88 research outputs found

    On Evaluating Commercial Cloud Services: A Systematic Review

    Full text link
    Background: Cloud Computing is increasingly booming in industry with many competing providers and services. Accordingly, evaluation of commercial Cloud services is necessary. However, the existing evaluation studies are relatively chaotic. There exists tremendous confusion and gap between practices and theory about Cloud services evaluation. Aim: To facilitate relieving the aforementioned chaos, this work aims to synthesize the existing evaluation implementations to outline the state-of-the-practice and also identify research opportunities in Cloud services evaluation. Method: Based on a conceptual evaluation model comprising six steps, the Systematic Literature Review (SLR) method was employed to collect relevant evidence to investigate the Cloud services evaluation step by step. Results: This SLR identified 82 relevant evaluation studies. The overall data collected from these studies essentially represent the current practical landscape of implementing Cloud services evaluation, and in turn can be reused to facilitate future evaluation work. Conclusions: Evaluation of commercial Cloud services has become a world-wide research topic. Some of the findings of this SLR identify several research gaps in the area of Cloud services evaluation (e.g., the Elasticity and Security evaluation of commercial Cloud services could be a long-term challenge), while some other findings suggest the trend of applying commercial Cloud services (e.g., compared with PaaS, IaaS seems more suitable for customers and is particularly important in industry). This SLR study itself also confirms some previous experiences and reveals new Evidence-Based Software Engineering (EBSE) lessons

    Systems and algorithms for wireless sensor networks based on animal and natural behavior

    Full text link
    In last decade, there have been many research works about wireless sensor networks (WSNs) focused on improving the network performance as well as increasing the energy efficiency and communications effectiveness. Many of these new mechanisms have been implemented using the behaviors of certain animals, such as ants, bees, or schools of fish.These systems are called bioinspired systems and are used to improve aspects such as handling large-scale networks, provide dynamic nature, and avoid resource constraints, heterogeneity, unattended operation, or robustness, amongmanyothers.Therefore, thispaper aims to studybioinspired mechanisms in the field ofWSN, providing the concepts of these behavior patterns in which these new approaches are based. The paper will explain existing bioinspired systems in WSNs and analyze their impact on WSNs and their evolution. In addition, we will conduct a comprehensive review of recently proposed bioinspired systems, protocols, and mechanisms. Finally, this paper will try to analyze the applications of each bioinspired mechanism as a function of the imitated animal and the deployed application. Although this research area is considered an area with highly theoretical content, we intend to show the great impact that it is generating from the practical perspective.Sendra, S.; Parra Boronat, L.; Lloret, J.; Khan, S. (2015). Systems and algorithms for wireless sensor networks based on animal and natural behavior. International Journal of Distributed Sensor Networks. 2015:1-19. doi:10.1155/2015/625972S1192015Iram, R., Sheikh, M. I., Jabbar, S., & Minhas, A. A. (2011). Computational intelligence based optimization in wireless sensor network. 2011 International Conference on Information and Communication Technologies. doi:10.1109/icict.2011.5983561Lloret, J., Bosch, I., Sendra, S., & Serrano, A. (2011). A Wireless Sensor Network for Vineyard Monitoring That Uses Image Processing. Sensors, 11(6), 6165-6196. doi:10.3390/s110606165Lloret, J., Garcia, M., Bri, D., & Sendra, S. (2009). A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification. Sensors, 9(11), 8722-8747. doi:10.3390/s91108722Dasgupta, P. (2008). A Multiagent Swarming System for Distributed Automatic Target Recognition Using Unmanned Aerial Vehicles. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 38(3), 549-563. doi:10.1109/tsmca.2008.918619Quwaider, M., & Biswas, S. (2012). Delay Tolerant Routing Protocol Modeling for Low Power Wearable Wireless Sensor Networks. Network Protocols and Algorithms, 4(3). doi:10.5296/npa.v4i3.2054Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459Liu, M., & Song, C. (2012). Ant-Based Transmission Range Assignment Scheme for Energy Hole Problem in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 8(12), 290717. doi:10.1155/2012/290717Riva, G., & Finochietto, J. M. (2012). Pheromone-based In-Network Processing for Wireless Sensor Network Monitoring Systems. Network Protocols and Algorithms, 4(4). doi:10.5296/npa.v4i4.2206Garcia, M., Sendra, S., Lloret, J., & Canovas, A. (2011). Saving energy and improving communications using cooperative group-based Wireless Sensor Networks. Telecommunication Systems, 52(4), 2489-2502. doi:10.1007/s11235-011-9568-3Kim, J.-Y., Sharma, T., Kumar, B., Tomar, G. S., Berry, K., & Lee, W.-H. (2014). Intercluster Ant Colony Optimization Algorithm for Wireless Sensor Network in Dense Environment. International Journal of Distributed Sensor Networks, 10(4), 457402. doi:10.1155/2014/457402Dressler, F., & Akan, O. B. (2010). A survey on bio-inspired networking. Computer Networks, 54(6), 881-900. doi:10.1016/j.comnet.2009.10.024Atakan, B., & Akan, O. B. (2006). Immune System Based Distributed Node and Rate Selection in Wireless Sensor Networks. 