Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263304
Danilo De Freitas Melo, Epaminondas De Souza Lage, A. Rocha, Braz de Jesus Cardoso
In apartments, houses and hotels, showers are by far the biggest consumers of water, responding to about 25% of the total volume consumed every month. When winter hits big cities and temperatures fall, the hot water consumption increases dramatically. Since end users often dispense cold water present in the pipelines until the heated water from the reservoirs is perceived in showers or other points of use, hotels and residential buildings are responsible for a considerable waste of treated water. Several solutions based on local hardware have been proposed to partially overcome this problem, but many of them try to reduce the waste of water at the expense of reducing the efficiency of the heating and recirculating systems. The age of the IoT has brought to the smart buildings new perspectives regarding to rational use of resources, providing savings and real comfort for users. This work proposes a smart water heating scheme, mediated by IoT technology, for large buildings in urban settings. The main goal is ensuring the minimal waste of water as well as energy economy in pumping and heating systems. The proposed automated solution is built from an open-source Asterisk-based IP-PBX on cloud computing technology. A complete experimental setup considering a residential building in the southeastern region of Brazil is implemented and tested. The achieved benefits are tangible and significant when compared to the dedicated existing systems.
{"title":"Improving the consumption and water heating efficiency in smart buildings","authors":"Danilo De Freitas Melo, Epaminondas De Souza Lage, A. Rocha, Braz de Jesus Cardoso","doi":"10.1109/CEWIT.2017.8263304","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263304","url":null,"abstract":"In apartments, houses and hotels, showers are by far the biggest consumers of water, responding to about 25% of the total volume consumed every month. When winter hits big cities and temperatures fall, the hot water consumption increases dramatically. Since end users often dispense cold water present in the pipelines until the heated water from the reservoirs is perceived in showers or other points of use, hotels and residential buildings are responsible for a considerable waste of treated water. Several solutions based on local hardware have been proposed to partially overcome this problem, but many of them try to reduce the waste of water at the expense of reducing the efficiency of the heating and recirculating systems. The age of the IoT has brought to the smart buildings new perspectives regarding to rational use of resources, providing savings and real comfort for users. This work proposes a smart water heating scheme, mediated by IoT technology, for large buildings in urban settings. The main goal is ensuring the minimal waste of water as well as energy economy in pumping and heating systems. The proposed automated solution is built from an open-source Asterisk-based IP-PBX on cloud computing technology. A complete experimental setup considering a residential building in the southeastern region of Brazil is implemented and tested. The achieved benefits are tangible and significant when compared to the dedicated existing systems.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263141
C. Axelrod
We are seeing rapid development of in-vehicle, vehicleto- vehicle, intelligent roadway, infrastructure and ride-hailing systems. However, progress in some areas is much faster than in others. For example, in-vehicle self-driving systems are evolving rapidly, but development of intelligent road systems is relatively sluggish. These systems are beginning to interconnect and interoperate to become complex systems-of-systems for which attack surfaces and vulnerabilities are expanding exponentially. Many of these systems are standalone and proprietary and do not interoperate. However, systems must be seamlessly integrated if we are to arrive at safe and secure fully-autonomous road vehicles. If we do not create broad standards early on, we can expect vulnerabilities to grow so much that they could overwhelm potential benefits from improved safety and fuel economies. Warnings about cybersecurity consequences of such complexities appear from time to time in academic publications and the popular press, but few companies and government agencies do not seem to heed these admonitions and suggestions. Meanwhile, the self-driving juggernaut ploughs ahead. Here, we identify likely cybersecurity consequences that will arise because current efforts reflect uncoordinated design and development, particularly of supporting infrastructure systems. We describe how such risks might be mitigated proactively by introducing cybersecurity requirements early in the design, development and deployment processes. We also discuss how we might establish universal automotive and transportation security and safety standards that are enforceable and can be enforced globally across in-vehicle and ex-vehicle systems. While we see impressive near-term advances, particularly with in-vehicle systems and vehicle-to-vehicle systems, such innovations will eventually hit a roadblock if infrastructure systems, both physical and cyber, do not receive the attention required to achieve acceptable levels of cybersecurity and safety.
