首页 > 最新文献

Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems最新文献

英文 中文
Virtual Keyboard for Wearable Wristbands 可穿戴腕带的虚拟键盘
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136984
Wenqiang Chen, Y. Lian, Lu Wang, Rukhsana Ruby, Wen Hu, Kaishun Wu
The wearable devices are small and easy to carry but typically with poor interaction experience. For example, Apple iWatch does not support instant text message input feature because of the lack of keyboard availability on the tiny touch screen. To address this problem, we develop a novel system, termed iKey, which enables users to use the back of one of their hands as virtual keyboard for wearable wristbands. iKey recognizes keystrokes based on a location-based training model via body vibration. We will demonstrate a real time functional prototype of iKey in this demo.
可穿戴设备体积小,便于携带,但交互体验差。例如,苹果iWatch不支持即时文本信息输入功能,因为它的小触摸屏上没有键盘可用。为了解决这个问题,我们开发了一种名为iKey的新系统,它使用户可以使用一只手的背部作为可穿戴腕带的虚拟键盘。iKey通过身体振动来识别基于位置的训练模型。在这个演示中,我们将展示iKey的实时功能原型。
{"title":"Virtual Keyboard for Wearable Wristbands","authors":"Wenqiang Chen, Y. Lian, Lu Wang, Rukhsana Ruby, Wen Hu, Kaishun Wu","doi":"10.1145/3131672.3136984","DOIUrl":"https://doi.org/10.1145/3131672.3136984","url":null,"abstract":"The wearable devices are small and easy to carry but typically with poor interaction experience. For example, Apple iWatch does not support instant text message input feature because of the lack of keyboard availability on the tiny touch screen. To address this problem, we develop a novel system, termed iKey, which enables users to use the back of one of their hands as virtual keyboard for wearable wristbands. iKey recognizes keystrokes based on a location-based training model via body vibration. We will demonstrate a real time functional prototype of iKey in this demo.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AquaMote
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136992
Eun Sun Lee, J. Jeyakumar, Bharathan Balaji, R. P. Wilson, Mani Srivastava
Tagging animals with sensors is a powerful approach to acquire critical information about the behavioural ecology of free-living animals, which ultimately can provide data to inform best practice in conservation efforts. Sensor tags for such deployments need long lifetimes and incorporate multiple sensors, especially location because space use can contextualize behavior. The tag size needs to be minimal so as not to affect the activities of the animal. Aquatic animals in particular present challenges due to lack of wireless communication and water-proofing. Taking these points into consideration we have designed Aquamote: an ultra-low power, tiny sensor tag (20 x 29 mm2) which integrates accelerometer, gyroscope, magnetometer, depth sensor, GPS and BLE. Our poster will showcase the performance of AquaMote and highlight our design decisions to reduce its size and power consumption.
{"title":"AquaMote","authors":"Eun Sun Lee, J. Jeyakumar, Bharathan Balaji, R. P. Wilson, Mani Srivastava","doi":"10.1145/3131672.3136992","DOIUrl":"https://doi.org/10.1145/3131672.3136992","url":null,"abstract":"Tagging animals with sensors is a powerful approach to acquire critical information about the behavioural ecology of free-living animals, which ultimately can provide data to inform best practice in conservation efforts. Sensor tags for such deployments need long lifetimes and incorporate multiple sensors, especially location because space use can contextualize behavior. The tag size needs to be minimal so as not to affect the activities of the animal. Aquatic animals in particular present challenges due to lack of wireless communication and water-proofing. Taking these points into consideration we have designed Aquamote: an ultra-low power, tiny sensor tag (20 x 29 mm2) which integrates accelerometer, gyroscope, magnetometer, depth sensor, GPS and BLE. Our poster will showcase the performance of AquaMote and highlight our design decisions to reduce its size and power consumption.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Supply Chain Object Discovery with Semantic-enhanced Blockchain 基于语义增强区块链的供应链对象发现
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136974
M. Ruta, F. Scioscia, S. Ieva, Giovanna Capurso, E. Sciascio
Supply chains can be seen as cyber-physical networks grounded on object identification and tracking. Conventional trust models featuring centralized information management architectures and simplistic things classification lend two of the most relevant limitations to current solutions. Blockchain introduces novel and a valuable trust approaches while semantic technologies better permit a things description. This paper introduces a semantic-enhanced blockchain platform allowing a flexible object discovery. It is based on validation by consensus of smart contracts and adopt a semantic matchmaking between queries and object annotations expressed w.r.t. ontology models. Early experiments assess the good behaviour of the proposed framework.
