86 research outputs found

    Monitoring of atopic dermatitis using leaky coaxial cable

    Get PDF
    In our daily life, inadvertent scratching may increase the severity of skin diseases (such as atopic dermatitis, etc.). However, people rarely pay attention to this matter, so the known measurement behavior of the movement is also very little. Nevertheless, the behavior and frequency of scratching represent the degree of itching, and the analysis of scratching frequency is helpful to the doctor's clinical dosage. In this paper, a novel system is proposed to monitor the scratching motion of a sleeping human body at night. The core device of the system are just a Leaky coaxial cable (LCX) and a router. Commonly, LCX is used in the blind field or semi blind field in wireless communication. The new idea is that the leaky cable is placed on the bed, then the state information of physical layer of wireless communication channels is acquired to identify the scratching motion and other small body movements in the human sleep process. The results show that it can be used to detect the movement and its duration. Channel state information (CSI) packet is collected by card installed in the computer based on the 802.11n protocol. The characterization of the scratch motion in the collected channel state information is unique, so it can be distinguished from the wireless channel amplitude variation trend

    Biometric behavior authentication exploiting propagation characteristics of wireless channel

    Get PDF
    Massive expansion of wireless body area networks (WBANs) in the field of health monitoring applications has given rise to the generation of huge amount of biomedical data. Ensuring privacy and security of this very personal data serves as a major hurdle in the development of these systems. An effective and energy friendly authentication algorithm is, therefore, a necessary requirement for current WBANs. Conventional authentication algorithms are often implemented on higher levels of the Open System Interconnection model and require advanced software or major hardware upgradation. This paper investigates the implementation of a physical layer security algorithm as an alternative. The algorithm is based on the behavior fingerprint developed using the wireless channel characteristics. The usability of the algorithm is established through experimental results, which show that this authentication method is not only effective, but also very suitable for the energy-, resource-, and interface-limited WBAN medical applications

    A Low Profile Antenna for Millimeter-Wave Body-Centric Applications

    Get PDF
    Millimeter-Wave (mm-Wave) frequencies are a front runner contender for the next generation body-centric wireless communications. In this paper, the design of a very low-profile antenna is presented for body-centric applications operating in the mm-Wave frequency band centered at 60 GHz. The antenna has an overall size of 14 × 10.5 × 1.15 mm 3 and is printed on a flexible printed circuit board. The performance of the antenna is evaluated in off-body, on-body, and bodyto-body communication scenarios using a realistic numerical phantom and verified through measurements. The antenna has a bandwidth of 9.8 GHz and offers a gain of 10.6 dBi in off-body (free space) configuration, while 12.1 dBi in on-body configuration. It also achieves an efficiency of 74% in off-body and 63% in on-body scenario. The small and flexible structure of the antenna along with excellent impedance matching, broad bandwidth, high gain, and good efficiency makes it a suitable candidate to attain simultaneous data transmission/reception at mm-Wave frequencies for the 5G body-centric applications

    Towards sparse characterisation of on-body ultra-wideband wireless channels

    Get PDF
    With the aim of reducing cost and power consumption of the receiving terminal, compressive sensing (CS) framework is applied to on-body ultra-wideband (UWB) channel estimation. It is demonstrated in this Letter that the sparse on-body UWB channel impulse response recovered by the CS framework fits the original sparse channel well; thus, on-body channel estimation can be achieved using low-speed sampling devices

    Authentication in Millimeter-Wave Body-Centric Networks Through Wireless Channel Characterization

    Get PDF
    Advent of 5G technologies has ensued in massive growth of body-centric communications (BCCs), especially at millimeter-wave (mm-wave) frequencies. As a result, the portable/handheld terminals are becoming more and more “intelligent” but not without the cost of being less secure. Improved authentication measures need to be explored, as effective identity authentication is the first level of security in these devices. This paper presents a novel keyless authentication method exploiting wireless channel characteristics. Human palm has distinct transmission coefficient (S21) for each of the users and is used for in vivo fingerprint identification in this paper. A detailed channel modeling using data acquisition from real environment and empirical approach is adopted to evaluate the usability of this method. The results show that this method can provide a secure operation for the mm-wave 5G BCCs

