2,553 research outputs found
Prediction of stroke patients’ bedroom-stay duration: machine-learning approach using wearable sensor data
Background: The importance of being physically active and avoiding staying in bed has been recognized in stroke rehabilitation. However, studies have pointed out that stroke patients admitted to rehabilitation units often spend most of their day immobile and inactive, with limited opportunities for activity outside their bedrooms. To address this issue, it is necessary to record the duration of stroke patients staying in their bedrooms, but it is impractical for medical providers to do this manually during their daily work of providing care. Although an automated approach using wearable devices and access points is more practical, implementing these access points into medical facilities is costly. However, when combined with machine learning, predicting the duration of stroke patients staying in their bedrooms is possible with reduced cost. We assessed using machine learning to estimate bedroom-stay duration using activity data recorded with wearable devices.Method: We recruited 99 stroke hemiparesis inpatients and conducted 343 measurements. Data on electrocardiograms and chest acceleration were measured using a wearable device, and the location name of the access point that detected the signal of the device was recorded. We first investigated the correlation between bedroom-stay duration measured from the access point as the objective variable and activity data measured with a wearable device and demographic information as explanatory variables. To evaluate the duration predictability, we then compared machine-learning models commonly used in medical studies.Results: We conducted 228 measurements that surpassed a 90% data-acquisition rate using Bluetooth Low Energy. Among the explanatory variables, the period spent reclining and sitting/standing were correlated with bedroom-stay duration (Spearman’s rank correlation coefficient (R) of 0.56 and −0.52, p < 0.001). Interestingly, the sum of the motor and cognitive categories of the functional independence measure, clinical indicators of the abilities of stroke patients, lacked correlation. The correlation between the actual bedroom-stay duration and predicted one using machine-learning models resulted in an R of 0.72 and p < 0.001, suggesting the possibility of predicting bedroom-stay duration from activity data and demographics.Conclusion: Wearable devices, coupled with machine learning, can predict the duration of patients staying in their bedrooms. Once trained, the machine-learning model can predict without continuously tracking the actual location, enabling more cost-effective and privacy-centric future measurements
Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)
Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis.
1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks.
2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s.
3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications.
4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats.
5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification.
6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations.
The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total
Development and Impact of a Mobile Application that Allows Users to Track Their Location on an Educational Institution Campus
This research study aims to solve user location issues within the campus at an educational institution. As this campus comprises a large number of places and departments, users often get confused about how to reach a specific location. To address this problem, the “Ubícate” (“locate by yourself” in Spanish) application was developed following the CDIO methodology, which encompasses four creative process steps: conceive, design, implement, and operate. The “Ubícate” app provides users with information on places of interest such as schools, departments, halls, auditoriums, and sports venues, offering a visual reference of available locations through 360-degree images. The application also uses Google Maps to track user location within the campus, thus marking a reference route between university gates and the different locations available, in addition to providing information on university-sponsored events. In this paper, Section 2 describes the methodology and each of the stages that were addressed in the following sections. Section 3 presents the development itself and the data used for the purposes thereof. Next, Section 4 reveals the results from this study. Later, Section 5 assesses these results and the findings from the study. In Section 6, our conclusions are discussed. Finally, Section 7 lists topics for future research. The application did indeed contribute to improving the attendance of the academic community at events. Where the application was used, the first-hand perception of visitors and their own was very positive and enhanced the institutional image and sense of belonging. The contribution of this study consists of presenting a mobile application as a solution from three approaches: the technical aspects for application development, the business vision to satisfy the user’s needs, and the end user’s perception. All three approaches provide a technical reader, an entrepreneur, or an end user an overview of a scalable solution to different types of implementations in different types of businesses that require indoor location through the use of technologies in mobile applications. The mobile application performs the location indoors using the Google Maps platform, allowing a more agile development in implementing the APP
Elemental analysis of particulate matter by X-ray fluorescence methods: A green approach to air quality monitoring
This review explores X-ray fluorescence (XRF) spectrometry for elemental analysis of particulate matter (PM) for
air quality monitoring. The introduction presents PM classification based on size and composition, covering
various elemental analysis methods while highlighting the increasing interest in XRF due to its non-destructive,
rapid, and green features. The fundamental concepts of XRF and the experimental configurations commonly used
are discussed, focusing on Energy Dispersive X-Ray Fluorescence (EDXRF) and Total Reflection X-Ray Fluorescence
(TXRF). PM sampling devices and substrate are described, with a specific emphasis on filtering membranes
for EDXRF and reflecting substrates for TXRF. Sample preparation strategies and procedures are presented.