供应链可以看作是基于对象识别和跟踪的信息物理网络。传统的信任模型以集中的信息管理架构和简单的事物分类为特征,这给当前的解决方案带来了两个最相关的限制。区块链引入了新颖和有价值的信任方法,而语义技术更好地允许事物描述。本文介绍了一个语义增强的区块链平台,允许灵活的对象发现。它基于智能合约的共识验证,并采用了w.r.t.本体模型表达的查询和对象注释之间的语义匹配。早期实验评估了所提出框架的良好性能。
{"title":"Supply Chain Object Discovery with Semantic-enhanced Blockchain","authors":"M. Ruta, F. Scioscia, S. Ieva, Giovanna Capurso, E. Sciascio","doi":"10.1145/3131672.3136974","DOIUrl":"https://doi.org/10.1145/3131672.3136974","url":null,"abstract":"Supply chains can be seen as cyber-physical networks grounded on object identification and tracking. Conventional trust models featuring centralized information management architectures and simplistic things classification lend two of the most relevant limitations to current solutions. Blockchain introduces novel and a valuable trust approaches while semantic technologies better permit a things description. This paper introduces a semantic-enhanced blockchain platform allowing a flexible object discovery. It is based on validation by consensus of smart contracts and adopt a semantic matchmaking between queries and object annotations expressed w.r.t. ontology models. Early experiments assess the good behaviour of the proposed framework.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
CamForensics: Understanding Visual Privacy Leaks in the Wild CamForensics:了解野外视觉隐私泄露
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3131683
Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon P. Cox, Kyu-Han Kim
Many mobile apps, including augmented-reality games, bar-code readers, and document scanners, digitize information from the physical world by applying computer-vision algorithms to live camera data. However, because camera permissions for existing mobile operating systems are coarse (i.e., an app may access a camera's entire view or none of it), users are vulnerable to visual privacy leaks. An app violates visual privacy if it extracts information from camera data in unexpected ways. For example, a user might be surprised to find that an augmented-reality makeup app extracts text from the camera's view in addition to detecting faces. This paper presents results from the first large-scale study of visual privacy leaks in the wild. We build CamForensics to identify the kind of information that apps extract from camera data. Our extensive user surveys determine what kind of information users expected an app to extract. Finally, our results show that camera apps frequently defy users' expectations based on their descriptions.
