{"title":"Modelling Activities of Daily Living with Petri nets","authors":"M. Garcia-Constantino, A. Konios, C. Nugent","doi":"10.1109/PERCOMW.2018.8480225","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480225","url":null,"abstract":"Modelling Activities of Daily Living (ADLs) is an important step in the process to design and implement reliable sensor systems that effectively monitor the activities of the ageing population. Once modelled, unusual activities may be detected that have the potential of impacting upon a person’s well-being. The use of Petri nets to model ADLs is considered in this research as a means to capture the intricate behaviours of ambient systems. To our best knowledge there has not been extensive work in the related literature, hence the novelty of this work. The ADLs considered in the developed Petri net model are: (i) preparing tea, (ii) preparing coffee, and (iii) preparing pasta. The first two ADLs listed are deemed to have many occurrences during a typical day of an elderly person. The third activity is representative of activities that involve cooking. Hence, abnormal behaviour detected in the context of these activities can be an indicator of a progressive health problem or the occurrence of a hazardous incident. The completion and non- completion of activities are considered in the developed Petri net model and are also formally verified. The description of the sensor system of the kitchen ADLs, its Petri net model and verification results are presented. Results show that the Petri net modelling of ADLs can reliably and effectively reflect the real behaviour of the examined system detecting all the activities of the users that can exhibit both their normal and abnormal behaviour.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fausto Giunchiglia, M. Zeni, Enrico Bignotti, Wanyi Zhang
{"title":"Assessing Annotation Consistency in the Wild","authors":"Fausto Giunchiglia, M. Zeni, Enrico Bignotti, Wanyi Zhang","doi":"10.1109/PERCOMW.2018.8480236","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480236","url":null,"abstract":"The process of human annotation of sensor data is at the base of research areas such as participatory sensing and mobile crowdsensing. While much research has been devoted to assessing the quality of sensor data, the same cannot be said about annotations, which are fundamental to obtain a clear understanding of users experience. We present an evaluation of an interdisciplinary annotation methodology allowing users to continuously annotate their everyday life. The evaluation is done on a dataset from a project focused on the behaviour of students and how this impacts on their academic performance. We focus on those annotations concerning locations and movements of students, and we evaluate the annotations quality by checking their consistency. Results show that students are highly consistent with respect to the random baseline, and that these results can be improved by exploiting the semantics of annotations.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physiological Impact of Vibro-Acoustic Therapy on Stress and Emotions through Wearable Sensors","authors":"Franca Delmastro, Flavio Di Martino, C. Dolciotti","doi":"10.1109/PERCOMW.2018.8480170","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480170","url":null,"abstract":"Stress represents one of the dominant factors of young adults’ health, negatively affecting emotional, mental and physical aspects. There are several works in the literature aimed at detecting stress levels and conditions through the use of wearable devices. In this paper we investigated the effects of vibro-acoustic therapy (VAT) on physiological signals in a small group of young adults, trying to detect its positive effect on their stress condition. VAT has its origin in 1980s with basic instruments able to transmit music and vibrations. Here, we exploited AcusticA, an innovative VAT solution represented by a wooden chaise longue developed by following the principles of a big soundboard, and thus implementing a whole-body approach. Therapeutic sessions are accompanied by selected relaxing melodies, appropriately composed by a music therapist. We recruited 8 volunteer subjects, working in the same environment and characterised by similar stress conditions. We analysed the main components of ECG and GSR signals in order to highlight physiological responses and their variations between a rest baseline phase and a 20 minute therapy. Results show a general decreasing trend in HR, SCRs and their amplitude, confirming the relaxing component of the therapy.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge-enabled Distributed Network Measurement","authors":"V. Bumgardner, Caylin D. Hickey, V. Marek","doi":"10.1109/PERCOMW.2018.8480233","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480233","url":null,"abstract":"In the area of network monitoring and measurement a number of good tools are already available. However, most mature tools do not account for changes in network management brought about through Software Defined Networking (SDN). New tools developed to address the SDN paradigm often lack both observation scope and performance scale to support distributed management of accelerated measurement devices, high-throughput network processing, and distributed network function monitoring. In this paper we present an approach to distributed network monitoring and management using an agent-based edge computing framework. In addition, we provide a number of real-world examples where this system has been put into practice.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121582694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Stach, Frank Dürr, K. Mindermann, S. Palanisamy, Stefan Wagner