Qualitative and quantitative analysis is described, with a particular focus on the calibration approaches implemented for PM. Finally, the challenges faced by XRF in becoming a recognized reliable analytical technique for PM analysis, comparable to other standardized techniques for PM filters analysis, while capitalizing on its green advantages
Intelligent ultrasound hand gesture recognition system
With the booming development of technology, hand gesture recognition has become a hotspot in Human-Computer Interaction (HCI) systems. Ultrasound hand gesture recognition is an innovative method that has attracted ample interest due to its strong real-time performance, low cost, large field of view, and illumination independence. Well-investigated HCI applications include external digital pens, game controllers on smart mobile devices, and web browser control on laptops. This thesis probes gesture recognition systems on multiple platforms to study the behavior of system performance with various gesture features. Focused on this topic, the contributions of this thesis can be summarized from the perspectives of smartphone acoustic field and hand model simulation, real-time gesture recognition on smart devices with speed categorization algorithm, fast reaction gesture recognition based on temporal neural networks, and angle of arrival-based gesture recognition system.
Firstly, a novel pressure-acoustic simulation model is developed to examine its potential for use in acoustic gesture recognition. The simulation model is creating a new system for acoustic verification, which uses simulations mimicking real-world sound elements to replicate a sound pressure environment as authentically as possible. This system is fine-tuned through sensitivity tests within the simulation and validate with real-world measurements. Following this, the study constructs novel simulations for acoustic applications, informed by the verified acoustic field distribution, to assess their effectiveness in specific devices. Furthermore, a simulation focused on understanding the effects of the placement of sound devices and hand-reflected sound waves is properly designed. Moreover, a feasibility test on phase control modification is conducted, revealing the practical applications and boundaries of this model.
Mobility and system accuracy are two significant factors that determine gesture recognition performance. As smartphones have high-quality acoustic devices for developing gesture recognition, to achieve a portable gesture recognition system with high accuracy, novel algorithms were developed to distinguish gestures using smartphone built-in speakers and microphones. The proposed system adopts Short-Time-Fourier-Transform (STFT) and machine learning to capture hand movement and determine gestures by the pretrained neural network. To differentiate gesture speeds, a specific neural network was designed and set as part of the classification algorithm. The final accuracy rate achieves 96% among nine gestures and three speed levels. The proposed algorithms were evaluated comparatively through algorithm comparison, and the accuracy outperformed state-of-the-art systems.
Furthermore, a fast reaction gesture recognition based on temporal neural networks was designed. Traditional ultrasound gesture recognition adopts convolutional neural networks that have flaws in terms of response time and discontinuous operation. Besides, overlap intervals in network processing cause cross-frame failures that greatly reduce system performance. To mitigate these problems, a novel fast reaction gesture recognition system that slices signals in short time intervals was designed. The proposed system adopted a novel convolutional recurrent neural network (CRNN) that calculates gesture features in a short time and combines features over time. The results showed the reaction time significantly reduced from 1s to 0.2s, and accuracy improved to 100% for six gestures.
Lastly, an acoustic sensor array was built to investigate the angle information of performed gestures. The direction of a gesture is a significant feature for gesture classification, which enables the same gesture in different directions to represent different actions. Previous studies mainly focused on types of gestures and analyzing approaches (e.g., Doppler Effect and channel impulse response, etc.), while the direction of gestures was not extensively studied. An acoustic gesture recognition system based on both speed information and gesture direction was developed. The system achieved 94.9% accuracy among ten different gestures from two directions. The proposed system was evaluated comparatively through numerical neural network structures, and the results confirmed that incorporating additional angle information improved the system's performance.
In summary, the work presented in this thesis validates the feasibility of recognizing hand gestures using remote ultrasonic sensing across multiple platforms. The acoustic simulation explores the smartphone acoustic field distribution and response results in the context of hand gesture recognition applications. The smartphone gesture recognition system demonstrates the accuracy of recognition through ultrasound signals and conducts an analysis of classification speed. The fast reaction system proposes a more optimized solution to address the cross-frame issue using temporal neural networks, reducing the response latency to 0.2s. The speed and angle-based system provides an additional feature for gesture recognition. The established work will accelerate the development of intelligent hand gesture recognition, enrich the available gesture features, and contribute to further research in various gestures and application scenarios
Privacy-Preserving by Design: Indoor Positioning System Using Wi-Fi Passive TDOA
Indoor localization systems have become increasingly important in a wide
range of applications, including industry, security, logistics, and emergency
services. However, the growing demand for accurate localization has heightened
concerns over privacy, as many localization systems rely on active signals that
can be misused by an adversary to track users' movements or manipulate their
measurements. This paper presents PassiFi, a novel passive Wi-Fi time-based
indoor localization system that effectively balances accuracy and privacy.
