676 research outputs found

    HyperSNN: A new efficient and robust deep learning model for resource constrained control applications

    Full text link
    In light of the increasing adoption of edge computing in areas such as intelligent furniture, robotics, and smart homes, this paper introduces HyperSNN, an innovative method for control tasks that uses spiking neural networks (SNNs) in combination with hyperdimensional computing. HyperSNN substitutes expensive 32-bit floating point multiplications with 8-bit integer additions, resulting in reduced energy consumption while enhancing robustness and potentially improving accuracy. Our model was tested on AI Gym benchmarks, including Cartpole, Acrobot, MountainCar, and Lunar Lander. HyperSNN achieves control accuracies that are on par with conventional machine learning methods but with only 1.36% to 9.96% of the energy expenditure. Furthermore, our experiments showed increased robustness when using HyperSNN. We believe that HyperSNN is especially suitable for interactive, mobile, and wearable devices, promoting energy-efficient and robust system design. Furthermore, it paves the way for the practical implementation of complex algorithms like model predictive control (MPC) in real-world industrial scenarios

    Aktivitätstracker im Alltag: Charakteristika von Motivation und User Diversity zur Erklärung individueller Nutzungstrajektorien

    Get PDF
    Die fortlaufend stärkere Durchdringung unseres Alltags mit digitalen Technologien wird besonders deutlich durch tragbare Geräte wie Smartphones, auf die jederzeit zugegriffen werden kann. Noch einen Schritt weiter gehen körpernah getragene, vernetzte Self-Tracking-Systeme wie Aktivitätstracker, welche kontinuierlich Bewegungsdaten und physiologische Parameter erfassen, algorithmisch aufbereiten und an die Nutzer*innen als quantifiziertes Feedback, oft zur Verhaltensmodifikation, zurückmelden. Diese spezifische Form der Interaktion zwischen Mensch und Technologie – körpernah, kontinuierlich, quantifiziert, vernetzt und persuasiv – ist für die Ingenieurpsychologie besonders relevant, da sie eine sehr enge Verbindung von Körper und Technik erfordert und spezifische Herausforderungen für die Stärkung der Selbstbestimmung ihrer Nutzer*innen bereithält. Einerseits dienen Aktivitätstracker der erleichterten Selbstreflexion durch Sichtbarmachung von Zusammenhängen, die zuvor verborgen blieben, wie etwa zwischen sportlicher Aktivität und Ruheherzfrequenz. Andererseits sollen Aktivitätstracker die Motivation für körperliche Verhaltensänderungen steigern. Die Nutzung von Aktivitätstrackern bewegt sich also potenziell in einem Spannungsfeld zwischen der Steigerung von Selbstbestimmung durch erweitertes Wissen sowie Aufzeigen von Handlungsoptionen und der Einschränkung der Selbstbestimmung durch persuasive Strategien zur Motivationssteigerung. Dieses Spannungsfeld bedingt neue Ansätze zur Beziehungsgestaltung zwischen Mensch und Trackingsystem. In der empirischen Forschung zur Nutzung von Aktivitätstrackern wird häufig darauf hingewiesen, dass ein Großteil der Nutzenden nach wenigen Wochen oder Monaten den kontinuierlichen Gebrauch beendet. Dieser Befund deutet daraufhin, dass Barrieren existieren, die die Langzeitnutzung unwahrscheinlicher machen. Des Weiteren wird immer wieder über negative Effekte der Trackernutzung berichtet, beispielsweise Stress. Allerdings ist auch bekannt, dass zahlreiche andere Personen ihr Trackingsystem über Jahre hinweg intensiv und erfolgreich gebrauchen. Es lässt sich also in Bezug auf die Nutzungstrajektorien eine bedeutsame Varianz feststellen, die es zu erklären gilt, um Self-Tracking-Anwendungen für diverse Nutzende gewinnbringend zu gestalten. Um diesem Vorhaben gerecht zu werden, ist es unabdingbar zu verstehen, welche individuellen Differenzen in der Gruppe der Nutzer*innen die Interaktion mit dem Aktivitätstracker, insbesondere in Bezug auf motivationale Aspekte, prägen. Dieser Herausforderung stellt sich die vorliegende Dissertation und greift dazu auf etablierte Theorien und Konzepte der Persönlichkeits- und Sozialpsychologie zurück. Da der theoriegeleitete Einbezug von Personenmerkmalen in die ingenieurpsychologische Forschung noch wenig vorangetrieben war, bestand zu Beginn des Promotionsvorhabens die Notwendigkeit, ein Konstrukt zu konzeptualisieren, welches zum einen auf einem stabilen psychologischen Theoriefundament steht und zum anderen spezifisch auf den Kontext der Mensch-Technik-Interaktion zugeschnitten ist. Im Rahmen der vorliegenden Dissertation wurde aus diesem Grund an der Herleitung der interaktionsbezogenen Technikaffinität (ATI) als kontextspezifische Variante der Denkfreude und ihrer Messbarmachung gearbei-tet. Insgesamt umfassten die Datenerhebungen zur Bestimmung der Gütekriterien der ATI-Skala fünf Datensätze mit über 1500 Teilnehmenden. Das