Detection and Prediction of Infectious Diseases Using IoT Sensors A Review

The most considerableadvantage to IoT in healthcare is that it supports doctors in undertaking extrasignificant clinical work in a profession that already is experiencing aworldwide professional hard work shortage . Healthcare IoT also canbolster affected person pride by permitting patients to spend more timeinteracting with their medical doctors due to the fact docs aren’t as taken with the mundane and rote aspects of their career .…

Non conservative Design of Robust Tracking Controllers Based on Input output Data

This paper studies worst-case robust optimal tracking using noisy input-output data . We utilize behavioral system theory to represent systemtrajectories, while avoiding explicit system identification . We assume that therecent output data used in the data-dependent representation are noisy and we provide a non-conservative design procedure for robust control based onoptimization with a linear cost and LMI constraints .…

PHOENIX Device Centric Cellular Network Protocol Monitoring using Runtime Verification

Phoenix monitors device-side cellular network traffic for performingsignature-based unexpected behavior detection . Phoenix can be manually-crafted by a network security expert or can be automatically synthesized using anoptional component of Phoenix . Phoenix was able to identify all 15 representative n-dayvulnerabilities and unsafe practices of 4G LTE networks considered in ourevaluation with a high packet processing speed (~68000 packets/second) whileinducing only a moderate amount of energy overhead (~4mW).…

Jamming Attacks and Anti Jamming Strategies in Wireless Networks A Comprehensive Survey

This article surveys existing jamming attacks andanti-jamming strategies in wireless local area networks (WLANs), cellularnetworks, cognitive radio networks (CRNs) and Bluetooth networks . It offers insights on the design of jamming-resilient wireless networking systems . An outlook on promising antijamming techniques is offered at the end of this article to delineate important research directions .…

Recurrence Ranks and Moment Sequences

We introduce the “moment rank” and “unitary rank” of numerical sequences . We show that both parameters can becharacterized by a broad set of criteria involving moments of measures, typesof recurrence relations, Hankel matrix factorizations, Waring rank, analyticproperties of generating functions, and algebraic properties of polynomialideals .…

OralViewer 3D Demonstration of Dental Surgeries for Patient Education with Oral Cavity Reconstruction from a 2D Panoramic X ray

OralViewer is the first interactive application that enables dentist’s demonstration of dental surgeries in 3D to promote patients’understanding . It takes a single 2D panoramic dental X-ray toreconstruct patient-specific 3D teeth structures, which are then assembled with registered gum and jaw bone models for complete oral cavity modeling .…

Multi Beam Multi Hop Routing for Intelligent Reflecting Surfaces Aided Massive MIMO

Intelligent reflecting surface (IRS) is envisioned to play a significant role in future wireless communication systems as an effective means of reconfiguring the radio signal propagation environment . We aim to select optimal IRSs and their beam routing path for each of the users, along with the active/passive beamforming at the BS/IRSs, such that the minimum received signal power among all users is maximized .…

Interplay between RIS and AI in Wireless Communications Fundamentals Architectures Applications and Open Research Problems

Future wireless communication networks are expected to fulfill theunprecedented performance requirements to support our highly digitized and data-driven society . Among many potential technologies, reconfigurableintelligent surface (RIS) and artificial intelligence (AI) have attractedextensive attention . This paperexplores the road to implementing the combination of RIS and AI; specifically,integrating AI-enabled technologies into RIS-based frameworks for maximizing the practicality of RIS to facilitate the realization of smart radiopropagation environments .…

De identifying Hospital Discharge Summaries An End to End Framework using Ensemble of De Identifiers

This paper presents an end-to-end de-identification framework to automatically remove Protected Health Information (PHI) from hospital discharge summaries . The majority of false positives and false negatives were related to the person category . The final model in our framework was an ensemble which combined six single models using both balanced and imbalanced datasets for training majority voting .…

SetSketch Filling the Gap between MinHash and HyperLogLog

MinHash and HyperLogLog are sketching algorithms that have become indispensable for set summaries in big data applications . MinHash is suitablefor the fast comparison of sets as it allows estimating the Jaccard similarityand other joint quantities . This work presents a new data structure called SetSketch that is able to continuously fill the gap between both use cases .…

Partially Observable Mean Field Reinforcement Learning

Traditional multi-agent reinforcement learning algorithms are not scalable to environments with more than a few agents . These algorithms areexponential in the number of agents . In the first setting, only agents in a fixed neighbourhood are visible, while in the second setting, the visibility of agents is determined atrandom based on distances .…

Design of heterogeneous multi agent system for distributed computation

A group behavior of a heterogeneous multi-agent system is studied which obeys an “average of individual vector fields” under strong couplings among the agents . A few applications are discussed including estimation of thenumber of agents in a network, distributed least-squares or median solver, distributed optimization, distributed state estimation, and robustsynchronization of coupled oscillators .…

Sub Gaussian Error Bounds for Hypothesis Testing

We interpret likelihood-based test functions from a geometric perspective . The Kullback-Leibler (KL) divergence is adopted to quantify the distance from a distribution to another . An error bound for binary hypothesistesting can be obtained in terms of the sub-Gaussian norm and the KLdivergence .…

