Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 17 de 17
Filter
Add more filters










Publication year range
1.
BioData Min ; 17(1): 15, 2024 Jun 11.
Article in English | MEDLINE | ID: mdl-38863014

ABSTRACT

The development of neuroscientific techniques enabling the recording of brain and peripheral nervous system activity has fueled research in cognitive science. Recent technological advancements offer new possibilities for inducing behavioral change, particularly through cost-effective Internet-based interventions. However, limitations in laboratory equipment volume have hindered the generalization of results to real-life contexts. The advent of Internet of Things (IoT) devices, such as wearables, equipped with sensors and microchips, has ushered in a new era in behavior change techniques. Wearables, including smartwatches, electronic tattoos, and more, are poised for massive adoption, with an expected annual growth rate of 55% over the next five years. These devices enable personalized instructions, leading to increased productivity and efficiency, particularly in industrial production. Additionally, the healthcare sector has seen a significant demand for wearables, with over 80% of global consumers willing to use them for health monitoring. This research explores the primary biometric applications of wearables and their impact on users' well-being, focusing on the integration of behavior change techniques facilitated by IoT devices. Wearables have revolutionized health monitoring by providing real-time feedback, personalized interventions, and gamification. They encourage positive behavior changes by delivering immediate feedback, tailored recommendations, and gamified experiences, leading to sustained improvements in health. Furthermore, wearables seamlessly integrate with digital platforms, enhancing their impact through social support and connectivity. However, privacy and data security concerns must be addressed to maintain users' trust. As technology continues to advance, the refinement of IoT devices' design and functionality is crucial for promoting behavior change and improving health outcomes. This study aims to investigate the effects of behavior change techniques facilitated by wearables on individuals' health outcomes and the role of wearables in promoting a healthier lifestyle.

2.
Sensors (Basel) ; 24(8)2024 Apr 10.
Article in English | MEDLINE | ID: mdl-38676044

ABSTRACT

This research paper delves into the effectiveness and impact of behavior change techniques fostered by information technologies, particularly wearables and Internet of Things (IoT) devices, within the realms of engineering and computer science. By conducting a comprehensive review of the relevant literature sourced from the Scopus database, this study aims to elucidate the mechanisms and strategies employed by these technologies to facilitate behavior change and their potential benefits to individuals and society. Through statistical measurements and related works, our work explores the trends over a span of two decades, from 2000 to 2023, to understand the evolving landscape of behavior change techniques in wearable and IoT technologies. A specific focus is placed on a case study examining the application of behavior change techniques (BCTs) for monitoring vital signs using wearables, underscoring the relevance and urgency of further investigation in this critical intersection of technology and human behavior. The findings shed light on the promising role of wearables and IoT devices for promoting positive behavior modifications and improving individuals' overall well-being and highlighting the need for continued research and development in this area to harness the full potential of technology for societal benefit.


Subject(s)
Internet of Things , Wearable Electronic Devices , Humans
3.
J Vis Exp ; (196)2023 06 23.
Article in English | MEDLINE | ID: mdl-37427950

ABSTRACT

The COVID-19 pandemic has changed many industries, empowering some sectors and causing many others to disappear. The education sector is not exempt from major changes; in some countries or cities, classes were taught 100% online for at least 1 year. However, some university careers need laboratory practices to complement learning, especially in engineering areas, and having only theoretical lessons online could affect their knowledge. For this reason, in this work, a mixed reality system called mixed reality for education (MRE) was developed to help students develop laboratory practices to complement online classes. An experiment was carried out with 30 students; 10 students did not use MRE, 10 used MRE, and 10 more used MRE with teacher feedback. With this, one can see the advantages of mixed reality in the education sector. The results show that using MRE helps to improve knowledge in engineering subjects; the students obtained qualifications with grades 10% to 20% better than those who did not use it. Above all, the results show the importance of feedback when using virtual reality systems.


Subject(s)
Augmented Reality , COVID-19 , Humans , Pandemics , Learning , Students
4.
Article in English | MEDLINE | ID: mdl-37047884

ABSTRACT

This paper looks at wireless sensor networks (WSNs) in healthcare, where they can monitor patients remotely. WSNs are considered one of the most promising technologies due to their flexibility and autonomy in communication. However, routing protocols in WSNs must be energy-efficient, with a minimal quality of service, so as not to compromise patient care. The main objective of this work is to compare two work schemes in the routing protocol algorithm in WSNs (cooperative and collaborative) in a home environment for monitoring the conditions of the elderly. The study aims to optimize the performance of the algorithm and the ease of use for people while analyzing the impact of the sensor network on the analysis of vital signs daily using medical equipment. We found relationships between vital sign metrics that have a more significant impact in the presence of a monitoring system. Finally, we conduct a performance analysis of both schemes proposed for the home tracking application and study their usability from the user's point of view.


