Wireless Sensor Networks for surveillance systems in home, office, or factory environment require correct tracking of intruders. For such systems, passive infrared motion sensors (PIR sensors) are ...ideal because they do not require any signal or devices on the object to be tracked and they can work in dark environment as well. This paper first analyzes the performance and the applicability of the PIR sensors for security systems. Then, we propose a region-based human tracking algorithm with actual implementation and experiment in real environment. From the experiments, we show that the human tracking algorithm based on the PIR sensors performs very well with proper sensor deployment.
Accurate identification of sentinel lymph nodes (SNL) and complete tumor removal in cancer patients is of critical importance and leads to improved patient recovery and survival. Gamma probes along ...with near infrared (NIR) probes are the gold standard in SNL identification but have failed to reduce false negative rates (FNR) to the desirable 5% value. By developing a high-resolution Positron Emission Tomography (PET) detector atop the patient in coincidence with a partially populated detector ring placed underneath the patient bed with <250 ps coincidence timing resolution, we are aiming to reduce the FNR compared to what is achievable today.In this regard, we modeled variations of the intraoperative system as well as a reference whole-body PET using the MonteCarlo code GATE. Detector blocks are 13x13 arrays of 3.6x3.6x20 mm3 LYSO:Ce pixels with 3.8 mm pitch. Models varied by the number of detector blocks underneath the patient bed and location of both top and bottom detectors with respect to the patient body. Unlike conventional PET with image slices along the body axis (transverse view), here the slices are defined horizontally and parallel with body axis (coronal view).A torso phantom with background activity concentration of 1/10th of that of hot spheres with 2,4,6,8, and 10 mm diameter and 10 mm spacing was also modeled. Reconstructed images show that 6, 8, and 10 mm lesions can be identified with 40 sec image acquisition. As expected, lesion detectability is reduced when coincidence time resolution (CTR) was changed from 150 ps to 250 ps which can be compensated by increasing acquisition time.
Direct electrochemical (EC) monitoring in a cell culture medium without electron transporter as called mediator is attractive topic in vitro organoid based on chip with frequently and long-time ...monitoring since it can avoid to its disadvantage as stability, toxicity. Here, direct monitoring with nonmediator is demonstrated based on impedance spectroscopy under the culture medium in order to overcome the limitation of mediator. The applicability of EC monitoring is shown by detecting alpha-1-anti trypsin (A1AT) which is known as biomarkers for cardiac damage and is widely chosen in organoid cardiac cell-based chip. The validity of presented EC monitoring is proved by observing signal processing and transduction in medium, mediator, medium-mediator complex. After the observation of electron behavior, A1AT as target analyte is immobilized on the electrode and detected using antibody-antigen interaction. As a result, the result indicates limit of detection is 10 ng mL
and linearity for the 10-1000 ng mL
range, with a sensitivity of 3980 nF (log g mL)
retaining specificity. This EC monitoring is based on label-free and reagentless detection, will pave the way to use for continuous and simple monitoring of in vitro organoid platform.
Recent changes in pervasive sensing applications require software systems that can address diverse technical, architectural, and human issues. Research on wireless sensor networks has served as ...technical fundamentals, mobile sensing research has helped solving many architectural problems, and now various human/cultural difficulties in pervasive sensing systems are revealed. We compare two contrasting architectural styles, i.e., the cathedral and the bazaar, and discuss the design of a system that unifies the both. Main challenges in designing such a system include: (1) a large amount of personal data; (2) privacy in sharing them; (3) energy-efficiency on mobile devices. We address them using a distributed network of virtually-private data stores featuring rule-based sharing control and flow-based execution of context inferences. Our performance benchmarks show that the rule processing delay is less than 25 ms in typical usage scenarios, and the flow-based execution saves 38.3% of CPU time as well as 54.3% of memory usage in comparison to a bus-based framework. Our twelve-person user study results indicate participants feel less privacy concerns using the rule-based sharing control. We also discuss an interesting tradeoff between usability and controllability, discovered from the user study. Finally, all source code for this research is readily available online.
Strain gauges are widely used in structural health monitoring (SHM) systems because they are inexpensive, easy to install, and sensitive enough to detect the potential danger of collapse of a ...building or structure. However, off-the-shelf equipment for the strain gauges is usually either wired to the sensors or wireless with very limited range, which significantly increases the total cost as well as restricting the performance of the deployment. In this paper, we propose a structural health monitoring system based on wireless sensor nodes equipped with inexpensive strain gauges. The performance of the system is not limited, because multi-hop deployment is possible. Our system consists of a sensor board, which properly amplifies and converts the signal from the strain gauges, and communication software, written in TinyOS, that is in charge of reliable transport of the strain data. We evaluated our system in comparison with the commercial equipment. The experiment results show that the proposed system is reliable and effective for use in structural health monitoring.
Miniaturized smart sensors are increasingly being used to collect personal data which embed minute details of our everyday life. When shared, the data streams can easily be mined to draw a rich set ...of inferences regarding private behaviors and lifestyle patterns. Disclosure of some of these unintended inferences gives rise to the notion of behavioral privacy different from traditional identity privacy typically addressed in the literature. From the provider’s perspective, we summarize these privacy concerns into three basic questions: (i) Whom to share data with? (ii) How much data to share? and (iii) What data to share?
