9 research outputs found

    Context-Aware Human Activity Recognition (CAHAR) in-the-Wild Using Smartphone Accelerometer

    Get PDF

    Identifying Users with Wearable Sensors based on Activity Patterns

    Get PDF
    We live in a world where ubiquitous systems surround us in the form of automated homes, smart appliances and wearable devices. These ubiquitous systems not only enhance productivity but can also provide assistance given a variety of different scenarios. However, these systems are vulnerable to the risk of unauthorized access, hence the ability to authenticate the end-user seamlessly and securely is important. This paper presents an approach for user identification given the physical activity patterns captured using on-body wearable sensors, such as accelerometer, gyroscope, and magnetometer. Three machine learning classifiers have been used to discover the activity patterns of users given the data captured from wearable sensors. The recognition results prove that the proposed scheme can effectively recognize a user’s identity based on his/her daily living physical activity patterns

    An Approach towards Position-Independent Human Activity Recognition Model based on Wearable Accelerometer Sensor

    No full text
    The continuous progress in wearable sensing technologies has motivated the researchers to develop novel models for human activity and behavior monitoring. As wearable sensors possess more liberty in their placement at multiple positions on the user’s body to track human motion patterns, hence, they have been extensively utilized in activity recognition systems. However, wearable inertial sensors are prone to their position and orientation sensitivity, thus leading to poor recognition performance in real-time scenarios. Therefore, in this study, we address the problem of position-independent human activity recognition using the wearable sensor. In this aspect, we propose a set of linear and non-linear transformations for 3D-sensor data to minimize the position and orientation sensitivity of the inertial sensor. We also present a feature extraction framework to efficiently recognize human activities independent of any sensor position. Finally, we validate our proposed scheme using the PAMAP dataset, which achieves the best average performance of 94.7% and 91.7% for position-dependent and position-independent activity recognition

    Using Smartphone Accelerometer for Human Physical Activity and Context Recognition in-the-Wild

    No full text
    Adaptation of smart devices is frequently rising, where a new generation of smartphones is growing into an emerging platform for personal computing, monitoring, and private data processing. Smartphone sensing allows collecting data from immediate environments and surroundings to recognize human daily living activities and behavioral contexts. Although smartphone-based activity recognition is universal; however, there is a need for coinciding recognition of in-the-wild human physical activities and the associated contexts. This research work proposes a two-level scheme for in-the-wild recognition of human physical activities and the corresponding contexts based on the smartphone accelerometer data. Different classifiers are used for experimentation purposes, and the achieved results validate the efficiency of the proposed scheme

    A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.

    No full text
    Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8Ă—8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Formula: see text] on a projective line PL(F7) over a finite field F7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications
    corecore