This document summarizes a study that investigated using a flexible conductive polymer sensor embedded in leggings to monitor knee movement and activity recognition. The sensor was connected to a wireless sensing node to collect data. Twelve subjects performed walking, running, and stair activities while wearing the smart leggings. Test-retest reliability of the sensor output range showed good to excellent reliability. Discrimination of activities was achieved using total power and median frequency features from the sensor signal, demonstrating over 90% accuracy. The system shows potential for assessing knee function during daily activities.
Predictors of Patients’ Functional Outcome after Motor Nerve Transfers in Man...Professor M. A. Imam
To maximize outcome in nerve transfers:
1- The recipient nerve reinnervated close to the target muscle.
2- Direct repair without intervening grafts.
3- Similarly behaving neuromuscular units (agonistic donors and recipients)
Predictors of Patients’ Functional Outcome after Motor Nerve Transfers in Man...Professor M. A. Imam
To maximize outcome in nerve transfers:
1- The recipient nerve reinnervated close to the target muscle.
2- Direct repair without intervening grafts.
3- Similarly behaving neuromuscular units (agonistic donors and recipients)
Lecture given by Dr Saithna, Orthopedic Surgeon, Overland Park, Kansas on his latest research related to knee and shoulder injuries, including: Anterior cruciate ligament (ACL), ACL repair, ACL reconstruction, ACL rehabilitation, Rotator cuff and Long head of biceps injuries
Low level light therapy direction of irradiation for orthodonticCecilia Young 楊幽幽
Low level Light Therapy - Direction of Irradiation for Orthodontic Movement and Reduction of Pain
Cecilia Young*
Department of Dental Surgery, Physician Pharmacist People Health Magazine, Hong Kong
*Corresponding Author: Cecilia Young, Department of Dental Surgery, Physician Pharmacist People Health Magazine, Hong Kong. Received: June 14, 2018; Published: July 18, 2018
Osteoporosis Detection Using Deep LearningIJMTST Journal
Osteoporosis is a bone disorder which occurs due to low bone mass, degradation of bone micro-architecture
and high susceptibility to fracture. It is a major health concern across the world, especially in elderly people.
Osteoporosis can cause spinal or hip fractures that may lead to socio-economic burden and high morbidity.
Therefore, there is a need for the early diagnosis of osteoporosis and predicting the presence of the fracture.
We introduce a Convolutional Neural Network model to effectively diagnose osteoporosis in bone radiography
data. Automated diagnosis from digital radiographs is very challenging since the scans of healthy and
osteoporotic subjects show little or no visual differences. In this paper, we have proposed a model to separate
healthy from osteoporotic subjects using high dimensional textural feature representations computed from
radiography images. CNN can help us bring the use of structural MRI measurements of bone quality into
clinical practice for the detection of Osteoporosis as it gives high accuracy.
Does the Minimally Invasive Quadriceps Sparing Approach Provide Better Short ...CrimsonPublishersOPROJ
Does the Minimally Invasive Quadriceps Sparing Approach Provide Better Short Term Recovery Than The Medial Parapatellar Approach In Primary Total Knee Arthroplasty? by Rachel Taute* in Crimson Publishers: Orthopedic Research and Reviews Journal
Learn more: https://www.brainlab.com/surgery-products
Abstract
Introduction “Navigation in surgery” spans a broad area, which, depending on the clinical challenge, can have different meanings. Over the past decade, navigation in surgery has evolved beyond imaging modalities and bulky systems into the rich networking of the cloud or devices that are pocket-sized.
Discussion
This article will review various aspects of navigation in the operating room and beyond. This includes a short history of navigation, the evolution of surgical navigation, as well as technical aspects and clinical benefits with examples from neurosurgery, spinal surgery, and orthopedics.
Conclusion
With improved computer technology and a trend towards advanced information processing within hospitals, navigation is quickly becoming an integral part in the surgical routine of clinicians.
Excerpt:
Over the last three decades, technical advances have significantly changed the way we live. From computers to smartphones, from single purpose to multipurpose devices, technology has become an intrinsic part of our daily routine. Navigation in surgery is an important example of today’s technological capabilities being applied to medicine. It has emerged as one of the most reliable representatives of technology as it continues to transform surgical interventions into safer and less invasive procedures. In surgery, navigation has spurred technical progress, enabled more daring procedures, and unlocked new synergies. What was once a simple localization tool has evolved into a centerpiece of technology in the surgical theater.
“Navigation in surgery” spans a broad area, which, depending on the clinical challenge, may have various interpretations. The meaning of navigation in surgery is most accurately defined by the questions posed: “Where is my (anatomical) target?”, “How do I reach my target safely?”, “Where am I (anatomically)?”, or “Where and how shall I position my implant?”. Apart from these important anatomical orientation questions, surgical navigation is also used as a measurement tool and an information center for providing surgeons with the right information at the right time.
There are examples of technological advances in the medical field, whose benefit to the patient became immediately evident which were rapidly adopted and integrated into the clinical routine—without the need for proper randomized clinical trials. Examples range from the introduction of anesthesia to enable safer surgery and the introduction of microscopy enabling microsurgery. Surgical navigation and its wide range of benefits could be next.
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
Now a day’s Cryptography is one of the broad areas for researchers. Due to its importance, several cryptography techniques
are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. The main of our research
is to develop a novel Approach for enhancing the security of Amazigh Text using binary tree. The plaintext considered is the
combination of Unicode characters. This paper contributes in the area of elliptic curve cryptography by encrypting data using matrix
approach and using the concept of tree traversal method for enhancing the security of the encrypted points. The security goals were
enhanced by making it difficult for attacker to predicate a pattern as well as speed of the encryption/decryption scheme. The results
show strength of the algorithm.
Segmentation and Visualization of Human Coronary Artery Trees from CTA DatasetsEditor IJCATR
The volume information extracted from computed tomography angiogram is very useful for cardiologists to diagnose various diseases.
An approach is presented to segment human coronary artery trees from the volumetric datasets. The coronary arteries’ surfaces are recovered
by triangle mesh with the boundary points extracted from the coronary artery voxels segmented. The positions where the calcified plaques occur
are identified by mapping the intensities of boundary points of the coronary artery trees on the triangle meshed surfaces. If different values of
the computed maximum principle curvatures of boundary points surrounding the lumen cross section are mapped on the triangle meshed surfaces
of the segmented coronary artery trees, the cross section structure of the coronary artery lumen segment is noncircular cross section structure.
Lecture given by Dr Saithna, Orthopedic Surgeon, Overland Park, Kansas on his latest research related to knee and shoulder injuries, including: Anterior cruciate ligament (ACL), ACL repair, ACL reconstruction, ACL rehabilitation, Rotator cuff and Long head of biceps injuries
Low level light therapy direction of irradiation for orthodonticCecilia Young 楊幽幽
Low level Light Therapy - Direction of Irradiation for Orthodontic Movement and Reduction of Pain
Cecilia Young*
Department of Dental Surgery, Physician Pharmacist People Health Magazine, Hong Kong
*Corresponding Author: Cecilia Young, Department of Dental Surgery, Physician Pharmacist People Health Magazine, Hong Kong. Received: June 14, 2018; Published: July 18, 2018
Osteoporosis Detection Using Deep LearningIJMTST Journal
Osteoporosis is a bone disorder which occurs due to low bone mass, degradation of bone micro-architecture
and high susceptibility to fracture. It is a major health concern across the world, especially in elderly people.
Osteoporosis can cause spinal or hip fractures that may lead to socio-economic burden and high morbidity.
Therefore, there is a need for the early diagnosis of osteoporosis and predicting the presence of the fracture.
We introduce a Convolutional Neural Network model to effectively diagnose osteoporosis in bone radiography
data. Automated diagnosis from digital radiographs is very challenging since the scans of healthy and
osteoporotic subjects show little or no visual differences. In this paper, we have proposed a model to separate
healthy from osteoporotic subjects using high dimensional textural feature representations computed from
radiography images. CNN can help us bring the use of structural MRI measurements of bone quality into
clinical practice for the detection of Osteoporosis as it gives high accuracy.
Does the Minimally Invasive Quadriceps Sparing Approach Provide Better Short ...CrimsonPublishersOPROJ
Does the Minimally Invasive Quadriceps Sparing Approach Provide Better Short Term Recovery Than The Medial Parapatellar Approach In Primary Total Knee Arthroplasty? by Rachel Taute* in Crimson Publishers: Orthopedic Research and Reviews Journal
Learn more: https://www.brainlab.com/surgery-products
Abstract
Introduction “Navigation in surgery” spans a broad area, which, depending on the clinical challenge, can have different meanings. Over the past decade, navigation in surgery has evolved beyond imaging modalities and bulky systems into the rich networking of the cloud or devices that are pocket-sized.