{"title":"Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles","authors":"C. Axelrod","doi":"10.1109/CEWIT.2017.8263141","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263141","url":null,"abstract":"We are seeing rapid development of in-vehicle, vehicleto- vehicle, intelligent roadway, infrastructure and ride-hailing systems. However, progress in some areas is much faster than in others. For example, in-vehicle self-driving systems are evolving rapidly, but development of intelligent road systems is relatively sluggish. These systems are beginning to interconnect and interoperate to become complex systems-of-systems for which attack surfaces and vulnerabilities are expanding exponentially. Many of these systems are standalone and proprietary and do not interoperate. However, systems must be seamlessly integrated if we are to arrive at safe and secure fully-autonomous road vehicles. If we do not create broad standards early on, we can expect vulnerabilities to grow so much that they could overwhelm potential benefits from improved safety and fuel economies. Warnings about cybersecurity consequences of such complexities appear from time to time in academic publications and the popular press, but few companies and government agencies do not seem to heed these admonitions and suggestions. Meanwhile, the self-driving juggernaut ploughs ahead. Here, we identify likely cybersecurity consequences that will arise because current efforts reflect uncoordinated design and development, particularly of supporting infrastructure systems. We describe how such risks might be mitigated proactively by introducing cybersecurity requirements early in the design, development and deployment processes. We also discuss how we might establish universal automotive and transportation security and safety standards that are enforceable and can be enforced globally across in-vehicle and ex-vehicle systems. While we see impressive near-term advances, particularly with in-vehicle systems and vehicle-to-vehicle systems, such innovations will eventually hit a roadblock if infrastructure systems, both physical and cyber, do not receive the attention required to achieve acceptable levels of cybersecurity and safety.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263138
K. Jayachandran, Sriteja Chilakamarri, Darius Coelho, Klaus Mueller
The current situation of obesity in children and adults is indicative of the inability to choose the right product from a typical collection of various similar products in the supermarket. To obtain a more quantitative idea regarding their shopping patterns, we have developed a prototype of a game which offers a virtual shopping experience to the player by letting him move around and shop in a virtual reality grocery store environment. The idea behind developing the game instead of a questionnaire was (1) to provide a more engaging and realistic experience, (2) to enable educators to conveniently collect the player’s choices, and to tune the difficulty of the experience in real time via levelling. The game was played by 30 different people between the age group of 17 to 29 where, each of the players was made to play the game twice. In the first run, the players chose products they desire based on their knowledge and intuitions. Just before the game ended, the player was taught about the choices he had made and better products were recommended. This was achieved with the help of specially designed user friendly labels with color codes for better and faster understanding. The second run is crucial for analyzing if the player has actually benefited from this review section of the game. After the analysis, the ANOVA test on the scores obtained by the players reveal that they have indeed learnt to shop better from the game.
{"title":"A virtual reality grocery shopping game to improve awareness for healthy foods in young adults","authors":"K. Jayachandran, Sriteja Chilakamarri, Darius Coelho, Klaus Mueller","doi":"10.1109/CEWIT.2017.8263138","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263138","url":null,"abstract":"The current situation of obesity in children and adults is indicative of the inability to choose the right product from a typical collection of various similar products in the supermarket. To obtain a more quantitative idea regarding their shopping patterns, we have developed a prototype of a game which offers a virtual shopping experience to the player by letting him move around and shop in a virtual reality grocery store environment. The idea behind developing the game instead of a questionnaire was (1) to provide a more engaging and realistic experience, (2) to enable educators to conveniently collect the player’s choices, and to tune the difficulty of the experience in real time via levelling. The game was played by 30 different people between the age group of 17 to 29 where, each of the players was made to play the game twice. In the first run, the players chose products they desire based on their knowledge and intuitions. Just before the game ended, the player was taught about the choices he had made and better products were recommended. This was achieved with the help of specially designed user friendly labels with color codes for better and faster understanding. The second run is crucial for analyzing if the player has actually benefited from this review section of the game. After the analysis, the ANOVA test on the scores obtained by the players reveal that they have indeed learnt to shop better from the game.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263302
S. Shom, M. Alahmad
Determining electric vehicle charging infrastructure locations within a particular city or state is a key factor for a successful electrified transportation deployment. In this paper, a search algorithm is developed to calculate the number of charging infrastructure locations for a particular model of an electric vehicle when traveling between two points on a particular Interstate or US-Highway. The algorithm determines the actual mileage a given electric vehicle will travel, which in turn is used to determine the number of charging infrastructure locations. This algorithm is applied as a case study to determine the number of locations needed for a given electric vehicle model in Nebraska state, USA. Detailed analysis are conducted to identify gaps in the coverage area. Then, a prioritization method is applied to the selected locations and cities. This is done to insure key cities and highly visible Interstates and US-Highway corridors are selected for advancement of the State’s economy and planning for deployment and penetrations of electric vehicle expansion.