2006 1st Bio-Inspired Models of Network, Information and Computing Systems. doi:10.1109/bimnics.2006.361806Di Pietro, R., & Verde, N. V. (2011). Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. doi:10.1109/wowmom.2011.5986165Marwaha, S., Indulska, J., & Portmann, M. (2009). Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A Survey. 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. doi:10.1109/uic-atc.2009.95Jha, V., Khetarpal, K., & Sharma, M. (2011). A survey of nature inspired routing algorithms for MANETs. 2011 3rd International Conference on Electronics Computer Technology. doi:10.1109/icectech.2011.5942042Fernandez-Marquez, J. L., Di Marzo Serugendo, G., Montagna, S., Viroli, M., & Arcos, J. L. (2012). Description and composition of bio-inspired design patterns: a complete overview. Natural Computing, 12(1), 43-67. doi:10.1007/s11047-012-9324-yCamilo, T., Carreto, C., Silva, J. S., & Boavida, F. (2006). An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks. Lecture Notes in Computer Science, 49-59. doi:10.1007/11839088_5Selvakennedy, S., Sinnappan, S., & Shang, Y. (2006). T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks. Journal of Communications, 1(2). doi:10.4304/jcm.1.2.22-29Almshreqi, A. M. S., Ali, B. M., Rasid, M. F. A., Ismail, A., & Varahram, P. (2012). An improved routing mechanism using bio-inspired for energy balancing in wireless sensor networks. The International Conference on Information Network 2012. doi:10.1109/icoin.2012.6164367Chen, G., Guo, T.-D., Yang, W.-G., & Zhao, T. (2006). An improved ant-based routing protocol in Wireless Sensor Networks. 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing. doi:10.1109/colcom.2006.361893Okdem, S., & Karaboga, D. (2006). Routing in Wireless Sensor Networks Using Ant Colony Optimization. First NASA/ESA Conference on Adaptive Hardware and Systems (AHS’06). doi:10.1109/ahs.2006.63Salehpour, A.-A., Mirmobin, B., Afzali-Kusha, A., & Mohammadi, S. (2008). An energy efficient routing protocol for cluster-based wireless sensor networks using ant colony optimization. 2008 International Conference on Innovations in Information Technology. doi:10.1109/innovations.2008.4781748Wen, Y., Chen, Y., & Pan, M. (2008). Adaptive ant-based routing in wireless sensor networks using Energy*Delay metrics. Journal of Zhejiang University-SCIENCE A, 9(4), 531-538. doi:10.1631/jzus.a071382Liao, W.-H., Kao, Y., & Wu, R.-T. (2011). Ant colony optimization based sensor deployment protocol for wireless sensor networks. Expert Systems with Applications, 38(6), 6599-6605. doi:10.1016/j.eswa.2010.11.079Pavai, K., Sivagami, A., & Sridharan, D. (2009). Study of Routing Protocols in Wireless Sensor Networks. 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies. doi:10.1109/act.2009.133Juan, L., Chen, S., & Chao, Z. (2007). Ant System Based Anycast Routing in Wireless Sensor Networks. 2007 International Conference on Wireless Communications, Networking and Mobile Computing. doi:10.1109/wicom.2007.603Wang, C., & Lin, Q. (2008). Swarm intelligence optimization based routing algorithm for Wireless Sensor Networks. 2008 International Conference on Neural Networks and Signal Processing. doi:10.1109/icnnsp.2008.4590326Jiang, H., Wang, M., Liu, M., & Yan, J. (2012). A quantum-inspired ant-based routing algorithm for WSNs. Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD). doi:10.1109/cscwd.2012.6221881Okazaki, A. M., & Frohlich, A. A. (2011). Ant-based Dynamic Hop Optimization Protocol: A routing algorithm for Mobile Wireless Sensor Networks. 2011 IEEE GLOBECOM Workshops (GC Wkshps). doi:10.1109/glocomw.2011.6162356Hui, X., Zhigang, Z., & Xueguang, Z. (2009). A Novel Routing Protocol in Wireless Sensor Networks Based on Ant Colony Optimization. 2009 International Conference on Environmental Science and Information Application Technology. doi:10.1109/esiat.2009.460AbdelSalam, H. S., & Olariu, S. (2012). BEES: BioinspirEd backbonE Selection in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 44-51. doi:10.1109/tpds.2011.100Da Silva Rego, A., Celestino, J., dos Santos, A., Cerqueira, E. C., Patel, A., & Taghavi, M. (2012). BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks. 2012 18th IEEE International Conference on Networks (ICON). doi:10.1109/icon.2012.6506592Neshat, M., Sepidnam, G., Sargolzaei, M., & Toosi, A. N. (2012). Artificial fish swarm algorithm: a survey of the state-of-the-art, hybridization, combinatorial and indicative applications. Artificial Intelligence Review, 42(4), 965-997. doi:10.1007/s10462-012-9342-2Antoniou, P., Pitsillides, A., Blackwell, T., & Engelbrecht, A. (2009). Employing the flocking behavior of birds for controlling congestion in autonomous decentralized networks. 2009 IEEE Congress on Evolutionary Computation. doi:10.1109/cec.2009.4983153Ruihua, Z., Zhiping, J., Xin, L., & Dongxue, H. (2011). Double cluster-heads clustering algorithm for wireless sensor networks using PSO. 2011 6th IEEE Conference on Industrial Electronics and Applications. doi:10.1109/iciea.2011.5975688Kulkarni, R. V., Venayagamoorthy, G. K., & Cheng, M. X. (2009). Bio-inspired node localization in wireless sensor networks. 2009 IEEE International Conference on Systems, Man and Cybernetics. doi:10.1109/icsmc.2009.5346107Kulkarni, R. V., & Venayagamoorthy, G. K. (2010). Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(6), 663-675. doi:10.1109/tsmcc.2010.2049649Xin Song, Cuirong Wang, Wang, J., & Bin Zhang. (2010). A hierarchical routing protocol based on AFSO algorithm for WSN. 2010 International Conference On Computer Design and Applications. doi:10.1109/iccda.2010.5541265Gao, X. Z., Wu, Y., Zenger, K., & Huang, X. (2010). A Knowledge-Based Artificial Fish-Swarm Algorithm. 