Pub Date : 2026-04-01Epub Date: 2026-01-17DOI: 10.1016/j.pmcj.2026.102171
Tran Thanh Lam Nguyen, Barbara Carminati, Elena Ferrari
Smartphones have become necessary in modern life and can replace traditional devices like cameras. The high demand for taking and sharing photos via smartphones, especially with the explosion of social networks and instant messaging, highlights the importance of smartphones. Android, the leading smartphone operating system, has continuously improved user security and privacy over its 17 years of development (2008–2025). However, security vulnerabilities still exist because of its open-source nature. This paper introduces ALIBIS, a framework that automatically estimates the risk of leakage of sensitive data contained in EXIF metadata when users share images online by combining static analysis and Large Language Models (LLMs). ALIBIS demonstrates consistent and robust estimation capabilities, achieving an average accuracy, precision, recall, and f1 score in k-fold cross-validation (k=5) of 0.8686, 0.8902, 0.881, and 0.8854, respectively. In addition, a survey of 130 global participants, including Android app developers and end-users, revealed a significant lack of awareness about image metadata and its risks: 82.3% of participants (user role) do not delete sensitive metadata before sharing images, and 62.3% do not know how to remove metadata. Furthermore, only 1.9% of participants (developer role) proactively remove EXIF metadata during programming. We propose ExifMetadataLib, a lightweight library for easy integration with Android OS, to mitigate sensitive metadata leakage.
智能手机已经成为现代生活的必需品,可以取代相机等传统设备。通过智能手机拍摄和分享照片的高需求,尤其是随着社交网络和即时通讯的爆炸式增长,凸显了智能手机的重要性。Android作为领先的智能手机操作系统,在其17年的发展(2008-2025)中不断提高用户的安全性和隐私性。然而,由于其开源特性,安全漏洞仍然存在。本文介绍了ALIBIS框架,该框架结合静态分析和大型语言模型(Large Language Models, llm),自动估计用户在线共享图像时EXIF元数据中包含的敏感数据泄露的风险。ALIBIS具有一致性和鲁棒性的估计能力,k-fold交叉验证(k=5)的平均正确率、精密度、召回率和f1得分分别为0.8686、0.8902、0.881和0.8854。此外,一项针对130名全球参与者(包括Android应用开发者和最终用户)的调查显示,人们对图像元数据及其风险的认识严重不足:82.3%的参与者(用户角色)在共享图像之前不会删除敏感元数据,62.3%的参与者不知道如何删除元数据。此外,只有1.9%的参与者(开发人员角色)在编程期间主动删除EXIF元数据。我们提出ExifMetadataLib,一个轻量级的库,易于与Android操作系统集成,以减轻敏感的元数据泄漏。
{"title":"ALIBIS: Assessing and mitigating the risk of sensitive metadata Leakage In moBile Image Sharing","authors":"Tran Thanh Lam Nguyen, Barbara Carminati, Elena Ferrari","doi":"10.1016/j.pmcj.2026.102171","DOIUrl":"10.1016/j.pmcj.2026.102171","url":null,"abstract":"<div><div>Smartphones have become necessary in modern life and can replace traditional devices like cameras. The high demand for taking and sharing photos via smartphones, especially with the explosion of social networks and instant messaging, highlights the importance of smartphones. Android, the leading smartphone operating system, has continuously improved user security and privacy over its 17 years of development (2008–2025). However, security vulnerabilities still exist because of its open-source nature. This paper introduces ALIBIS, a framework that automatically estimates the risk of leakage of sensitive data contained in EXIF metadata when users share images online by combining static analysis and Large Language Models (LLMs). ALIBIS demonstrates consistent and robust estimation capabilities, achieving an average accuracy, precision, recall, and f1 score in k-fold cross-validation (k=5) of 0.8686, 0.8902, 0.881, and 0.8854, respectively. In addition, a survey of 130 global participants, including Android app developers and end-users, revealed a significant lack of awareness about image metadata and its risks: 82.3% of participants (user role) do not delete sensitive metadata before sharing images, and 62.3% do not know how to remove metadata. Furthermore, only 1.9% of participants (developer role) proactively remove EXIF metadata during programming. We propose ExifMetadataLib, a lightweight library for easy integration with Android OS, to mitigate sensitive metadata leakage.