Discussion
This article will review various aspects of navigation in the operating room and beyond. This includes a short history of navigation, the evolution of surgical navigation, as well as technical aspects and clinical benefits with examples from neurosurgery, spinal surgery, and orthopedics.
Conclusion
With improved computer technology and a trend towards advanced information processing within hospitals, navigation is quickly becoming an integral part in the surgical routine of clinicians.
Excerpt:
Over the last three decades, technical advances have significantly changed the way we live. From computers to smartphones, from single purpose to multipurpose devices, technology has become an intrinsic part of our daily routine. Navigation in surgery is an important example of today’s technological capabilities being applied to medicine. It has emerged as one of the most reliable representatives of technology as it continues to transform surgical interventions into safer and less invasive procedures. In surgery, navigation has spurred technical progress, enabled more daring procedures, and unlocked new synergies. What was once a simple localization tool has evolved into a centerpiece of technology in the surgical theater.
“Navigation in surgery” spans a broad area, which, depending on the clinical challenge, may have various interpretations. The meaning of navigation in surgery is most accurately defined by the questions posed: “Where is my (anatomical) target?”, “How do I reach my target safely?”, “Where am I (anatomically)?”, or “Where and how shall I position my implant?”. Apart from these important anatomical orientation questions, surgical navigation is also used as a measurement tool and an information center for providing surgeons with the right information at the right time.
There are examples of technological advances in the medical field, whose benefit to the patient became immediately evident which were rapidly adopted and integrated into the clinical routine—without the need for proper randomized clinical trials. Examples range from the introduction of anesthesia to enable safer surgery and the introduction of microscopy enabling microsurgery. Surgical navigation and its wide range of benefits could be next.
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
Now a day’s Cryptography is one of the broad areas for researchers. Due to its importance, several cryptography techniques
are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. The main of our research
is to develop a novel Approach for enhancing the security of Amazigh Text using binary tree. The plaintext considered is the
combination of Unicode characters. This paper contributes in the area of elliptic curve cryptography by encrypting data using matrix
approach and using the concept of tree traversal method for enhancing the security of the encrypted points. The security goals were
enhanced by making it difficult for attacker to predicate a pattern as well as speed of the encryption/decryption scheme. The results
show strength of the algorithm.
Segmentation and Visualization of Human Coronary Artery Trees from CTA DatasetsEditor IJCATR
The volume information extracted from computed tomography angiogram is very useful for cardiologists to diagnose various diseases.
An approach is presented to segment human coronary artery trees from the volumetric datasets. The coronary arteries’ surfaces are recovered
by triangle mesh with the boundary points extracted from the coronary artery voxels segmented. The positions where the calcified plaques occur
are identified by mapping the intensities of boundary points of the coronary artery trees on the triangle meshed surfaces. If different values of
the computed maximum principle curvatures of boundary points surrounding the lumen cross section are mapped on the triangle meshed surfaces
of the segmented coronary artery trees, the cross section structure of the coronary artery lumen segment is noncircular cross section structure.
Factors inhibiting the adoption of ICT by Tamale Polytechnic lecturers for th...Editor IJCATR
Although the Ghanaian polytechnics have had computers and varied levels of ICT development for almost two decades now, ways
to create effective IT-enabled teaching and learning methodologies have evolved slowly and patchily. This situation is gradually making the
polytechnic trainees incompatible in the digital-enabled job markets. Coupled with this development is the fact that the internet has become
the single and largest library and knowledge reservoir thus making it indispensable in the teaching and learning ambit. It has therefore become
imperative and collective responsibility to identify the factors that inhibit the adoption of the technology by the tertiary teachers especially
the Polytechnic Teachers Association of Ghana (POTAG) fraternity to bridge the digital gab to add more value to the polytechnic teachers
and graduates and to raise their relevance in the industry. This research therefore comes in, with the case of the Tamale Polytechnic, to
explore the challenges and recommend strategies to stakeholders. Descriptive survey methodology, which is capable of collecting background
information and hard to find data without the researcher motivating or influencing respondents' responses, was used to arrive at our findings.
Proposing a Scheduling Algorithm to Balance the Time and Energy Using an Impe...Editor IJCATR
Computational grids have become an appealing research area as they solve compute-intensive problems within the scientific
community and in industry. A grid computational power is aggregated from a huge set of distributed heterogeneous workers; hence, it
is becoming a mainstream technology for large-scale distributed resource sharing and system integration. Unfortunately, current grid
schedulers suffer from the haste problem, which is the schedule inability to successfully allocate all input tasks. Accordingly, some tasks
fail to complete execution as they are allocated to unsuitable workers. Others may not start execution as suitable workers are previously
allocated to other peers. This paper presents an imperialist competition algorithm (ICA) method to solve the grid scheduling problems.
The objective is to minimize the makespan and energy of the grid. Simulation results show that the grid scheduling problem can be
solved efficiently by the proposed method
Randić Index of Some Class of Trees with an AlgorithmEditor IJCATR
The Randić index R(G) of a graph G is defined as the sum of the weights (dG(u)dG(v))-1/2 over all edges e = uv of G. In this
paper we have obtained the Randić index of some class of trees and of their complements. Also further developed an algorithmic
technique to find Randić index of a graph.
Government Web Application Security: Issues and Challenges - A Case of IndiaEditor IJCATR
The public services offered by the government are trustworthy, for that reason the government needs to understand various
threats, vulnerabilities, and trends in order to protect the citizen database and offered services. This paper studied various acts, rules,
policies, guidelines and standards adopted by the government departments for development of design, development & deployment of
web-based applications and cited various problems related to coding, manpower and funding issues as a case of India. This study
shows, the majority of government departments is developing and audited web applications before hosting on the public domain. But,
for this most departments have to depend on the private organizations. This drawback arises in the government departments because of
lack of certified or educated staff. Thus the government departments ought to train their staff along with administrators in information
security from time to time. This will ensure making improvements to the internal protection and reduce the dependency on private
organization tremendously.
Activity Context Modeling in Context-AwareEditor IJCATR
The explosion of mobile devices has fuelled the advancement of pervasive computing to provide personal assistance in this
information-driven world. Pervasive computing takes advantage of context-aware computing to track, use and adapt to contextual
information. The context that has attracted the attention of many researchers is the activity context. There are six major techniques that
are used to model activity context. These techniques are key-value, logic-based, ontology-based, object-oriented, mark-up schemes and
graphical. This paper analyses these techniques in detail by describing how each technique is implemented while reviewing their pros
and cons. The paper ends with a hybrid modeling method that fits heterogeneous environment while considering the entire of modeling
through data acquisition and utilization stages. The modeling stages of activity context are data sensation, data abstraction and
reasoning and planning. The work revealed that mark-up schemes and object-oriented are best applicable at the data sensation stage.
Key-value and object-oriented techniques fairly support data abstraction stage whereas the logic-based and ontology-based techniques
are the ideal techniques for reasoning and planning stage. In a distributed system, mark-up schemes are very useful in data
communication over a network and graphical technique should be used when saving context data into database.
Automating Students’ Activities in Higher Educational InstitutionsEditor IJCATR
The modern educational systems consist of curricular and extracurricular activities. Students are encouraged to form unions.
These unions have representative roles, provide academic support and advice, offer welfare advice and support; engage in sports and
social activities of which most of them are free to join. In order to make life enjoyable, students have to be better time managers.
However, some of them find it difficult to prioritize their activities. This paper automates students’ activities in higher educational
institutions. It determines the preference of students’ activities in higher educational institutions and then prioritizes them with the help
of statistical tools. The associations between critical activities are determined and with the help of if-then rule set mechanism, a system
that has all the users activities stored in database and alert the user the right task to perform is designed. Higher educational institutions
were chosen for this study due to the dynamics of student life in these institutions
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Gesture Based Retrieval for Mental Illness RecognitionEditor IJCATR
In this work, we try to explore and explain content based image retrieval technique for mental illness early detection based
on gesture expression. Gesture expression based to recognize mental illness due to gesture has multidimensional and may features for
calculation. A technique used to detect and recognize facial expression called Content Based Image Retrieval or CBIR, in this technique
needed gesture image training and referencing. This research also proposed to construct an accurate method or algorithm to detect and
recognize whether one’s suffers mental illness or not. In this research was carried out using gesture image database and gesture without
obstacles (hat, moustache, glasses, etc). Research uses more than 5,000 gesture images with gesture which collected from Lampung
mental illness hospital and from the internet. Research produce an image gesture retrieval result quite good in term of precession and
recall parameters.
