9 research outputs found

    Medical data analysis based on Nao robot: An automated approach towards robotic real-time interaction with human body

    Get PDF
    There is a significant increase of strokes, heart diseases and premature death, people need more than ever to be aware of their vital signs such as blood pressure, heart beats, cholesterol level etc. Monitoring and analysing this medical data can help increase the awareness of the risk factor of heart disease. However, there is a huge pressure on medical staff and general practitioners (GPs), therefore this research proposes a medical data analysis based on Nao robots to meet these needs and it will serve as an automated approach towards a robotics real-time interaction with the human body. The proposed research offers a new way to allow users to understand the meaning of their vital signs using a human robot interaction. The developed system has been tested on publicly available data and simulated data. It can predict the future risk of heart disease based on some data attributes. Based on the risk prediction, it can feedback the result and the required lifestyle changes to avoid any related risk

    The Role of Edge Robotics As-a-Service in Monitoring COVID-19 Infection

    Full text link
    Deep learning technology has been widely used in edge computing. However, pandemics like covid-19 require deep learning capabilities at mobile devices (detect respiratory rate using mobile robotics or conduct CT scan using a mobile scanner), which are severely constrained by the limited storage and computation resources at the device level. To solve this problem, we propose a three-tier architecture, including robot layers, edge layers, and cloud layers. We adopt this architecture to design a non-contact respiratory monitoring system to break down respiratory rate calculation tasks. Experimental results of respiratory rate monitoring show that the proposed approach in this paper significantly outperforms other approaches. It is supported by computation time costs with 2.26 ms per frame, 27.48 ms per frame, 0.78 seconds for convolution operation, similarity calculation, processing one-minute length respiratory signals, respectively. And the computation time costs of our three-tier architecture are less than that of edge+cloud architecture and cloud architecture. Moreover, we use our three-tire architecture for CT image diagnosis task decomposition. The evaluation of a CT image dataset of COVID-19 proves that our three-tire architecture is useful for resolving tasks on deep learning networks by edge equipment. There are broad application scenarios in smart hospitals in the future

    The Penetration of Internet of Things in Robotics: Towards a Web of Robotic Things

    Get PDF
    As the Internet of Things (IoT) penetrates different domains and application areas, it has recently entered also the world of robotics. Robotics constitutes a modern and fast-evolving technology, increasingly being used in industrial, commercial and domestic settings. IoT, together with the Web of Things (WoT) could provide many benefits to robotic systems. Some of the benefits of IoT in robotics have been discussed in related work. This paper moves one step further, studying the actual current use of IoT in robotics, through various real-world examples encountered through a bibliographic research. The paper also examines the potential ofWoT, together with robotic systems, investigating which concepts, characteristics, architectures, hardware, software and communication methods of IoT are used in existing robotic systems, which sensors and actions are incorporated in IoT-based robots, as well as in which application areas. Finally, the current application of WoT in robotics is examined and discussed

    Semantics-based platform for context-aware and personalized robot interaction in the internet of robotic things

    Get PDF
    Robots are moving from well-controlled lab environments to the real world, where an increasing number of environments has been transformed into smart sensorized IoT spaces. Users will expect these robots to adapt to their preferences and needs, and even more so for social robots that engage in personal interactions. In this paper, we present declarative ontological models and a middleware platform for building services that generate interaction tasks for social robots in smart IoT environments. The platform implements a modular, data-driven workflow that allows developers of interaction services to determine the appropriate time, content and style of human-robot interaction tasks by reasoning on semantically enriched loT sensor data. The platform also abstracts the complexities of scheduling, planning and execution of these tasks, and can automatically adjust parameters to the personal profile and current context. We present motivational scenarios in three environments: a smart home, a smart office and a smart nursing home, detail the interfaces and executional paths in our platform and present a proof-of-concept implementation. (C) 2018 Elsevier Inc. All rights reserved

    From Personalized Medicine to Population Health: A Survey of mHealth Sensing Techniques