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"117 ","pages":"Article 102171"},"PeriodicalIF":3.5,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human Activity Recognition (HAR) refers to the automatic recognition of various human physical activities such as walking, sitting, and standing. HAR based on wearable sensors and smartphones has gained significant attention due to its wide range of applications in healthcare, sports, rehabilitation, and smart environments. Despite extensive research, challenges remain in modeling complex spatial–temporal dependencies within activity sequences and addressing class imbalance issues in sensor-based datasets. In this paper, we propose a hybrid deep learning model that integrates a Convolutional Neural Network (CNN) for spatial feature extraction followed by a Bidirectional Long Short-Term Memory (Bi-LSTM) for bi-directional sequential analysis and a fully connected layer for classifying the different types of activities. To address data imbalance and enhance the model robustness, three oversampling techniques — Random Oversampling (ROS), Adaptive Synthetic Sampling (ADASYN), and Synthetic Minority Over-sampling Technique (SMOTE) — were experimentally evaluated, with SMOTE demonstrating superior performance. The proposed model was trained and evaluated on six publicly available benchmark datasets: MHealth, PAMAP2, WISDM, UCI-HAR, USC-HAD and Opportunity datasets, achieving F1-score at 100%, 97.99%, 99.0%, 94.81%, 91.13% and 90.95% respectively. Comparative results demonstrate that the proposed framework outperforms several state-of-the-art methods across multiple datasets, confirming its robustness, reliability, and generalization capability for diverse human activity recognition scenarios.
{"title":"SMOTE-Enhanced CNN-Bi-LSTM for wearable sensor-based human activity recognition","authors":"Ahmed Arafa , Hadeer Harfoush , Nawal El-Fishawy , Marwa Radad","doi":"10.1016/j.pmcj.2026.102161","DOIUrl":"10.1016/j.pmcj.2026.102161","url":null,"abstract":"<div><div>Human Activity Recognition (HAR) refers to the automatic recognition of various human physical activities such as walking, sitting, and standing. HAR based on wearable sensors and smartphones has gained significant attention due to its wide range of applications in healthcare, sports, rehabilitation, and smart environments. Despite extensive research, challenges remain in modeling complex spatial–temporal dependencies within activity sequences and addressing class imbalance issues in sensor-based datasets. In this paper, we propose a hybrid deep learning model that integrates a Convolutional Neural Network (CNN) for spatial feature extraction followed by a Bidirectional Long Short-Term Memory (Bi-LSTM) for bi-directional sequential analysis and a fully connected layer for classifying the different types of activities. To address data imbalance and enhance the model robustness, three oversampling techniques — Random Oversampling (ROS), Adaptive Synthetic Sampling (ADASYN), and Synthetic Minority Over-sampling Technique (SMOTE) — were experimentally evaluated, with SMOTE demonstrating superior performance. The proposed model was trained and evaluated on six publicly available benchmark datasets: MHealth, PAMAP2, WISDM, UCI-HAR, USC-HAD and Opportunity datasets, achieving F1-score at 100%, 97.99%, 99.0%, 94.81%, 91.13% and 90.95% respectively. Comparative results demonstrate that the proposed framework outperforms several state-of-the-art methods across multiple datasets, confirming its robustness, reliability, and generalization capability for diverse human activity recognition scenarios.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"117 ","pages":"Article 102161"},"PeriodicalIF":3.5,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-01Epub Date: 2026-01-22DOI: 10.1016/j.pmcj.2026.102178
Yamini Shankar, Ayon Chakraborty
Radio Frequency (RF)-based wireless sensing provides a privacy-preserving and non-intrusive alternative to vision-based systems for human activity recognition and environmental monitoring. However, transmitting high dimensional Channel State Information (CSI) from multiple distributed sensors leads to severe network congestion, especially at scale. We propose AutoCompress, a model-aware framework that intelligently compresses CSI spectrograms by prioritizing the most informative elements. Using Sparse Sensor Placement Optimization for Classification (SSPOC), AutoCompress computes element-wise importance scores for each spectrogram. These scores guide a sensor-subcarrier selection strategy under bandwidth constraints, implemented via the Prioritized Weighted Subcarrier-Sensor Cover (PWSSC) algorithm. Evaluated on the UT-HAR dataset and a real-world Nexmon-based testbed, AutoCompress achieves an average reduction in data transmission, improves network throughput by 35.5%, and reduces latency by -all while maintaining high inference accuracy, compared to baseline uncompressed CSI data transmission. These results demonstrate AutoCompress as a scalable, interpretable, and bandwidth-efficient solution for distributed wireless sensing systems.