{"title":"Determining optimal locations of electrified transportation infrastructure on interstate/ us-highways","authors":"S. Shom, M. Alahmad","doi":"10.1109/CEWIT.2017.8263302","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263302","url":null,"abstract":"Determining electric vehicle charging infrastructure locations within a particular city or state is a key factor for a successful electrified transportation deployment. In this paper, a search algorithm is developed to calculate the number of charging infrastructure locations for a particular model of an electric vehicle when traveling between two points on a particular Interstate or US-Highway. The algorithm determines the actual mileage a given electric vehicle will travel, which in turn is used to determine the number of charging infrastructure locations. This algorithm is applied as a case study to determine the number of locations needed for a given electric vehicle model in Nebraska state, USA. Detailed analysis are conducted to identify gaps in the coverage area. Then, a prioritization method is applied to the selected locations and cities. This is done to insure key cities and highly visible Interstates and US-Highway corridors are selected for advancement of the State’s economy and planning for deployment and penetrations of electric vehicle expansion.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263303
S. M. Dambrot
Given the gulf between current science and technology knowledge and implementation, on the one hand, and on the other the emergence of interdisciplinary and transdisciplinary research derived from the accelerating rate of scientific discovery and technological innovation, future science/technology scenarios may be conservatively viewed—historically often incorrectly--as being improbable or even impossible. It is from this perspective that I introduce a hypothetical method, supported by a review of the literature, in which future generations of synthetic genomics, bionanotechnology and counterfactual keyless quantum entanglement meld to make possible the expression of neural tissue augmented with preprogrammed technological functions. Herein termed enplants (endogenous implants), these modified neuronal cells could function as intracranial neuroprosthetic devices biophysically expressed from modified and de novo genetic sequences. The proposed enplant technology would enable the development of precise neural bioprostheses with stable decoherence-resistant time- and distance-agnostic quantum communications capabilities. These “features would allow implant-free real-time Biological Brain-Machine Interface (βBMI) functionality without invasive transcranial surgery or the tissue inflammation and other complications associated with current neuroprosthetic implants. Moreover, real-time B2MI-provided neurological diagnosis, therapy and functional augmentation would integrate with the user’s perception and awareness.
