136 research outputs found

    Use of Mobile Phones as Intelligent Sensors for Sound Input Analysis and Sleep State Detection

    Get PDF
    Sleep is not just a passive process, but rather a highly dynamic process that is terminated by waking up. Throughout the night a specific number of sleep stages that are repeatedly changing in various periods of time take place. These specific time intervals and specific sleep stages are very important for the wake up event. It is far more difficult to wake up during the deep NREM (2–4) stage of sleep because the rest of the body is still sleeping. On the other hand if we wake up during the mild (REM, NREM1) sleep stage it is a much more pleasant experience for us and for our bodies. This problem led the authors to undertake this study and develop a Windows Mobile-based device application called wakeNsmile. The wakeNsmile application records and monitors the sleep stages for specific amounts of time before a desired alarm time set by users. It uses a built-in microphone and determines the optimal time to wake the user up. Hence, if the user sets an alarm in wakeNsmile to 7:00 and wakeNsmile detects that a more appropriate time to wake up (REM stage) is at 6:50, the alarm will start at 6:50. The current availability and low price of mobile devices is yet another reason to use and develop such an application that will hopefully help someone to wakeNsmile in the morning. So far, the wakeNsmile application has been tested on four individuals introduced in the final section

    Algorithm for Dynamic Fingerprinting Radio Map Creation Using IMU Measurements

    Full text link
    While a vast number of location-based services appeared lately, indoor positioning solutions are developed to provide reliable position information in environments where traditionally used satellite-based positioning systems cannot provide access to accurate position estimates. Indoor positioning systems can be based on many technologies; however, radio networks and more precisely Wi-Fi networks seem to attract the attention of a majority of the research teams. The most widely used localization approach used in Wi-Fi-based systems is based on fingerprinting framework. Fingerprinting algorithms, however, require a radio map for position estimation. This paper will describe a solution for dynamic radio map creation, which is aimed to reduce the time required to build a radio map. The proposed solution is using measurements from IMUs (Inertial Measurement Units), which are processed with a particle filter dead reckoning algorithm. Reference points (RPs) generated by the implemented dead reckoning algorithm are then processed by the proposed reference point merging algorithm, in order to optimize the radio map size and merge similar RPs. The proposed solution was tested in a real-world environment and evaluated by the implementation of deterministic fingerprinting positioning algorithms, and the achieved results were compared with results achieved with a static radio map. The achieved results presented in the paper show that positioning algorithms achieved similar accuracy even with a dynamic map with a low density of reference points

    FLIR vs SEEK thermal cameras in biomedicine: comparative diagnosis through infrared thermography

    Get PDF
    Background: In biomedicine, infrared thermography is the most promising technique among other conventional methods for revealing the differences in skin temperature, resulting from the irregular temperature dispersion, which is the significant signaling of diseases and disorders in human body. Given the process of detecting emitted thermal radiation of human body temperature by infrared imaging, we, in this study, present the current utility of thermal camera models namely FLIR and SEEK in biomedical applications as an extension of our previous article. Results: The most significant result is the differences between image qualities of the thermograms captured by thermal camera models. In other words, the image quality of the thermal images in FLIR One is higher than SEEK Compact PRO. However, the thermal images of FLIR One are noisier than SEEK Compact PRO since the thermal resolution of FLIR One is 160 × 120 while it is 320 × 240 in SEEK Compact PRO. Conclusion: Detecting and revealing the inhomogeneous temperature distribution on the injured toe of the subject, we, in this paper, analyzed the imaging results of two different smartphone-based thermal camera models by making comparison among various thermograms. Utilizing the feasibility of the proposed method for faster and comparative diagnosis in biomedical problems is the main contribution of this study.The work and the contribution were supported by the SPEV project “Smart Solutions in Ubiquitous Computing Environments”, University of Hradec Kralove, Faculty of Informatics and Management, Czech Republic (under ID: UHK-FIM-SPEV-2019). Supported by the grant TIN2016-75850-R from the Spanish Ministry of Economy and Competitiveness with FEDER funds

    Performance and Convergence Analysis of Modified C-Means Using Jeffreys-Divergence for Clustering

    Get PDF
    The size of data that we generate every day across the globe is undoubtedly astonishing due to the growth of the Internet of Things. So, it is a common practice to unravel important hidden facts and understand the massive data using clustering techniques. However, non- linear relations, which are essentially unexplored when compared to linear correlations, are more widespread within data that is high throughput. Often, nonlinear links can model a large amount of data in a more precise fashion and highlight critical trends and patterns. Moreover, selecting an appropriate measure of similarity is a well-known issue since many years when it comes to data clustering. In this work, a non-Euclidean similarity measure is proposed, which relies on non-linear Jeffreys-divergence (JS). We subsequently develop c- means using the proposed JS (J-c-means). The various properties of the JS and J-c-means are discussed. All the analyses were carried out on a few real-life and synthetic databases. The obtained outcomes show that J-c-means outperforms some cutting-edge c-means algorithms empirically