    Hand palm local channel characterization for millimeter-wave body-centric applications

    Get PDF
    The body-centric wireless channel characterization mostly utilizes whole body models. However, localized channels for body parts consistently interacting with the wireless device have their own importance. This paper attempts to characterize the hand palm local channel through experimental measurements at three millimeter-wave frequency bands of 27-28 GHz, 29-30 GHz, and 31-32 GHz. Five human subjects are used in this study. Net body loss is found to be 3dB for different subjects with subject-specific and varying palm shape size is found to be the primary affecting source. The repeatability of the on-body propagation measurements is found to be within 10% of variance

    Antenna and Propagation Considerations for Amateur UAV Monitoring

    Get PDF
    The broad application spectrum of unmanned aerial vehicles is making them one of the most promising technologies of Internet of Things era. Proactive prevention for public safety threats is one of the key areas with vast potential of surveillance and monitoring drones. Antennas play a vital role in such applications to establish reliable communication in these scenarios. This paper considers line-of-sight and non-line-of-sight threat scenarios with the perspective of antennas and electromagnetic wave propagation

    Sleep apnea syndrome sensing at C-Band

    Get PDF
    A non-intrusive sleep apnea detection system using a C-Band channel sensing technique is proposed to monitor sleep apnea syndrome in real time. The system utilizes perturbations of RF signals to differentiate between patient's breathing under normal and sleep apnea conditions. The peak distance calculation is used to obtain the respiratory rates. A comparison of the datasets generated by the proposed method and a wearable sensor is made using a concordance correlation coefficient to establish its accuracy. The results show that the proposed sensing technique exhibits high accuracy and robustness, with more than 80% concordance with the wearable breathing sensor. This method is, therefore, a good candidate for the real-time wireless detection of sleep apnea

    Double threshold authentication using body area radio channel characteristics

    Get PDF
    The demand of portable and body-worn devices for remote health monitoring is ever increasing. One of the major challenges caused by this influx of wireless body area network (WBAN) devices is security of user's extremely vital and personal information. Conventional authentication techniques implemented at upper layers of the Open System Interconnection (OSI) model usually consumes huge amount of power. They also require significant changes at hardware and software levels. It makes them unsuitable for inherently low powered WBAN devices. This letter investigates the usability of a double threshold algorithm as a physical layer security measure in these scenarios. The algorithm is based on the user's behavioral fingerprint extracted from the radio channel characteristics. Effectiveness of this technique is established through experimental measurements considering a variety of common usage scenarios. The results show that this method provides high level of security against false authentication attacks and has great potential in WBANs

    Analysis of Physicochemical Quality and Flavor Differences of Five Commercially Available Tiger Nut Oils with Different Processes Based on GC-IMS Technique

    Get PDF
    In order to evaluate the differences in physicochemical quality and flavor of commercially edible tiger nut oil, gas chromatography-ion mobility spectroscopy (GC-IMS) combined with principal component analysis was used to compare the volatile compounds in tiger nut oil from different extraction methods (physical pressing, hot pressing, subcritical extraction, high-pressure cold pressing and cold pressing). The GC-IMS results showed that 76 volatile compounds including 12 esters, 16 alcohols, 29 aldehydes, 9 ketones, 5 acids, 3 furans, 1 pyrazine and 1 sulfur compound were identified in the oil from different extraction methods. The relative content of aldehydes, esters and furans (53.54%, 13.06%, 5.41%) in the hot-pressing group were higher than others. The flavor differences of tiger nut oil from different processes were mainly derived from four key flavor substances as 1-octen-3-ol, nonanal, (E)-2-octenal and hexanal. The results of principal component analysis (PCA) showed that PC1 and PC2 were 48.7% and 30.1%, respectively, with a cumulative difference contribution of 78.8%, and the differences in volatile compounds between different processes were significant, which could be well distinguished by different extraction methods. The results of pearson correlation analysis showed that there was a significant positive correlation between b* value and acid value, peroxide value, p-malondialdehyde value and 1-octen-3-ol (0.57<r<0.88, P<0.05). The research could provide some reference value for the production and processing, theoretical research and quality inspection of commercial tiger nut oil
    corecore