许多移动应用程序,包括增强现实游戏、条形码阅读器和文档扫描仪,通过将计算机视觉算法应用于实时摄像机数据,将来自物理世界的信息数字化。然而,由于现有移动操作系统的摄像头权限很粗糙(例如,应用程序可以访问摄像头的整个视图,也可以不访问),用户很容易受到视觉隐私泄露的影响。如果应用程序以意想不到的方式从摄像头数据中提取信息,就会侵犯视觉隐私。例如,用户可能会惊讶地发现,除了检测人脸之外,增强现实化妆应用程序还可以从相机视图中提取文本。本文介绍了首次大规模野外视觉隐私泄露研究的结果。我们建立CamForensics来识别应用程序从摄像头数据中提取的信息。我们广泛的用户调查决定了用户希望应用程序提取什么样的信息。最后,我们的研究结果表明,相机应用程序经常违背用户对其描述的期望。
{"title":"CamForensics: Understanding Visual Privacy Leaks in the Wild","authors":"Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon P. Cox, Kyu-Han Kim","doi":"10.1145/3131672.3131683","DOIUrl":"https://doi.org/10.1145/3131672.3131683","url":null,"abstract":"Many mobile apps, including augmented-reality games, bar-code readers, and document scanners, digitize information from the physical world by applying computer-vision algorithms to live camera data. However, because camera permissions for existing mobile operating systems are coarse (i.e., an app may access a camera's entire view or none of it), users are vulnerable to visual privacy leaks. An app violates visual privacy if it extracts information from camera data in unexpected ways. For example, a user might be surprised to find that an augmented-reality makeup app extracts text from the camera's view in addition to detecting faces. This paper presents results from the first large-scale study of visual privacy leaks in the wild. We build CamForensics to identify the kind of information that apps extract from camera data. Our extensive user surveys determine what kind of information users expected an app to extract. Finally, our results show that camera apps frequently defy users' expectations based on their descriptions.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Future of Sensing is Batteryless, Intermittent, and Awesome 传感的未来是无电池的、间歇性的、令人敬畏的
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3131699
Josiah D. Hester, Jacob M. Sorber
Sensing has been obsessed with delivering on the "smart dust" vision outlined decades ago, where trillions of tiny invisible computers support daily life, infrastructure, and humanity in general. Batteries are the single greatest threat to this vision of a sustainable Internet of Things. They are expensive, bulky, hazardous, and wear out after a few years (even rechargeables). Replacing and disposing of billions or trillions of dead batteries per year would be expensive and irresponsible. By leaving the batteries behind and surviving off energy harvested from the environment, tiny intermittently powered computers can monitor objects in hard to reach places maintenance free for decades. The intermittent execution, constrained compute and energy resources, and unreliability of these devices creates new challenges for the sensing and embedded systems community. However, the rewards and potential impact across many fields are worth it, enabling currently impractical applications in health services and patient care, commercial and consumer applications, wildlife conservation, industrial and infrastructure management, even space exploration. This paper highlights major research questions and establishes new directions for the community to embrace and investigate.
传感技术一直痴迷于实现几十年前提出的“智能尘埃”愿景,即数万亿微型隐形计算机为日常生活、基础设施和人类提供支持。电池是可持续物联网愿景面临的最大威胁。它们昂贵、笨重、危险,而且几年后就会磨损(即使是可充电的)。每年更换和处理数十亿或数万亿的废电池既昂贵又不负责任。通过将电池抛在身后,依靠从环境中获取的能量生存,微型间歇性供电的计算机可以在几十年内免费监控难以到达的地方的物体。这些设备的间歇性执行、有限的计算和能源资源以及不可靠性给传感和嵌入式系统社区带来了新的挑战。然而,在许多领域的回报和潜在影响是值得的,使目前在保健服务和病人护理、商业和消费者应用、野生动物保护、工业和基础设施管理、甚至空间探索等方面不切实际的应用成为可能。本文突出了主要的研究问题,并确立了社区接受和研究的新方向。
{"title":"The Future of Sensing is Batteryless, Intermittent, and Awesome","authors":"Josiah D. Hester, Jacob M. Sorber","doi":"10.1145/3131672.3131699","DOIUrl":"https://doi.org/10.1145/3131672.3131699","url":null,"abstract":"Sensing has been obsessed with delivering on the \"smart dust\" vision outlined decades ago, where trillions of tiny invisible computers support daily life, infrastructure, and humanity in general. Batteries are the single greatest threat to this vision of a sustainable Internet of Things. They are expensive, bulky, hazardous, and wear out after a few years (even rechargeables). Replacing and disposing of billions or trillions of dead batteries per year would be expensive and irresponsible. By leaving the batteries behind and surviving off energy harvested from the environment, tiny intermittently powered computers can monitor objects in hard to reach places maintenance free for decades. The intermittent execution, constrained compute and energy resources, and unreliability of these devices creates new challenges for the sensing and embedded systems community. However, the rewards and potential impact across many fields are worth it, enabling currently impractical applications in health services and patient care, commercial and consumer applications, wildlife conservation, industrial and infrastructure management, even space exploration. This paper highlights major research questions and establishes new directions for the community to embrace and investigate.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages 启用端到端加密CoAP报文的路由过滤
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136960
Klara Seitz, Sebastian Serth, Konrad-Felix Krentz, C. Meinel
IoT devices usually are battery-powered and directly connected to the Internet. This makes them vulnerable to so-called path-based denial-of-service (PDoS) attacks. For example, in a PDoS attack an adversary sends multiple Constrained Application Protocol (CoAP) messages towards an IoT device, thereby causing each IoT device along the path to expend energy for forwarding this message. Current end-to-end security solutions, such as DTLS or IPsec, fail to prevent such attacks since they only filter out inauthentic CoAP messages at their destination. This demonstration shows an approach to allow en-route filtering where a trusted gateway has all necessary information to check the integrity, decrypt and, if necessary, drop a message before forwarding it to the constrained mote. Our approach preserves precious resources of IoT devices in the face of path-based denial-of-service attacks by remote attackers.