{"title":"AutoCompress: Improving network efficiency for distributed wireless sensing applications","authors":"Yamini Shankar, Ayon Chakraborty","doi":"10.1016/j.pmcj.2026.102178","DOIUrl":"10.1016/j.pmcj.2026.102178","url":null,"abstract":"<div><div>Radio Frequency (RF)-based wireless sensing provides a privacy-preserving and non-intrusive alternative to vision-based systems for human activity recognition and environmental monitoring. However, transmitting high dimensional Channel State Information (CSI) from multiple distributed sensors leads to severe network congestion, especially at scale. We propose <span>AutoCompress</span>, a model-aware framework that intelligently compresses CSI spectrograms by prioritizing the most informative elements. Using Sparse Sensor Placement Optimization for Classification (SSPOC), <span>AutoCompress</span> computes element-wise importance scores for each spectrogram. These scores guide a sensor-subcarrier selection strategy under bandwidth constraints, implemented via the Prioritized Weighted Subcarrier-Sensor Cover (PWSSC) algorithm. Evaluated on the UT-HAR dataset and a real-world Nexmon-based testbed, <span>AutoCompress</span> achieves an average <span><math><mrow><mo>></mo><mn>4000</mn><mo>×</mo></mrow></math></span> reduction in data transmission, improves network throughput by 35.5%, and reduces latency by <span><math><mrow><mo>></mo><mn>90</mn><mtext>%</mtext></mrow></math></span>-all while maintaining high inference accuracy, compared to baseline uncompressed CSI data transmission. These results demonstrate <span>AutoCompress</span> as a scalable, interpretable, and bandwidth-efficient solution for distributed wireless sensing systems.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"117 ","pages":"Article 102178"},"PeriodicalIF":3.5,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146173211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-04-01Epub Date: 2026-01-28DOI: 10.1016/j.pmcj.2026.102175
Claudio Cicconetti , Emanuele Carlini , Chen Chen , Roman Kolcun , Richard Mortier
Edge–cloud computing infrastructures are increasingly widespread as they combine the flexibility of cloud-native development tools with the performance and security of distributed computing environments. Function-as-a-Service has emerged as a powerful abstraction that overcomes the limitations of a micro-service architecture. However, it generally does not support stateful functions, making it unsuitable for many practical applications in, e.g., Internet of Things (IoT) and real-time analytics. In this paper, we explore a novel paradigm, based on stateful asynchronous agents, that goes beyond traditional serverless computing. We focus on several key technical aspects: programming model, deployment procedures, design of a flexible compute node, and state management. We illustrate our paradigm using the EDGELESS platform as a concrete implementation of this stateful agents’ pattern. We report proof-of-concept experiment results obtained in a testbed with heterogeneous resource-constrained edge nodes that showcase some distinguishing features of our platform: scalable management of lightweight function instances, the advantage of keeping the state local at function instances, and delegated orchestration to enable a third-party agent to make migration decisions in a group of local nodes.