    Full text link
    Mobile Sensing Apps have been widely used as a practical approach to collect behavioral and health-related information from individuals and provide timely intervention to promote health and well-beings, such as mental health and chronic cares. As the objectives of mobile sensing could be either \emph{(a) personalized medicine for individuals} or \emph{(b) public health for populations}, in this work we review the design of these mobile sensing apps, and propose to categorize the design of these apps/systems in two paradigms -- \emph{(i) Personal Sensing} and \emph{(ii) Crowd Sensing} paradigms. While both sensing paradigms might incorporate with common ubiquitous sensing technologies, such as wearable sensors, mobility monitoring, mobile data offloading, and/or cloud-based data analytics to collect and process sensing data from individuals, we present a novel taxonomy system with two major components that can specify and classify apps/systems from aspects of the life-cycle of mHealth Sensing: \emph{(1) Sensing Task Creation \& Participation}, \emph{(2) Health Surveillance \& Data Collection}, and \emph{(3) Data Analysis \& Knowledge Discovery}. With respect to different goals of the two paradigms, this work systematically reviews this field, and summarizes the design of typical apps/systems in the view of the configurations and interactions between these two components. In addition to summarization, the proposed taxonomy system also helps figure out the potential directions of mobile sensing for health from both personalized medicines and population health perspectives.Comment: Submitted to a journal for revie

    Wearable devices και mobile applications στα πλαίσια του Internet Of Things για την παρακολούθηση της φυσικής κατάστασης των χρηστών

    Get PDF
    Διπλωματική εργασία--Πανεπιστήμιο Μακεδονίας, Θεσσαλονίκη, 2018Τις τελευταίες δεκαετίες παρουσιάζεται μια συνεχόμενη αναζήτηση και ανάπτυξη νέων τεχνολογιών που θα διευκολύνουν την ζωή μας και θα κάνουν την καθημερινότητα των χρηστών πιο εύκολη. Για αυτό τον λόγο αποφασίσαμε το θέμα της παρούσας διπλωματικής να είναι η ανάλυση των Wearable Devices («Φορετών» Συσκευών) και των Mobile Applications (Κινητών Εφαρμογών), δηλαδή νέων τεχνολογιών που αφορούν την παρακολούθηση της φυσικής κατάστασης των χρηστών, στα πλαίσια του Internet of Things (Διαδίκτυο των Πραγμάτων). Ειδικότερα, Το Διαδίκτυο των Πραγμάτων (Internet of Things) πρωτοπορεί σε αυτή την προσπάθεια, μπαίνοντας όλο και περισσότερο στην καθημερινότητά μας. Ο κλάδος του fitness, τα τελευταία χρόνια απασχολεί όλο και περισσότερο τους ανθρώπους και ειδικότερα τους νέους. Η παχυσαρκία αποτελεί τη μάστιγα της σημερινής εποχής και μέσω αυτών των τεχνολογιών ο χρήστης έχει τη δυνατότητα να παρακολουθεί και να ελέγχει όχι μόνο τη φυσική του κατάσταση αλλά και το βάρος του και συνεπώς την υγεία του. Υπάρχουν πολλές εταιρείες είτε μεγάλες είτε μικρές που απασχολούνται στον εξεταζόμενο κλάδο, οι οποίες συνεχώς δημιουργούν νέα προϊόντα για αυτό τον σκοπό. Ο κύριος στόχος της παρούσας μελέτης είναι να δώσει μια ολοκληρωμένη εικόνα αυτού του τομέα έρευνας και να αναφέρει το πλήρες φάσμα εργαλείων στον τομέα των φορητών συσκευών για την παρακολούθησης της φυσικής κατάστασης Πιο συγκεκριμένα, θα ερευνήσουμε τα Wearable Devices και τις κινητές εφαρμογές που ήδη υπάρχουν στην αγορά ενώ επικεντρώνεται στον νέο κλάδο του Internet of Things μέσω δευτερογενούς έρευνας σε αντίστοιχες μελέτες άλλων ερευνητών, αναφέροντας τόσο τα ερευνητικά έργα όσο και τις εμπορικές συσκευές ώστε να μελετήσουμε και να διερευνήσουμε την τρέχουσα διαθέσιμη τεχνολογία. Κατά την προετοιμασία αυτής της εργασίας, μελετήσαμε τη βιβλιογραφία και η δευτερογενής έρευνα στηρίχθηκε κυρίως στην κατανόηση και ταξινόμηση με βάση κάποια χαρακτηριστικά των παραπάνω εννοιών

