138 research outputs found

    Sensing Systems for Respiration Monitoring: A Technical Systematic Review

    Get PDF
    Respiratory monitoring is essential in sleep studies, sport training, patient monitoring, or health at work, among other applications. This paper presents a comprehensive systematic review of respiration sensing systems. After several systematic searches in scientific repositories, the 198 most relevant papers in this field were analyzed in detail. Different items were examined: sensing technique and sensor, respiration parameter, sensor location and size, general system setup, communication protocol, processing station, energy autonomy and power consumption, sensor validation, processing algorithm, performance evaluation, and analysis software. As a result, several trends and the remaining research challenges of respiration sensors were identified. Long-term evaluations and usability tests should be performed. Researchers designed custom experiments to validate the sensing systems, making it difficult to compare results. Therefore, another challenge is to have a common validation framework to fairly compare sensor performance. The implementation of energy-saving strategies, the incorporation of energy harvesting techniques, the calculation of volume parameters of breathing, or the effective integration of respiration sensors into clothing are other remaining research efforts. Addressing these and other challenges outlined in the paper is a required step to obtain a feasible, robust, affordable, and unobtrusive respiration sensing system

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Model-Based Performance Prediction for Concurrent Software on Multicore Architectures

    Get PDF
    Model-based performance prediction is a well-known concept to ensure the quality of software.Current approaches are based on a single-metric model, which leads to inaccurate predictions for modern architectures. This thesis presents a multi-strategies approach to extend performance prediction models to support multicore architectures.We implemented the strategies into Palladio and significantly increased the performance prediction power

    Recent Advances in Internet of Things Solutions for Early Warning Systems: A Review

    Get PDF
    none5noNatural disasters cause enormous damage and losses every year, both economic and in terms of human lives. It is essential to develop systems to predict disasters and to generate and disseminate timely warnings. Recently, technologies such as the Internet of Things solutions have been integrated into alert systems to provide an effective method to gather environmental data and produce alerts. This work reviews the literature regarding Internet of Things solutions in the field of Early Warning for different natural disasters: floods, earthquakes, tsunamis, and landslides. The aim of the paper is to describe the adopted IoT architectures, define the constraints and the requirements of an Early Warning system, and systematically determine which are the most used solutions in the four use cases examined. This review also highlights the main gaps in literature and provides suggestions to satisfy the requirements for each use case based on the articles and solutions reviewed, particularly stressing the advantages of integrating a Fog/Edge layer in the developed IoT architectures.openEsposito M.; Palma L.; Belli A.; Sabbatini L.; Pierleoni P.Esposito, M.; Palma, L.; Belli, A.; Sabbatini, L.; Pierleoni, P

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Distributed EaaS simulation using TEEs: A case study in the implementation and practical application of an embedded computer cluster