物联网设备通常由电池供电,并直接连接到互联网。这使得它们容易受到所谓的基于路径的拒绝服务(PDoS)攻击。例如,在PDoS攻击中,攻击者向物联网设备发送多个受限应用协议(CoAP)消息,从而导致路径上的每个物联网设备花费能量来转发该消息。当前的端到端安全解决方案(如DTLS或IPsec)无法阻止此类攻击,因为它们只在目的地过滤掉不真实的CoAP消息。此演示展示了一种允许路由过滤的方法,其中可信网关具有所有必要的信息,以便在将消息转发到受约束的端口之前检查其完整性、解密并在必要时删除消息。面对远程攻击者基于路径的拒绝服务攻击,我们的方法保留了物联网设备的宝贵资源。
{"title":"Enabling En-Route Filtering for End-to-End Encrypted CoAP Messages","authors":"Klara Seitz, Sebastian Serth, Konrad-Felix Krentz, C. Meinel","doi":"10.1145/3131672.3136960","DOIUrl":"https://doi.org/10.1145/3131672.3136960","url":null,"abstract":"IoT devices usually are battery-powered and directly connected to the Internet. This makes them vulnerable to so-called path-based denial-of-service (PDoS) attacks. For example, in a PDoS attack an adversary sends multiple Constrained Application Protocol (CoAP) messages towards an IoT device, thereby causing each IoT device along the path to expend energy for forwarding this message. Current end-to-end security solutions, such as DTLS or IPsec, fail to prevent such attacks since they only filter out inauthentic CoAP messages at their destination. This demonstration shows an approach to allow en-route filtering where a trusted gateway has all necessary information to check the integrity, decrypt and, if necessary, drop a message before forwarding it to the constrained mote. Our approach preserves precious resources of IoT devices in the face of path-based denial-of-service attacks by remote attackers.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Monitoring a Person's Heart Rate and Respiratory Rate on a Shared Bed Using Geophones 使用检波器监测共用床上的人的心率和呼吸频率
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3131679
Zhenhua Jia, Amelie Bonde, Sugang Li, Chenren Xu, Jingxian Wang, Yanyong Zhang, R. Howard, Pei Zhang
Using geophones to sense bed vibrations caused by ballistic force has shown great potential in monitoring a person's heart rate during sleep. It does not require a special mattress or sheets, and the user is free to move around and change position during sleep. Earlier work has studied how to process the geophone signal to detect heartbeats when a single subject occupies the entire bed. In this study, we develop a system called VitalMon, aiming to monitor a person's respiratory rate as well as heart rate, even when she is sharing a bed with another person. In such situations, the vibrations from both persons are mixed together. VitalMon first separates the two heartbeat signals, and then distinguishes the respiration signal from the heartbeat signal for each person. Our heartbeat separation algorithm relies on the spatial difference between two signal sources with respect to each vibration sensor, and our respiration extraction algorithm deciphers the breathing rate embedded in amplitude fluctuation of the heartbeat signal. We have developed a prototype bed to evaluate the proposed algorithms. A total of 86 subjects participated in our study, and we collected 5084 geophone samples, totaling 56 hours of data. We show that our technique is accurate -- its breathing rate estimation error for a single person is 0.38 breaths per minute (median error is 0.22 breaths per minute), heart rate estimation error when two persons share a bed is 1.90 beats per minute (median error is 0.72 beats per minute), and breathing rate estimation error when two persons share a bed is 2.62 breaths per minute (median error is 1.95 breaths per minute). By varying sleeping posture and mattress type, we show that our system can work in many different scenarios.
