Overindulgence of harmful substances such as drugs or alcohol, called substance abuse, can directly affect a person's health and their day-to-day activities. The younger population become more vulnerable to such use of psychoactive substances due to lack of awareness of the long-term hazardous effects these substances can have on their health. Additionally, these individuals tend to develop severe mental disorders as they grow older. With the boom of Internet of Things (IoT), the use of wearable sensors such as smartwatches and smartphones has tremendously increased. These wearables help in monitoring a person's physiological signal and keep them informed of one's health. In this research, we propose an edge-intelligent IoT-based wearable that can assist in substance-abuse detection by monitoring their physiological signals on daily basis. The proposed system helps in monitoring the substance abuse and craving of the individual and help the healthcare provider to start an early intervention as required. The proposed system is validated using a custom-built wearable, i-SAD, which was developed as a dedicated substance abuse wearable using commercially available off-the-shelf components. The proposed wearable design was validated using medical quality wearable and yielded a correlation of 0.89 for accelerometer values and 0.92 for average heart rate values.
more »
« less
SolicitudeSavvy: An IoT-based Edge Intelligent Framework for Monitoring Anxiety in Real-time
Anxiety disorders affect more than 18 percent of the population and is the most common mental illnesses in the US. There is a great demand to address this emerging epidemic with tools to differentiate and diagnose such disorders, and to create awareness especially in places like NorthEast Texas which is home to 1.5 million people with 58 percent of them living in rural areas. The goal of the proposed device is to diagnose as many anxiety disorders as possible, in real-time using the diagnosing wearable framework, SolicitudeSavvy, which uses technology such as the Internet of Things (IoT), a network of interconnected devices, to accomplish such a task. The proposed IoT-based device has two components: a custom-built wearable necklace that contains sensors to collect data about the user as they go about their day and a low-cost portable system that monitors Electrooculography (EoG) signals using a camera. The partial necklace attaches to the shirt and opens halfway around the wearer's neck and the EoG can be attached to any eyewear. The device monitors the user throughout the day, and even as they go to bed at night. This information is accumulated in the IoT cloud and analyzed to see exactly what type of disorder(s) the patient may suffer from. The authorized personnel i.e. doctor or therapist can use this pattern to find a treatment that best suits them and is most likely to resolve their affliction.
more »
« less
- Award ID(s):
- 1924117
- PAR ID:
- 10290119
- Date Published:
- Journal Name:
- 2021 22nd International Symposium on Quality Electronic Design (ISQED)
- Page Range / eLocation ID:
- 576 to 580
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
It is imperative to find the most accurate way to detect falls in elders to help mitigate the disastrous effects of such unfortunate injuries. In order to mitigate fall related accidents, we propose the Good-Eye System, an Internet of Things (IoT) enabled Edge Level Device which works when there is an orientation change detected by camera, and monitors physiological signal parameters. If the observed change is greater than the set threshold, the user is notified with information regarding a prediction of fall or a detection of fall, using LED lights. The Good-Eye System has a remote wall attached camera to monitor continuously the subject as long as the person is in a room along with a camera attached to a wearable to increase the accuracy of the model. The observed accuracy of the Good-Eye System as a whole is approximately 95%.more » « less
-
In intelligent IoT networks, an IoT user is capable of sensing the spectrum and learning from its observation to dynamically access the wireless channels without interfering with the primary user’s signal. The network, however, is potentially subject to primary user emulation and jamming attacks. In the existing works, various attacks and defense mechanisms for spectrum sharing in IoT networks have been proposed. This paper systematically conducts a targeted survey of these efforts and proposes new approaches for future studies to strengthen the communication of IoT users. Our proposed methods involve the development of intelligent IoT devices that go beyond existing solutions, enabling them not only to share the spectrum with licensed users but also to effectively thwart potential attackers. First, considering practical aspects of imperfect spectrum sensing and delay, we propose to utilize online machine learning-based approaches to design spectrum sharing attack policies. We also investigate the attacker’s channel observation/sensing capabilities to design attack policies using time-varying feedback graph models. Second, taking into account the IoT devices’ practical characteristics of channel switching delay, we propose online learning-based channel access policies for optimal defense by the IoT device to guarantee the maximum network capacity. We then highlight future research directions, focusing on the defense of IoT devices against adaptive attackers. Finally, aided by concepts from intelligence and statistical factor analysis tools, we provide a workflow which can be utilized for devices’ intelligence factors impact analysis on the defense performance.more » « less
-
Wearable internet of things (IoT) devices can enable a variety of biomedical applications, such as gesture recognition, health monitoring, and human activity tracking. Size and weight constraints limit the battery capacity, which leads to frequent charging requirements and user dissatisfaction. Minimizing the energy consumption not only alleviates this problem, but also paves the way for self-powered devices that operate on harvested energy. This paper considers an energy-optimal gesture recognition application that runs on energy-harvesting devices. We first formulate an optimization problem for maximizing the number of recognized gestures when energy budget and accuracy constraints are given. Next, we derive an analytical energy model from the power consumption measurements using a wearable IoT device prototype. Then, we prove that maximizing the number of recognized gestures is equivalent to minimizing the duration of gesture recognition. Finally, we utilize this result to construct an optimization technique that maximizes the number of gestures recognized under the energy budget constraints while satisfying the recognition accuracy requirements. Our extensive evaluations demonstrate that the proposed analytical model is valid for wearable IoT applications, and the optimization approach increases the number of recognized gestures by up to 2.4× compared to a manual optimization.more » « less
-
User authentication is a critical process in both corporate and home environments due to the ever-growing security and privacy concerns. With the advancement of smart cities and home environments, the concept of user authentication is evolved with a broader implication by not only preventing unauthorized users from accessing confidential information but also providing the opportunities for customized services corresponding to a specific user. Traditional approaches of user authentication either require specialized device installation or inconvenient wearable sensor attachment. This paper supports the extended concept of user authentication with a device-free approach by leveraging the prevalent WiFi signals made available by IoT devices, such as smart refrigerator, smart TV and thermostat, etc. The proposed system utilizes the WiFi signals to capture unique human physiological and behavioral characteristics inherited from their daily activities, including both walking and stationary ones. Particularly, we extract representative features from channel state information (CSI) measurements of WiFi signals, and develop a deep learning based user authentication scheme to accurately identify each individual user. Extensive experiments in two typical indoor environments, a university office and an apartment, are conducted to demonstrate the effectiveness of the proposed authentication system. In particular, our system can achieve over 94% and 91% authentication accuracy with 11 subjects through walking and stationary activities, respectively.more » « less