2010 13th IEEE International Conference on Computational Science and Engineering. doi:10.1109/cse.2010.49Wang, L., & Ma, L. (2011). A hybrid artificial fish swarm algorithm for Bin-packing problem. Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. doi:10.1109/emeit.2011.6022829Yiyue, W., Hongmei, L., & Hengyang, H. (2012). Wireless Sensor Network Deployment Using an Optimized Artificial Fish Swarm Algorithm. 2012 International Conference on Computer Science and Electronics Engineering. doi:10.1109/iccsee.2012.453Yang, X.-S. (2010). A New Metaheuristic Bat-Inspired Algorithm. Studies in Computational Intelligence, 65-74. doi:10.1007/978-3-642-12538-6_6Goyal, S., & Patterh, M. S. (2013). Performance of BAT Algorithm on Localization of Wireless Sensor Network. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 6(3), 351-358. doi:10.24297/ijct.v6i3.4481Krishnanand, K. N., & Ghose, D. (2006). Glowworm swarm based optimization algorithm for multimodal functions with collective robotics applications. Multiagent and Grid Systems, 2(3), 209-222. doi:10.3233/mgs-2006-2301Apostolopoulos, T., & Vlachos, A. (2011). Application of the Firefly Algorithm for Solving the Economic Emissions Load Dispatch Problem. International Journal of Combinatorics, 2011, 1-23. doi:10.1155/2011/523806Liao, W.-H., Kao, Y., & Li, Y.-S. (2011). A sensor deployment approach using glowworm swarm optimization algorithm in wireless sensor networks. Expert Systems with Applications, 38(10), 12180-12188. doi:10.1016/j.eswa.2011.03.053Sun, Y., Jiang, Q., & Zhang, K. (2012). A clustering scheme for Reachback Firefly Synchronicity in wireless sensor networks. 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content. doi:10.1109/icnidc.2012.6418705Zungeru, A. M., Ang, L.-M., & Seng, K. P. (2012). Termite-Hill. International Journal of Swarm Intelligence Research, 3(4), 1-22. doi:10.4018/jsir.2012100101KumarE, S., S. M., K., & Kumar B. P., V. (2014). Clustering Protocol for Wireless Sensor Networks based on Rhesus Macaque (Macaca mulatta) Animal's Social Behavior. International Journal of Computer Applications, 87(8), 20-27. doi:10.5120/15229-3754Breza, M., & McCann, J. A. (2008). Lessons in Implementing Bio-inspired Algorithms on Wireless Sensor Networks. 2008 NASA/ESA Conference on Adaptive Hardware and Systems. doi:10.1109/ahs.2008.72Aziz, N. A. B. A., Mohemmed, A. W., & Sagar, B. S. D. (2007). Particle Swarm Optimization and Voronoi diagram for Wireless Sensor Networks coverage optimization. 2007 International Conference on Intelligent and Advanced Systems. doi:10.1109/icias.2007.4658528Falcon, R., Li, X., Nayak, A., & Stojmenovic, I. (2012). A harmony-seeking firefly swarm to the periodic replacement of damaged sensors by a team of mobile robots. 2012 IEEE International Conference on Communications (ICC). doi:10.1109/icc.2012.6363859Antoniou, P., & Pitsillides, A. (2010). A bio-inspired approach for streaming applications in wireless sensor networks based on the Lotka–Volterra competition model. Computer Communications, 33(17), 2039-2047. doi:10.1016/j.comcom.2010.07.020Benahmed, K., Merabti, M., & Haffaf, H. (2012). Inspired Social Spider Behavior for Secure Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications, 4(4), 1-10. doi:10.4018/jmcmc.2012100101Alrajeh, N. A., & Lloret, J. (2013). Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 9(10), 351047. doi:10.1155/2013/351047Hussain, S., Matin, A. W., & Islam, O. (2007). Genetic Algorithm for Hierarchical Wireless Sensor Networks. Journal of Networks, 2(5). doi:10.4304/jnw.2.5.87-97Hussain, S., Matin, A. W., & Islam, O. (2007). Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor Networks. Fourth International Conference on Information Technology (ITNG’07). doi:10.1109/itng.2007.97Ferentinos, K. P., & Tsiligiridis, T. A. (2007). Adaptive design optimization of wireless sensor networks using genetic algorithms. Computer Networks, 51(4), 1031-1051. doi:10.1016/j.comnet.2006.06.013Jia, J., Chen, J., Chang, G., & Tan, Z. (2009). Energy efficient coverage control in wireless sensor networks based on multi-objective genetic algorithm. Computers & Mathematics with Applications, 57(11-12), 1756-1766. doi:10.1016/j.camwa.2008.10.036Nan, G.-F., Li, M.-Q., & Li, J. (2007). Estimation of Node Localization with a Real-Coded Genetic Algorithm in WSNs. 2007 International Conference on Machine Learning and Cybernetics. doi:10.1109/icmlc.2007.4370265Saleem, K., Fisal, N., Abdullah, M. S., Zulkarmwan, A. B., Hafizah, S., & Kamilah, S. (2009). Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs. 2009 First Asian Conference on Intelligent Information and Database Systems. doi:10.1109/aciids.2009.75Jabbari, A., & Lang, W. (2010). Advanced Bio-inspired Plausibility Checking in a Wireless Sensor Network Using Neuro-immune Systems: Autonomous Fault Diagnosis in an Intelligent Transportation System. 2010 Fourth International Conference on Sensor Technologies and Applications. doi:10.1109/sensorcomm.2010.24Ponnusamy, V., & Abdullah, A. (2010). Biologically Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network. 2010 Sixth International Conference on Intelligent Environments. doi:10.1109/ie.2010.46Li, J., Cui, Z., & Shi, Z. (2012). An Improved Artificial Plant Optimization Algorithm for Coverage Problem in WSN. Sensor Letters, 10(8), 1874-1878. doi:10.1166/sl.2012.2627Sendra, S., Llario, F., Parra, L., & Lloret, J. (2014). Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks. Recent Advances in Communications and Networking Technology, 2(2), 91-101. doi:10.2174/22117407112016660012Sendra, S., Granell, E., Lloret, J., & Rodrigues, J. J. P. C. (2013). Smart Collaborative Mobile System for Taking Care of Disabled and Elderly People. Mobile Networks and Applications, 19(3), 287-302. doi:10.1007/s11036-013-0445-zGarcia, M., Sendra, S., Lloret, G., & Lloret, J. (2011). Monitoring and control sensor system for fish feeding in marine fish farms. IET Communications, 5(12), 1682-1690. doi:10.1049/iet-com.2010.0654Sendra, S., Lloret, J., Rodrigues, J. J. P. C., & Aguiar, J. M. (2013). Underwater Wireless Communications in Freshwater at 2.4 GHz. IEEE Communications Letters, 17(9), 1794-1797. doi:10.1109/lcomm.2013.072313.131214Lloret, J., Sendra, S., Ardid, M., & Rodrigues, J. J. P. C. (2012). Underwater Wireless Sensor Communications in the 2.4 GHz ISM Frequency Band. Sensors, 12(4), 4237-4264. doi:10.3390/s12040423