Subject(s)
Computer Communication Networks , Wireless Technology , Humans , Aged , Algorithms
5.
Sensors (Basel) ; 23(8)2023 Apr 11.
Article in English | MEDLINE | ID: mdl-37112216

ABSTRACT

5G (fifth-generation technology) technologies are becoming more mainstream thanks to great efforts from telecommunication companies, research facilities, and governments. This technology is often associated with the Internet of Things to improve the quality of life for citizens by automating and gathering data recollection processes. This paper presents the 5G and IoT technologies, explaining common architectures, typical IoT implementations, and recurring problems. This work also presents a detailed and explained overview of interference in general wireless applications, interference unique to 5G and IoT, and possible optimization techniques to overcome these challenges. This manuscript highlights the importance of addressing interference and optimizing network performance in 5G networks to ensure reliable and efficient connectivity for IoT devices, which is essential for adequately functioning business processes. This insight can be helpful for businesses that rely on these technologies to improve their productivity, reduce downtime, and enhance customer satisfaction. We also highlight the potential of the convergence of networks and services in increasing the availability and speed of access to the internet, enabling a range of new and innovative applications and services.

6.
Article in English | MEDLINE | ID: mdl-36011599

ABSTRACT

Sensor networks are deployed in people's homes to make life easier and more comfortable and secure. They might represent an interesting approach for elderly care as well. This work highlights the benefits of a sensor network implemented in the homes of a group of users between 55 and 75 years old, which encompasses a simple home energy optimization algorithm based on user behavior. We analyze variables related to vital signs to establish users' comfort and tranquility thresholds. We statistically study the perception of security that users exhibit, differentiating between men and women, examining how it affects the person's development at home, as well as the reactivity of the sensor algorithm, to optimize its performance. The proposed algorithm is analyzed under certain performance metrics, showing an improvement of 15% over a sensor network under the same conditions. We look at and quantify the usefulness of accurate alerts on each sensor and how it reflects in the users' perceptions (for men and women separately). This study analyzes a simple, low-cost, and easy-to-implement home-based sensor network optimized with an adaptive energy optimization algorithm to improve the lives of older adults, which is capable of sending alerts of possible accidents or intruders with the highest efficiency.


Subject(s)
Algorithms , Perception , Aged , Female , Humans , Male , Middle Aged
7.
Article in English | MEDLINE | ID: mdl-35954882

ABSTRACT

Over seven million people suffer from an impairment in Mexico; 64.1% are gait-related, and 36.2% are children aged 0 to 14 years. Furthermore, many suffer from neurological disorders, which limits their verbal skills to provide accurate feedback. Robot-assisted gait therapy has shown significant benefits, but the users must make an active effort to accomplish muscular memory, which usually is only around 30% of the time. Moreover, during therapy, the patients' affective state is mostly unsatisfied, wide-awake, and powerless. This paper proposes a method for increasing the efficiency by combining affective data from an Emotiv Insight, an Oculus Go headset displaying an immersive interaction, and a feedback system. Our preliminary study had eight patients during therapy and eight students analyzing the footage using the self-assessment Manikin. It showed that it is possible to use an EEG headset and identify the affective state with a weighted average precision of 97.5%, recall of 87.9%, and F1-score of 92.3% in general. Furthermore, using a VR device could boost efficiency by 16% more. In conclusion, this method allows providing feedback to the therapist in real-time even if the patient is non-verbal and has a limited amount of facial and body expressions.


Subject(s)
Stroke Rehabilitation , Virtual Reality , Child , Emotions , Exercise Therapy/methods , Gait , Humans , Stroke Rehabilitation/methods
8.
Sensors (Basel) ; 22(4)2022 Feb 21.
Article in English | MEDLINE | ID: mdl-35214585