使用地震仪来感知由弹道力引起的床震动,在监测人睡眠时的心率方面显示出巨大的潜力。它不需要特殊的床垫或床单,使用者可以在睡眠中自由移动和改变姿势。早期的工作研究了如何处理检波器信号,以检测当一个受试者占据整个床时的心跳。在这项研究中,我们开发了一个名为VitalMon的系统,旨在监测一个人的呼吸频率和心率,即使她与另一个人同床共枕。在这种情况下,两个人的振动混合在一起。VitalMon首先将两个心跳信号分离,然后将每个人的呼吸信号与心跳信号区分开来。我们的心跳分离算法依赖于两个信号源相对于每个振动传感器的空间差异,我们的呼吸提取算法破译心跳信号振幅波动中嵌入的呼吸频率。我们已经开发了一个原型床来评估所提出的算法。共有86名受试者参与了我们的研究,我们收集了5084个检波器样本,总计56小时的数据。我们证明了我们的技术是准确的——它对单个人的呼吸速率估计误差为每分钟0.38次(中位数误差为每分钟0.22次),对两人同床时的心率估计误差为每分钟1.90次(中位数误差为每分钟0.72次),对两人同床时的呼吸速率估计误差为每分钟2.62次(中位数误差为每分钟1.95次)。通过改变睡眠姿势和床垫类型,我们展示了我们的系统可以在许多不同的情况下工作。
{"title":"Monitoring a Person's Heart Rate and Respiratory Rate on a Shared Bed Using Geophones","authors":"Zhenhua Jia, Amelie Bonde, Sugang Li, Chenren Xu, Jingxian Wang, Yanyong Zhang, R. Howard, Pei Zhang","doi":"10.1145/3131672.3131679","DOIUrl":"https://doi.org/10.1145/3131672.3131679","url":null,"abstract":"Using geophones to sense bed vibrations caused by ballistic force has shown great potential in monitoring a person's heart rate during sleep. It does not require a special mattress or sheets, and the user is free to move around and change position during sleep. Earlier work has studied how to process the geophone signal to detect heartbeats when a single subject occupies the entire bed. In this study, we develop a system called VitalMon, aiming to monitor a person's respiratory rate as well as heart rate, even when she is sharing a bed with another person. In such situations, the vibrations from both persons are mixed together. VitalMon first separates the two heartbeat signals, and then distinguishes the respiration signal from the heartbeat signal for each person. Our heartbeat separation algorithm relies on the spatial difference between two signal sources with respect to each vibration sensor, and our respiration extraction algorithm deciphers the breathing rate embedded in amplitude fluctuation of the heartbeat signal. We have developed a prototype bed to evaluate the proposed algorithms. A total of 86 subjects participated in our study, and we collected 5084 geophone samples, totaling 56 hours of data. We show that our technique is accurate -- its breathing rate estimation error for a single person is 0.38 breaths per minute (median error is 0.22 breaths per minute), heart rate estimation error when two persons share a bed is 1.90 beats per minute (median error is 0.72 beats per minute), and breathing rate estimation error when two persons share a bed is 2.62 breaths per minute (median error is 1.95 breaths per minute). By varying sleeping posture and mattress type, we show that our system can work in many different scenarios.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130671787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
An Empirical Study of WiFi-based Radio Tomographic Imaging 基于wifi的射频层析成像的实证研究
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136983
D. Piumwardane, C. Suduwella, I. Dharmadasa, A. Sayakkara, Prabhash Kumarasinghe, K. Zoysa, C. Keppitiyagama
Radio Tomographic Imaging (RTI) enables device free localization of physical objects by using signal attenuation in wireless networks. In this paper, we explore how existing RTI methods can be used in WiFi networks to do tomographic imaging. Moreover we analyze and evaluate the properties that affect the accuracy of WiFi tomographic imaging process.