    S-Divergence-Based Internal Clustering Validation Index

    Get PDF
    A clustering validation index (CVI) is employed to evaluate an algorithm’s clustering results. Generally, CVI statistics can be split into three classes, namely internal, external, and relative cluster validations. Most of the existing internal CVIs were designed based on compactness (CM) and separation (SM). The distance between cluster centers is calculated by SM, whereas the CM measures the variance of the cluster. However, the SM between groups is not always captured accurately in highly overlapping classes. In this article, we devise a novel internal CVI that can be regarded as a complementary measure to the landscape of available internal CVIs. Initially, a database’s clusters are modeled as a non-parametric density function estimated using kernel density estimation. Then the S-divergence (SD) and S-distance are introduced for measuring the SM and the CM, respectively. The SD is defined based on the concept of Hermitian positive definite matrices applied to density functions. The proposed internal CVI (PM) is the ratio of CM to SM. The PM outperforms the legacy measures presented in the literature on both superficial and realistic databases in various scenarios, according to empirical results from four popular clustering algorithms, including fuzzy k-means, spectral clustering, density peak clustering, and density-based spatial clustering applied to noisy data

    Complexity-based analysis of the alterations in the structure of coronaviruses

    Get PDF
    The coronavirus has influenced the lives of many people since its identification in 1960. In general, there are seven types of coronavirus. Although some types of this virus, including 229E, NL63, OC43, and HKU1, cause mild to moderate illness, SARS-CoV, MERS-CoV, and SARS-CoV-2 have shown to have severer effects on the human body. Specifically, the recent known type of coronavirus, SARS-CoV-2, has affected the lives of many people around the world since late 2019 with the disease named COVID-19. In this paper, for the first time, we investigated the variations among the complex structures of coronaviruses. We employed the fractal dimension, approximate entropy, and sample entropy as the measures of complexity. Based on the obtained results, SARS-CoV-2 has a significantly different complex structure than SARS-CoV and MERS-CoV. To study the high mutation rate of SARS-CoV-2, we also analyzed the long-term memory of genome walks for different coronaviruses using the Hurst exponent. The results demonstrated that the SARS-CoV-2 shows the lowest memory in its genome walk, explaining the errors in copying the sequences along the genome that results in the virus mutation

    Non Destructive Defect Detection by Spectral Density Analysis

    Get PDF
    The potential nondestructive diagnostics of solid objects is discussed in this article. The whole process is accomplished by consecutive steps involving software analysis of the vibration power spectrum (eventually acoustic emissions) created during the normal operation of the diagnosed device or under unexpected situations. Another option is to create an artificial pulse, which can help us to determine the actual state of the diagnosed device. The main idea of this method is based on the analysis of the current power spectrum density of the received signal and its postprocessing in the Matlab environment with a following sample comparison in the Statistica software environment. The last step, which is comparison of samples, is the most important, because it is possible to determine the status of the examined object at a given time. Nowadays samples are compared only visually, but this method can’t produce good results. Further the presented filter can choose relevant data from a huge group of data, which originate from applying FFT (Fast Fourier Transform). On the other hand, using this approach they can be subjected to analysis with the assistance of a neural network. If correct and high-quality starting data are provided to the initial network, we are able to analyze other samples and state in which condition a certain object is. The success rate of this approximation, based on our testing of the solution, is now 85.7%. With further improvement of the filter, it could be even greater. Finally it is possible to detect defective conditions or upcoming limiting states of examined objects/materials by using only one device which contains HW and SW parts. This kind of detection can provide significant financial savings in certain cases (such as continuous casting of iron where it could save hundreds of thousands of USD)