Applying Utaut and Innovation Diffusion Theory to Understand the Rapid Adopti...Editor IJCATR
M-PESA, the world-leading mobile money system has transformed lives and livelihoods in Kenya and beyond. Financial
inclusion for the marginalized in emerging markets is now feasible and achievable. Mobile money promises a more scalable and
cheaper alternative to the large unbanked populace than conventional banking. In the recent years, Sub-Saharan Africa has rolled out a
number of practical technology-driven innovative products leading to more and more cashless transactions. One such product is MPESA;
a mobile-based financial innovation that has achieved unprecedented growth since its inception in March 2007 by the mobile
network operator, Safaricom. In spite of its tantalizing potential, one major challenge is how to optimally capture the market. This
paper analyses the M-PESA ecosystem, by building theoretical linkages between two main theories; i) Innovation Diffusion Theory
and ii) Unified Theory of Acceptance and Use of Technology. The questions the author is addressing are: Which factors are
responsible for M-PESA’s rapid adoption? How does Safaricom maintain its strong grip as a Mobile Network Operator in the financial
sector?
Data Mining Model for Predicting Student Enrolment in STEM Courses in Higher ...Editor IJCATR
Educational data mining is the process of applying data mining tools and techniques to analyze data at educational
institutions. In this paper, educational data mining was used to predict enrollment of students in Science, Technology, Engineering and
Mathematics (STEM) courses in higher educational institutions. The study examined the extent to which individual, sociodemographic
and school-level contextual factors help in pre-identifying successful and unsuccessful students in enrollment in STEM
disciplines in Higher Education Institutions in Kenya. The Cross Industry Standard Process for Data Mining framework was applied to
a dataset drawn from the first, second and third year undergraduate female students enrolled in STEM disciplines in one University in
Kenya to model student enrollment. Feature selection was used to rank the predictor variables by their importance for further analysis.
Various predictive algorithms were evaluated in predicting enrollment of students in STEM courses. Empirical results showed the
following: (i) the most important factors separating successful from unsuccessful students are: High School final grade, teacher
inspiration, career flexibility, pre-university awareness and mathematics grade. (ii) among classification algorithms for prediction,
decision tree (CART) was the most successful classifier with an overall percentage of correct classification of 85.2%. This paper
showcases the importance of Prediction and Classification based data mining algorithms in the field of education and also presents
some promising future lines.
A través d’aquesta presentació PowerPoint podreu observar que l’E-learning és l’eix transvasador del nostre projecte. A part també podreu observar els punts Claus que s’han desenvolupat al llarg d’aquest, i els enllaços corresponents per a poder veure la pàgina web del projecte.
Internet of Things-based telemonitoring rehabilitation system for knee injuriesjournalBEEI
Rehabilitation engineering, as one of the active research areas in biomedical science, needs further investigations and improvements. The process of rehabilitation, whether after a stroke, ligament, or accident-related injuries, is commonly based on clinical assessment tools, which can be executed, either by self-reported (home-based) treatment or through observer-rated therapy. However, people with reduced mobility (e.g., stroke, surgical, and ligament patients) can benefit from rehabilitation programs only if effective and appropriate assistive tools are provided. In this paper, a new Internet of Things (IoT)-based telemonitoring system is introduced for knee injuries’ rehabilitation (Knee-Rehab). The proposed system is a real-time rehabilitation and monitoring framework designed to be a portable, home-based, and online-based instrument comprised of bio-mechanical, bio-instrumentation and IoT-based elements. The system helps patients to rest at home after surgeries or physical treatment, do their rehab-exercises, and receive suggestions form their advisors, which gain the ability to monitor the situation over the exercising time and propose necessary medication/activities to be followed by the patients accordingly, based on their current status. The experimental measurements show the high accuracy achieved by the developed system in terms of monitored knee joint angle, where the maximum error is 3.5° compared to manual goniometer measurements.
Important Parameters for Hand Function Assessment of Stroke PatientsTELKOMNIKA JOURNAL
Clinical scales such as Fugl-Meyer Assessment and Motor Assessment Scale are widely used to evaluate stroke patient's motor performance. However, the scoring systems of these assessments provide only rough estimation, making it difficult to objectively quantify impairment and disability or even rehabilitation progress throughout their rehabilitation period. In contrast, robot-based assessments are objective, repeatable, and could potentially reduce the assessment time. However, robot-based assessment scales are not as well established as conventional assessment scale and the correlation to conventional assessment scale is unclear. This paper discusses the important parameters in order to assess the hand function of stroke patients. This knowledge will provide a contribution to the development of a new robot-based assessment device effectively by including the important parameters in the device. The important parameters were included in development of iRest and yielded promising results that illustrate the potential of the important parameters in assessing the hand function of stroke patients.
Health monitoring catalogue based on human activity classification using mac...IJECEIAES
In recent times, fitness trackers and smartphones equipped with different sensors like gyroscopes, accelerometers, global positioning system sensors and programs are used for recognizing human activities. In this paper, the results collected from these devices are used to design a system that can assist an application in monitoring a person’s health. The proposed system takes the raw sensor signals as input, preprocesses it and using machine learning techniques outputs the state of the user with minimum error. The objective of this paper is to compare the performance of different algorithms logistic regression (LR), support vector machine (SVM), k-nearest neighbor (k-NN) and random forest (RF). The algorithms are trained and tested with an original number of features as well as with transformed number of features (using linear discriminant analysis). The data with a smaller number of features is then used to visualize the high dimensional data. In this paper, each data point is mapped in the high dimensional data to two-dimensional data using t-distributed stochastic neighbor embedding technique. Overall, the first high dimensional data is visualized and compared with model’s performance with different algorithms and different number of coordinates.
Ataxic person prediction using feature optimized based on machine learning modelIJECEIAES
Ataxic gait monitoring and assessment of neurological disorders belong to important areas that are supported by digital signal processing methods and artificial intelligence (AI) techniques such as machine learning (ML) and deep learning (DL) techniques. This paper uses spatio-temporal data from Kinect sensor to optimize machine learning model to distinguish between ataxic and normal gait. Existing ML-based methodologies fails to establish feature correlation between different gait parameters; thus, exhibit very poor performance. Further, when data is imbalanced in nature the existing ML-based methodologies induces higher false positive. In addressing the research issues this paper introduces an extreme gradient boost (XGBoost)based classifier and enhanced feature optimization (EFO) by modifying the standard cross validation (SCV) mechanism. Experiment outcome shows the proposed ataxic person identification model achieves very good result in comparison with existing ML-based and DL-based ataxic person identification methodologies.
Facilitating Trunk Endurance Assessment by means of Mobile Health TechnologiesOresti Banos
Trunk endurance tests are widely used in physical medicine to assess the muscle status of people affected by low back pain. Nevertheless, traditional evaluation procedures suffer from practical limitations, which can lead to potential misdiagnoses. This work presents mDurance, a novel mobile health system aimed at supporting specialists in the functional assessment of trunk endurance by using wearable and mobile devices. The system makes use of a wearable inertial sensor to track the patient trunk posture, while portable electromyography sensors are employed to seamlessly measure the electrical activity produced by the trunk muscles. The information registered by the sensors is processed and managed by a mobile application that facilitates the expert normal routine, while reducing the impact of human errors and expediting the analysis of the test results. The reliability and usability of mDurance is proved through a case study, thus demonstrating its potential interest for regular physical therapy routines.
A survey on bio-signal analysis for human-robot interactionIJECEIAES
The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of each domain's benefits and drawbacks, and finally, a recommendation for a new strategy for robotic systems.
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
Wireless Sensor Networks (WSNs) for healthcare have emerged in the recent years. Wireless technology has been developed and used widely for different medical fields. This technology provides healthcare services for patients, especially who suffer from chronic diseases. Services such as catering continuous medical monitoring and get rid of disturbance caused by the sensor of instruments. Sensors are connected to a patient by wires and become bed-bound that less from the mobility of the patient. In this paper, proposed a real-time heart pulse monitoring system via conducted an electronic circuit architecture to measure Heart Pulse (HP) for patients and display heart pulse measuring via smartphone and computer over the network in real-time settings. In HP measuring application standpoint, using sensor technology to observe heart pulse by bringing the fingerprint to the sensor via used Arduino microcontroller with Ethernet shield to connect heart pulse circuit to the internet and send results to the web server and receive it anywhere. The proposed system provided the usability by the user (userfriendly) not only by the specialist. Also, it offered speed andresults accuracy, the highest availability with the user on an ongoing basis, and few cost.