{"title":"Design and implementation of a platform for stateful agents at the edge","authors":"Claudio Cicconetti , Emanuele Carlini , Chen Chen , Roman Kolcun , Richard Mortier","doi":"10.1016/j.pmcj.2026.102175","DOIUrl":"10.1016/j.pmcj.2026.102175","url":null,"abstract":"<div><div>Edge–cloud computing infrastructures are increasingly widespread as they combine the flexibility of cloud-native development tools with the performance and security of distributed computing environments. Function-as-a-Service has emerged as a powerful abstraction that overcomes the limitations of a micro-service architecture. However, it generally does not support stateful functions, making it unsuitable for many practical applications in, e.g., Internet of Things (IoT) and real-time analytics. In this paper, we explore a novel paradigm, based on stateful asynchronous agents, that goes beyond traditional serverless computing. We focus on several key technical aspects: programming model, deployment procedures, design of a flexible compute node, and state management. We illustrate our paradigm using the <em>EDGELESS</em> platform as a concrete implementation of this stateful agents’ pattern. We report proof-of-concept experiment results obtained in a testbed with heterogeneous resource-constrained edge nodes that showcase some distinguishing features of our platform: scalable management of lightweight function instances, the advantage of keeping the state local at function instances, and delegated orchestration to enable a third-party agent to make migration decisions in a group of local nodes.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"117 ","pages":"Article 102175"},"PeriodicalIF":3.5,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teaching a machine to accurately identify human activities from sensor data poses a significant challenge, which is further compounded by considerations of data privacy, resource costs, and responsiveness, particularly within the constraints of devices like smartphones. While current solutions efficiently identify activities, trained models are barely portable in scenarios composed of diverse activities and limited battery life devices, such as smartphones. This paper introduces Transferable and Copyright-Preserving Human Activity Recognition (TCP-HAR), a mobile-based HAR system that integrates digital watermarking, Federated Learning (FL), Transfer Learning (TL), and compression techniques to provide efficient human activity recognition while providing copyright protection of deep neural network models over Android smartphones. Our solution optimizes the utilization of FL, TL, and their combination (FTL) by extensively testing standalone TL models in offline contexts and comparing these results with FL across a network of mobile devices. Our findings highlight the benefits of TCP-HAR for mobile environments in terms of accuracy, F1-score, and training time. In addition, our proposed watermarking mechanism is robust yet computationally efficient, ensuring ownership verification without compromising the scalability of the TFL process.
{"title":"TCP-HAR: On-Device Transferable and Copyright-Preserving Human Activity Recognition","authors":"Alessio Sacco , Bruno Palermo , Giulio Figliolino , Chiara Contoli , Guido Marchetto , Flavio Esposito","doi":"10.1016/j.pmcj.2026.102163","DOIUrl":"10.1016/j.pmcj.2026.102163","url":null,"abstract":"<div><div>Teaching a machine to accurately identify human activities from sensor data poses a significant challenge, which is further compounded by considerations of data privacy, resource costs, and responsiveness, particularly within the constraints of devices like smartphones. While current solutions efficiently identify activities, trained models are barely portable in scenarios composed of diverse activities and limited battery life devices, such as smartphones. This paper introduces Transferable and Copyright-Preserving Human Activity Recognition (TCP-HAR), a mobile-based HAR system that integrates digital watermarking, Federated Learning (FL), Transfer Learning (TL), and compression techniques to provide efficient human activity recognition while providing copyright protection of deep neural network models over Android smartphones. Our solution optimizes the utilization of FL, TL, and their combination (FTL) by extensively testing standalone TL models in offline contexts and comparing these results with FL across a network of mobile devices. Our findings highlight the benefits of TCP-HAR for mobile environments in terms of accuracy, F1-score, and training time. In addition, our proposed watermarking mechanism is robust yet computationally efficient, ensuring ownership verification without compromising the scalability of the TFL process.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"117 ","pages":"Article 102163"},"PeriodicalIF":3.5,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-01Epub Date: 2025-12-27DOI: 10.1016/j.pmcj.2025.102158
Marcello Pietri , Natalia Selini Hadjidimitriou , Marco Mamei , Marco Picone , Enrico Rossini , Edoardo Maria Sanna , Jovanka Adzic , Andrea Buldorini
In this research, we propose automating network management through data-driven intelligence, with a particular focus on anomalies and network traffic during specific events or periods. We analyze a large dataset collected by Orange mobile network operator in France with the goal of forecasting mobile demand for different classes of services. To model the underlying network infrastructure, we introduce a model for the underlying network based on a hierarchy of virtualization layers and slices. Building on this model, we propose algorithms to optimize the resources allocated to network slices and traffic distribution within the operator’s network. Network performance is evaluated as the fraction of time the mobile traffic is within the capacity of the network. Our results demonstrate that dynamic reallocation of resources among slices, and dynamic load balancing (traffic shaping) between nodes notably improves network performance. These results provide insights into critical aspects related to future 5G network management.