    A decentralized service discovery approach on peer-to-peer network

    Get PDF
    Service-Oriented Computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable, and robust service discovery mechanism. However, traditional service discovery methods using centralized registries can easily suffer from problems such as performance bottleneck and vulnerability to failures in large scalable service networks, thus functioning abnormally. To address these problems, this paper proposes a peer-to-peer-based decentralized service discovery approach named Chord4S. Chord4S utilizes the data distribution and lookup capabilities of the popular Chord to distribute and discover services in a decentralized manner. Data availability is further improved by distributing published descriptions of functionally equivalent services to different successor nodes that are organized into virtual segments in the Chord4S circle. Based on the service publication approach, Chord4S supports QoS-aware service discovery. Chord4S also supports service discovery with wildcard(s). In addition, the Chord routing protocol is extended to support efficient discovery of multiple services with a single query. This enables late negotiation of Service Level Agreements (SLAs) between service consumers and multiple candidate service providers. The experimental evaluation shows that Chord4S achieves higher data availability and provides efficient query with reasonable overhead

    CorrNet: Fine-grained emotion recognition for video watching using wearable physiological sensors

    Get PDF
    Recognizing user emotions while they watch short-form videos anytime and anywhere is essential for facilitating video content customization and personalization. However, most works either classify a single emotion per video stimuli, or are restricted to static, desktop environments. To address this, we propose a correlation-based emotion recognition algorithm (CorrNet) to recognize the valence and arousal (V-A) of each instance (fine-grained segment of signals) using only wearable, physiological signals (e.g., electrodermal activity, heart rate). CorrNet takes advantage of features both inside each instance (intra-modality features) and between different instances for the same video stimuli (correlation-based features). We first test our approach on an indoor-desktop affect dataset (CASE), and thereafter on an outdoor-mobile affect dataset (MERCA) which we collected using a smart wristband and wearable eyetracker. Results show that for subject-independent binary classification (high-low), CorrNet yields promising recognition accuracies: 76.37% and 74.03% for V-A on CASE, and 70.29% and 68.15% for V-A on MERCA. Our findings show: (1) instance segment lengths between 1–4 s result in highest recognition accuracies (2) accuracies between laboratory-grade and wearable sensors are comparable, even under low sampling rates (≤64 Hz) (3) large amounts of neu-tral V-A labels, an artifact of continuous affect annotation, result in varied recognition performance

    Multi-sensor data fusion in mobile devices for the identification of Activities of Daily Living

    Get PDF
    Following the recent advances in technology and the growing use of mobile devices such as smartphones, several solutions may be developed to improve the quality of life of users in the context of Ambient Assisted Living (AAL). Mobile devices have different available sensors, e.g., accelerometer, gyroscope, magnetometer, microphone and Global Positioning System (GPS) receiver, which allow the acquisition of physical and physiological parameters for the recognition of different Activities of Daily Living (ADL) and the environments in which they are performed. The definition of ADL includes a well-known set of tasks, which include basic selfcare tasks, based on the types of skills that people usually learn in early childhood, including feeding, bathing, dressing, grooming, walking, running, jumping, climbing stairs, sleeping, watching TV, working, listening to music, cooking, eating and others. On the context of AAL, some individuals (henceforth called user or users) need particular assistance, either because the user has some sort of impairment, or because the user is old, or simply because users need/want to monitor their lifestyle. The research and development of systems that provide a particular assistance to people is increasing in many areas of application. In particular, in the future, the recognition of ADL will be an important element for the development of a personal digital life coach, providing assistance to different types of users. To support the recognition of ADL, the surrounding environments should be also recognized to increase the reliability of these systems. The main focus of this Thesis is the research on methods for the fusion and classification of the data acquired by the sensors available in off-the-shelf mobile devices in