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
The development of wireless body area sensor network (WBASN) is offer many promising
new application in the area of remote health monitoring. This paper presents a system consisting
of a force measuring device for estimation of the force ability of human muscle groups which
means (Arm Strength). It comprises at least one (pressing element) strength sensor which works
together with a force measuring microcontroller based electronic unit. This unit can accurately
measure the force exerted onto strength sensor placed inside the force measuring unit. According
to how the equipment is assorted muscle strength of different muscle group can be measured.
The measured value are converted to digital form and stored in memory.
Hand motion pattern recognition analysis of forearm muscle using MMG signalsjournalBEEI
Surface Mechanomyography (MMG) is the recording of mechanical activity of muscle tissue. MMG measures the mechanical signal (vibration of muscle) that generated from the muscles during contraction or relaxation action. It is widely used in various fields such as medical diagnosis, rehabilitation purpose and engineering applications. The main purpose of this research is to identify the hand gesture movement via VMG sensor (TSD250A) and classify them using Linear Discriminant Analysis (LDA). There are four channels MMG signal placed into adjacent muscles which PL-FCU and ED-ECU. The features used to feed the classifier to determine accuracy are mean absolute value, standard deviation, variance and root mean square. Most of subjects gave similar range of MMG signal of extraction values because of the adjacent muscle. The average accuracy of LDA is approximately 87.50% for the eight subjects. The finding of the result shows, MMG signal of adjacent muscle can affect the classification accuracy of the classifier.
Abstract - Positioning is a fundamental component of human life to make meaningful interpretations of the environment. Without knowledge of position, human beings are like machines and have very limited capabilities to interact with the environment. Even machines in today’s world can be made smarter if positioning information is made available to them. Indoor positioning of pedestrians is the broad area considered in this thesis. A foot mounted pedestrian tracking device has been studied for this purpose. Systems which utilize foot mounted inertial navigation system has been in the literature for more than two decades. However very few real time implementations have been possible. The purpose of this thesis is to benchmark and improve the performance of one such implementation.
Similar to Estimation of Walking rate in Complex activity recognition (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Estimation of Walking rate in Complex activity recognition
1. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 568 - 577, 2016, ISSN:- 2319–8656
www.ijcat.com 568
Estimation of Walking rate in Complex activity
recognition
Hooman Kashanian
Department Of Computer
Engineering
Islamic Azad University
Ferdows, Iran
Saeed Sharif
Department Of Computer
Science
Islamic Azad University
Ferdows, Iran
Ralf Akildyz
Department Of Electronic And
Computer Science
Hacettepe University
Ankara, Turkey
Abstract: Physical activity recognition using embedded sensors has enabled by many context-aware applications in different areas. In
sequential acceleration data there is a natural dependence between observations of movement or behavior, a fact that has been largely
ignored in most analyses. In this paper, investigate the role that smart devices, including smartphones, can play in identifying activities
of daily living. Monitoring and precisely quantifying users’ physical activity with inertial measurement unit-based devices, for
instance, has also proven to be important in health management of patients affected by chronic diseases, e.g. We show that their
combination only improves the overall recognition performance when their individual performances are not very high, so that there is
room for performance improvement. We show that the system can be used accurately to monitor both feet movement and use this
result in many applications such as any playing. Time and frequency domain features of the signal were used to discriminate between
activities, it demonstrates accuracy of 93% when employing a random forest analytical approach.
Keywords: Complex activity recognition; Mobile and ubiquitous environment; Accelerometer; Cell Phones; Humans; Monitoring;
Ambulatory, random forest, Online prediction.
2. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 569
1. INTRODUCTION
STEOARTHRITIS (OA) is a degenerative disease causing pain,
joint stiffness, loss of function and disability [1]. The knee is one of
the most commonly affected joints disabling a large proportion of
the adult population over a range of daily activities [2].
Exercise is recognized as a key component in the management of
knee OA [3] but its effectiveness in restoring joint function is
hampered by a lack of individualized programs and by low treatment
fidelity. Research studies have quantified the effect of different
treatment options in reducing pain and disability reporting small to
moderate effects over control groups [4]-[8]. However, the delivered
exercise therapies were not tailored to patients’ specific impairments
or their aspirations, and this may be why none of the studies have
reported a definite impact of exercise on quality of life and functional
outcomes. Furthermore, the long-term impact of exercise on cessation
of the intervention is frequently lost or significantly reduced or
simply not reported [8], [9]. This indicates a paucity of longitudinal
studies into the effect of optimal rehabilitative approaches and even
fewer studies addressing how to optimize the short and long-term
exercise compliance in this population group.
Individualized programs can be obtained based on objective
measures of patients’ joint functional status; however, the routine
collection of these measures is rare with the output seldom accessible
or made meaningful to healthcare professionals. Simple solutions to
enhance compliance may be achieved by solving organizational and
accessibility issues (e.g. location, time, work and other commitments)
and addressing cost concerns. Furthermore, providing patients with
marker of performance and ensuring a correct understanding of the
content of rehabilitation will keep them motivated while supporting
self-management [10], [11].
It is expected that by prescribing patients exercise regimes based
on sound biomechanical assessed deficits and providing them with
targets and feedback on performance will enhance compliance and
hence treatment effectiveness [12], [13]. Objective measures of knee
functional status, referring mainly to knee 3-D angles, are generally
obtained in laboratories using expensive, time consuming and
difficult to operate equipment. Moreover, the retrievable information
is related to an artificial environment over a short period of time. On
the other hand, the clinical benefit for long-term monitoring of
patients in everyday situations has been advised and it has been
proposed that it should be used to inform treatment [14], [15]. Long-
term monitoring within each patient environment can only be
possible with the use of an ambulatory monitoring system. However,
to be effective, this technology needs to be able to inform clinicians
on patients’ joint status and, be simple and easy to use for patients
and allow them to gain feedback on their performance. Despite the
use of wearable technology and particularly inertial measurement
units (IMUs) gaining popularity within the research environment,
clinical uptake remains poor [16], [17].
The main advantage of using wearable devices over standard
laboratory-based motion analysis systems to track joint movement
relates to the portability of the instrument allowing for prolonged data
collection in more realistic environments. However, their everyday
use is still limited by poor patient acceptance. To obtain knee angles
from IMUs two devices have to be positioned on the shank and thigh
of the subject to extrapolate the relative movement between the two
segments. The output accuracy is affected by drift from required
integration of acceleration and angular velocity values and, artefacts
errors due to skin movement and misalignments [18], [19]. In
addition to this, their use still requires a certain level of expertise that
can limit wide adoption especially in the ageing population. More
simple activity monitors based on accelerometry are common and
readily accessible on the market for a range of applications. However,
the measures obtained are frequently limited to how active a patient
is, and few are able to discriminate between activity performed, or
able to record step counts and distance travelled. Although important
for general activity levels, these parameters do not represent
clinically relevant measures directly related to knee joint status. For
rehabilitative purposes, it would be important to be able to monitor
knee function (e.g., Knee kinematics).
Within our group we explored the use of a flexible conductive
polymer material as a sensing modality for knee movement [20].
Laboratory experiments were conducted to evaluate the polymer
sensor in measuring flexion and extension angles of the knee in a
controlled environment where the knee movement was restricted and
standardized with a dynamometer. A subject specific algorithm was
defined to obtain measures of knee flexion and extension angles to an
accuracy of 1° with the gold standard [20]. The previous study
characterized the sensor and validated it in a controlled laboratory
setting, but no investigations were conducted to evaluate the sensor’s
response to free, unconstrained movement. With the intended use of
the sensor for knee rehabilitation in the home and clinics, further
testing is required to evaluate the sensor capability to follow knee
movement patterns in dynamic real life conditions. It was also
essential that the sensor had low power requirement to facilitate
continuous data acquisition.
The aim of this study was to investigate the reliability of the
response of the sensor to everyday tasks and to evaluate its potential
towards assessing joint range of motion and activity identification. To
support out-of-the laboratory assessments, wearable electronics were
developed in the form of a sensing node to allow wireless data
acquisition from the sensor. Design constraints included the need for
the system to be unobtrusive, low cost, low power and simple to use.
This paper focuses on the evaluation and exploitation of the system in
reference to the output from a flexible polymer sensor embedded in a
pair of leggings. The main contributions relate to the system ability to
demonstrate activity discrimination based on a single passive
polymer sensor and simultaneously derive a surrogate of knee range
of motion from the sensor output to comprehensively describe knee
functional status during a specific activity context.
O
3. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 570
Fig.1. Photographs showing (A) wireless node positioned in the back pocket,
(B) sensor integration to a pair of leggings and (C) detail of flexible sensor
unit. (D) Photos showing node package with overall dimensions (left) and
assembly of printed circuit boards (right).