{"title":"Traffic analysis and resource adaptation in large-scale 5G multi-layer edge networks","authors":"Marcello Pietri , Natalia Selini Hadjidimitriou , Marco Mamei , Marco Picone , Enrico Rossini , Edoardo Maria Sanna , Jovanka Adzic , Andrea Buldorini","doi":"10.1016/j.pmcj.2025.102158","DOIUrl":"10.1016/j.pmcj.2025.102158","url":null,"abstract":"<div><div>In this research, we propose automating network management through data-driven intelligence, with a particular focus on anomalies and network traffic during specific events or periods. We analyze a large dataset collected by Orange mobile network operator in France with the goal of forecasting mobile demand for different classes of services. To model the underlying network infrastructure, we introduce a model for the underlying network based on a hierarchy of virtualization layers and slices. Building on this model, we propose algorithms to optimize the resources allocated to network slices and traffic distribution within the operator’s network. Network performance is evaluated as the fraction of time the mobile traffic is within the capacity of the network. Our results demonstrate that dynamic reallocation of resources among slices, and dynamic load balancing (traffic shaping) between nodes notably improves network performance. These results provide insights into critical aspects related to future 5G network management.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"116 ","pages":"Article 102158"},"PeriodicalIF":3.5,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federated Learning (FL) enables distributed learning of sensitive and multi-location data to enhance data privacy and avoid data leakages. In FL, participating clients only share the trained local model updates to the external server for global aggregation. However, FL is vulnerable to security threats like adaptive data poisoning attacks in non-IID data scenarios, especially coordinated attacks by colluding sybils. Existing defences struggle against sybils as their focus has been on either analysing model behaviour or strengthening aggregation mechanisms. Sybils can collude by sharing their model updates with each other in the external environment. They can then strategically manipulate and share poisoned model updates for global aggregation, specifically employing label-flipping attacks. This paper introduces a novel defence framework that shifts the focus from model analysis to sybil behaviour analysis utilizing historical pairwise cosine similarity of client updates during the training process. By establishing a dynamic threshold and analysing patterns of similarity change among participating clients, the proposed defence framework detects sybils exhibiting coordinated data poisoning and excludes them from the subsequent global aggregation process. This approach is adaptable to various underlying aggregation methods, providing a robust defence against collusive data poisoning attacks and improving model resilience and convergence even under challenging non-IID settings. Comprehensive evaluations demonstrate a significant reduction in the Attack Success Ratio, i.e. from over 40% to below 1%, showcasing its superior efficacy compared to state-of-the-art defences against targeted data poisoning attacks.