order to recognize ADL in almost real-time, taking into account the large diversity of the capabilities and characteristics of the mobile devices available in the market. In order to achieve this objective, this Thesis started with the review of the existing methods and technologies to define the architecture and modules of the method for the identification of ADL. With this review and based on the knowledge acquired about the sensors available in off-the-shelf mobile devices, a set of tasks that may be reliably identified was defined as a basis for the remaining research and development to be carried out in this Thesis. This review also identified the main stages for the development of a new method for the identification of the ADL using the sensors available in off-the-shelf mobile devices; these stages are data acquisition, data processing, data cleaning, data imputation, feature extraction, data fusion and artificial intelligence. One of the challenges is related to the different types of data acquired from the different sensors, but other challenges were found, including the presence of environmental noise, the positioning of the mobile device during the daily activities, the limited capabilities of the mobile devices and others. Based on the acquired data, the processing was performed, implementing data cleaning and feature extraction methods, in order to define a new framework for the recognition of ADL. The data imputation methods were not applied, because at this stage of the research their implementation does not have influence in the results of the identification of the ADL and environments, as the features are extracted from a set of data acquired during a defined time interval and there are no missing values during this stage. The joint selection of the set of usable sensors and the identifiable set of tasks will then allow the development of a framework that, considering multi-sensor data fusion technologies and context awareness, in coordination with other information available from the user context, such as his/her agenda and the time of the day, will allow to establish a profile of the tasks that the user performs in a regular activity day. The classification method and the algorithm for the fusion of the features for the recognition of ADL and its environments needs to be deployed in a machine with some computational power, while the mobile device that will use the created framework, can perform the identification of the ADL using a much less computational power. Based on the results reported in the literature, the method chosen for the recognition of the ADL is composed by three variants of Artificial Neural Networks (ANN), including simple Multilayer Perceptron (MLP) networks, Feedforward Neural Networks (FNN) with Backpropagation, and Deep Neural Networks (DNN). Data acquisition can be performed with standard methods. After the acquisition, the data must be processed at the data processing stage, which includes data cleaning and feature extraction methods. The data cleaning method used for motion and magnetic sensors is the low pass filter, in order to reduce the noise acquired; but for the acoustic data, the Fast Fourier Transform (FFT) was applied to extract the different frequencies. When the data is clean, several features are then extracted based on the types of sensors used, including the mean, standard deviation, variance, maximum value, minimum value and median of raw data acquired from the motion and magnetic sensors; the mean, standard deviation, variance and median of the maximum peaks calculated with the raw data acquired from the motion and magnetic sensors; the five greatest distances between the maximum peaks calculated with the raw data acquired from the motion and magnetic sensors; the mean, standard deviation, variance, median and 26 Mel- Frequency Cepstral Coefficients (MFCC) of the frequencies obtained with FFT based on the raw data acquired from the microphone data; and the distance travelled calculated with the data acquired from the GPS receiver. After the extraction of the features, these will be grouped in different datasets for the application of the ANN methods and to discover the method and dataset that reports better results. The classification stage was incrementally developed, starting with the identification of the most common ADL (i.e., walking, running, going upstairs, going downstairs and standing activities) with motion and magnetic sensors. Next, the environments were identified with acoustic data, i.e., bedroom, bar, classroom, gym, kitchen, living room, hall, street and library. After the environments are recognized, and based on the different sets of sensors commonly available in the mobile devices, the data acquired from the motion and magnetic sensors were combined with the recognized environment in order to differentiate some activities without motion, i.e., sleeping and watching TV. The number of recognized activities in this stage was increased with the use of the distance travelled, extracted from the GPS receiver data, allowing also to recognize the driving activity. After the implementation of the three classification methods with different numbers of iterations, datasets and remaining configurations in a machine with high processing capabilities, the reported results proved that the best method for the recognition of the most common ADL and activities without motion is the DNN method, but the best method for the recognition of environments is the FNN method with Backpropagation. Depending on the number of sensors used, this implementation reports a mean accuracy between 85.89% and 89.51% for the recognition of the most common ADL, equals