{"title":"How a Pattern-based Privacy System Contributes to Improve Context Recognition","authors":"Christoph Stach, Frank Dürr, K. Mindermann, S. Palanisamy, Stefan Wagner","doi":"10.1109/PERCOMW.2018.8480227","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480227","url":null,"abstract":"As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data—as well as the knowledge which can be derived from it—is highly beneficial as apps are able to adapt their services appropriate to the respective context, it also poses a privacy threat. Thus, a lot of research work is done regarding privacy. Yet, all approaches obfuscate certain attributes which has a negative impact on context recognition and thus service quality. Therefore, we introduce a novel access control mechanism called PATRON. The basic idea is to control access to information patterns. For instance, a person suffering from diabetes might not want to reveal his or her unhealthy eating habit, which can be derived from the pattern “rising blood sugar level” “adding bread units”. Such a pattern which must not be discoverable by some parties (e. g., insurance companies) is called private pattern whereas a pattern which improves an app's service quality is labeled as public pattern. PATRON employs different techniques to conceal private patterns and, in case of available alternatives, selects the one with the least negative impact on service quality, such that the recognition of public patterns is supported as good as possible.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"6 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Sztyler, Gabriele Civitarese, H. Stuckenschmidt
{"title":"Modeling and Reasoning with ProbLog: An Application in Recognizing Complex Activities","authors":"T. Sztyler, Gabriele Civitarese, H. Stuckenschmidt","doi":"10.1109/PERCOMW.2018.8480299","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480299","url":null,"abstract":"Smart-homectivity recognition is an enabling tool for a wide range of ambient assisted living applications. The recognition of ADLs usually relies on supervised learning or knowledge-based reasoning techniques. In order to overcome the well-known limitations of those two approaches and, at the same time, to combine their strengths to improve the recognition rate, many researchers investigated Markov Logic Networks (MLNs). However, MLNs require a non-trivial effort by experts to properly model probabilities in terms of weights. In this paper, we propose a novel method based on ProbLog. ProbLog is a probabilistic extension of Prolog, which allows to explicitly define probabilistic facts and rules. With respect to MLN, the inference mode of ProbLog is based on the closed-world assumption and it has faster response times. We propose a simple and flexible ProbLog model, which we exploit to recognize complex ADLs in an online fashion. Considering a dataset with 21 subjects, our results show that our method reaches high F-measure (83%). Moreover, we also show that the response time of ProbLog is satisfying for real-time applications.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hend K. Gedawy, Karim Habak, Khaled A. Harras, M. Hamdi
{"title":"Awakening the Cloud Within: Energy-Aware Task Scheduling on Edge IoT Devices","authors":"Hend K. Gedawy, Karim Habak, Khaled A. Harras, M. Hamdi","doi":"10.1109/PERCOMW.2018.8480266","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480266","url":null,"abstract":"Mobile and IoT devices are becoming increasingly capable computing platforms that are often underutilized. In this paper, we propose a system that leverages the idle compute cycles in a group of heterogeneous mobile and IoT devices that can be clustered to form an edge micro-cloud. At the heart of this system, we formulate a task assignment and scheduling problem that strives to maximize the computational throughput of the constructed micro-cloud while maintaining the energy consumption below an operator specified threshold. Due to the NP-Completeness of this scheduling problem, we design a set of heuristics to solve this problem. We implement a prototype of our system and use it to evaluate its performance and assess its efficiency. Our results demonstrate the system’s ability to utilize the available compute capacity of a group of mobile and IoT devices while adhering to pre-specified energy constraints. Compared to other schedulers, our scheduler achieves 10% to 40% improvement in terms of latency minimization, and up to 30% improvement in terms of computational throughput.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eduardo Machado, Deepika Singh, F. Cruciani, Liming Luke Chen, S. Hanke, Fernando Salvago, J. Kropf, Andreas Holzinger