ABSTRACT

In this research, we analyse data obtained from sensors when a user handwrites or draws on a tablet to detect whether the user is in a specific mood state. First, we calculated the features based on the temporal, kinematic, statistical, spectral and cepstral domains for the tablet pressure, the horizontal and vertical pen displacements and the azimuth of the pen's position. Next, we selected features using a principal component analysis (PCA) pipeline, followed by modified fast correlation-based filtering (mFCBF). PCA was used to calculate the orthogonal transformation of the features, and mFCBF was used to select the best PCA features. The EMOTHAW database was used for depression, anxiety and stress scale (DASS) assessment. The process involved the augmentation of the training data by first augmenting the mood states such that all the data were the same size. Then, 80% of the training data was randomly selected, and a small random Gaussian noise was added to the extracted features. Automated machine learning was employed to train and test more than ten plain and ensembled classifiers. For all three moods, we obtained 100% accuracy results when detecting two possible grades of mood severities using this architecture. The results obtained were superior to the results obtained by using state-of-the-art methods, which enabled us to define the three mood states and provide precise information to the clinical psychologist. The accuracy results obtained when detecting these three possible mood states using this architecture were 82.5%, 72.8% and 74.56% for depression, anxiety and stress, respectively.


Subject(s)
Anxiety , Machine Learning , Anxiety/diagnosis , Normal Distribution , Principal Component Analysis , Support Vector Machine
9.
Sensors (Basel) ; 21(18)2021 Sep 10.
Article in English | MEDLINE | ID: mdl-34577273

ABSTRACT

Inter-carrier interference (ICI) in vehicle to vehicle (V2V) orthogonal frequency division multiplexing (OFDM) systems is a common problem that makes the process of detecting data a demanding task. Mitigation of the ICI in V2V systems has been addressed with linear and non-linear iterative receivers in the past; however, the former requires a high number of iterations to achieve good performance, while the latter does not exploit the channel's frequency diversity. In this paper, a transmission and reception scheme for low complexity data detection in doubly selective highly time varying channels is proposed. The technique couples the discrete Fourier transform spreading with non-linear detection in order to collect the available channel frequency diversity and successfully achieving performance close to the optimal maximum likelihood (ML) detector. When compared with the iterative LMMSE detection, the proposed system achieves a higher performance in terms of bit error rate (BER), reducing the computational cost by a third-part when using 48 subcarriers, while in an OFDM system with 512 subcarriers, the computational cost is reduced by two orders of magnitude.

10.
Sensors (Basel) ; 21(16)2021 Aug 04.
Article in English | MEDLINE | ID: mdl-34450714

ABSTRACT

This paper reports on the progress of a wearable assistive technology (AT) device designed to enhance the independent, safe, and efficient mobility of blind and visually impaired pedestrians in outdoor environments. Such device exploits the smartphone's positioning and computing capabilities to locate and guide users along urban settings. The necessary navigation instructions to reach a destination are encoded as vibrating patterns which are conveyed to the user via a foot-placed tactile interface. To determine the performance of the proposed AT device, two user experiments were conducted. The first one requested a group of 20 voluntary normally sighted subjects to recognize the feedback provided by the tactile-foot interface. The results showed recognition rates over 93%. The second experiment involved two blind voluntary subjects which were assisted to find target destinations along public urban pathways. Results show that the subjects successfully accomplished the task and suggest that blind and visually impaired pedestrians might find the AT device and its concept approach useful, friendly, fast to master, and easy to use.


Subject(s)
Pedestrians , Self-Help Devices , Visually Impaired Persons , Wearable Electronic Devices , Humans , Smartphone
11.
Sensors (Basel) ; 21(4)2021 Feb 08.
Article in English | MEDLINE | ID: mdl-33567489

ABSTRACT

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network's performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols' performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.

12.
Sensors (Basel) ; 22(1)2021 Dec 28.
Article in English | MEDLINE | ID: mdl-35009729

ABSTRACT

The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for network security as well as reducing operation and maintenance costs, especially at the physical layer, where the energy consumption plays an important role. This article demonstrates through simulations and experiments that, while the cooperative scheme is more efficient when a WSN is at normal operating conditions, the collaborative scheme offers more enhanced protection against the aggressiveness of jamming in the performance metrics, thus making it safer, reducing operation and maintenance costs and laying the foundations for jamming mitigation. This document additionally offers an algorithm to detect jamming in real time. Firstly, it examines the characteristics and damages caused by the type of aggressor. Secondly, it reflects on the natural immunity of the WSN (which depends on its node density and a cooperative or collaborative configuration). Finally, it considers the performance metrics, especially those that impact energy consumption during transmission.