Two exploitation cases were considered: (i) one that necessitates a
subject specific calibration, based on a simplified approach to activity
discrimination and (ii) an approach that eliminates the individual
calibration but incorporates computational resources for a machine
learning approach. Individual subject activity discrimination was
successfully achieved based on an innovative combination of two
spectral features, median frequency and total power of the spectrum,
while group classification was achieved with high accuracy based on
a random forest algorithm. Independently of the exploitation set-up of
choice, by proving the capability of the system in monitoring knee
function in everyday life scenarios, with an appropriate feedback
interface, it will be a valuable tool to support knee rehabilitation by
providing objective measure of function to clinicians as well as
enhancing long term patients’ compliance and promoting self-
management.
2. METHOD
2.1 Smart Leggings
The sensor unit (Fig.1.C) consists of a conductive flexible
polymeric material in the form of a thin (0.2 mm) rectangular strip
(50 mm x 100 mm). The conductivity is provided by the presence of
graphitized carbon black Nano powder particles (< 500 nm) in a
polyurethane substrate. The ratio between the two compounds in the
conductive polymer composite is 20:80. Two connectors were
attached at each end of the sensor unit. The sensor was secured on to
a pair of commercially available leggings (92% polyester, 8% elastin)
(Fig.1.B), in a pre-stretched condition, to coincide with the anterior
aspect of the knee joint. The composite material has a resistor like-
function so when stretched, it changes resistance. Knee motion
stretches the sensor allowing for a direct sensing modality for knee
flexion/extension movement.
2.2 Data Acquisition: Multi Sensors Wireless Platform
Data from the sensor unit were acquired by means of a custom
wireless sensing node (Fig.1.A, D). The developed sensor node
consists of three printed circuit board (PCB) tiers (Fig.1.D), each
with its own functionality as follows:
i. PCB 1: analogue interface tier accommodating circuitry for
the flexible sensor unit; a Wheatstone bridge configuration
is used to detect resistive changes within the flexible
sensor, the signal is then further amplified by a micropower
precision instrumentation amplifier (LT1789, Linear
Technology, Milpitas, CA, USA) before being converted to
digital values;
ii. PCB 2: core tier with a microprocessor (64MHz PIC18F
family, Microchip Technology Inc., Chandler, AZ, USA)
and an inertial measurement unit (IMU) embedding a 3 axis
accelerometer (ADXL345, Analog Devices Inc, Norwood,
MA, USA) and 3 axis gyroscope (L3G4200D,
STMicroelectronics, Geneva, Switzerland);
iii. PCB 3: connectivity tier incorporating a small form factor,
low power Bluetooth module (RN42, Microchip
Technology Inc., Chandler, AZ, USA) allowing wireless
data transmission for distances up to 20 meters. Data were
acquired synchronously from the IMU and flexible sensor
unit at 122 Hz sampling frequency;
The PCB tiers are encased in a box with sides of 35 mm x 50 mm x
40 mm (width x length x height). The node operates on a 3 V battery
and its overall mass is 54g. During testing the node was placed on the
back pocket of the leggings. Thin wires sewn along the seam of the
leggings connected the sensor unit to the PCB 1 of the wireless node.
2.3 Participants
Twelve healthy subjects with no reported knee pain (Age: 27 ± 5
years, Height: 1.7 ±0.1 m, Body Mass: 66 ± 12 kg) took part in the
study. The sample size was defined in accordance with earlier
recomendations [21]. For a power of 80% and to achieve a specificity
of 95%, and assuming test-retest reliability of 0.9 for the sensor
outputs with two observations, a sample size of 12 would suffice to
allow for observations of test-retest reliability of 0.6 or greater.
Written informed consent was obtained from all subjects prior
testing, following attainment of ethical approval. Ethical approval
was granted by the Imperial College Ethics Research Committee.
2.4 Experimental Procedures
Each participant was tested on two separate occasions with at least
a one-week gap between sessions, referred in the text as Test 1 and
Test 2. A test session consisted of the participant walking and
running both indoors and outdoors, and going up and down
consecutive flights of stairs. The indoor test took place along a 30 m
corridor; and participants were asked to walk and run this distance 10
times. The stair test was conducted in a public building back stair
case using 5 consecutive flights of stair with 10 steps each (width
30cm, height 16cm) with subjects being requested to go up and down
the stairs two times. This allowed 10 data sets for both ascending and
descending the stairs. The outdoors test was conducted in a quiet
nearby park and subjects were instructed to walk and run without
stopping for two minutes, twice, with sufficient rest periods allowed
between tests. Each subject performed the different activities at their
preferred, comfortable speed. During each session, participants were
asked to wear the smart leggings and to position the sensor unit to
4. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 571
cover the anterior aspect of their right knee. This imitates the use of
the system in home environments where users are unsupervised
allowing to evaluate the system in real condition. The sensing node
was positioned by the investigator in the back pocket of the leggings
once Bluetooth connection was established with a notebook (HP Mini
5103 Notebook PC, Hewlett-Packard Company, Palo Alto, CA,
USA) for data acquisition. A test session lasted approximately 45
minutes.
2.5 Data Pre-Processing and Sensor Output
The wearable system allows for simultaneous multisensor data
collection, but for the aim of the current study only the flexible
sensor unit output was analyses. The use of accelerometer and
gyroscopes data is already well established and widely accepted for
activity monitoring whereas, the novelty of the present study resides
in the ability to provide direct information of knee function while
characterizing activities performed using a single passive polymer
sensor. Data were pre-processed by filtering and having the DC offset
removed from the signal output. A 4th order Butterworth filter with
10Hz cut-off frequency was used. Time histories of the signal outputs
were analysed to investigate the capability of the sensor to monitor
dynamic knee movement. The range of the signal output in the time
domain was evaluated. This range can be considered as a surrogate of
the knee range of motion, since the sensor stretches as the knee
bends, generating the output which allows mapping the knee
flexion/extension movement. Range was normalized to each subject’s
leg length [22]. Test-retest reliability of the signal output range was
assessed by mean of intra-class correlation as defined by Shrout and
Fleiss [23] and examined accordingly to the classification of Landis
and Kock [24]. Bland and Altman tests statistics [25] were performed
to provide a measure of agreement between tests. All data processing
and statistical analysis were completed with Matlab (The MathWorks
Inc., Natick, MA, USA) and SPSS (SPSS Inc., Chicago, IL, USA)
software.
2.6 Spectral Domain Activity Discrimination
A frequency domain approach was adopted to discriminate between
activities. A single-sided power spectral density (PSD) analysis was
performed using the periodogram method over the whole signal
recorded per trial. From the PSD function ( ), total power of the
spectrum and median frequency (MDF) were computed. The total
power of the spectrum ( ) is the cumulative power of the signal:
(1)
The median frequency is the frequency dividing the signal power
spectrum into two equal halves:
(2)
These two parameters were used as discriminative features to
classify tasks performed. This approach was taken to verify if a
simple discriminative algorithm using only these two parameters
would allow activity differentiation instead of using computationally
complex algorithms involving machine learning techniques.
Fig.2. Graph showing the relationship between accuracy and number of trees.
descent (upper right), running (lower left) and, walking (lower right).
Table 1
TEST-RETEST RELIABILITY AND BLAND AND ALTMAN TEST RESULTS
Test-Retest Reliability Bland and Altman Test
ICC Coefficient
95% CI
(Lower,Upper
Bound)
(mV/m) (mV/m) (mV/m)
Repeatability
Coefficient
(mV/m)
95% LOA
(Lower,Upper
Bound)
Run Indoors 0.958 0.860; 0.988 11.0 11.2 3.2 21.9 -10.9; 32.9
Run Outdoors 0.984 0.945; 0.995 1.0 11.8 3.4 23.1 -22.1; 24.1
Walk Indoors 0.897 0.657; 0.970 -0.5 8.9 2.6 17.5 -18.0; 17.0
Walk
Outdoors
0.958 0.861; 0.988 -0.9 4.2 1.2 8.3 -9.2; 7.4
Stair Ascent 0.867 0.557; 0.961 -3.6 14.4 4.2 28.2 -31.9; 24.6
Stair Descent 0.938 0.796; 0.982 -0.6 9.3 2.7 18.1 -18.8; 17.5
5. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 572
Time(s)
0 10 20
SensorOutput(mV)
-40
-20
0
20
40
60
80
Stair Ascent
Time(s)
0 10 20
SensorOutput(mV)
-40
-20
0
20
40
60
80
Stair Descent
Time(s)
0 10 20
SensorOutput(mV)
-40
-20
0
20
40
60
80
Running
Time(s)
0 10 20
SensorOutput(mV)
-40
-20
0
20
40
60
80
Walking
Fig.3. Sensor output time histories during stair ascent (upper left), stair
The sensor capability in discriminating activity was analysed treating
participants individually as well as a group for the two tests
conducted. This was done to investigate if a general activity detection
algorithm could have been defined based on a simple classification
method that would not require subject specific calibration (e.g.:
identify specific thresholds for each subject to allow real time
classification). Median frequency and total power of the spectrum
were normalized to each individual’s anthropometric features (leg
length, body mass and height) when comparing data across
participants using the method proposed by Hof [22]. Data analysis
was performed using Matlab software. The data showed the need for
subject specific calibration when only MDF and power of the
spectrum were used for activity classification as no general-purpose
thresholds could be defined that would have satisfied all participants’
data. Machine learning was then utilized to tackle this problem and
overcome the necessity of a baseline subject calibration.