Chunk List Concurrent Data Structures

Chunking data is obviously no new concept; however, I had never found any structures that used chunking as the basis of their implementation . By using chunking and concurrency to my advantage, I came up with thechunk list – a dynamic list-based data structure that would separate largeamounts of data into specifically sized chunks, each of which should be able to be searched at the exact same time by searching each chunk on a separatethread .…

5G MEC Computation Handoff for Mobile Augmented Reality

The combination of 5G and Multi-access Edge Computing (MEC) can significantly reduce application delay by lowering transmission delay and bringing capabilities closer to the end user . 5G MEC couldenable excellent user experience in applications like Mobile Augmented Reality(MAR), which are computation-intensive, and delay and jitter-sensitive .…

Design and Actuator Optimization of Lightweight and Compliant Knee Exoskeleton for Mobility Assistance of Children with Crouch Gait

Pediatric exoskeletons offer great promise to increase mobility for children with crouch gait caused by cerebral palsy . A lightweight, compliant and user-specific actuator is critical for maximizing the benefits of anexoskeleton to users . We developed alightweight (1.65 kg unilateral mass) and compliant pediatric knee exoskeleton with a bandwidth of 22.6 Hz that can provide torque assistance to children withcrouch gait using high torque density motor .…

Self Adaptive Systems A Systematic Literature Review Across Categories and Domains

A self-adaptive system is characterized by being context-aware and can act on that awareness . The underlying goal of a SAS is the sustainedachievement of its goals despite changes in its environment . We characterize the maturation process of theresearch area from theoretical papers over practical implementations to moreholistic and generic approaches, frameworks, and exemplars, applied to areassuch as networking, web services, and robotics, with much of the recent workfocusing on IoT and IaaS.…

Tweeting for the Cause Network analysis of UK petition sharing

This work examines the dynamics of sharing petitions on social media in order to garner signatures and, ultimately, agovernment response . Using 20 months of Twitter data, we perform analyses of networks constructed of petitions and supporters on Twitter . We find that Twitter users do not exclusively share petitions on one issue nor do they share exclusively popular petitions .…

Interface Features and Users Well Being Measuring the Sensitivity of Users Well Being to Resource Constraints and Feature Types

Users increasingly face multiple interface features on one hand, and constraints on available resources (e.g., time, attention) on the other . Building on microeconomic theory,and focusing on social information features, users’ interface choices were conceptualized as an exchange of resources in return for goods (social information features) We studied how sensitive users’ well-being is to features’ type, and to their cost level and type .…

mathcal L _1 Adaptive Control for Switching Reference Systems Application to Flight Control

This paper presents a framework for the design and analysis of an $\mathcal{L}_1$ adaptive controller with a switching reference system . The analysis uses a switched reference system that assumesperfect knowledge of uncertainties and uses a corresponding non-adaptivecontroller . Simulations of the short period dynamics of a transport class aircraft during the approach phase illustrate the theoretical results .…

Estimating Experimental Dispersion Curves from Steady State Frequency Response Measurements

Dispersion curves characterize the frequency dependence of the phase and thegroup velocities of propagating elastic waves . The advantages of this approach over other traditionally used methods stem from the need to conduct only steady-state experiments . The data-driven model (using the out-of-plane FRFs) estimates the anti-symmetric ($A_0$) group velocity with a maximum error of $4\%$ over a 40~kHz frequency band .…

Task Offloading and Resource Allocation with Multiple CAPs and Selfish Users

In this work, we consider a multi-user mobile edge computing system with multiple computing access points (CAPs) Each mobile user has multipleddependent tasks that must be processed in a round-by-round schedule . In everyround, a user may process their individual task locally, or choose to offload their task to one of the $M$ CAPs or the remote cloud server, in order to reduce their processing cost .…

Inverse reinforcement learning for autonomous navigation via differentiable semantic mapping and planning

This paper focuses on inverse reinforcement learning for autonomousnavigation using distance and semantic category observations . The objective isto infer a cost function that explains demonstrated behavior while relying only on the expert’s observations and state-control trajectory . We develop a mapencoder, that infers semantic category probabilities from the observationsequence, and a cost encoder, defined as a deep neural network over these features .…

Adaptive Surgical Robotic Training Using Real Time Stylistic Behavior Feedback Through Haptic Cues

Surgical skill directly affects surgical procedure outcomes; thus, effectivetraining is needed to ensure satisfactory results . We propose a framework to enable user-adaptive training using near-real-time detection of performance, based on intuitive styles of surgicalmovements . We evaluate the ability of three types of force feedback (spring, damping, and spring plusdamping feedback), computed based on prior user positions, to improve different behaviors of the user during kinematically constrained reaching movement tasks .…

Design of a Dynamic Parameter Controlled Chaotic PRNG in a 65nm CMOS process

In this paper, we present the design of a new chaotic map circuit with a 65nmCMOS process . We propose two designs of dynamicparameter-controlled chaotic map (DPCCM)-based pseudo-random number generators . The wider chaotic range and lower-overhead, offered byour designs, can be highly suitable for various applications such as, logicobfuscation, chaos-based cryptography, re-configurable random numbergeneration,and hard-ware security for resource-constrained edge devices likeIoT.…