Resultat der Skalenentwicklung ist ein unidimensionales, ökonomisches, reliables und valides Erhebungsinstrument der interaktionsbezogenen Technikaffinität (Artikel 1). Als relativ stabiles Persönlichkeitsmerkmal, das die Motivation zur Auseinandersetzung mit Technik grundlegend beeinflusst, wurde ATI in die folgenden Studien zur Interaktion zwischen Mensch und Aktivitätstracker miteinbezogen. Um die alltägliche, individuelle Mensch-Tracker-Interaktion umfassend zu verstehen und erklären zu können, wie es zu den unterschiedlichen Nutzungsverläufen kommt, müssen verschiedene Phasen der Nutzung untersucht werden. Zunächst ist zu klären, welche Motivatoren Menschen eigentlich dazu veranlassen, mit der Trackernutzung zu beginnen. Weiterhin ist die Nutzungsphase selbst zu beleuchten, um zu beschreiben, wie sich die oben beschriebene, spezifische Form der Trackerinteraktion auf die Nutzungserfahrung und anhaltende Motivation auswirkt und wie sich negative Nutzungskonsequenzen bemerkbar machen. Schließlich sind zum Verständnis der Nutzungstrajektorien die Gründe für den Abbruch zu berücksichtigen, sodass auch die Phase nach der Nutzung relevant ist. Da sich diese Dissertation dezidiert damit beschäftigt, wie sich die Interaktion mit Aktivitätstrackern im Alltag gestaltet, ist die Untersuchung der Nutzung in Stichproben von tatsächlichen bzw. ehemaligen Aktivitätstracker-Nutzer*innen angezeigt. Aus diesem Grund wurden zwei Online-Erhebungen durchgeführt, um ebendiese Stichproben zu erreichen. Das Ziel der ersten Studie (N = 210) war die quantitative Analyse von Nutzungsmotivationen sowie unintendierten, negativen Effekten der Trackernutzung im Alltagsgebrauch. Es zeigte sich, dass das Tracken sowohl zum Selbstzweck (intrinsische Motivation) als auch zur Erreichung eines externen Ziels (extrinsische Motivation) durchgeführt wird und diese Motivationstypen oft gleichzeitig auftreten. Darüber hinaus konnte gezeigt werden, dass negative Effekte in Form von Motivationsverlusten in Bezug auf die Trackernutzung und die körperliche Aktivität eine Rolle im Alltag vieler Nutzer*innen spielen. Die Wahrscheinlichkeit des Auftretens dieser Effekte wird teilweise von Personenmerkmalen wie ATI und der Nutzungsmotivation bestimmt (Artikel 2). Die zweite Studie nahm ehemalige Nutzer*innen (N = 159) in den Blick und fokussierte auf die Erfassung der Gründe für den Nutzungsabbruch sowie die Stabilität der Abbruchentscheidung. Die Ergebnisse machten deutlich, dass zahlreiche Nutzungsbarrieren für die Entscheidung, den Tracker abzulegen, ausschlaggebend sind. Außerdem sind die Abbruchentscheidungen oft nicht permanent, was auf eine episodische Trackernutzung hindeutet (Artikel 3). Schließlich wurden wiederum Personenmerkmale und außerdem Interaktionscharakteristika in Betracht gezogen, um die große Varianz hinsichtlich Abbruchgründen und -permanenz zu erklären. Die Analysen offenbarten unter anderem, dass eine episodische Nutzung (d. h. nicht endgültige Beendigung) wahrscheinlicher ist, wenn sich die Nutzungsmotivation durch einen hohen Grad an Selbstbestimmung auszeichnet (Artikel 4). Abschließend betonen die Befunde der Dissertation die zentrale Rolle der wahrgenommenen Selbstbestimmung im Kontext der Mensch-Tracker-Interaktion und geben Anlass für Designrichtlinien, die die Beziehung zwischen Trackingsystem und Nutzer*in mit all ihren gegenseitigen Abhängigkeiten und individuellen Merkmalen berücksichtigen, um so die Selbstbestimmung zu erhalten oder sogar durch vertieftes Selbstwissen zu stärken.The ongoing permeation of our daily life with digital technologies is particularly evident in wearable devices such as smartphones, which can be accessed at any time. Wearable, connected self-tracking systems such as activity trackers go even a step further. They continuously record movement data and physiological parameters, process them algorithmically and provide quantified feedback to the user, often for behavioral modification. This specific form of interaction between humans and technology – close to the body, continuous, quantified, connected, and persuasive – is particularly relevant for engineering psychology, as it requires a very close connection between body and technology and poses specific challenges for strengthening the self-determination of its users. That is, on the one hand, activity trackers serve to facilitate self-reflection by revealing relationships which were previously hidden, such as the relationship between physical activity and resting heart rate. On the other hand, activity trackers are intended to enhance motivation for physical behavioral changes. The use of activity trackers thus potentially moves in a field of tension between the increase of self-determination through expanded knowledge as well as the identification of behavioral options and the restriction of self-determination