{"title":"Sybil-aware adaptive defence framework for robust federated learning","authors":"Dnyanesh Khedekar , Tanmaya Mahapatra , Amitesh Singh Rajput","doi":"10.1016/j.pmcj.2025.102157","DOIUrl":"10.1016/j.pmcj.2025.102157","url":null,"abstract":"<div><div>Federated Learning (FL) enables distributed learning of sensitive and multi-location data to enhance data privacy and avoid data leakages. In FL, participating clients only share the trained local model updates to the external server for global aggregation. However, FL is vulnerable to security threats like adaptive data poisoning attacks in non-IID data scenarios, especially coordinated attacks by colluding sybils. Existing defences struggle against sybils as their focus has been on either analysing model behaviour or strengthening aggregation mechanisms. Sybils can collude by sharing their model updates with each other in the external environment. They can then strategically manipulate and share poisoned model updates for global aggregation, specifically employing label-flipping attacks. This paper introduces a novel defence framework that shifts the focus from model analysis to sybil behaviour analysis utilizing historical pairwise cosine similarity of client updates during the training process. By establishing a dynamic threshold and analysing patterns of similarity change among participating clients, the proposed defence framework detects sybils exhibiting coordinated data poisoning and excludes them from the subsequent global aggregation process. This approach is adaptable to various underlying aggregation methods, providing a robust defence against collusive data poisoning attacks and improving model resilience and convergence even under challenging non-IID settings. Comprehensive evaluations demonstrate a significant reduction in the Attack Success Ratio, i.e. from over 40% to below 1%, showcasing its superior efficacy compared to state-of-the-art defences against targeted data poisoning attacks.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"116 ","pages":"Article 102157"},"PeriodicalIF":3.5,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-01Epub Date: 2025-12-04DOI: 10.1016/j.pmcj.2025.102153
Euijong Lee , Jaemin Jeong , Gyuchan Jo , Taegyeom Lee , Gee-Myung Moon , Young-Duk Seo , Ji-Hoon Jeong
Childhood overweight and obesity have emerged as some of the most serious global public health challenges, as they can lead to a variety of health-related problems and the early development of chronic diseases. The healthcare domain has been transformed by the integration of the Internet of Things (IoT), leading to the development of digital healthcare solutions. This integration has led to an increase in the health data collected from a variety of IoT sources. Consequently, advanced technologies are required to analyze health data, and Artificial Intelligence (AI) has been employed to extract meaningful insights from the data. Moreover, these technologies can be effectively applied in healthcare to address childhood overweight and obesity. A self-adaptive framework is proposed to manage childhood weight using lifelog data from IoT environments. An ensemble-based learning model is applied to predict weight using the lifelog data. A smartphone application providing real-world services was developed, and lifelog data were collected from a cohort of 362 children aged 104 to 152 months. Reasonable results were obtained, indicating that the proposed ensemble model can predict childhood weight change using lifelog data with an accuracy of 0.9711 and an F1-score 0.9725. Also, the results indicated that appropriate rewards can encourage human involvement and positively influence data quality.The results demonstrated the efficiency of the proposed framework with human involvement in weight prediction. The experimental results demonstrate the efficiency of the proposed framework and its potential application in healthcare services to enhance children’s health.
