110 research outputs found

    Exploring Artificial Neural Networks Efficiency in Tiny Wearable Devices for Human Activity Recognition

    Get PDF
    The increasing diffusion of tiny wearable devices and, at the same time, the advent of machine learning techniques that can perform sophisticated inference, represent a valuable opportunity for the development of pervasive computing applications. Moreover, pushing inference on edge devices can in principle improve application responsiveness, reduce energy consumption and mitigate privacy and security issues. However, devices with small size and low-power consumption and factor form, like those dedicated to wearable platforms, pose strict computational, memory, and energy requirements which result in challenging issues to be addressed by designers. The main purpose of this study is to empirically explore this trade-off through the characterization of memory usage, energy consumption, and execution time needed by different types of neural networks (namely multilayer and convolutional neural networks) trained for human activity recognition on board of a typical low-power wearable device. Through extensive experimental results, obtained on a public human activity recognition dataset, we derive Pareto curves that demonstrate the possibility of achieving a 4Ă— reduction in memory usage and a 36Ă— reduction in energy consumption, at fixed accuracy levels, for a multilayer Perceptron network with respect to more sophisticated convolution network model

    A Review on Blockchain for the Internet of Medical Things: Definitions, Challenges, Applications, and Vision

    Get PDF
    none3noNowadays, there are a lot of new mobile devices that have the potential to assist healthcare professionals when working and help to increase the well-being of the people. These devices comprise the Internet of Medical Things, but it is generally difficult for healthcare institutions to meet compliance of their systems with new medical solutions efficiently. A technology that promises the sharing of data in a trust-less scenario is the Distributed Ledger Technology through its properties of decentralization, immutability, and transparency. The Blockchain and the Internet of Medical Things can be considered as at an early stage, and the implementations successfully applying the technology are not so many. Some aspects covered by these implementations are data sharing, interoperability of systems, security of devices, the opportunity of data monetization and data ownership that will be the focus of this review.openGioele Bigini;Valerio Freschi;Emanuele LattanziBigini, Gioele; Freschi, Valerio; Lattanzi, Emanuel

    Supporting Preemptive Multitasking in Wireless Sensor Networks

    Get PDF
    Supporting the concurrent execution of multiple tasks on lightweight sensor nodes could enable the deployment of independent applications on a shared wireless sensor network, thus saving cost and time by exploiting infrastructures which are typically underutilized if dedicated to a single task. Existing approaches to wireless sensor network programming provide limited support to concurrency at the cost of reducing the generality and the expressiveness of the language adopted. This paper presents a java-compatible platform for wireless sensor networks which provides a thorough support to preemptive multitasking while allowing the programmers to write their applications in java. The proposed approach has been implemented and tested on top of VirtualSense, an ultra-low-power wireless sensor mote providing a java-compatible runtime environment. Performance and scalability of the solution are discussed in light of extensive experiments performed on representative benchmarks

    Unstructured Handwashing Recognition using Smartwatch to Reduce Contact Transmission of Pathogens

    Full text link
    Current guidelines from the World Health Organization indicate that the SARS-CoV-2 coronavirus, which results in the novel coronavirus disease (COVID-19), is transmitted through respiratory droplets or by contact. Contact transmission occurs when contaminated hands touch the mucous membrane of the mouth, nose, or eyes so hands hygiene is extremely important to prevent the spread of the SARSCoV-2 as well as of other pathogens. The vast proliferation of wearable devices, such as smartwatches, containing acceleration, rotation, magnetic field sensors, etc., together with the modern technologies of artificial intelligence, such as machine learning and more recently deep-learning, allow the development of accurate applications for recognition and classification of human activities such as: walking, climbing stairs, running, clapping, sitting, sleeping, etc. In this work, we evaluate the feasibility of a machine learning based system which, starting from inertial signals collected from wearable devices such as current smartwatches, recognizes when a subject is washing or rubbing its hands. Preliminary results, obtained over two different datasets, show a classification accuracy of about 95% and of about 94% for respectively deep and standard learning techniques

    Decentralising the Internet of Medical Things with Distributed Ledger Technologies and Off-Chain Storages: a Proof of Concept

    Get PDF
    The privacy issue limits the Internet of Medical Things. Medical information would enhance new medical studies, formulate new treatments, and deliver new digital health technologies. Solving the sharing issue will have a triple impact: handling sensitive information easily, contributing to international medical advancements, and enabling personalised care. A possible solution could be to decentralise the notion of privacy, distributing it directly to users. Solutions enabling this vision are closely linked to Distributed Ledger Technologies. This technology would allow privacy-compliant solutions in contexts where privacy is the first need through its characteristics of immutability and transparency. This work lays the foundations for a system that can provide adequate security in terms of privacy, allowing the sharing of information between participants. We introduce an Internet of Medical Things application use case called “Balance”, networks of trusted peers to manage sensitive data access called “Halo”, and eventually leverage Smart Contracts to safeguard third party rights over data. This architecture should enable the theoretical vision of privacy-based healthcare solutions running in a decentralised manner