through persuasive strategies to increase motivation. This tension requires new approaches to the design of relationships between people and tracking systems. Empirical research on activity tracker usage often highlights that a large proportion of users stop continuous use after a few weeks or months. This finding suggests the existence of barriers that make long-term use less likely. Furthermore, negative effects of tracker use, such as stress, are repeatedly reported. However, it is also known that many other users have enjoyed intensive and successful use of their tracking system for many years. Thus, a significant variance in usage trajectories can be observed, which needs to be explained in order to make self-tracking applications beneficial for diverse users. To meet this goal, it is essential to understand which individual differences in the group of users shape the interaction with their activity tracker, especially with respect to motivational aspects. This dissertation addresses this challenge by drawing on established theories and concepts of personality and social psychology. At the beginning of the dissertation project, the theory-based inclusion of personal characteristics in engineering psychology had not yet been sufficiently advanced. Thus, there was a need to conceptualize a construct which, on the one hand, stands on a stable psychological theoretical foundation and, on the other hand, is specifically tailored to the context of human-technology interaction. For this reason, the conceptualization of affinity for technology interaction (ATI) as a context-specific variant of need for cognition and its measurability took place within the context of the dissertation. In total, the data collection to determine the quality criteria of the ATI scale comprised five data sets with over 1500 participants. The result of the scale development is a unidimensional, economical, reliable, and valid survey instrument of ATI (Article 1). As a relatively stable personality trait that fundamentally influences motivation to engage with technology, ATI was included in subsequent studies of human-activity tracker interaction. In order to comprehensively understand the everyday, individual human-tracker interaction and to be able to explain how the various usage patterns occur, different phases of usage must be examined. First, it must be clarified which motivators actually cause a person to start using a tracker. Furthermore, the usage phase itself must be examined to describe how the specific form of tracker interaction described above affects the usage experience and ongoing motivation, and how negative usage consequences become apparent. Finally, to understand usage trajectories, the reasons for discontinuation need to be considered, hence the post-usage phase is also relevant. Since this dissertation decidedly focuses on the interaction with activity trackers in everyday life, the investigation of actual or former activity tracker users is indicated. For this reason, two online surveys were conducted to assess these actual (former) users. The aim of the first study (N = 210) was to quantitatively analyze motivations for usage as well as unintended, negative effects of tracker usage in daily use. It was shown that tracking is performed both for an end in itself (intrinsic motivation) and to achieve an external goal (extrinsic motivation), and that these motivation types often occur simultaneously. Furthermore, it was shown that negative effects in terms of motivation losses with respect to tracker use as well as physical activity play a role in many users' daily lives. The likelihood of these effects occurring is partly determined by personal characteristics such as ATI and motivation for usage (Article 2). The second study examined former users (N = 159) and focused on the reasons for discontinuing use and the stability of abandonment. The results indicated that numerous barriers to use are decisive for the decision to discontinue tracking. In addition, abandonment decisions are often not permanent, suggesting episodic tracker use (Article 3). Finally, person and interaction characteristics were considered to explain the large variance in abandonment reasons and permanence. The analyses revealed, among other things, that episodic use (i.e., not definitive termination) is more likely when the motivation for usage is characterized by a high degree of self-determination (Article 4). In conclusion, the findings of the dissertation emphasize the central role of perceived self-determination in the context of human-tracker interaction and give rise to design guidelines that take into account the relationship between the tracking system and the user with all its interdependencies and individual characteristics in order to preserve or even strengthen self-determination through deeper self-knowledge