{"title":"A self-adaptive framework for child healthcare in IoT environment using AI-based prediction","authors":"Euijong Lee , Jaemin Jeong , Gyuchan Jo , Taegyeom Lee , Gee-Myung Moon , Young-Duk Seo , Ji-Hoon Jeong","doi":"10.1016/j.pmcj.2025.102153","DOIUrl":"10.1016/j.pmcj.2025.102153","url":null,"abstract":"<div><div>Childhood overweight and obesity have emerged as some of the most serious global public health challenges, as they can lead to a variety of health-related problems and the early development of chronic diseases. The healthcare domain has been transformed by the integration of the Internet of Things (IoT), leading to the development of digital healthcare solutions. This integration has led to an increase in the health data collected from a variety of IoT sources. Consequently, advanced technologies are required to analyze health data, and Artificial Intelligence (AI) has been employed to extract meaningful insights from the data. Moreover, these technologies can be effectively applied in healthcare to address childhood overweight and obesity. A self-adaptive framework is proposed to manage childhood weight using lifelog data from IoT environments. An ensemble-based learning model is applied to predict weight using the lifelog data. A smartphone application providing real-world services was developed, and lifelog data were collected from a cohort of 362 children aged 104 to 152 months. Reasonable results were obtained, indicating that the proposed ensemble model can predict childhood weight change using lifelog data with an accuracy of 0.9711 and an F1-score 0.9725. Also, the results indicated that appropriate rewards can encourage human involvement and positively influence data quality.The results demonstrated the efficiency of the proposed framework with human involvement in weight prediction. The experimental results demonstrate the efficiency of the proposed framework and its potential application in healthcare services to enhance children’s health.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"116 ","pages":"Article 102153"},"PeriodicalIF":3.5,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rapid advances in electronic textiles have enabled the development of smart socks with temperature-sensing capabilities for real-time foot temperature monitoring, where stretchability, user comfort, durability, bending, washability, sensing location error during wear, and higher manufacturing cost are drawbacks. This study introduces a smart sock prototype that integrates highly stretchable hybrid electronic temperature-sensing (SHETS) yarns in key physiological foot regions—hallux, metatarsal, midfoot, and heel—to detect temperature variations and address the challenges of existing and commercial products. Structural design of SHETS yarns involved wrapping, novel interconnection, encapsulation, and braiding techniques to integrate miniature thermistor within the yarn structure, showing high stretchability, durability, washability, and sensing accuracy. Low-power microcontroller transmits analog data to a digital format, and the web-based interface enables users to monitor data through mobile phone applications in real-time. The prototype demonstrates high accuracy, durability, and reliability under various conditions, with average temperature error ranging from ±0.23 °C to ±0.27 °C. The prototype maintains durability and stability in hot, cold, and sweaty conditions. Physical activities like walking, running, and cycling demonstrate the durability and stability of foot temperature changes, while extended wear shows low power consumption and stability. The device withstands over 30 washing cycles with minimal accuracy loss (maximum ±0.28 °C error) and retains the mechanical and electrical properties of SHETS yarn under repeated stretching and bending. Additionally, the android-based intelligent foot alert system enhances usability by providing real-time monitoring and alerts on smartphones, offering a cost-effective, energy-efficient, and user-friendly solution for proactive foot health management. Available code: https://github.com/Sumonta-e-textile/Smart-Materials-and-Electronic-Textiles-Lab.
{"title":"The structure design of the smart sock prototype integrated with stretchable hybrid electronic temperature sensing yarn for real-time temperature monitoring","authors":"Sumonta Ghosh , Fenye Meng , Rony Shaha , Jiyong Hu","doi":"10.1016/j.pmcj.2025.102136","DOIUrl":"10.1016/j.pmcj.2025.102136","url":null,"abstract":"<div><div>Rapid advances in electronic textiles have enabled the development of smart socks with temperature-sensing capabilities for real-time foot temperature monitoring, where stretchability, user comfort, durability, bending, washability, sensing location error during wear, and higher manufacturing cost are drawbacks. This study introduces a smart sock prototype that integrates highly stretchable hybrid electronic temperature-sensing (SHETS) yarns in key physiological foot regions—hallux, metatarsal, midfoot, and heel—to detect temperature variations and address the challenges of existing and commercial products. Structural design of SHETS yarns involved