{"title":"Enplants: genomically engineered neural tissue with neuroprosthetic and communications functionality","authors":"S. M. Dambrot","doi":"10.1109/CEWIT.2017.8263303","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263303","url":null,"abstract":"Given the gulf between current science and technology knowledge and implementation, on the one hand, and on the other the emergence of interdisciplinary and transdisciplinary research derived from the accelerating rate of scientific discovery and technological innovation, future science/technology scenarios may be conservatively viewed—historically often incorrectly--as being improbable or even impossible. It is from this perspective that I introduce a hypothetical method, supported by a review of the literature, in which future generations of synthetic genomics, bionanotechnology and counterfactual keyless quantum entanglement meld to make possible the expression of neural tissue augmented with preprogrammed technological functions. Herein termed enplants (endogenous implants), these modified neuronal cells could function as intracranial neuroprosthetic devices biophysically expressed from modified and de novo genetic sequences. The proposed enplant technology would enable the development of precise neural bioprostheses with stable decoherence-resistant time- and distance-agnostic quantum communications capabilities. These “features would allow implant-free real-time Biological Brain-Machine Interface (βBMI) functionality without invasive transcranial surgery or the tissue inflammation and other complications associated with current neuroprosthetic implants. Moreover, real-time B2MI-provided neurological diagnosis, therapy and functional augmentation would integrate with the user’s perception and awareness.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263140
William J. Long, Wei Lin
Wearable medical devices are playing more and more important roles in healthcare. Unlike the wired connection, the wireless connection between wearable devices and the remote servers are exceptionally vulnerable to malicious attacks, and poses threats to the safety and privacy of the patient health data. Therefore, wearable medical devices require the implementation of reliable measures to secure the wireless network communication. However, those devices usually have limited computational power that is not comparable with the desktop computer and thus, it is difficult to adopt the full-fledged security algorithm in software. In this study, we have developed an efficient authentication and encryption protocol for internetconnected wearable devices using the recognized standards of AES and SHA that can provide two-way authentication between wearable device and remote server and protection of patient privacy against various network threats. We have tested the feasibility of this protocol on the TI CC3200 Launchpad, an evaluation board of the CC3200, which is a Wi-Fi capable microcontroller designed for wearable devices and includes a hardware accelerated cryptography module for the implementation of the encryption algorithm. The microcontroller serves as the wearable device client and a Linux computer serves as the server. The embedded client software was written in ANSI C and the server software was written in Python.
{"title":"An authentication protocol for wearable medical devices","authors":"William J. Long, Wei Lin","doi":"10.1109/CEWIT.2017.8263140","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263140","url":null,"abstract":"Wearable medical devices are playing more and more important roles in healthcare. Unlike the wired connection, the wireless connection between wearable devices and the remote servers are exceptionally vulnerable to malicious attacks, and poses threats to the safety and privacy of the patient health data. Therefore, wearable medical devices require the implementation of reliable measures to secure the wireless network communication. However, those devices usually have limited computational power that is not comparable with the desktop computer and thus, it is difficult to adopt the full-fledged security algorithm in software. In this study, we have developed an efficient authentication and encryption protocol for internetconnected wearable devices using the recognized standards of AES and SHA that can provide two-way authentication between wearable device and remote server and protection of patient privacy against various network threats. We have tested the feasibility of this protocol on the TI CC3200 Launchpad, an evaluation board of the CC3200, which is a Wi-Fi capable microcontroller designed for wearable devices and includes a hardware accelerated cryptography module for the implementation of the encryption algorithm. The microcontroller serves as the wearable device client and a Linux computer serves as the server. The embedded client software was written in ANSI C and the server software was written in Python.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263305
D. Minoli, B. Occhiogrosso
A large portion of the human population now lives in cities and by 2050 even a larger fraction of people will be urban dwellers. Many metropolitan areas have seen tremendous real estate development in recent years, yet the roads, water mains, sewers, and power grids have seen no, or extremely limited, upgrades. Whatever infrastructure is in place is aging and, unfortunately, may experience temporary use rationing as upgrades are made, as often one reads in the local press and/or experiences personally. It is clear that technological solutions are needed to manage the increasingly-scarce infrastructure resources under the limitations imposed by population growth, limited financial resources, and, in many instances, local political inertia. The Internet of Things (IoT) offers the promise of improving the resource management of many assets related to city life – including the flow of goods, people, and vehicles, and the greening of the environment -- by optimizing energy consumption and maximizing life-activity efficiency. This review article assesses some of the application issues, the technical requirements, and some of the technical solutions, including the use of High Efficiency Video Coding (HEVC) and Mobile IPv6 Protocols (MIPv6), associated with a broad-based deployment of IoT capabilities in urban settings; these IoT-based solutions enables city administrations to approach a desired state where citizens can reliably enjoy the Quality of Life benefits afforded by a Smart City paradigm.