    Bootstrap Based Uncertainty Propagation for Data Quality Estimation in Crowdsensing Systems

    Get PDF
    The diffusion of mobile devices equipped with sensing, computation, and communication capabilities is opening unprecedented possibilities for high-resolution, spatio-temporal mapping of several phenomena. This novel data generation, collection, and processing paradigm, termed crowdsensing, lays upon complex, distributed cyberphysical systems. Collective data gathering from heterogeneous, spatially distributed devices inherently raises the question of how to manage different quality levels of contributed data. In order to extract meaningful information, it is, therefore, desirable to the introduction of effective methods for evaluating the quality of data. In this paper, we propose an approach aimed at systematic accuracy estimation of quantities provided by end-user devices of a crowd-based sensing system. This is obtained thanks to the combination of statistical bootstrap with uncertainty propagation techniques, leading to a consistent and technically sound methodology. Uncertainty propagation provides a formal framework for combining uncertainties, resulting from different quantities influencing a given measurement activity. Statistical bootstrap enables the characterization of the sampling distribution of a given statistics without any prior assumption on the type of statistical distributions behind the data generation process. The proposed approach is evaluated on synthetic benchmarks and on a real world case study. Cross-validation experiments show that confidence intervals computed by means of the presented technique show a maximum 1.5% variation with respect to interval widths computed by means of controlled standard Monte Carlo methods, under a wide range of operating conditions. In general, experimental results confirm the suitability and validity of the introduced methodology

    In-Band Controllable Radio Interference Generation for Wireless Sensor Networks

    Get PDF
    Interference signals negatively impact the performance of wireless embedded systems. The increased packet losses, delays, and energy consumption experienced by devices operating in environments subject to interference are particularly critical in constrained systems such as wireless sensor networks. The need to design and test systems for mitigating the effects of interference prompts for the capability of reproducing in a controllable way suitable interference signals. Solutions have been proposed recently, which tackle the problem by making use of 802.15.4 compliant radio transceivers, like those available on board of commonly used sensor nodes, thus paving the way for low cost and repeatable generation of interference which could reliably emulate real-world scenarios, for instance densely deployed networks. In this paper, we present an investigation regarding the emulation of interference sources by means of 802.15.4 radios on novel 32-bit wireless system-on-chip. The study is based on an extensive experimental evaluation, providing novel insights into the main features of the system. In particular, the effects of interference on the communication link, measured in terms of packet reception rate, are investigated for different parameters (namely, duty cycle and power of the interference signal, communication protocols, and payload size), and results are discussed concerning the feasibility of emulating background noise by means of the analyzed techniques

    Cosmological lepton asymmetry with a nonzero mixing angle \theta_{13}

    Get PDF
    While the baryon asymmetry of the Universe is nowadays well measured by cosmological observations, the bounds on the lepton asymmetry in the form of neutrinos are still significantly weaker. We place limits on the relic neutrino asymmetries using some of the latest cosmological data, taking into account the effect of flavor oscillations. We present our results for two different values of the neutrino mixing angle \theta_{13}, and show that for large \theta_{13} the limits on the total neutrino asymmetry become more stringent, diluting even large initial flavor asymmetries. In particular, we find that the present bounds are still dominated by the limits coming from Big Bang Nucleosynthesis, while the limits on the total neutrino mass from cosmological data are essentially independent of \theta_{13}. Finally, we perform a forecast for COrE, taken as an example of a future CMB experiment, and find that it could improve the limits on the total lepton asymmetry approximately by up to a factor 6.6.Comment: 11 pages, 7 figures, 5 tables. v2: updated COrE specifications. v3: matches Phys. Rev. D accepted versio

    On the Decentralization of Health Systems for Data Availability: a DLT-based Architecture

    Get PDF
    Mobile devices entered people's lives by leaps and bounds, offering various applications relying on private third-party entities to manage their users' data. Centralized control of personal health data endangers the privacy of the users directly involved. In the future, there will likely be a trend toward decentralizing the health data collection, relieving central entities of this task. This comes with several challenges in a decentralized environment, such as avoiding a single point of failure to guarantee data availability. The following work proposes an architecture based on Distributed Ledger Technology to allow users to decide on their data while ensuring availability by employing social networks. We will outline the mechanisms behind data storage and the implications of using smart contracts in the architecture. In concluding the work, we show the developed architecture and results deriving from its assessment, highlighting possible use cases applied to the specific health data management context
    • …
    corecore