2.7 Random Forest Activity Classification
A Random Forest [26] was used to develop a generalized
classification method to discriminate between activities based on
features extracted from the flexible sensor output. Random forests are
statistical modern machine learning techniques that allow accurate
classification of large datasets that are screened by independent trees,
in this instance, classification trees, which form the forest. Each tree
develops upon a set of rules based on discriminatory features
randomly selected from measured parameters. Random forests
perform feature selection automatically to develop each tree that can
alternatively be expressed as set of rules. In each node of a tree, a
decision is made based on one feature. The random forest combines
the response of each tree via majority voting to obtain the ultimate
classification response.
The random forest employed in this study is an ensemble of 10
classification decision trees. The number 10 was decided by verifying
that increasing the number of trees did not affect
Subjects
1 2 3 4 5 6 7 8 9 10 11 12
ActivityRange(mV/m)
0
50
100
150
200
250
Test 1
Subjects
1 2 3 4 5 6 7 8 9 10 11 12
ActivityRange(mV/m)
0
50
100
150
200
250
Test 2
Run indoors
Run outdoors
Walk indoors
Walk outdoors
Stair descent
Stairsascent
Fig.4. Sensor output range as surrogate of knee range of motion during the
different activities for both tests conducted.
accuracy significantly (Fig.2) but, increased the computational
complexity of the method. Our aim is to keep the complexity of the
data processing to a minimum to allow a timely real time data
visualisation in the future.
The ensemble classifies activities into walking, running, and
ascending and descending stairs. The ensemble was provided with
features from time and frequency domain analysis of the sensor
output namely: MDF, power of the spectrum, peak frequency,
maximum spectral amplitude and output range of the signal in the
time domain. Anthropometric parameters, gender, age, height and leg
length, were also utilised. 90% of the data were randomly selected
and used for the construction of the trees and 10% of the data were
used to test the algorithm.
Performance metrics consisting of accuracy, specificity, sensitivity,
and F measure were computed from the confusion matrix to evaluate
the classification method. This analysis was performed using Matlab
Statistics Toolbox.
3. RESULTS
Typical time series of the sensor output are plotted in Fig.3 for the
different activities performed, 20 s time frames are depicted. These
plots show that the sensor is able to follow the knee movement during
dynamic tasks by capturing the knee flexion/extension repetitions
throughout the trials. The output, presented in mV, can thereby be
considered a surrogate of knee sagittal kinematics.
The range of the measured voltage from the sensor is shown in the
bar charts in Fig. 4 for both tests conducted for each subject. No
statistical significant differences were found within subject (p >
0.05). This range could be considered a surrogate of knee range of
motion as it quantifies the amount the sensor has stretched due to
knee movement during each performed task.
An almost perfect test-retest reliability (ICC > 0.8) was obtained
for the output range among all participants (Table I). Bland and
Altman test results in Table I and Fig.5 demonstrate good to high
agreement between tests with the majority of
6. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 573
Fig.5. Bland and Altman plot of agreement between Test 1 and 2. Dashed
lines represent upper and lower limit of agreement and the solid line
represents the mean difference.
Total Power (W)
0 100 200 300 400 500
Medianfrequency(Hz)
0.8
1
1.2
1.4
1.6
1.8
Run indoors
Walk indoors
Stair ascent
Stairsdescent
Run outdoors
Walk outdoors
Fig.6. Activities discrimination using MDF and Total Power of the spectrum.
Filled markers refers to Test 1, unfilled ones to Test 2 for one participant. The
bars indicate ± one standard deviation.
data points falling within the locus of agreement. The highest biased
(d =11 mV/m) was observed for running indoors indicating higher
variations occurred in this task. This could be related to the intrinsic
variability of the movement but also to the fact that the sensor may
have been prone to major movement artefacts with respect to the
underlying knee during this fast task which was repeated 10 times.
Fig.6 shows an example of activity clustering for one participant
when only using MDF and the total power of the spectrum as
discriminative features. Comparable results are obtained for Test 1
and 2. Similar clustering was observed for other participants;
summary values of normalized MDF and total power of the spectrum
(with standard deviation indicated in brackets below each value) are
shown in Table 2.
Total Power (W)
0 0.5 1 1.5 2 2.5 3 3.5 4
Medianfrequency(Hz)
0.2
0.3
0.4
0.5
0.6
0.7
0.8
Run indoors
Walk indoors
Stair ascent
Stairsdescent
Run outdoors
Walk outdoors
Fig.7. Activities discrimination using MDF and Total Power of the spectrum.
Filled markers refers to Test 1, unfilled ones to Test 2 for all participants. The
bars indicate ± one standard deviation. Data are normalised to subject specific
anthropometric parameters.
Frequency
0
5
10
15
20
25
30
35
M
DF
Pow
er
Range
PeakFrequency
M
ax
Am
plitude
BodyM
ass
Height
Leg
Length
Age
Fig.8. Histogram showing the frequency of the features selected by the
Random forest for its decision trees.
Considering the participants as a group led to the discriminatory
ability of the MDF and power of the spectrum to be lost (Fig. 7). This
7. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 574
occurred despite normalization of the outputs to subject specific
anthropometric parameters [22].
Subject specific calibration is therefore required if these two
parameters are to be used alone to identify activities and define
thresholds boundaries for the different activities performed.
The possibility of using a machine learning approach, in particular
a random forest algorithm, was investigated to allow a generalized
discrimination between activities from the sensor output, avoiding the
need for subject specific calibration. An ensemble of 10 trees was
created using 9 features (Table 2).
Table 2
RANDOM FOREST PERFOMANCE METRICS AND FEATURES
Accuracy 92.8%
Run Walk
Stair
Descent
Stair
Ascent
Sensitivity 1 1 0.75 NaN
Specificity 1 1 1 0.92
F-score 1 1 0.85 0
# of
features
9
Features
Median Frequency, Total Power of the
Spectrum, Peak Frequency, Max Amplitude,
Output Range, Body Mass, Height, Leg
Length, Age
Moreover, data from the two tests were combined to allow for more
data during the training phase of the random forest. The ensemble,
when tested with the remaining 10% of the sample data, performed
well with an accuracy of 93%. This implies 93% of the time activities
were correctly identified. Detailed performance metrics of the
ensemble are shown in Table III.
Fig.8 shows the frequency of occurrence of features automatically
selected by the decision trees (i.e.: how many times each feature is
picked across all nodes for all trees). Among these features MDF is
the most important one, whereas anthropometric parameters, and
particularly body mass and height, do not play an important role in
the classification process.
4. DISCUSSION
A novel wearable system has been presented that allows
simultaneous estimation of a surrogate for knee range of motion and
identification of activity type performed. The sensor unit was able to
reliably detect knee movement during dynamic activities at different
speeds as shown in Table I. The excellent reliability demonstrated the
sensor is not affected by movement artefacts allowing for valid
results despite don-doff of the system and participants positioning it.
This offers the potential of the system to support rehabilitation
however, without further work to understand the relationship of the
surrogate to knee range of motion it may have limited utility as an
outcome measure at this stage.
The time series waveforms of the sensor output (Fig.3) recall
typical knee kinematics curves reported in the literature [27], [28].
This indicates the potential to use the sensor output as a surrogate for
knee sagittal kinematics, as the output is the direct response to
stretching caused by knee flexion/extension movements, thereby
permitting acquisition of data from unconstrained environments over
extended periods of time. It follows that the range of motion required
to perform activities of daily living can also be inferred from the
sensor output. Repetitive patterns (Fig.4) were observed among
participants in the sensor output range reflecting the knee joint
angulation expected for the activities performed [27], [28], lower
values indicate the sensor has been stretched less responding to the
demand of the activity in requiring less knee flexion/extension. The
findings show that walking was the activity that required the smallest
range of movement (smaller stretching of the sensor) whereas stair
ascent the one with the greatest range of knee motion (greater
stretching of the sensor) in agreement with range patterns reported in
biomechanical studies [27], [28]. For three of the participants tested,
however, running showed the highest stretching span as can be
observed from Fig.4, this may be due to the fact that these
participants were recreational sport runners and this may be
associated to a greater knee flexion/extension range of motion [29].