wrapping, novel interconnection, encapsulation, and braiding techniques to integrate miniature thermistor within the yarn structure, showing high stretchability, durability, washability, and sensing accuracy. Low-power microcontroller transmits analog data to a digital format, and the web-based interface enables users to monitor data through mobile phone applications in real-time. The prototype demonstrates high accuracy, durability, and reliability under various conditions, with average temperature error ranging from ±0.23 °C to ±0.27 °C. The prototype maintains durability and stability in hot, cold, and sweaty conditions. Physical activities like walking, running, and cycling demonstrate the durability and stability of foot temperature changes, while extended wear shows low power consumption and stability. The device withstands over 30 washing cycles with minimal accuracy loss (maximum ±0.28 °C error) and retains the mechanical and electrical properties of SHETS yarn under repeated stretching and bending. Additionally, the android-based intelligent foot alert system enhances usability by providing real-time monitoring and alerts on smartphones, offering a cost-effective, energy-efficient, and user-friendly solution for proactive foot health management. Available code: <span><span>https://github.com/Sumonta-e-textile/Smart-Materials-and-Electronic-Textiles-Lab</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"116 ","pages":"Article 102136"},"PeriodicalIF":3.5,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-03-01Epub Date: 2026-01-06DOI: 10.1016/j.pmcj.2026.102160
Zhiyuan Jiang , Sike Ni , Mohammed A.A. Al-qaness
Fall detection and Human Activity Recognition (HAR) are crucial applications in pervasive and mobile computing, enabling real-time monitoring of individuals – especially the elderly or patients – for enhanced safety and health management. Wearable devices have emerged as a critical tool for continuous activity monitoring, enabling real-time detection and intervention. However, the quality of data collected by wearable sensors faces several challenges, including noise interference, instability due to wearing, and individual differences. To address these challenges, this paper proposes a feature stepwise fusion detection system based on a multilevel discrete wavelet decomposition with Kolmogorov–Arnold Network, namely MDWD-KAN. This model utilizes multilevel wavelet decomposition to perform multiresolution analysis on sensor signals, extracting multilevel features and effectively enhancing feature stability and noise resistance. Additionally, through a heterogeneous model and a multilevel feature fusion strategy, MDWD-KAN achieves complementary low-frequency and high-frequency features, improving the recognition capability for complex motion patterns. Experiments were conducted on three public datasets: MobiAct, SisFall, and UniMiB-SHAR. The results show that MDWD-KAN achieves average recognition accuracies of 99.67%, 99.90%, and 99.65%, respectively, for binary classification (fall and non-fall), and 98.85%, 85.45%, and 96.86%, respectively, for multiclassification.
{"title":"MDWD-KAN: Multilevel discrete wavelet decomposition with Kolmogorov–Arnold network for fall detection and activity recognition using wearable sensors","authors":"Zhiyuan Jiang , Sike Ni , Mohammed A.A. Al-qaness","doi":"10.1016/j.pmcj.2026.102160","DOIUrl":"10.1016/j.pmcj.2026.102160","url":null,"abstract":"<div><div>Fall detection and Human Activity Recognition (HAR) are crucial applications in pervasive and mobile computing, enabling real-time monitoring of individuals – especially the elderly or patients – for enhanced safety and health management. Wearable devices have emerged as a critical tool for continuous activity monitoring, enabling real-time detection and intervention. However, the quality of data collected by wearable sensors faces several challenges, including noise interference, instability due to wearing, and individual differences. To address these challenges, this paper proposes a feature stepwise fusion detection system based on a multilevel discrete wavelet decomposition with Kolmogorov–Arnold Network, namely MDWD-KAN. This model utilizes multilevel wavelet decomposition to perform multiresolution analysis on sensor signals, extracting multilevel features and effectively enhancing feature stability and noise resistance. Additionally, through a heterogeneous model and a multilevel feature fusion strategy, MDWD-KAN achieves complementary low-frequency and high-frequency features, improving the recognition capability for complex motion patterns. Experiments were conducted on three public datasets: MobiAct, SisFall, and UniMiB-SHAR. The results show that MDWD-KAN achieves average recognition accuracies of 99.67%, 99.90%, and 99.65%, respectively, for binary classification (fall and non-fall), and 98.85%, 85.45%, and 96.86%, respectively, for multiclassification.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"116 ","pages":"Article 102160"},"PeriodicalIF":3.5,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145925535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}