63,478 research outputs found
SensX: About Sensing and Assessment of Complex Human Motion
The great success of wearables and smartphone apps for provision of extensive
physical workout instructions boosts a whole industry dealing with consumer
oriented sensors and sports equipment. But with these opportunities there are
also new challenges emerging. The unregulated distribution of instructions
about ambitious exercises enables unexperienced users to undertake demanding
workouts without professional supervision which may lead to suboptimal training
success or even serious injuries. We believe, that automated supervision and
realtime feedback during a workout may help to solve these issues. Therefore we
introduce four fundamental steps for complex human motion assessment and
present SensX, a sensor-based architecture for monitoring, recording, and
analyzing complex and multi-dimensional motion chains. We provide the results
of our preliminary study encompassing 8 different body weight exercises, 20
participants, and more than 9,220 recorded exercise repetitions. Furthermore,
insights into SensXs classification capabilities and the impact of specific
sensor configurations onto the analysis process are given.Comment: Published within the Proceedings of 14th IEEE International
Conference on Networking, Sensing and Control (ICNSC), May 16th-18th, 2017,
Calabria Italy 6 pages, 5 figure
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Machine learning has become mainstream across industries. Numerous examples
proved the validity of it for security applications. In this work, we
investigate how to reverse engineer a neural network by using only power
side-channel information. To this end, we consider a multilayer perceptron as
the machine learning architecture of choice and assume a non-invasive and
eavesdropping attacker capable of measuring only passive side-channel leakages
like power consumption, electromagnetic radiation, and reaction time.
We conduct all experiments on real data and common neural net architectures
in order to properly assess the applicability and extendability of those
attacks. Practical results are shown on an ARM CORTEX-M3 microcontroller. Our
experiments show that the side-channel attacker is capable of obtaining the
following information: the activation functions used in the architecture, the
number of layers and neurons in the layers, the number of output classes, and
weights in the neural network. Thus, the attacker can effectively reverse
engineer the network using side-channel information.
Next, we show that once the attacker has the knowledge about the neural
network architecture, he/she could also recover the inputs to the network with
only a single-shot measurement. Finally, we discuss several mitigations one
could use to thwart such attacks.Comment: 15 pages, 16 figure
Study of the urban evolution of Brasilia with the use of LANDSAT data
The urban growth of Brasilia within the last ten years is analyzed with special emphasis on the utilization of remote sensing orbital data and automatic image processing. The urban spatial structure and the monitoring of its temporal changes were focused in a whole and dynamic way by the utilization of MSS-LANDSAT images for June 1973, 1978 and 1983. In order to aid data interpretation, a registration algorithm implemented at the Interactive Multispectral Image Analysis System (IMAGE-100) was utilized aiming at the overlap of multitemporal images. The utilization of suitable digital filters, combined with the images overlap, allowed a rapid identification of areas of possible urban growth and oriented the field work. The results obtained permitted an evaluation of the urban growth of Brasilia, taking as reference the proposed stated for the construction of the city
Return of the man-machine interface: violent interactions
This paper presents the design and evaluation of “the man-machine interface”
a punchable interface designed to criticise and react against the values inherent in
modern systems that tacitly favour one type of user (linguistically and technically
gifted) and alienate another (physically gifted). We report a user study, where participants
used the device to express their opinions before engaging in a group discussion
about the implications of strength-based interactions. We draw connections between
our own work and that of evolutionary biologists whose recent findings indicate the
shape of the human hand is likely to have been partly evolved for the purpose of punching,
and conclude by examining violent force as an appropriate means for expressing
thoughts and feelings
Near Real-Time Data Labeling Using a Depth Sensor for EMG Based Prosthetic Arms
Recognizing sEMG (Surface Electromyography) signals belonging to a particular
action (e.g., lateral arm raise) automatically is a challenging task as EMG
signals themselves have a lot of variation even for the same action due to
several factors. To overcome this issue, there should be a proper separation
which indicates similar patterns repetitively for a particular action in raw
signals. A repetitive pattern is not always matched because the same action can
be carried out with different time duration. Thus, a depth sensor (Kinect) was
used for pattern identification where three joint angles were recording
continuously which is clearly separable for a particular action while recording
sEMG signals. To Segment out a repetitive pattern in angle data, MDTW (Moving
Dynamic Time Warping) approach is introduced. This technique is allowed to
retrieve suspected motion of interest from raw signals. MDTW based on DTW
algorithm, but it will be moving through the whole dataset in a pre-defined
manner which is capable of picking up almost all the suspected segments inside
a given dataset an optimal way. Elevated bicep curl and lateral arm raise
movements are taken as motions of interest to show how the proposed technique
can be employed to achieve auto identification and labelling. The full
implementation is available at https://github.com/GPrathap/OpenBCIPytho
-ARM: Network Sparsification via Stochastic Binary Optimization
We consider network sparsification as an -norm regularized binary
optimization problem, where each unit of a neural network (e.g., weight,
neuron, or channel, etc.) is attached with a stochastic binary gate, whose
parameters are jointly optimized with original network parameters. The
Augment-Reinforce-Merge (ARM), a recently proposed unbiased gradient estimator,
is investigated for this binary optimization problem. Compared to the hard
concrete gradient estimator from Louizos et al., ARM demonstrates superior
performance of pruning network architectures while retaining almost the same
accuracies of baseline methods. Similar to the hard concrete estimator, ARM
also enables conditional computation during model training but with improved
effectiveness due to the exact binary stochasticity. Thanks to the flexibility
of ARM, many smooth or non-smooth parametric functions, such as scaled sigmoid
or hard sigmoid, can be used to parameterize this binary optimization problem
and the unbiasness of the ARM estimator is retained, while the hard concrete
estimator has to rely on the hard sigmoid function to achieve conditional
computation and thus accelerated training. Extensive experiments on multiple
public datasets demonstrate state-of-the-art pruning rates with almost the same
accuracies of baseline methods. The resulting algorithm -ARM sparsifies
the Wide-ResNet models on CIFAR-10 and CIFAR-100 while the hard concrete
estimator cannot. The code is public available at
https://github.com/leo-yangli/l0-arm.Comment: Published as a conference paper at ECML 201
- …