PassiFi uses a passive WiFi Time Difference of Arrival (TDoA) approach that
ensures users' privacy and safeguards the integrity of their measurement data
while still achieving high accuracy. The system adopts a fingerprinting
approach to address multi-path and non-line-of-sight problems and utilizes deep
neural networks to learn the complex relationship between TDoA and location.
Evaluation in a real-world testbed demonstrates PassiFi's exceptional
performance, surpassing traditional multilateration by 128%, achieving
sub-meter accuracy on par with state-of-the-art active measurement systems, all
while preserving privacy
Archaeological palaeoenvironmental archives: challenges and potential
This Arts and Humanities Research Council (AHRC) sponsored collaborative doctoral project represents one of
the most significant efforts to collate quantitative and qualitative data that can elucidate practices related to
archaeological palaeoenvironmental archiving in England. The research has revealed that archived
palaeoenvironmental remains are valuable resources for archaeological research and can clarify subjects that
include the adoption and importation of exotic species, plant and insect invasion, human health and diet, and
plant and animal husbandry practices. In addition to scientific research, archived palaeoenvironmental remains
can provide evidence-based narratives of human resilience and climate change and offer evidence of the
scientific process, making them ideal resources for public science engagement. These areas of potential have
been realised at an imperative time; given that waterlogged palaeoenvironmental remains at significant sites
such as Star Carr, Must Farm, and Flag Fen, archaeological deposits in towns and cities are at risk of decay due
to climate change-related factors, and unsustainable agricultural practices. Innovative approaches to collecting
and archiving palaeoenvironmental remains and maintaining existing archives will permit the creation of an
accessible and thorough national resource that can service archaeologists and researchers in the related fields
of biology and natural history. Furthermore, a concerted effort to recognise absences in archaeological
archives, matched by an effort to supply these deficiencies, can produce a resource that can contribute to an
enduring geographical and temporal record of England's biodiversity, which can be used in perpetuity in the
face of diminishing archaeological and contemporary natural resources.
To realise these opportunities, particular challenges must be overcome. The most prominent of these include
inconsistent collection policies resulting from pressures associated with shortages in storage capacity and
declining specialist knowledge in museums and repositories combined with variable curation practices. Many of
these challenges can be resolved by developing a dedicated storage facility that can focus on the ongoing
conservation and curation of palaeoenvironmental remains. Combined with an OASIS + module designed to
handle and disseminate data pertaining to palaeoenvironmental archives, remains would be findable,
accessible, and interoperable with biological archives and collections worldwide. Providing a national centre for
curating palaeoenvironmental remains and a dedicated digital repository will require significant funding.
Funding sources could be identified through collaboration with other disciplines. If sufficient funding cannot be
identified, options that would require less financial investment, such as high-level archive audits and the
production of guidance documents, will be able to assist all stakeholders with the improved curation,
management, and promotion of the archived resource
A Comprehensive Review of the GNSS with IoT Applications and Their Use Cases with Special Emphasis on Machine Learning and Deep Learning Models
This paper presents a comprehensive review of the Global Navigation Satellite System (GNSS) with Internet of Things (IoT) applications and their use cases with special emphasis on Machine learning (ML) and Deep Learning (DL) models. Various factors like the availability of a huge amount of GNSS data due to the increasing number of interconnected devices having low-cost data storage and low-power processing technologies - which is majorly due to the evolution of IoT - have accelerated the use of machine learning and deep learning based algorithms in the GNSS community. IoT and GNSS technology can track almost any item possible. Smart cities are being developed with the use of GNSS and IoT. This survey paper primarily reviews several machine learning and deep learning algorithms and solutions applied to various GNSS use cases that are especially helpful in providing accurate and seamless navigation solutions in urban areas. Multipath, signal outages with less satellite visibility, and lost communication links are major challenges that hinder the navigation process in crowded areas like cities and dense forests. The advantages and disadvantages of using machine learning techniques are also highlighted along with their potential applications with GNSS and IoT
2023-2024 Graduate School Catalog
You and your peers represent more than 67 countries and your shared scholarship spans 140 programs - from business administration and biomedical engineering to history, horticulture, musical performance, marine science, and more. Your ideas and interests will inform public health, create opportunities for art and innovation, contribute to the greater good, and positively impact economic development in Maine and beyond
Beam scanning by liquid-crystal biasing in a modified SIW structure
A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium
- …