{"title":"A Conceptual framework for Adaptive User Interfaces for older adults","authors":"Eduardo Machado, Deepika Singh, F. Cruciani, Liming Luke Chen, S. Hanke, Fernando Salvago, J. Kropf, Andreas Holzinger","doi":"10.1109/PERCOMW.2018.8480407","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480407","url":null,"abstract":"Nowadays, information and communication technologies (ICT) have become part of our everyday life, enhancing the quality of life and promoting new forms of social interaction. Despite the numerous benefits of ICT, older adults still present low rates of ICT adoption compared to other population segments. The lack of accessible User Interfaces has been identified as a major barrier. Traditional User Interfaces follow a design for all approach, typically ignoring the needs of older adults. Recent research in Human-Computer Interaction (HCI) proposes adaptive User Interfaces to suit the individual users abilities. Nevertheless, most of the existing approaches perform adaptation based on user profile groups and do not provide personalized adaptation in real-time. This paper introduces a conceptual framework for developing real-time adaptive User Interfaces. The system aims to target most common issues among older adults, ${i.e.}$cognitive decline and vision loss. The developed conceptual framework also presents novel strategic techniques to assess cognitive load and vision related issues in an unobtrusive manner for the user.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Conjunction of Fog Computing and the Industrial Internet of Things - An Applied Approach","authors":"A. Seitz, Dominik Buchinger, B. Brügge","doi":"10.1109/PERCOMW.2018.8480288","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480288","url":null,"abstract":"Industrial applications benefit from cloud computing deployments in terms of scalability, manageability, and cost. However, cloud-only implementations do not meet the requirements of industrial applications such as latency, network traffic reduction, and reliability. Fog computing is a promising approach to overcome the limitations of cloud computing in terms of realtime and network utilization. Fog computing already found its application in various areas such as Augmented Reality and Smart Cities. This paper presents two case studies which show the applicability of the fog paradigm for Industrial Internet of Things (IIoT) applications. IIoT applications are characterized by a high degree of integration and flexibility. The FEAt case study shows how the availability of a system can be increased by using a fog computing architecture and at the same time low latency for the analysis of sensor data can be achieved. In the second case study, FARADAY, we optimize bandwidth utilization in an existing industry environment by applying a fog-based solution. We show, that fog computing is applicable for industrial applications, helps to overcome problems associated with cloud deployments, and leads to reliable applications.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dominik Schäfer, Janick Edinger, Jens Eckrich, Martin Breitbach, C. Becker
{"title":"Hybrid Task Scheduling for Mobile Devices in Edge and Cloud Environments","authors":"Dominik Schäfer, Janick Edinger, Jens Eckrich, Martin Breitbach, C. Becker","doi":"10.1109/PERCOMW.2018.8480201","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480201","url":null,"abstract":"Mobile cloud computing enables mobile devices to augment their computational capabilities with centralized resources. However, due to latency issues, mobile cloud computing is unsuitable in many situations. Lately, mobile edge computing appeared as a more decentralized paradigm, which utilizes nearby resources. It benefits from the continuously increasing amount and the enhancing performance of end-user devices. Compared to mobile cloud computing, nearby resources are limited, but reachable with a significantly shorter latency. We argue that a combination of both approaches can drastically improve the performance of mobile applications. In this paper, we introduce a hybrid scheduling approach. Beyond centralized scheduling on remote edge and cloud resources, we introduce an ad-hoc scheduling mechanism on nearby edge devices. Our context-aware scheduler considers both options along with the characteristics of the task to decide between an execution in the cloud or in the edge. We use mechanisms for edge device discovery, connection management, and task allocation as well as a context-aware utility function. We integrate our approach into an existing distributed computing system and evaluate the hybrid scheduler within a real-world testbed.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}