In this paper, we outline the architecture of SensorSafe as a software-based framework with support for three basic mechanisms to allow privacy-aware data sharing. First, it provides a library of routines accessible using a simple GUI for providers to define fine-grained, context-dependent access control. Second, it uses the trust network between consumers and providers to derive the optimal rate of information flow which would maintain both provider privacy and consumer utility. Finally, it introduces a compressive sensing based feature-sharing procedure to further control the amount of information release. We provide simulation results to illustrate the efficacy of each of these mechanisms.
SensorAct: A Decentralized and Scriptable Middleware for Smart Energy Buildings Arjunan, Pandarasamy; Saha, Manaswi; Haksoo Choi ...
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom),
08/2015
Conference Proceeding
Buildings, with their different subsystems interacting with diverse occupants, constitute a complex Cyber-Physical-Human infrastructure. Monitoring and controlling this complex ecosystem is essential ...both for efficient and optimized operations of building subsystems and for influencing the occupant behavior. A critical enabling technology in this case is a middleware system for buildings that can provide support for deriving rich inferences by fusing and analyzing intentionally acquired or opportunistically available data from diverse embedded sensors, human feedback, and existing building subsystems. This paper presents Sensor Act, a Scriptable middleware system architecture for energy management applications in buildings. In addition to providing support for managing and integrating heterogeneous sensing and actuation systems in buildings, Sensor Act provides two emerging features: (1) a scripting framework for application developers to extend and automate the various energy management functions of the buildings, and (2) a rule-based sensor data and control sharing mechanism for fine-grained sharing for building owners. We describe the detailed system architecture and design, and provide proof of concept through multiple third party applications built using Sensor Act APIs and deployment in diverse settings across India and United States. Sensor Act is released in open source for community use.
Towards a rich sensing stack for IoT devices Chenguang Shen; Haksoo Choi; Chakraborty, Supriyo ...
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD),
2014-Nov.
Conference Proceeding
The broad spectrum of interconnected sensors and actuators, available on various mobile devices and smartphones and collectively defined as the Internet of Things (IoT), have evolved into platforms ...with ability to both collect personal sensory data and also change the users' immediate environment. The continuous streams of richly annotated sensory data on these IoT devices have also enabled the emergence of a new class of context-aware apps that use the data to infer user context and accordingly customize their responses in real-time. However, this growth in the number of apps has not been complemented with adequate system support on the IoT devices resulting in monolithic apps that each implement and execute their own customized sensing pipelines. In this paper, we outline our vision of a sensing stack, akin to a networking stack, that can facilitate the development and execution of context-aware apps on IoT devices. There are several advantages to building a rich sensing stack. First, it allows apps to reuse stages of the sensing pipeline easing their development. Second, the layers of the stack allow for both in- and cross-layer resource optimization. Finally, it allows better control over the shared data as instead of raw-sensor data, higher-level semantic abstractions, such as inferences can now be shared with apps. We describe our initial efforts towards creating the different building blocks of such a sensing stack.
Demystifying privacy in sensory data: A QoI based approach Chakraborty, S; Haksoo Choi; Srivastava, M B
2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops),
2011-March
Conference Proceeding
There is a growing consensus regarding the emergence of privacy concerns as a major deterrent towards the widespread adoption of emerging technologies such as mobile healthcare, participatory sensing ...and other social network based applications. In this paper, we motivate the need for privacy awareness, present a taxonomy of the privacy problems, and the various existing solutions. We highlight the tension that exists between quality of service at the receiver and the privacy requirement at the source and present a linear program formalization to model the tradeoff between the two objectives. We further present the design and architecture of SensorSafe, a framework which allows privacy-aware sharing of sensory information.
We propose a 6LoWPAN-SNMP that enables transmission of SNMP messages over IPv6-enabled low-power wireless personal area networks (6LoWPAN). The 6LoWPAN-SNMP is an extended modification of the Simple ...Network Management Protocol (SNMP). Compared to traditional IP-networks, 6LoWPAN is a severely resource-constrained network; hence, existing SNMP protocols need to be modified to meet the goals in RFC 4919, ldquo6LoWPAN Problems and Goalsrdquo. The proposed 6LoWPAN-SNMP provides for native communication of SNMP messages on LoWPAN networks. The proposed mechanism is resource-efficient and fully compatible with the standard SNMP. It utilizes SNMP header compression and provides extended protocol operations to reduce the number of SNMP messages generated among the SNMP entities. Compatibility with the standard SNMP is achieved by a proxy forwarder on the 6LoWPAN gateway. The proposed mechanism is implemented on actual hardware platforms using the open-source Net-SNMP library and the Berkeley 6LoWPAN on the TinyOS 2.1. The feasibility and effectiveness of 6LoWPAN-SNMP is evaluated. The experimental results show that 6LoWPAN can be effectively supported with network management functionality based on SNMP.