of dense environmental features and the possibilities to operate in indoor/outdoor areas. Therefore, this proposal aims to address a crucial question for industrial applications with our industrial partners to explore limitations and develop solutions towards robust state estimation of drones in challenging environments such as warehouses and greenhouses. The results of this project will be used as the baseline to develop other navigation technologies towards full autonomous deployment of drones such as mapping, localization, docking and maneuvering to safely deploy drones in GPS-denied areas.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.