无线电层析成像(RTI)通过无线网络中的信号衰减使设备能够自由定位物理对象。在本文中,我们探讨了如何在WiFi网络中使用现有的RTI方法来进行层析成像。并对影响WiFi层析成像精度的特性进行了分析和评价。
{"title":"An Empirical Study of WiFi-based Radio Tomographic Imaging","authors":"D. Piumwardane, C. Suduwella, I. Dharmadasa, A. Sayakkara, Prabhash Kumarasinghe, K. Zoysa, C. Keppitiyagama","doi":"10.1145/3131672.3136983","DOIUrl":"https://doi.org/10.1145/3131672.3136983","url":null,"abstract":"Radio Tomographic Imaging (RTI) enables device free localization of physical objects by using signal attenuation in wireless networks. In this paper, we explore how existing RTI methods can be used in WiFi networks to do tomographic imaging. Moreover we analyze and evaluate the properties that affect the accuracy of WiFi tomographic imaging process.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"150 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Calibrating Time-variant, Device-specific Phase Noise for COTS WiFi Devices 校正时变,设备特定的相位噪声为COTS WiFi设备
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3131695
Jincao Zhu, Youngbin Im, Shivakant Mishra, Sangtae Ha
Current COTS WiFi based work on wireless motion sensing extracts human movements such as keystroking and hand motion mainly from amplitude training to classify different types of motions, as obtaining meaningful phase values is very challenging due to time-varying phase noises occurred with the movement. However, the methods based only on amplitude training are not very practical since their accuracy is not environment and location independent. This paper proposes an effective phase noise calibration technique which can be broadly applicable to COTS WiFi based motion sensing. We leverage the fact that multi-path for indoor environment contains certain static paths, such as reflections from wall or static furniture, as well as dynamic paths due to human hand and arm movements. When a hand moves, the phase value of the signal from the hand rotates as the path length changes and causes the superposition of signals over static and dynamic paths in antenna and frequency domain. To evaluate the effectiveness of the proposed technique, we experiment with a prototype system that can track hand gestures in a non-intrusive manner, i.e. users are not equipped with any device, using COTS WiFi devices. Our evaluation shows that calibrated phase values provide much rich, yet robust information on motion tracking -- 80th percentile angle estimation error up to 14 degrees, 80th percentile tracking error up to 15 cm, and its robustness to the environment and the speed of movement.