The knee range of motion is expressed in mV for this preliminary
investigation as a first step to identify the capability of the sensor to
track knee movement dynamically; the next step will be to identify
the relation between the sensor output (mV) and knee angles (°)
captured through a 3-D motion analysis system to allow the
representation of the output in degrees. However, the possibility to
use the output in mV as representation of knee sagittal angles will be
explored further together with the clinical interpretation. A database
of healthy knees movement, monitored in mV, can be acquired to
allow for comparison with pathological knees in the future or,
similarly, if we have a baseline measure of a patient knee angles in
mV based on the sensor data and having proved, in this study, the
accuracy and repeatability of the sensor outputs, the sensor can be
used to monitor knee function over time as relative comparison to
each individual baseline measure. This also aligns with the idea that
functional improvements are relative and specific to each subject.
Therefore, there exists a situated use for the sensor in monitoring
knee movement also if expressed in mV.
Knee range of motion is often evaluated during the clinical
assessment of patients with knee OA with the use of goniometers via
a static end range of motion passive test and has frequently been
reported as clinically significant parameter in studies of the knee OA
population [30]. However, such data and the majority of research data
are one off measurements performed within a laboratory or clinical
environment and as such not representative of everyday tasks in real
life settings. In this study, differences in participants’ performances
could be appreciated between a task performed indoor or outdoor. An
improved understanding of knee function, in real life contexts would
permit more effective evaluation of a patient’s functional limitations
8. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 575
that could be used to prescribe targeted exercise regime to improve
specific functions and follow-up patients’ progresses. This may be
facilitated by the described system. The system allows continuous
long-term monitoring of the knee, which can be expressed as
surrogate of knee range of motion, and furthermore it allows the
context of the activity to be identified accurately.
Firstly, a simple classification method using MDF and total power
of the spectrum was investigated for the identification of activity.
This proposed method prioritized the simplified approach (based on
only two features) despite the need for subject specific calibration.
Different aspects of a signal, and generally of an acceleration signal
both in time and frequency domains have been explored to detect
activities [31], [32], some of which requiring computationally intense
algorithms. MDF discriminatory ability was proposed before for the
analysis of acceleration data [33]. MDF alone would not suffice for
discrimination between activities using the proposed sensor output;
thereby, in this study, it was used in conjunction to the total power of
the spectrum. These two features were chosen as they incorporate
significant discrimination capability. Good activity discrimination
was achieved: data formed defined classes accordingly to the activity
performed (Fig.5). This was particularly evident when the
participants were analyzed separately, on a subject-by-subject basis.
Net separation between activity classes was not achieved when data
for all subjects were treated together, as a group, indicating the need
for subject specific calibration (Fig. 7). Although sensors could be
calibrated for each subject, this may represent a limitation for future
clinical adoption, as an additional step is required before actual use,
implying extra economic and time costs. This was resolved by
successfully employing a random forest algorithm to automatically
detect activities in a generalised fashion. This method was
mathematically more complex but has the advantage that can be
applied without the need for subject specific calibrations.
Machine learning techniques, among which random forests, have
been recently used to classify activities from acceleration data
acquired via a number of 3-axis accelerometers or smartphone
positioned on different parts of the body [31],[32], [34]-[39]. Most of
the studies involved the simultaneous use of two or more devices in
different positions to increase the accuracy of the classification
methods proposed. This leads to a bulkiness of the system not
compatible with patients’ preferences [40]. On the other hand, the use
of one sensor alone implied specific positioning on areas that could
interfere with activities of daily living (e.g.: chest, bulky phone in the
pocket) or more visible to the other (e.g: ear) against patients’
discreetness. The classification method proposed showed high
accuracy (93%) utilising 9 features from a single sensor alone while
allowing discrete data monitoring. The accuracy achieved compares
well with the accuracy reported in previously conducted studies
(range 80-99%) using more conventional acceleration signals to
detect activity. Further improvements in the accuracy may be
achieved via investigating a larger set of subjects that covers the
pathological case as well.
The feature that played the greatest role in the activity
classification was the MDF. All the features utilised allow for an easy
implementation. The random forest demonstrated good
discrimination ability in correctly identifying activities performed as
seen in the performance metrics table (Table III). Among the testing
set values none of the data referred to stair ascent thereby explaining
the low F score and sensitivity values. A larger data set will be
collected to further test the method proposed having demonstrated the
viability of the system for activity classification through this study.
Also, once the random forest is trained, the identification of activities
for future subjects can be achieved in real time. The features utilized
will be calculated to allow real-time feedback in an automated
fashion by using a moving window method as the data are collected
and, not over whole trial as conducted for this study. Visual feedback
of the data for patients and clinicians will complement the wireless
system to allow an easy and fast interpretation of the data for clinical
use. Data will be made available via smartphone/tablet application or
in the form of a one-page report on patient progress. Although
accelerometers are established systems for activity recognition or
activity level quantification in their simplest form, the sensor
proposed allows also for range of movement estimation not
achievable with one accelerometer. This dual functionality represents
an advantage of our system over existing technology. Although the
smart leggings utilised for this study still shows visible electronics,
these will be integrated into clothing in the next prototype to comply
with patients’ needs and maximise acceptance [40]. Moreover, the
system proposed requires minimum training for the end user to
permit independent utilization.
5. CONCLUSION
Findings from this study demonstrate the feasibility of the novel
sensing system in monitoring knee movement and classifying
activities of daily living. Being able to monitor knee functional status
outside laboratory environments will bring great advantage to the
rehabilitation of patients with knee OA. Objective measures of knee
health can both inform treatment and motivate patients to comply
with prescribed rehabilitation regimes to enhance clinical benefit.
Additional activities will be included in further testing to have a
more comprehensive classification of activity of daily living and to
explore the possibility to express the output in degrees. System
design together with a visual feedback tool will be improved to
reflect end users preferences, both patients and health professionals,
and ultimately progress into clinical adoption. The use of the sensor
can also be expanded to the monitoring of clinically used
performance tests to assess patients’ physical function. A study
conducted within our group showed the ability of the sensor to
monitor performance during exercises extrapolated from a knee OA
rehabilitation class [41]. Assessment of performance-based tests as
suggested by OA guidelines could be included as additional
processed outcome of the sensor increasing the clinical usefulness of
the information obtained from the novel system.
6. REFERENCES
[1] J. J. Guiry, P. van de Ven, and J. Nelson, “Multi-Sensor Fusion
for Enhanced Contextual Awareness of Everyday Activities
with Ubiquitous Devices,” Sensors, vol. 14, no. 3, p. 5687,
2014.
[2] C. Giannella, J. Han, J. Pei, X. Yan, and P. S. Yu, Mining
Frequent Patterns in Data Streams at Multiple Time
Granularities. MIT Press, 2003, ch. 3.
[3] G. Doretto, A. Chiuso, Y. N. Wu, and S. Soatto, “Dynamic
Textures,” Int. J. Comput. Vis., vol. 51, no. 2, pp. 91–109,
2003.
[4] Y. Hanai, J. Nishimura, and T. Kuroda, “Haar-like filtering for
human activity recognition using 3d accelerometer,” in Proc.
IEEE 13th Digit. Signal Process. Workshop, 5th IEEE Signal
Process. Educ. Workshop, Jan. 2009, pp. 675–678
9. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 576
[5] Guiry, J.J.; van de Ven, P.; Nelson, J. Multi-Sensor Fusion for
Enhanced Contextual Awareness of Everyday Activities with
Ubiquitous Devices. Sensors 2014, 14, 5687-5701.
[6] Tzu-Yi Hung, Jiwen Lu and Yap-Peng Tan, "Graph-based
sparse coding and embedding for activity-based human
identification," 2013 IEEE International Conference on
Multimedia and Expo (ICME), San Jose, CA, 2013, pp. 1-6.
[7] M. Yang, L. Zhang, X. Feng, and D. Zhang, “Fisher
Discrimination Dictionary Learning for Sparse
Representation,” in Proceedings of the 2011 International
Conference on Computer Vision, 2011, pp. 543–550.
[8] L. Liu, C. Shen, L. Wang, A. van den Hengel, and C. Wang,
“Encoding High Dimensional Local Features by Sparse Coding
Based Fisher Vectors,” Nov. 2014.