    Stress detection in lifelog data for improved personalized lifelog retrieval system

    Get PDF
    Stress can be categorized into acute and chronic types, with acute stress having short-term positive effects in managing hazardous situations, while chronic stress can adversely impact mental health. In a biological context, stress elicits a physiological response indicative of the fight-or-flight mechanism, accompanied by measurable changes in physiological signals such as blood volume pulse (BVP), galvanic skin response (GSR), and skin temperature (TEMP). While clinical-grade devices have traditionally been used to measure these signals, recent advancements in sensor technology enable their capture using consumer-grade wearable devices, providing opportunities for research in acute stress detection. Despite these advancements, there has been limited focus on utilizing low-resolution data obtained from sensor technology for early stress detection and evaluating stress detection models under real-world conditions. Moreover, the potential of physiological signals to infer mental stress information remains largely unexplored in lifelog retrieval systems. This thesis addresses these gaps through empirical investigations and explores the potential of utilizing physiological signals for stress detection and their integration within the state-of-the-art (SOTA) lifelog retrieval system. The main contributions of this thesis are as follows. Firstly, statistical analyses are conducted to investigate the feasibility of using low-resolution data for stress detection and emphasize the superiority of subject-dependent models over subject-independent models, thereby proposing the optimal approach to training stress detection models with low-resolution data. Secondly, longitudinal stress lifelog data is collected to evaluate stress detection models in real-world settings. It is proposed that training lifelog models on physiological signals in real-world settings is crucial to avoid detection inaccuracies caused by differences between laboratory and free-living conditions. Finally, a state-of-the-art lifelog interactive retrieval system called \lifeseeker is developed, incorporating the stress-moment filter function. Experimental results demonstrate that integrating this function improves the overall performance of the system in both interactive and non-interactive modes. In summary, this thesis contributes to the understanding of stress detection applied in real-world settings and showcases the potential of integrating stress information for enhancing personalized lifelog retrieval system performance