13.
Sensors (Basel) ; 20(13)2020 Jun 28.
Article in English | MEDLINE | ID: mdl-32605300

ABSTRACT

The huge spreading of Internet of things (IoT)-oriented modern technologies is revolutionizing all fields of human activities, leading several benefits and allowing to strongly optimize classic productive processes. The agriculture field is also affected by these technological advances, resulting in better water and fertilizers' usage and so huge improvements of both quality and yield of the crops. In this manuscript, the development of an IoT-based smart traceability and farm management system is described, which calibrates the irrigations and fertigation operations as a function of crop typology, growth phase, soil and environment parameters and weather information; a suitable software architecture was developed to support the system decision-making process, also based on data collected on-field by a properly designed solar-powered wireless sensor network (WSN). The WSN nodes were realized by using the ESP8266 NodeMCU module exploiting its microcontroller functionalities and Wi-Fi connectivity. Thanks to a properly sized solar power supply system and an optimized scheduling scheme, a long node autonomy was guaranteed, as experimentally verified by its power consumption measures, thus reducing WSN maintenance. In addition, a literature analysis on the most used wireless technologies for agri-food products' traceability is reported, together with the design and testing of a Bluetooth low energy (BLE) low-cost sensor tag to be applied into the containers of agri-food products, just collected from the fields or already processed, to monitor the main parameters indicative of any failure or spoiling over time along the supply chain. A mobile application was developed for monitoring the tracking information and storing conditions of the agri-food products. Test results in real-operative scenarios demonstrate the proper operation of the BLE smart tag prototype and tracking system.

14.
Sensors (Basel) ; 19(11)2019 May 31.
Article in English | MEDLINE | ID: mdl-31159187

ABSTRACT

In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism. The first one detects jamming by comparing the performance parameters with respect to directly connected neighbors by interchanging packets with performance metric information, whereas the latter, jamming detection relays comparing defined zones of nodes related with a collector node, and using information of this collector detects a possible affected zone. The effectiveness of these techniques were tested in simulated environment of a quadrangular grid of 7 × 7, each node delivering 10 packets/sec, and defining as collector node, the one in the lower left corner of the grid. The jammer node is sending packets under reactive jamming. The mechanism was implemented and tested in AODV (Ad hoc On Demand Distance Vector), DSR (Dynamic Source Routing), and MPH (Multi-Parent Hierarchical), named AODV-M, DSR-M and MPH-M, respectively. Results reveal that the proposed techniques increase the accurate of the detected zone, reducing the detection of the affected zone up to 15% for AODV-M and DSR-M and up to 4% using the MPH-M protocol.

15.
Sensors (Basel) ; 17(7)2017 Jul 05.
Article in English | MEDLINE | ID: mdl-28678180

ABSTRACT

In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M.

16.
Sensors (Basel) ; 15(4): 7619-49, 2015 Mar 27.
Article in English | MEDLINE | ID: mdl-25825979

ABSTRACT

In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.

17.
Sensors (Basel) ; 14(12): 22811-47, 2014 Dec 02.
Article in English | MEDLINE | ID: mdl-25474377

ABSTRACT

Wireless Sensor Networks deliver valuable information for long periods, then it is desirable to have optimum performance, reduced delays, low overhead, and reliable delivery of information. In this work, proposed metrics that influence energy consumption are used for a performance comparison among our proposed routing protocol, called Multi-Parent Hierarchical (MPH), the well-known protocols for sensor networks, Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zigbee Tree Routing (ZTR), all of them working with the IEEE 802.15.4 MAC layer. Results show how some communication metrics affect performance, throughput, reliability and energy consumption. It can be concluded that MPH is an efficient protocol since it reaches the best performance against the other three protocols under evaluation, such as 19.3% reduction of packet retransmissions, 26.9% decrease of overhead, and 41.2% improvement on the capacity of the protocol for recovering the topology from failures with respect to AODV protocol. We implemented and tested MPH in a real network of 99 nodes during ten days and analyzed parameters as number of hops, connectivity and delay, in order to validate our Sensors 2014, 14 22812 simulator and obtain reliable results. Moreover, an energy model of CC2530 chip is proposed and used for simulations of the four aforementioned protocols, showing that MPH has 15.9% reduction of energy consumption with respect to AODV, 13.7% versus DSR, and 5% against ZTR.


Subject(s)
Computer Communication Networks/instrumentation , Electric Power Supplies , Information Storage and Retrieval/methods , Monitoring, Ambulatory/instrumentation , Signal Processing, Computer-Assisted/instrumentation , Wireless Technology/instrumentation , Computer Simulation , Computer-Aided Design , Energy Transfer , Equipment Design , Equipment Failure Analysis , Models, Theoretical , Transducers
SELECTION OF CITATIONS
SEARCH DETAIL
...