    Get PDF
    Internet of Things (IoT) devices with limited resources struggle to generate the high-quality entropy required for high-quality randomness. This results in weak cryptographic keys. As keys are a single point of failure in modern cryptography, IoT devices performing cryptographic operations may be susceptible to a variety of attacks. To address this issue, we develop an Entropy as a Service (EaaS) simulation. The purpose of EaaS is to provide IoT devices with high-quality entropy as a service so that they can use it to generate strong keys. Additionally, we utilise Trusted Execution Environments (TEEs) in the simulation. TEE is a secure processor component that provides data protection, integrity, and confidentiality for select applications running on the processor by isolating them from other system processes (including the OS). TEE thereby enhances system security. The EaaS simulation is performed on a computer cluster known as the Magi cluster. Magi cluster is a private computer cluster that has been designed, built, configured, and tested as part of this thesis to meet the requirements of Tampere University's Network and Information Security Group (NISEC). In this thesis, we explain how the Magi cluster is implemented and how it is utilised to conduct a distributed EaaS simulation utilising TEEs.Esineiden internetin (Internet of Things, IoT) laitteilla on tyypillisesti rajallisten resurssien vuoksi haasteita tuottaa tarpeeksi korkealaatuista entropiaa vahvan satunnaisuuden luomiseen. Tämä johtaa heikkoihin salausavaimiin. Koska salausavaimet ovat modernin kryptografian heikoin lenkki, IoT-laitteilla tehtävät kryptografiset operaatiot saattavat olla haavoittuvaisia useita erilaisia hyökkäyksiä vastaan. Ratkaistaksemme tämän ongelman kehitämme simulaation, joka tarjoaa IoT-laitteille vahvaa entropiaa palveluna (Entropy as a Service, EaaS). EaaS-simulaation ideana on jakaa korkealaatuista entropiaa palveluna IoT-laitteille, jotta ne pystyvät luomaan vahvoja salausavaimia. Hyödynnämme simulaatiossa lisäksi luotettuja suoritusympäristöjä (Trusted Execution Environment, TEE). TEE on prosessorilla oleva erillinen komponentti, joka tarjoaa eristetyn ja turvallisen ajoympäristön valituille ohjelmille. TEE:tä hyödyntämällä ajonaikaiselle ohjelmalle voidaan taata datan suojaus, luottamuksellisuus sekä eheys eristämällä se muista järjestelmällä ajetuista ohjelmista (mukaan lukien käyttöjärjestelmä). Näin ollen TEE parantaa järjestelmän tietoturvallisuutta. EaaS-simulaatio toteutetaan Magi-nimisellä tietokoneklusterilla. Magi on Tampereen Yliopiston Network and Information Security Group (NISEC) -tutkimusryhmän oma yksityinen klusteri, joka on suunniteltu, rakennettu, määritelty ja testattu osana tätä diplomityötä. Tässä diplomityössä käymme läpi, kuinka Magi-klusteri on toteutettu ja kuinka sillä toteutetaan hajautettu EaaS-simulaatio hyödyntäen TEE:itä

    Multi-Robot Systems: Challenges, Trends and Applications

    Get PDF
    This book is a printed edition of the Special Issue entitled “Multi-Robot Systems: Challenges, Trends, and Applications” that was published in Applied Sciences. This Special Issue collected seventeen high-quality papers that discuss the main challenges of multi-robot systems, present the trends to address these issues, and report various relevant applications. Some of the topics addressed by these papers are robot swarms, mission planning, robot teaming, machine learning, immersive technologies, search and rescue, and social robotics

    Machine Learning in Image Analysis and Pattern Recognition

    Get PDF
    This book is to chart the progress in applying machine learning, including deep learning, to a broad range of image analysis and pattern recognition problems and applications. In this book, we have assembled original research articles making unique contributions to the theory, methodology and applications of machine learning in image analysis and pattern recognition

    Contribución al diseño de sensores vestibles y ambientales para medir la respiración y el salto vertical en adultos mayores y frágiles.