目前基于COTS WiFi的无线体感工作主要是从振幅训练中提取人体动作,如击键和手部动作,对不同类型的动作进行分类,因为运动中会出现时变的相位噪声,很难获得有意义的相位值。然而,仅基于幅度训练的方法不太实用,因为它们的精度与环境和位置无关。本文提出了一种有效的相位噪声标定技术,可广泛应用于基于COTS WiFi的运动传感中。我们利用这样一个事实,即室内环境的多路径包含某些静态路径,例如来自墙壁或静态家具的反射,以及由于人的手和手臂运动而产生的动态路径。当手移动时,来自手的信号的相位值随着路径长度的变化而旋转,导致信号在天线域和频域的静态路径和动态路径上叠加。为了评估所提出技术的有效性,我们实验了一个原型系统,该系统可以以非侵入式的方式跟踪手势,即用户不配备任何设备,使用COTS WiFi设备。我们的评估表明,校准的相位值为运动跟踪提供了丰富而稳健的信息——第80百分位角度估计误差可达14度,第80百分位跟踪误差可达15厘米,并且其对环境和运动速度的鲁棒性。
{"title":"Calibrating Time-variant, Device-specific Phase Noise for COTS WiFi Devices","authors":"Jincao Zhu, Youngbin Im, Shivakant Mishra, Sangtae Ha","doi":"10.1145/3131672.3131695","DOIUrl":"https://doi.org/10.1145/3131672.3131695","url":null,"abstract":"Current COTS WiFi based work on wireless motion sensing extracts human movements such as keystroking and hand motion mainly from amplitude training to classify different types of motions, as obtaining meaningful phase values is very challenging due to time-varying phase noises occurred with the movement. However, the methods based only on amplitude training are not very practical since their accuracy is not environment and location independent. This paper proposes an effective phase noise calibration technique which can be broadly applicable to COTS WiFi based motion sensing. We leverage the fact that multi-path for indoor environment contains certain static paths, such as reflections from wall or static furniture, as well as dynamic paths due to human hand and arm movements. When a hand moves, the phase value of the signal from the hand rotates as the path length changes and causes the superposition of signals over static and dynamic paths in antenna and frequency domain. To evaluate the effectiveness of the proposed technique, we experiment with a prototype system that can track hand gestures in a non-intrusive manner, i.e. users are not equipped with any device, using COTS WiFi devices. Our evaluation shows that calibrated phase values provide much rich, yet robust information on motion tracking -- 80th percentile angle estimation error up to 14 degrees, 80th percentile tracking error up to 15 cm, and its robustness to the environment and the speed of movement.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Ultra-Low Power Gaze Tracking for Virtual Reality 虚拟现实的超低功耗注视跟踪
Pub Date : 2017-11-06 DOI: 10.1145/3131672.3136989
Tianxing Li, Emmanuel S. Akosah, Qiang Liu, Xia Zhou
We present LiGaze, a low-power approach to gaze tracking tailored to VR. It relies on a few low-cost photodiodes, eliminating the need for cameras and active infrared emitters. Reusing light emitted from the VR screen, LiGaze leverages photodiodes around a VR lens to measure reflected screen light in different directions. It then infers gaze direction by exploiting pupil's light absorption property. The core of LiGaze is to deal with screen light dynamics and extract changes in reflected light related to pupil movement. We design and fabricate a LiGaze prototype using off-the-shelf photodiodes. Its sensing and computation consume 791μW in total.
我们介绍了LiGaze,一种为VR量身定制的低功耗凝视跟踪方法。它依赖于一些低成本的光电二极管,消除了对摄像机和主动红外发射器的需求。LiGaze利用VR屏幕发出的光,利用VR镜头周围的光电二极管来测量不同方向反射的屏幕光。然后利用瞳孔的光吸收特性来推断凝视方向。LiGaze的核心是处理屏幕光动态,提取与瞳孔运动相关的反射光变化。我们使用现成的光电二极管设计和制造了一个LiGaze原型。其传感和计算总功耗为791μW。
{"title":"Ultra-Low Power Gaze Tracking for Virtual Reality","authors":"Tianxing Li, Emmanuel S. Akosah, Qiang Liu, Xia Zhou","doi":"10.1145/3131672.3136989","DOIUrl":"https://doi.org/10.1145/3131672.3136989","url":null,"abstract":"We present LiGaze, a low-power approach to gaze tracking tailored to VR. It relies on a few low-cost photodiodes, eliminating the need for cameras and active infrared emitters. Reusing light emitted from the VR screen, LiGaze leverages photodiodes around a VR lens to measure reflected screen light in different directions. It then infers gaze direction by exploiting pupil's light absorption property. The core of LiGaze is to deal with screen light dynamics and extract changes in reflected light related to pupil movement. We design and fabricate a LiGaze prototype using off-the-shelf photodiodes. Its sensing and computation consume 791μW in total.","PeriodicalId":424262,"journal":{"name":"Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1