to 86.50% for the recognition of environments, and equals to 100% for the recognition of activities without motion, reporting an overall accuracy between 85.89% and 92.00%. The last stage of this research work was the implementation of the structured framework for the mobile devices, verifying that the FNN method requires a high processing power for the recognition of environments and the results reported with the mobile application are lower than the results reported with the machine with high processing capabilities used. Thus, the DNN method was also implemented for the recognition of the environments with the mobile devices. Finally, the results reported with the mobile devices show an accuracy between 86.39% and 89.15% for the recognition of the most common ADL, equal to 45.68% for the recognition of environments, and equal to 100% for the recognition of activities without motion, reporting an overall accuracy between 58.02% and 89.15%. Compared with the literature, the results returned by the implemented framework show only a residual improvement. However, the results reported in this research work comprehend the identification of more ADL than the ones described in other studies. The improvement in the recognition of ADL based on the mean of the accuracies is equal to 2.93%, but the maximum number of ADL and environments previously recognized was 13, while the number of ADL and environments recognized with the framework resulting from this research is 16. In conclusion, the framework developed has a mean improvement of 2.93% in the accuracy of the recognition for a larger number of ADL and environments than previously reported. In the future, the achievements reported by this PhD research may be considered as a start point of the development of a personal digital life coach, but the number of ADL and environments recognized by the framework should be increased and the experiments should be performed with different types of devices (i.e., smartphones and smartwatches), and the data imputation and other machine learning methods should be explored in order to attempt to increase the reliability of the framework for the recognition of ADL and its environments.Após os recentes avanços tecnológicos e o crescente uso dos dispositivos móveis, como por exemplo os smartphones, várias soluções podem ser desenvolvidas para melhorar a qualidade de vida dos utilizadores no contexto de Ambientes de Vida Assistida (AVA) ou Ambient Assisted Living (AAL). Os dispositivos móveis integram vários sensores, tais como acelerómetro, giroscópio, magnetómetro, microfone e recetor de Sistema de Posicionamento Global (GPS), que permitem a aquisição de vários parâmetros físicos e fisiológicos para o reconhecimento de diferentes Atividades da Vida Diária (AVD) e os seus ambientes. A definição de AVD inclui um conjunto bem conhecido de tarefas que são tarefas básicas de autocuidado, baseadas nos tipos de habilidades que as pessoas geralmente aprendem na infância. Essas tarefas incluem alimentar-se, tomar banho, vestir-se, fazer os cuidados pessoais, caminhar, correr, pular, subir escadas, dormir, ver televisão, trabalhar, ouvir música, cozinhar, comer, entre outras. No contexto de AVA, alguns indivíduos (comumente chamados de utilizadores) precisam de assistência particular, seja porque o utilizador tem algum tipo de deficiência, seja porque é idoso, ou simplesmente porque o utilizador precisa/quer monitorizar e treinar o seu estilo de vida. A investigação e desenvolvimento de sistemas que fornecem algum tipo de assistência particular está em crescente em muitas áreas de aplicação. Em particular, no futuro, o reconhecimento das AVD é uma parte importante para o desenvolvimento de um assistente pessoal digital, fornecendo uma assistência pessoal de baixo custo aos diferentes tipos de pessoas. pessoas. Para ajudar no reconhecimento das AVD, os ambientes em que estas se desenrolam devem ser reconhecidos para aumentar a fiabilidade destes sistemas. O foco principal desta Tese é o desenvolvimento de métodos para a fusão e classificação dos dados adquiridos a partir dos sensores disponíveis nos dispositivos móveis, para o reconhecimento quase em tempo real das AVD, tendo em consideração a grande diversidade das características dos dispositivos móveis disponíveis no mercado. Para atingir este objetivo, esta Tese iniciou-se com a revisão dos métodos e tecnologias existentes para definir a arquitetura e os módulos do novo método de identificação das AVD. Com esta revisão da literatura e com base no conhecimento adquirido sobre os sensores disponíveis nos dispositivos móveis disponíveis no mercado, um conjunto de tarefas que podem ser identificadas foi definido para as pesquisas e desenvolvimentos desta Tese. Esta revisão também identifica os principais conceitos para o desenvolvimento do novo método de identificação das AVD, utilizando os sensores, são eles: aquisição de dados, processamento de dados, correção de dados, imputação de dados, extração de características, fusão de dados e extração de resultados recorrendo a métodos de inteligência artificial. Um dos desafios está relacionado aos diferentes tipos de dados adquiridos pelos diferentes sensores, mas outros desafios foram encontrados, sendo os mais relevantes o ruído ambiental, o posicionamento do dispositivo durante a realização das atividades diárias, as capacidades limitadas dos dispositivos móveis. As diferentes características das pessoas podem igualmente influenciar a criação dos métodos, escolhendo pessoas com diferentes estilos de vida e características físicas para a aquisição e identificação dos dados adquiridos a partir de sensores. Com base nos dados