{"title":"Mobile IPv6 protocols and high efficiency video coding for smart city IoT applications","authors":"D. Minoli, B. Occhiogrosso","doi":"10.1109/CEWIT.2017.8263305","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263305","url":null,"abstract":"A large portion of the human population now lives in cities and by 2050 even a larger fraction of people will be urban dwellers. Many metropolitan areas have seen tremendous real estate development in recent years, yet the roads, water mains, sewers, and power grids have seen no, or extremely limited, upgrades. Whatever infrastructure is in place is aging and, unfortunately, may experience temporary use rationing as upgrades are made, as often one reads in the local press and/or experiences personally. It is clear that technological solutions are needed to manage the increasingly-scarce infrastructure resources under the limitations imposed by population growth, limited financial resources, and, in many instances, local political inertia. The Internet of Things (IoT) offers the promise of improving the resource management of many assets related to city life – including the flow of goods, people, and vehicles, and the greening of the environment -- by optimizing energy consumption and maximizing life-activity efficiency. This review article assesses some of the application issues, the technical requirements, and some of the technical solutions, including the use of High Efficiency Video Coding (HEVC) and Mobile IPv6 Protocols (MIPv6), associated with a broad-based deployment of IoT capabilities in urban settings; these IoT-based solutions enables city administrations to approach a desired state where citizens can reliably enjoy the Quality of Life benefits afforded by a Smart City paradigm.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123709226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CEWIT.2017.8263139
Nicholas Polosky, Jithin Jagannath, Daniel O'Connor, Hanne M. Saarinen, Svetlana Foulke
This paper reports on challenges and opportunities associated with the development of an electroencephalogram (EEG) based personalized device for monitoring of brain activities pertaining large scale neural dynamics in the observed and providing relevant feedback to the observer. The envisioned device interprets signals and categorizes them on classes of typical responses. This could enable a speechless interaction between an observer and a participant wearing the device. This framework is different from the brain-computer-interface (BCI) framework as it focuses on indicators relevant to the human observer, brain-observer-indicator (BOI). Sensors detect resting states of the brain with associated patterns, synchrony between regions, and spectral changes in response to a cognitive event. A cognitive event results in notable changes in the associated patterns of electrical potentials. Recognition of these patterns has a broad application base, if the pattern-activity mechanism is characterized and recognized. The scope of the project includes development of a smart interaction support system BOI, relying on utilization of an EEG toolkit and an artificial neural network for personalization. The objective is to develop software that will support applications requiring feedback (i.e., training), along with a method for obtaining statistical data on the associated brain activity for engineering studies geared to improve signal acquisition and device performance. The findings from preliminary stages of the project are encouraging but indicate multiple challenges that must be addressed including a trade between a reduction of noise and complexity of classification software, definition of classes and recognition of classes and patterns, and development of an effective training data set acquisition strategy.
{"title":"Artificial neural network with electroencephalogram sensors for brainwave interpretation: brain-observer-indicator development challenges","authors":"Nicholas Polosky, Jithin Jagannath, Daniel O'Connor, Hanne M. Saarinen, Svetlana Foulke","doi":"10.1109/CEWIT.2017.8263139","DOIUrl":"https://doi.org/10.1109/CEWIT.2017.8263139","url":null,"abstract":"This paper reports on challenges and opportunities associated with the development of an electroencephalogram (EEG) based personalized device for monitoring of brain activities pertaining large scale neural dynamics in the observed and providing relevant feedback to the observer. The envisioned device interprets signals and categorizes them on classes of typical responses. This could enable a speechless interaction between an observer and a participant wearing the device. This framework is different from the brain-computer-interface (BCI) framework as it focuses on indicators relevant to the human observer, brain-observer-indicator (BOI). Sensors detect resting states of the brain with associated patterns, synchrony between regions, and spectral changes in response to a cognitive event. A cognitive event results in notable changes in the associated patterns of electrical potentials. Recognition of these patterns has a broad application base, if the pattern-activity mechanism is characterized and recognized. The scope of the project includes development of a smart interaction support system BOI, relying on utilization of an EEG toolkit and an artificial neural network for personalization. The objective is to develop software that will support applications requiring feedback (i.e., training), along with a method for obtaining statistical data on the associated brain activity for engineering studies geared to improve signal acquisition and device performance. The findings from preliminary stages of the project are encouraging but indicate multiple challenges that must be addressed including a trade between a reduction of noise and complexity of classification software, definition of classes and recognition of classes and patterns, and development of an effective training data set acquisition strategy.","PeriodicalId":129601,"journal":{"name":"2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115970223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}