[9] R. Raina, A. Battle, H. Lee, B. Packer, A. Y. Ng, Self-taught
learning: transfer learning from unlabeled data, in: Proc. Int.
Conf. on Machine Learning (ICML), 2007.
[10] S. Bhattacharya, P. Nurmi, N. Hammerla, and T. Plötz, “Using
unlabeled data in a sparse-coding framework for human
activity recognition,” Pervasive Mob. Comput., vol. 15, pp.
242–262, 2014.
[11] V. Kumar, C. Narasimham, and B. Sujith, “Classification of
Time Series Data by One Class Classifier using DTW-D,”
Procedia Compute. Sci., vol. 54, pp. 343–352, 2015.
[12] R. J. Martin, “A metric for ARMA processes,” IEEE Trans.
Signal Process., vol. 48, no. 4, pp. 1164–1170, Apr. 2000.
[13] Z. Dong, W. Liang, Y. Wu, M. Pei, and Y. Jia, “Nonnegative
correlation coding for image classification,” Sci. China Inf.
Sci., vol. 59, no. 1, pp. 1–14, 2016.
[14] A. Ravichandran, R. Chaudhry, and R. Vidal, “Categorizing
Dynamic Textures Using a Bag of Dynamical Systems,” IEEE
Trans. Pattern Anal. Mach. Intel., vol. 35, no. 2, pp. 342–353,
Feb. 2013.
[15] M. Shoaib, S. Bosch, O. D. Incel, H. Scholten, and P. J. M.
Havinga, “Fusion of smartphone motion sensors for physical
activity recognition.,” Sensors (Basel)., vol. 14, no. 6, pp.
10146–76, Jan. 2014.
[16] M. Shoaib, S. Bosch, H. Scholten, P. J. M. Havinga and O. D.
Incel, "Towards detection of bad habits by fusing smartphone
and smartwatch sensors," Pervasive Computing and
Communication Workshops (PerCom Workshops), 2015 IEEE
International Conference on, St. Louis, MO, 2015, pp. 591-596
[17] M. Shoaib, S. Bosch, O. D. Incel, H. Scholten, and P. J. M.
Havinga, “Complex Human Activity Recognition Using
Smartphone and Wrist-Worn Motion Sensors.,” Sensors
(Basel)., vol. 16, no. 4, p. 426, Jan. 2016.
[18] S. G. Trost, Y. Zheng, and W.-K. Wong, “Machine learning for
activity recognition: hip versus wrist data,” Physiol. Meas., vol.
35, no. 11, p. 2183, 2014.
[19] M. Stikic, D. Larlus, and B. Schiele, “Multi-graph Based Semi-
supervised Learning for Activity Recognition,” in 2009
International Symposium on Wearable Computers, 2009, pp.
85–92.
[20] M. Stikic and B. Schiele, “Location and Context Awareness:
4th International Symposium, LoCA 2009 Tokyo, Japan, May
7-8, 2009 Proceedings,” T. Choudhury, A. Quigley, T. Strang,
and K. Suginuma, Eds. Berlin, Heidelberg: Springer Berlin
Heidelberg, 2009, pp. 156–173.
[21] H. Liu, L. Yu, W. Wang, and F. Sun, “Extreme learning
machine for time sequence classification,” Neuro computing,
vol. 174, Part A, pp. 322–330, 2016.
[22] J. R Munkers, Topology vol. 2: Prentice Hall Upper Saddle
River, 2000.
[23] L. R. Rabiner, “A tutorial on hidden Markov models and
selected applications in speech recognition,” Proc. IEEE, vol.
77, no. 2, pp. 257–286, Feb. 1989.
[24] H. Ney, D. Mergel, A. Noll and A. Paeseler, "A data-driven
organization of the dynamic programming beam search for
continuous speech recognition," Acoustics, Speech, and Signal
Processing, IEEE International Conference on ICASSP '87.
1987, pp. 833-836.
[25] M. Yang, L. Zhang, X. Feng, and D. Zhang, “Fisher
Discrimination Dictionary Learning for Sparse
Representation,” in Proceedings of the 2011 International
Conference on Computer Vision, 2011, pp. 543–550.
[26] L. Liu, C. Shen, L. Wang, A. van den Hengel, and C. Wang,
“Encoding High Dimensional Local Features by Sparse Coding
Based Fisher Vectors,” Nov. 2014.
[27] M. Yang, L. Zhang, X. Feng, and D. Zhang, “Sparse
Representation Based Fisher Discrimination Dictionary
Learning for Image Classification,” Int. J. Comput. Vis., vol.
109, no. 3, pp. 209–232, 2014.
[28] G. Ciuti, L. Ricotti, A. Menciassi, and P. Dario, “MEMS
Sensor Technologies for Human Centred Applications in
Healthcare, Physical Activities, Safety and Environmental
Sensing: A Review on Research Activities in Italy,” Sensors,
vol. 15, no. 3, p. 6441, 2015.
[29] Debraj De, Pratool Bharti, Sajal K. Das, Sriram Chellappan,
"Multimodal Wearable Sensing for Fine-Grained Activity
Recognition in Healthcare", IEEE Internet Computing, vol.19,
no. 5, pp. 26-35, Sept.-Oct. 2015, doi:10.1109/MIC.2015.72
[30] C. Torres-Huitzil and A. Alvarez-Landero, “Mobile Health: A
Technology Road Map,” S. Adibi, Ed. Cham: Springer
International Publishing, 2015, pp. 147–169.
[31] U. Fareed, “Smartphone Sensor Fusion Based Activity
Recognition System for Elderly Healthcare,” in Proceedings of
the 2015 Workshop on Pervasive Wireless Healthcare, 2015,
pp. 29–34.
[32] Ryan M. Gibson, Abbes Amira, Naeem Ramzan, Pablo
Casaseca-de-la-Higuera, and Zeeshan Pervez, “Multiple
Comparator Classifier Framework for Accelerometer-Based
Fall Detection and Diagnostic,” Applied Soft Computing,
2015.
[33] A. Avci, S. Bosch, M. Marin-Perianu, R. Marin-Perianu, and P.
Havinga, “Activity Recognition Using Inertial Sensing for
Healthcare, Wellbeing and Sports Applications: A Survey,” in
Architecture of Computing Systems (ARCS), 2010 23rd
International Conference on, 2010, pp. 1–10.
[34] G. Fortino, X. Li, X. Lin, O. Mayora, E. Natalizio, and M. R.
Yuce, “Wireless Technology for Pervasive Healthcare,” Mob.
Networks Appl., vol. 19, no. 3, pp. 273–275, 2014.
[35] N. D. Lane, M. Lin, M. Mohammod, X. Yang, H. Lu, G.
Cardone, S. Ali, A. Doryab, E. Berke, A. T. Campbell, and T.
Choudhury, “BeWell: Sensing Sleep, Physical Activities and
Social Interactions to Promote Wellbeing,” Mob. Networks
Appl., vol. 19, no. 3, pp. 345–359, 2014.
[36] R. I. Ramos-Garcia and A. W. Hoover, “A Study of Temporal
Action Sequencing During Consumption of a Meal,” in
Proceedings of the International Conference on
Bioinformatics, Computational Biology and Biomedical
Informatics, 2013, pp. 68:68–68:75.
[37] A. Parate, M.-C. Chiu, C. Chadowitz, D. Ganesan, and E.
Kalogerakis, “RisQ: Recognizing Smoking Gestures with
Inertial Sensors on a Wristband,” in Proceedings of the 12th
Annual International Conference on Mobile Systems,
Applications, and Services, 2014, pp. 149–161.
[38] Guiry, J.J.; van de Ven, P.; Nelson, J. Multi-Sensor Fusion for
Enhanced Contextual Awareness of Everyday Activities with
Ubiquitous Devices. Sensors 2014, 14, 5687-5701.
10. International Journal of Computer Applications Technology and Research
Volume 5– Issue 9, 561 - 569, 2016, ISSN:- 2319–8656
www.ijcat.com 577
[39] I. Sabek, M. Youssef, and A. Vasilakos, “Ace: An accurate and
efficient multi-entity device-free wlan localization system,”
IEEE Trans. Mobile Comput., vol. 14, no. 2, pp. 261–273, Feb.
2015.
[40] Z. Sheng et al., “A survey on the ietf protocol suite for the
Internet of Things: Standards,.challenges, and opportunities,”
IEEE Wireless Common., vol. 20, no. 6, pp. 91–98, Dec. 2013.
[41] Ö Yürür, C. H. Liu and W. Moreno, "Light-Weight Online
Unsupervised Posture Detection by Smartphone Acc
elerometer," in IEEE Internet of Things Journal, vol. 2, no. 4,
pp. 329-339, Aug. 2015.