adquiridos, realizou-se o processamento dos dados, implementando-se métodos de correção dos dados e a extração de características, para iniciar a criação do novo método para o reconhecimento das AVD. Os métodos de imputação de dados foram excluídos da implementação, pois não iriam influenciar os resultados da identificação das AVD e dos ambientes, na medida em que são utilizadas as características extraídas de um conjunto de dados adquiridos durante um intervalo de tempo definido. A seleção dos sensores utilizáveis, bem como das AVD identificáveis, permitirá o desenvolvimento de um método que, considerando o uso de tecnologias para a fusão de dados adquiridos com múltiplos sensores em coordenação com outras informações relativas ao contexto do utilizador, tais como a agenda do utilizador, permitindo estabelecer um perfil de tarefas que o utilizador realiza diariamente. Com base nos resultados obtidos na literatura, o método escolhido para o reconhecimento das AVD são as diferentes variantes das Redes Neuronais Artificiais (RNA), incluindo Multilayer Perceptron (MLP), Feedforward Neural Networks (FNN) with Backpropagation and Deep Neural Networks (DNN). No final, após a criação dos métodos para cada fase do método para o reconhecimento das AVD e ambientes, a implementação sequencial dos diferentes métodos foi realizada num dispositivo móvel para testes adicionais. Após a definição da estrutura do método para o reconhecimento de AVD e ambientes usando dispositivos móveis, verificou-se que a aquisição de dados pode ser realizada com os métodos comuns. Após a aquisição de dados, os mesmos devem ser processados no módulo de processamento de dados, que inclui os métodos de correção de dados e de extração de características. O método de correção de dados utilizado para sensores de movimento e magnéticos é o filtro passa-baixo de modo a reduzir o ruído, mas para os dados acústicos, a Transformada Rápida de Fourier (FFT) foi aplicada para extrair as diferentes frequências. Após a correção dos dados, as diferentes características foram extraídas com base nos tipos de sensores usados, sendo a média, desvio padrão, variância, valor máximo, valor mínimo e mediana de dados adquiridos pelos sensores magnéticos e de movimento, a média, desvio padrão, variância e mediana dos picos máximos calculados com base nos dados adquiridos pelos sensores magnéticos e de movimento, as cinco maiores distâncias entre os picos máximos calculados com os dados adquiridos dos sensores de movimento e magnéticos, a média, desvio padrão, variância e 26 Mel-Frequency Cepstral Coefficients (MFCC) das frequências obtidas com FFT com base nos dados obtidos a partir do microfone, e a distância calculada com os dados adquiridos pelo recetor de GPS. Após a extração das características, as mesmas são agrupadas em diferentes conjuntos de dados para a aplicação dos métodos de RNA de modo a descobrir o método e o conjunto de características que reporta melhores resultados. O módulo de classificação de dados foi incrementalmente desenvolvido, começando com a identificação das AVD comuns com sensores magnéticos e de movimento, i.e., andar, correr, subir escadas, descer escadas e parado. Em seguida, os ambientes são identificados com dados de sensores acústicos, i.e., quarto, bar, sala de aula, ginásio, cozinha, sala de estar, hall, rua e biblioteca. Com base nos ambientes reconhecidos e os restantes sensores disponíveis nos dispositivos móveis, os dados adquiridos dos sensores magnéticos e de movimento foram combinados com o ambiente reconhecido para diferenciar algumas atividades sem movimento (i.e., dormir e ver televisão), onde o número de atividades reconhecidas nesta fase aumenta com a fusão da distância percorrida, extraída a partir dos dados do recetor GPS, permitindo também reconhecer a atividade de conduzir. Após a implementação dos três métodos de classificação com diferentes números de iterações, conjuntos de dados e configurações numa máquina com alta capacidade de processamento, os resultados relatados provaram que o melhor método para o reconhecimento das atividades comuns de AVD e atividades sem movimento é o método DNN, mas o melhor método para o reconhecimento de ambientes é o método FNN with Backpropagation. Dependendo do número de sensores utilizados, esta implementação reporta uma exatidão média entre 85,89% e 89,51% para o reconhecimento das AVD comuns, igual a 86,50% para o reconhecimento de ambientes, e igual a 100% para o reconhecimento de atividades sem movimento, reportando uma exatidão global entre 85,89% e 92,00%. A última etapa desta Tese foi a implementação do método nos dispositivos móveis, verificando que o método FNN requer um alto poder de processamento para o reconhecimento de ambientes e os resultados reportados com estes dispositivos são inferiores aos resultados reportados com a máquina com alta capacidade de processamento utilizada no desenvolvimento do método. Assim, o método DNN foi igualmente implementado para o reconhecimento dos ambientes com os dispositivos móveis. Finalmente, os resultados relatados com os dispositivos móveis reportam uma exatidão entre 86,39% e 89,15% para o reconhecimento das AVD comuns, igual a 45,68% para o reconhecimento de ambientes, e igual a 100% para o reconhecimento de atividades sem movimento, reportando uma exatidão geral entre 58,02% e 89,15%. Com base nos resultados relatados na literatura, os resultados do método desenvolvido mostram uma melhoria residual, mas os resultados desta Tese identificam mais AVD que os demais estudos disponíveis na literatura. A melhoria no reconhecimento das AVD com base na média das exatidões é igual a 2,93%, mas o número máximo de AVD e ambientes reconhecidos pelos estudos disponíveis na literatura é 13, enquanto o número de AVD e ambientes reconhecidos com o método implementado é 16. Assim, o método desenvolvido tem uma melhoria de 2,93% na exatidão do reconhecimento num maior número de AVD e ambientes. Como trabalho futuro, os resultados reportados nesta Tese podem ser considerados um ponto de partida para o desenvolvimento de um assistente digital pessoal, mas o número de ADL e ambientes reconhecidos pelo método deve ser aumentado e as experiências devem ser repetidas com diferentes tipos de dispositivos móveis (i.e., smartphones e smartwatches), e os métodos de imputação e outros métodos de classificação de dados devem ser explorados de modo a tentar aumentar a confiabilidade do método para o reconhecimento das AVD e ambientes