    Get PDF
    Con el avance de la tecnología, se ha popularizado entre la población el uso de dispositivos para medir su estado de salud. Para lograr esto, se suelen utilizar dispositivos vestibles como los smartwatch y smartbands, dispositivos ambientales embebidos en los alrededores, e incluso dispositivos conectados a aplicaciones móviles. El uso de estas tecnologías también se ha popularizado entre los profesionales de la salud.Esta tesis se centra en el desarrollo de dispositivos para monitorizar la salud de adultos mayores y adultos frágiles. Se desarrollaron dos líneas de trabajo: en la primera se diseñó e implementó un sistema vestible para monitorizar en tiempo real la respiración de los usuarios; en la segunda se desarrolló un sistema ambiental capaz de medir la altura del salto vertical efectuado por los usuarios sobre él.Sistema vestible para monitorizar la respiración:- Dentro de esta línea de trabajo se investigó un nuevo sensor de respiración que venía a cubrir algunas lagunas existentes en el estado de la técnica: la integración de todos los elementos electrónicos del sistema en un encapsulado compacto, la liberación del diseño para su reutilización y mejora por parte de otros investigadores y el bajo coste de los elementos que componen el sistema, entre otros. El sistema vestible consiste en un dispositivo que se coloca alrededor del pecho mediante una cinta ajustable. Este sistema funciona mediante un sensor piezoresistivo que detecta las variaciones en el diámetro del pecho ocasionadas al inhalar y exhalar; las variaciones detectadas son enviadas de forma inalámbrica mediante Bluetooth a una estación de visualización elegida por el usuario (PC, Tablet o Smartphone). El sistema se encuentra embebido en un armazón impreso en 3D. Para validar el funcionamiento de este sistema, se realizaron pruebas con 21 voluntarios que efectuaron diferentes ritmos de respiración. Para obtener los ritmos respiratorios de cada señal generada, se utilizaron dos algoritmos. Estos algoritmos calculan el ritmo respiratorio al segmentar la señal original en ventanas de tiempo desde 6 hasta 30 segundos. Los resultados obtenidos muestran que, con una ventana de tiempo de 27 segundos, se obtiene el menor error para cada algoritmo (4,02% y 3,40 %).Sistema ambiental para medir el salto vertical:- Dentro de esta segunda línea de trabajo se investigó en un novedoso sistema ambiental para medir la altura del salto, lo que supuso una innovación respecto a los sensores utilizados actualmente para este fin. El sistema ambiental consiste en una plataforma que detecta objetos sobre ella mediante la presión, y mide el tiempo transcurrido desde que un objeto se retira y se coloca de nuevo. El sistema detecta los objetos mediante una matriz de sensores piezoresitivos (Force Sensitive Resistors - FSR realizados con velostat). Las dimensiones de la plataforma son 30 cm x 30 cm, área sobre la cual se distribuyen un total de 256 sensores FSR. El salto vertical se calcula mediante la fórmula de tiempo de vuelo, y el resultado es enviado mediante Bluetooth a un PC o Smartphone. Se realizaron dos experimentos: en el primero participaron un total de 38 voluntarios, con el objetivo de validar el funcionamiento del sistema con una cámara de alta velocidad como referencia (120 fps); en el segundo experimento se capturaron los datos en crudo de 15 voluntarios, con estos datos se emularon 10 frecuencias de muestreo (desde 20 Hz hasta 200 Hz) y se analizaron los efectos de utilizar frecuencias más bajas. Del primer experimento se obtuvo un error relativo medio de 1.98% con un coeficiente de determinación r2= 0,996. Del segundo experimento se determinó que las frecuencias de muestreo de 200 Hz y 100 Hz muestran un desempeño similar al mantener un error relativo por debajo del 5% en el 95% de las mediciones.Finalmente, este trabajo de tesis concluye indicando las principales aportaciones realizadas para cada una de las dos líneas de trabajo, así como el trabajo futuro que podría desarrollarse en cada una de ellas.<br /

