877 research outputs found

    A framework of integrating knowledge of human factors to facilitate HMI and collaboration in intelligent manufacturing

    Get PDF
    Recent developments in the field of intelligent manufacturing have led to increased levels of automation and robotic operators becoming commonplace within manufacturing processes. However, the human component of such systems remains prevalent, resulting in significant disturbance and uncertainty. Consequently, semi-automated processes are difficult to optimise. This paper studies the relationships between robotic and human operators to develop the understanding of how the human influence affects these production processes, and proposes a framework to integrate and implement knowledge of such factors, with the aim of improving Human-Machine-Interaction, facilitating bi-directional collaboration, and increasing productivity and quality, supported by an example case-study

    Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems

    Get PDF
    Occupancy detection of a building has a wide range of applications. Areas such as emergency management, home automation and building energy management can benefit from the knowledge of occupants' locations to provide better results and improve their efficiency. Bluetooth Low Energy (BLE) beacons installed inside a building are able to provide information on an occupant's location. Since, however, their operation is based on broadcasting advertisements, they are vulnerable to network security breaches. In this work, we evaluate the effect of two types of spoofing attacks on a BLE based occupancy detection system. The system is composed of BLE beacons installed inside the building, a mobile application installed on occupants’ mobile phones and a remote control server. Occupancy detection is performed by a classifier installed on the remote server. We use our real-world experimental results to evaluate the impact of these attacks on the system's operation, particularly in terms of the accuracy with which it can provide location information

    Location-enhanced activity recognition in indoor environments using off the shelf smart watch technology and BLE beacons

    Get PDF
    Activity recognition in indoor spaces benefits context awareness and improves the efficiency of applications related to personalised health monitoring, building energy management, security and safety. The majority of activity recognition frameworks, however, employ a network of specialised building sensors or a network of body-worn sensors. As this approach suffers with respect to practicality, we propose the use of commercial off-the-shelf devices. In this work, we design and evaluate an activity recognition system composed of a smart watch, which is enhanced with location information coming from Bluetooth Low Energy (BLE) beacons. We evaluate the performance of this approach for a variety of activities performed in an indoor laboratory environment, using four supervised machine learning algorithms. Our experimental results indicate that our location-enhanced activity recognition system is able to reach a classification accuracy ranging from 92% to 100%, while without location information classification accuracy it can drop to as low as 50% in some cases, depending on the window size chosen for data segmentation

    Occupancy detection for building emergency management using BLE beacons

    Get PDF
    Being able to reliable estimate the occupancy of areas inside a building can prove beneficial for managing an emergency situation, as it allows for more efficient allocation of resources such as emergency personnel. In indoor environments, however, occupancy detection can be a very challenging task. A solution to this can be provided by the use of Bluetooth Low Energy (BLE) beacons installed in the building. In this work we evaluate the performance of a BLE based occupancy detection system geared towards emergency situations that take place inside buildings. The system is composed of BLE beacons installed inside the building, a mobile application installed on occupants' mobile phones and a remote control server. Our approach does not require any processing to take place on the occupants' mobile phones, since the occupancy detection is based on a classifier installed on the remote server. Our real-world experiments indicated that the system can provide high classification accuracy for different numbers of installed beacons and occupant movement patterns

    Bluetooth low energy based occupancy detection for emergency management

    Get PDF
    A reliable estimation of an area’s occupancy can be beneficial to a large variety of applications, and especially in relation to emergency management. For example, it can help detect areas of priority and assign emergency personnel in an efficient manner. However, occupancy detection can be a major challenge in indoor environments. A recent technology that can prove very useful in that respect is Bluetooth Low Energy (BLE), which is able to provide the location of a user using information from beacons installed in a building. Here, we evaluate BLE as the primary means of occupancy estimation in an indoor environment, using a prototype system composed of BLE beacons, a mobile application and a server. We employ three machine learning approaches (k-nearest neighbours, logistic regression and support vector machines) to determine the presence of occupants inside specific areas of an office space and we evaluate our approach in two independent experimental settings. Our experimental results indicate that combining BLE with machine learning is certainly promising as the basis for occupancy estimation

    Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices

    Get PDF
    The Human-as-a-Sensor (HaaS) paradigm, where it is human users rather than automated sensor systems that detect and report events or incidents has gained considerable traction over the last decades, especially as Internet-connected smartphones have helped develop an information sharing culture in society. In the law enforcement and civil protection space, HaaS is typically used to harvest information that enhances situational awareness regarding physical hazards, crimes and evolving emergencies. The trustworthiness of this information is typically studied in relation to the trustworthiness of the human sensors. However, malicious modification, prevention or delay of reports can also be the result of cyber or cyber-physical security breaches affecting the mobile devices and network infrastructure used to deliver HaaS reports. Examples of these can be denial of service attacks, where the timely delivery of reports is important, and location spoofing attacks, where the accuracy of the location of an incident is important. The aim of this paper is to introduce this cyber-trustworthiness aspect in HaaS and propose a mechanism for scoring reports in terms of their cyber-trustworthiness based on features of the mobile device that are monitored in real-time. Our initial results show that this is a promising line of work that can enhance the reliability of HaaS
    corecore