    Vehículo autónomo de siembra y labrado para la agricultura andina del Perú

    Get PDF
    La agricultura es una actividad milenaria realizada por diversas culturas para brindar sustento económico y alimenticio. De la misma manera que la humanidad se ha desarrollado debido a las innovaciones tecnológicas, la agricultura ha formado parte de este crecimiento. Actualmente, las industrias impulsan la agricultura de precisión, la cual emplea los avances tecnológicos para automatizar este proceso artesanal. Con ello se mejora la rentabilidad y precisión de la labor agrícola. No obstante, este tipo de agricultura está enfocada en campos de cultivo dedicados a la industria. Por ende, la región de la sierra del Perú no emplea avances tecnológicos de esta magnitud, puesto que presenta una geografía abrupta y campos de cultivo reducidos (parcelas). En este trabajo de investigación se propone desarrollar un vehículo agrícola autónomo para actividades de sembrado y labrado en campos de cultivo de la sierra peruana. El trabajo de investigación emplea la metodología de diseño mecatrónico VDI 2221, para el cual se desarrolló el estudio del estado de las tecnologías. Asimismo, se estableció los requerimientos de la propuesta solución y el diagrama de funciones de este. A partir de lo estudiado se propuso soluciones para cada función del sistema mediante una matriz morfológica, con lo cual se propusieron tres conceptos solución que fueron contrastados mediante una evaluación técnica económica para determinar el concepto solución óptimo. El desarrollo del concepto solución óptimo consta del diseño mecánico, electrónico y de control del sistema integrado. El diseño mecánico se compone de una estructura principal; un mecanismo de labrado con una herramienta para la creación de surcos en tierra suelta, un sistema de desplazamiento, dirección y suspensión del vehículo en terrenos con desniveles y pendientes máximas de 30°; y una estructura de almacenamiento de semillas con un mecanismo de siembra directa por grupos. Los mecanismos fueron validados con un factor de seguridad 1.5 como mínimo y un tiempo de recuperación en la suspensión de 3.2 s. Por una parte, el diseño electrónico se realiza la selección de sensores para la autonomía; actuadores para el impulsar los mecanismos diseñados; sistema de comunicación; periféricos de interacción y seguridad; unidades de control para el procesamiento de algoritmos, y envió y recepción de señales; y fuentes de energía con sus respectivos reguladores. A partir de ello se obtiene un vehículo capaz de tener una autonomía de funcionamiento de 2.5 h con un factor de seguridad de 1.2. Por otra parte, en el diseño de control se desarrolla un algoritmo de autonomía, el cual realiza la labor agrícola en un entorno predeterminado. Los resultados de su funcionamiento se encuentran en validación. Finalmente, la sección de costos estima el valor monetario para la creación del sistema, este valor se mantiene por debajo del costo de los modelos industriales para vehículos autónomos destinados a la agricultura de presión

    Study of soft materials, flexible electronics, and machine learning for fully portable and wireless brain-machine interfaces

    Get PDF
    Over 300,000 individuals in the United States are afflicted with some form of limited motor function from brainstem or spinal-cord related injury resulting in quadriplegia or some form of locked-in syndrome. Conventional brain-machine interfaces used to allow for communication or movement require heavy, rigid components, uncomfortable headgear, excessive numbers of electrodes, and bulky electronics with long wires that result in greater data artifacts and generally inadequate performance. Wireless, wearable electroencephalograms, along with dry non-invasive electrodes can be utilized to allow recording of brain activity on a mobile subject to allow for unrestricted movement. Additionally, multilayer microfabricated flexible circuits, when combined with a soft materials platform allows for imperceptible wearable data acquisition electronics for long term recording. This dissertation aims to introduce new electronics and training paradigms for brain-machine interfaces to provide remedies in the form of communication and movement for these individuals. Here, training is optimized by generating a virtual environment from which a subject can achieve immersion using a VR headset in order to train and familiarize with the system. Advances in hardware and implementation of convolutional neural networks allow for rapid classification and low-latency target control. Integration of materials, mechanics, circuit and electrode design results in an optimized brain-machine interface allowing for rehabilitation and overall improved quality of life.Ph.D