    Mapeamento de Requisitos de Segurança à Tecnologia na Internet das Coisas

    Get PDF
    Devido ao rápido avanço tecnológico, a segurança e a privacidade têm sido assuntos de debates nos últimos anos, tanto por parte da comunidade industrial e científica, como pelos utilizadores finais. A partilha de informação através de métodos tecnológicos tem vindo a crescer na última década, devido também ao rápido crescimento e penetração destes meios. Uma das áreas que maior crescimento tem apresentado é conhecida como a Internet das Coisas (IdC), que engloba tecnologia que permite conectar vários objetos físicos e inteligentes com poder computacional reduzido na Internet, permitindo a partilha de informações entre si. Atualmente a IdC já desempenha um papel importante em muitas áreas chave da sociedade (e.g., transportes, saúde, e agricultura), sobretudo por permitir, de forma cómoda, extrair e partilhar informações referentes ao estado do ambiente. No entanto, vários problemas e desafios relacionados com a segurança têm surgido e demonstrado que a IdC carece de uma intervenção estruturante nessa dimensão, começando pelo básico. A IdC está num estado prematuro em termos de segurança e privacidade. Não existe uma abordagem geral (ou até preocupação) em relação à segurança, e não existe um mecanismo padronizado para a proteção dos dados e dispositivos. O hype associado a novos sistemas da IdC degenera num time-to-market reduzido que beneficia funcionalidade e prejudica engenharia de segurança. Por outro lado, especificações de processamento e memória mais modestas para muitos dos dispositivos da IdC criam desafios adicionais ao desenho e à integração de mecanismos de segurança; o facto de muitos dispositivos estarem fisicamente acessíveis, sem controlo rígido de acesso, bem como o facto de tecnologias sem-fios muitas vezes não cifradas ou sem garantia de integridade serem usadas nas comunicações da IdC facilita sobremaneira ataques a dispositivos IdC por parte de entidades maliciosas. Esta dissertação começa por analisar, de forma abrangente, alguns estudos já realizados na área da segurança para a IdC, comparando-os e usando-os como motivação para um estudo sobre a performance de mecanismos de segurança em plataformas de desenvolvimento atuais da IdC, especificamente num Raspberry Pi 3, assumindo que este conhecimento é importante para o desenho de sistemas e software para a IdC. A dissertação contém os resultados da performance para algumas funções da biblioteca OpenSSL, incluindo as funções de hash e cifra mais populares atualmente, colocados em perspetiva contra os resultados obtidos para um computador de secretária. É ainda apresentado um conjunto de testes de desempenho relacionadas aos mecanismos de segurança existentes para sistemas computacionais (e.g., firewall e sistema de detenção de intrusão). Esta dissertação apresenta também uma primeira abordagem para o mapeamento entre requisitos e mecanismos de segurança no contexto específico da IdC, com objetivo de encontrar os requisitos que melhor se adaptam ao ambiente da IdC, conhecendo as suas limitações, em particular a de segurança. No final, é apresentado um protótipo de uma ferramenta para prova de conceito e que dá utilidade a este mapeamento.Due to a very fast paced rythm in technology advancement, security and privacy have been subjects of debate in recent years, both by the industry and scientific community, and by end users. The sharing of information through technological means has been growing in the last decade, also due to the rapid growth and penetration of technology in everyday human life. One of the fastest growing areas is known as Internet of Things (IoT), which encompasses technology that allows one to connect multiple physical and intelligent objects with reduced computing power to the Internet, allowing sharing information with each other. Presently, IoT already plays an important role in many key areas of society (e.g., transport, health, and agriculture), in particular by enabling it to conveniently extract and share information on the state of the environment. However, several security-related problems and challenges have arisen in the last years, clearly demonstrating that IoT lacks a structuring intervention in this dimension, starting from the basics. IoT is in a premature state in terms of security and privacy. There is no general approach (or even concern) to security, and there is no standardized mechanism for protecting data and devices. The hype associated with new IoT systems often degenerates into a reduced time-to-market that benefits functionality and prejudices security engineering. On the other hand, more modest processing and memory specifications for many of the IoT devices create additional challenges in designing and integrating security mechanisms; the fact that many devices are physically accessible without rigid access control as well as the fact that often unencrypted or unsecured wireless technologies are used in the communications of IoT greatly facilitates attacks on such devices by malicious entities. This dissertation begins by analyzing, in a comprehensive manner, some studies already carried out in the field of security for IoT, comparing them and using them as motivation for a study on the performance of security mechanisms in current development platforms for the IoT, specifically in a Raspberry Pi 3, assuming that this knowledge is important for the design of secure IoT systems and software. The dissertation contains the performance results for some OpenSSL library functions, including the most popular hash and cipher functions currently used. These results are compared against the ones obtained for a desktop computer. Also presented is a set of performance tests concerning existing security mechanisms for computational systems (e.g., firewall and intrusion detection system). This dissertation also presents a first approach to the mapping between requirements and security mechanisms in the specific context of IoT, in order to find the requirements that best fit the IoT environment, knowing its limitations, in particular security. In the end, a prototype of a proof-of-concept tool, which shows how this mapping can be useful in practice, is presented
    corecore