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Investigating the attainment of optimum data quality for EHR Big Data: proposing a new methodological approach

    Get PDF
    The value derivable from the use of data is continuously increasing since some years. Both commercial and non-commercial organisations have realised the immense benefits that might be derived if all data at their disposal could be analysed and form the basis of decision taking. The technological tools required to produce, capture, store, transmit and analyse huge amounts of data form the background to the development of the phenomenon of Big Data. With Big Data, the aim is to be able to generate value from huge amounts of data, often in non-structured format and produced extremely frequently. However, the potential value derivable depends on general level of governance of data, more precisely on the quality of the data. The field of data quality is well researched for traditional data uses but is still in its infancy for the Big Data context. This dissertation focused on investigating effective methods to enhance data quality for Big Data. The principal deliverable of this research is in the form of a methodological approach which can be used to optimize the level of data quality in the Big Data context. Since data quality is contextual, (that is a non-generalizable field), this research study focuses on applying the methodological approach in one use case, in terms of the Electronic Health Records (EHR). The first main contribution to knowledge of this study systematically investigates which data quality dimensions (DQDs) are most important for EHR Big Data. The two most important dimensions ascertained by the research methods applied in this study are accuracy and completeness. These are two well-known dimensions, and this study confirms that they are also very important for EHR Big Data. The second important contribution to knowledge is an investigation into whether Artificial Intelligence with a special focus upon machine learning could be used in improving the detection of dirty data, focusing on the two data quality dimensions of accuracy and completeness. Regression and clustering algorithms proved to be more adequate for accuracy and completeness related issues respectively, based on the experiments carried out. However, the limits of implementing and using machine learning algorithms for detecting data quality issues for Big Data were also revealed and discussed in this research study. It can safely be deduced from the knowledge derived from this part of the research study that use of machine learning for enhancing data quality issues detection is a promising area but not yet a panacea which automates this entire process. The third important contribution is a proposed guideline to undertake data repairs most efficiently for Big Data; this involved surveying and comparing existing data cleansing algorithms against a prototype developed for data reparation. Weaknesses of existing algorithms are highlighted and are considered as areas of practice which efficient data reparation algorithms must focus upon. Those three important contributions form the nucleus for a new data quality methodological approach which could be used to optimize Big Data quality, as applied in the context of EHR. Some of the activities and techniques discussed through the proposed methodological approach can be transposed to other industries and use cases to a large extent. The proposed data quality methodological approach can be used by practitioners of Big Data Quality who follow a data-driven strategy. As opposed to existing Big Data quality frameworks, the proposed data quality methodological approach has the advantage of being more precise and specific. It gives clear and proven methods to undertake the main identified stages of a Big Data quality lifecycle and therefore can be applied by practitioners in the area. This research study provides some promising results and deliverables. It also paves the way for further research in the area. Technical and technological changes in Big Data is rapidly evolving and future research should be focusing on new representations of Big Data, the real-time streaming aspect, and replicating same research methods used in this current research study but on new technologies to validate current results

    Collaborative streaming of on demand videos for mobile devices

    Get PDF
    The 3G and LTE technologies made video on-demand a popular entertainment for users on the go. However, bandwidth insufficiency is an obstacle in providing high quality and smooth video playout in cellular networks. The objective of the proposed PhD research is to provide a user with high quality video streaming with minimal stalling time by aggregating bandwidth from ubiquitous nearby devices that may be using different radio networks
    corecore