    An Enhanced Spectral Clustering Algorithm with S-Distance

    Get PDF
    This work is partially supported by the project "Prediction of diseases through computer assisted diagnosis system using images captured by minimally-invasive and non-invasive modalities", Computer Science and Engineering, PDPM Indian Institute of Information Technology, Design and Manufacturing, Jabalpur India (under ID: SPARCMHRD-231). This work is also partially supported by the project "Smart Solutions in Ubiquitous Computing Environments", Grant Agency of Excellence, University of Hradec Kralove, Faculty of Informatics and Management, Czech Republic (under ID: UHK-FIM-GE-2204/2021); project at Universiti Teknologi Malaysia (UTM) under Research University Grant Vot-20H04, Malaysia Research University Network (MRUN) Vot 4L876 and the Fundamental Research Grant Scheme (FRGS) Vot5F073 supported by the Ministry of Education Malaysia for the completion of the research.Calculating and monitoring customer churn metrics is important for companies to retain customers and earn more profit in business. In this study, a churn prediction framework is developed by modified spectral clustering (SC). However, the similarity measure plays an imperative role in clustering for predicting churn with better accuracy by analyzing industrial data. The linear Euclidean distance in the traditional SC is replaced by the non-linear S-distance (Sd). The Sd is deduced from the concept of S-divergence (SD). Several characteristics of Sd are discussed in this work. Assays are conducted to endorse the proposed clustering algorithm on four synthetics, eight UCI, two industrial databases and one telecommunications database related to customer churn. Three existing clustering algorithms-k-means, density-based spatial clustering of applications with noise and conventional SC-are also implemented on the above-mentioned 15 databases. The empirical outcomes show that the proposed clustering algorithm beats three existing clustering algorithms in terms of its Jaccard index, f-score, recall, precision and accuracy. Finally, we also test the significance of the clustering results by the Wilcoxon's signed-rank test, Wilcoxon's rank-sum test, and sign tests. The relative study shows that the outcomes of the proposed algorithm are interesting, especially in the case of clusters of arbitrary shape.project "Prediction of diseases through computer assisted diagnosis system using images captured by minimally-invasive and non-invasive modalities", Computer Science and Engineering, PDPM Indian Institute of Information Technology, Design and Manufacturing SPARCMHRD-231project "Smart Solutions in Ubiquitous Computing Environments", Grant Agency of Excellence, University of Hradec Kralove, Faculty of Informatics and Management, Czech Republic UHK-FIM-GE-2204/2021Universiti Teknologi Malaysia (UTM) 20H04Malaysia Research University Network (MRUN) 4L876Fundamental Research Grant Scheme (FRGS) by the Ministry of Education Malaysia 5F07

    Breast cancer detection using infrared thermal imaging and a deep learning model

    Get PDF
    Women’s breasts are susceptible to developing cancer; this is supported by a recent study from 2016 showing that 2.8 million women worldwide had already been diagnosed with breast cancer that year. The medical care of a patient with breast cancer is costly and, given the cost and value of the preservation of the health of the citizen, the prevention of breast cancer has become a priority in public health. Over the past 20 years several techniques have been proposed for this purpose, such as mammography, which is frequently used for breast cancer diagnosis. However, false positives of mammography can occur in which the patient is diagnosed positive by another technique. Additionally, the potential side effects of using mammography may encourage patients and physicians to look for other diagnostic techniques. Our review of the literature first explored infrared digital imaging, which assumes that a basic thermal comparison between a healthy breast and a breast with cancer always shows an increase in thermal activity in the precancerous tissues and the areas surrounding developing breast cancer. Furthermore, through our research, we realized that a Computer-Aided Diagnostic (CAD) undertaken through infrared image processing could not be achieved without a model such as the well-known hemispheric model. The novel contribution of this paper is the production of a comparative study of several breast cancer detection techniques using powerful computer vision techniques and deep learning models

    Phishing Webpage Classification via Deep Learning-Based Algorithms: An Empirical Study

    Get PDF
    This work was supported/funded by the Ministry of Higher Education under the Fundamental Research Grant Scheme (FRGS/1/2018/ICT04/UTM/01/1). The authors sincerely thank Universiti Teknologi Malaysia (UTM) under Research University Grant Vot-20H04, Malaysia Research University Network (MRUN) Vot 4L876, for the completion of the research. Faculty of Informatics and Management, University of Hradec Kralove, SPEV project Grant Number: 2102/2021.Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve the phishing detection rate and reduce computational constraints in recent years. However, one solution is insufficient to address all problems caused by attackers in cyberspace. Therefore, the primary objective of this paper is to analyze the performance of various deep learning algorithms in detecting phishing activities. This analysis will help organizations or individuals select and adopt the proper solution according to their technological needs and specific applications’ requirements to fight against phishing attacks. In this regard, an empirical study was conducted using four different deep learning algorithms, including deep neural network (DNN), convolutional neural network (CNN), Long Short-Term Memory (LSTM), and gated recurrent unit (GRU). To analyze the behaviors of these deep learning architectures, extensive experiments were carried out to examine the impact of parameter tuning on the performance accuracy of the deep learning models. In addition, various performance metrics were measured to evaluate the effectiveness and feasibility of DL models in detecting phishing activities. The results obtained from the experiments showed that no single DL algorithm achieved the best measures across all performance metrics. The empirical findings from this paper also manifest several issues and suggest future research directions related to deep learning in the phishing detection domain.Ministry of Higher Education under the Fundamental Research Grant Scheme FRGS/1/2018/ICT04/UTM/01/1Universiti Teknologi Malaysia (UTM) Vot-20H04Malaysia Research University Network (MRUN) 4L876Faculty of Informatics and Management, University of Hradec Kralove, SPEV project 2102/2021
    corecore