    Seamless Multimodal Biometrics for Continuous Personalised Wellbeing Monitoring

    Full text link
    Artificially intelligent perception is increasingly present in the lives of every one of us. Vehicles are no exception, (...) In the near future, pattern recognition will have an even stronger role in vehicles, as self-driving cars will require automated ways to understand what is happening around (and within) them and act accordingly. (...) This doctoral work focused on advancing in-vehicle sensing through the research of novel computer vision and pattern recognition methodologies for both biometrics and wellbeing monitoring. The main focus has been on electrocardiogram (ECG) biometrics, a trait well-known for its potential for seamless driver monitoring. Major efforts were devoted to achieving improved performance in identification and identity verification in off-the-person scenarios, well-known for increased noise and variability. Here, end-to-end deep learning ECG biometric solutions were proposed and important topics were addressed such as cross-database and long-term performance, waveform relevance through explainability, and interlead conversion. Face biometrics, a natural complement to the ECG in seamless unconstrained scenarios, was also studied in this work. The open challenges of masked face recognition and interpretability in biometrics were tackled in an effort to evolve towards algorithms that are more transparent, trustworthy, and robust to significant occlusions. Within the topic of wellbeing monitoring, improved solutions to multimodal emotion recognition in groups of people and activity/violence recognition in in-vehicle scenarios were proposed. At last, we also proposed a novel way to learn template security within end-to-end models, dismissing additional separate encryption processes, and a self-supervised learning approach tailored to sequential data, in order to ensure data security and optimal performance. (...)Comment: Doctoral thesis presented and approved on the 21st of December 2022 to the University of Port

    Efficient Security Protocols for Constrained Devices

    Get PDF
    During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused significant disruptions in recent years.Many cyber-physical devices are categorized as constrained devices.A constrained device is characterized by one or more of the following limitations: limited memory, a less powerful CPU, or a limited communication interface.Many constrained devices are also powered by a battery or energy harvesting, which limits the available energy budget.Devices must be efficient to make the most of the limited resources.Mitigating cyber attacks is a complex task, requiring technical and organizational measures.Constrained cyber-physical devices require efficient security mechanisms to avoid overloading the systems limited resources.In this thesis, we present research on efficient security protocols for constrained cyber-physical devices.We have implemented and evaluated two state-of-the-art protocols, OSCORE and Group OSCORE.These protocols allow end-to-end protection of CoAP messages in the presence of untrusted proxies.Next, we have performed a formal protocol verification of WirelessHART, a protocol for communications in an industrial control systems setting.In our work, we present a novel attack against the protocol.We have developed a novel architecture for industrial control systems utilizing the Digital Twin concept.Using a state synchronization protocol, we propagate state changes between the digital and physical twins.The Digital Twin can then monitor and manage devices.We have also designed a protocol for secure ownership transfer of constrained wireless devices. Our protocol allows the owner of a wireless sensor network to transfer control of the devices to a new owner.With a formal protocol verification, we can guarantee the security of both the old and new owners.Lastly, we have developed an efficient Private Stream Aggregation (PSA) protocol.PSA allows devices to send encrypted measurements to an aggregator.The aggregator can combine the encrypted measurements and calculate the decrypted sum of the measurements.No party will learn the measurement except the device that generated it

    Novel DVFS Methodologies For Power-Efficient Mobile MPSoC

    Get PDF
    Low power mobile computing systems such as smartphones and wearables have become an integral part of our daily lives and are used in various ways to enhance our daily lives. Majority of modern mobile computing systems are powered by multi-processor System-on-a-Chip (MPSoC), where multiple processing elements are utilized on a single chip. Given the fact that these devices are battery operated most of the times, thus, have limited power supply and the key challenges include catering for performance while reducing the power consumption. Moreover, the reliability in terms of lifespan of these devices are also affected by the peak thermal behaviour on the device, which retrospectively also make such devices vulnerable to temperature side-channel attack. This thesis is concerned with performing Dynamic Voltage and Frequency Scaling (DVFS) on different processing elements such as CPU & GPU, and memory unit such as RAM to address the aforementioned challenges. Firstly, we design a Computer Vision based machine learning technique to classify applications automatically into different categories of workload such that DVFS could be performed on the CPU to reduce the power consumption of the device while executing the application. Secondly, we develop a reinforcement learning based agent to perform DVFS on CPU and GPU while considering the user's interaction with such devices to optimize power consumption and thermal behaviour. Next, we develop a heuristic based automated agent to perform DVFS on CPU, GPU and RAM to optimize the same while executing an application. Finally, we explored the affect of DVFS on CPUs leading to vulnerabilities against temperature side-channel attack and hence, we also designed a methodology to secure against such attack while improving the reliability in terms of lifespan of such devices
    corecore