    Comunicações veiculares híbridas

    Get PDF
    Vehicle Communications is a promising research field, with a great potential for the development of new applications capable of improving road safety, traffic efficiency, as well as passenger comfort and infotainment. Vehicle communication technologies can be short-range, such as ETSI ITS-G5 or the 5G PC5 sidelink channel, or long-range, using the cellular network (LTE or 5G). However, none of the technologies alone can support the expected variety of applications for a large number of vehicles, nor all the temporal and spatial requirements of connected and autonomous vehicles. Thus, it is proposed the collaborative or hybrid use of short-range communications, with lower latency, and of long-range technologies, potentially with higher latency, but integrating aggregated data of wider geographic scope. In this context, this work presents a hybrid vehicle communications model, capable of providing connectivity through two Radio Access Technologies (RAT), namely, ETSI ITS-G5 and LTE, to increase the probability of message delivery and, consequently, achieving a more robust, efficient and secure vehicle communication system. The implementation of short-range communication channels is done using Raw Packet Sockets, while the cellular connection is established using the Advanced Messaging Queuing Protocol (AMQP) protocol. The main contribution of this dissertation focuses on the design, implementation and evaluation of a Hybrid Routing Sublayer, capable of isolating messages that are formed/decoded from transmission/reception processes. This layer is, therefore, capable of managing traffic coming/destined to the application layer of intelligent transport systems (ITS), adapting and passing ITS messages between the highest layers of the protocol stack and the available radio access technologies. The Hybrid Routing Sublayer also reduces the financial costs due to the use of cellular communications and increases the efficiency of the use of the available electromagnetic spectrum, by introducing a cellular link controller using a Beacon Detector, which takes informed decisions related to the need to connect to a cellular network, according to different scenarios. The experimental results prove that hybrid vehicular communications meet the requirements of cooperative intelligent transport systems, by taking advantage of the benefits of both communication technologies. When evaluated independently, the ITS-G5 technology has obvious advantages in terms of latency over the LTE technology, while the LTE technology performs better than ITS-G5, in terms of throughput and reliability.As Comunicações Veiculares são um campo de pesquisa promissor, com um grande potencial de desenvolvimento de novas aplicações capazes de melhorar a segurança nas estradas, a eficiência do tráfego, bem com o conforto e entretenimento dos passageiros. As tecnologias de comunicação veícular podem ser de curto alcance, como por exemplo ETSI ITS-G5 ou o canal PC5 do 5G, ou de longo alcance, recorrendo à rede celular (LTE ou 5G). No entanto, nenhuma das tecnologias por si só, consegue suportar a variedade expectável de aplicações para um número de veículos elevado nem tampouco todos os requisitos temporais e espaciais dos veículos conectados e autónomos. Assim, é proposto o uso colaborativo ou híbrido de comunicações de curto alcance, com latências menores, e de tecnologias de longo alcance, potencialmente com maiores latências, mas integrando dados agregados de maior abrangência geográfica. Neste contexto, este trabalho apresenta um modelo de comunicações veiculares híbrido, capaz de fornecer conectividade por meio de duas Tecnologias de Acesso por Rádio (RAT), a saber, ETSI ITS-G5 e LTE, para aumentar a probabilidade de entrega de mensagens e, consequentemente, alcançar um sistema de comunicação veicular mais robusto, eficiente e seguro. A implementação de canais de comunicação de curto alcance é feita usando Raw Packet Sockets, enquanto que a ligação celular é estabelecida usando o protocolo Advanced Messaging Queuing Protocol (AMQP). A contribuição principal desta dissertação foca-se no projeto, implementação e avaliação de uma sub camada hibrída de encaminhamento, capaz de isolar mensagens que se formam/descodificam a partir de processos de transmissão/receção. Esta camadada é, portanto, capaz de gerir o tráfego proveniente/destinado à camada de aplicação de sistemas inteligentes de transportes (ITS) adaptando e passando mensagens ITS entre as camadas mais altas da pilha protocolar e as tecnologias de acesso rádio disponíveis. A sub camada hibrída de encaminhamento também potencia uma redução dos custos financeiros devidos ao uso de comunicações celulares e aumenta a eficiência do uso do espectro electromagnético disponível, ao introduzir um múdulo controlador da ligação celular, utilizando um Beacon Detector, que toma decisões informadas relacionadas com a necessidade de uma conexão a uma rede celular, de acordo com diferentes cenários. Os resultados experimentais comprovam que as comunicações veículares híbridas cumprem os requisitos dos sistemas cooperativos de transporte inteligentes, ao tirarem partido das vantagens de ambas tecnologias de comunicação. Quando avaliadas de forma independente, constata-se que que a tecnologia ITS-G5 tem vantagens evidentes em termos de latência sobre a tecnologia LTE, enquanto que a tecnologia LTE tem melhor desempenho que a LTE, ai nível de débito e fiabilidade.Mestrado em Engenharia Eletrónica e Telecomunicaçõe
    corecore