18,611 research outputs found
Energy and Accuracy Trade-Offs in Accelerometry-Based Activity Recognition
Driven by real-world applications such as fitness, wellbeing and healthcare, accelerometry-based activity recognition has been widely studied to provide context-awareness to future pervasive technologies. Accurate recognition and energy efficiency are key issues in enabling long-term and unobtrusive monitoring. While the majority of accelerometry-based activity recognition systems stream data to a central point for processing, some solutions process data locally on the sensor node to save energy. In this paper, we investigate the trade-offs between classification accuracy and energy efficiency by comparing on- and off-node schemes. An empirical energy model is presented and used to evaluate the energy efficiency of both systems, and a practical case study (monitoring the physical activities of office workers) is developed to evaluate the effect on classification accuracy. The results show a 40% energy saving can be obtained with a 13% reduction in classification accuracy, but this performance depends heavily on the wearerâs activity
Physiology-Aware Rural Ambulance Routing
In emergency patient transport from rural medical facility to center tertiary
hospital, real-time monitoring of the patient in the ambulance by a physician
expert at the tertiary center is crucial. While telemetry healthcare services
using mobile networks may enable remote real-time monitoring of transported
patients, physiologic measures and tracking are at least as important and
requires the existence of high-fidelity communication coverage. However, the
wireless networks along the roads especially in rural areas can range from 4G
to low-speed 2G, some parts with communication breakage. From a patient care
perspective, transport during critical illness can make route selection patient
state dependent. Prompt decisions with the relative advantage of a longer more
secure bandwidth route versus a shorter, more rapid transport route but with
less secure bandwidth must be made. The trade-off between route selection and
the quality of wireless communication is an important optimization problem
which unfortunately has remained unaddressed by prior work.
In this paper, we propose a novel physiology-aware route scheduling approach
for emergency ambulance transport of rural patients with acute, high risk
diseases in need of continuous remote monitoring. We mathematically model the
problem into an NP-hard graph theory problem, and approximate a solution based
on a trade-off between communication coverage and shortest path. We profile
communication along two major routes in a large rural hospital settings in
Illinois, and use the traces to manifest the concept. Further, we design our
algorithms and run preliminary experiments for scalability analysis. We believe
that our scheduling techniques can become a compelling aid that enables an
always-connected remote monitoring system in emergency patient transfer
scenarios aimed to prevent morbidity and mortality with early diagnosis
treatment.Comment: 6 pages, The Fifth IEEE International Conference on Healthcare
Informatics (ICHI 2017), Park City, Utah, 201
3E: Energy-Efficient Elastic Scheduling for Independent Tasks in Heterogeneous Computing Systems
Reducing energy consumption is a major design constraint for modern heterogeneous computing systems to minimize electricity cost, improve system reliability and protect environment. Conventional energy-efficient scheduling strategies developed on these systems do not sufficiently exploit the system elasticity and adaptability for maximum energy savings, and do not simultaneously take account of user expected finish time. In this paper, we develop a novel scheduling strategy named energy-efficient elastic (3E) scheduling for aperiodic, independent and non-real-time tasks with user expected finish times on DVFS-enabled heterogeneous computing systems. The 3E strategy adjusts processorsâ supply voltages and frequencies according to the system workload, and makes trade-offs between energy consumption and user expected finish times. Compared with other energy-efficient strategies, 3E significantly improves the scheduling quality and effectively enhances the system elasticity
Evaluator services for optimised service placement in distributed heterogeneous cloud infrastructures
Optimal placement of demanding real-time interactive applications in a distributed heterogeneous cloud very quickly results in a complex tradeoff between the application constraints and resource capabilities. This requires very detailed information of the various requirements and capabilities of the applications and available resources. In this paper, we present a mathematical model for the service optimization problem and study the concept of evaluator services as a flexible and efficient solution for this complex problem. An evaluator service is a service probe that is deployed in particular runtime environments to assess the feasibility and cost-effectiveness of deploying a specific application in such environment. We discuss how this concept can be incorporated in a general framework such as the FUSION architecture and discuss the key benefits and tradeoffs for doing evaluator-based optimal service placement in widely distributed heterogeneous cloud environments
Survey on wireless technology trade-offs for the industrial internet of things
Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment
On environments as systemic exoskeletons: Crosscutting optimizers and antifragility enablers
Classic approaches to General Systems Theory often adopt an individual
perspective and a limited number of systemic classes. As a result, those
classes include a wide number and variety of systems that result equivalent to
each other. This paper introduces a different approach: First, systems
belonging to a same class are further differentiated according to five major
general characteristics. This introduces a "horizontal dimension" to system
classification. A second component of our approach considers systems as nested
compositional hierarchies of other sub-systems. The resulting "vertical
dimension" further specializes the systemic classes and makes it easier to
assess similarities and differences regarding properties such as resilience,
performance, and quality-of-experience. Our approach is exemplified by
considering a telemonitoring system designed in the framework of Flemish
project "Little Sister". We show how our approach makes it possible to design
intelligent environments able to closely follow a system's horizontal and
vertical organization and to artificially augment its features by serving as
crosscutting optimizers and as enablers of antifragile behaviors.Comment: Accepted for publication in the Journal of Reliable Intelligent
Environments. Extends conference papers [10,12,15]. The final publication is
available at Springer via http://dx.doi.org/10.1007/s40860-015-0006-
Functionality-power-packaging considerations in context aware wearable systems
Wearable computing places tighter constraints on architecture design than traditional mobile computing. The architecture is described in terms of miniaturization, power-awareness, global low-power design and suitability for an application. In this article we present a new methodology based on three different system properties. Functionality, power and electronic Packaging metrics are proposed and evaluated to study different trade offs. We analyze the trade offs in different context recognition scenarios. The proof of concept case study is analyzed by studying (a) interaction with household appliances by a wrist worn device (acceleration, light sensors) (b) studying walking behavior with acceleration sensors, (c) computational task and (d) gesture recognition in a wood-workshop using the combination of accelerometer and microphone sensors. After analyzing the case study, we highlight the size aspect by electronic packaging for a given functionality and present the miniaturization trends for âautonomous sensor button
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challengesâsome inherited from wireless sensor networks (WSNs), some unique to themselvesâthat require a new key management scheme to be tailor-made. The challenge is taken on, and the result is KALwEN, a new parameterized key management scheme that combines the best-suited cryptographic techniques in a seamless framework. KALwEN is user-friendly in the sense that it requires no expert knowledge of a user, and instead only requires a user to follow a simple set of instructions when bootstrapping or extending a network. One of KALwEN's key features is that it allows sensor devices from different manufacturers, which expectedly do not have any pre-shared secret, to establish secure communications with each other. KALwEN is decentralized, such that it does not rely on the availability of a local processing unit (LPU). KALwEN supports secure global broadcast, local broadcast, and local (neighbor-to-neighbor) unicast, while preserving past key secrecy and future key secrecy (FKS). The fact that the cryptographic protocols of KALwEN have been formally verified also makes a convincing case. With both formal verification and experimental evaluation, our results should appeal to theorists and practitioners alike
- âŚ