11th International Conference on Mobile and Ubiquitous Systems:

Slides:



Advertisements
Similar presentations
Autonomic Scaling of Cloud Computing Resources
Advertisements

Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
L OUISIANA T ECH U NIVERSITY Department of Electrical Engineering and Institute for Micromanufacturing INTRODUCTION PROBLEM FORMULATION STATE FEEDBACK.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Presented for: CPS Lab-ASU By: Ramtin Kermani
Linear Matrix Inequality Solution To The Fault Detection Problem Emmanuel Mazars co-authors Zhenhai li and Imad Jaimoukha Imperial College IASTED International.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Chapter 15 Application of Computer Simulation and Modeling.
Bastien DURAND Karen GODARY-DEJEAN – Lionel LAPIERRE Robin PASSAMA – Didier CRESTANI 27 Janvier 2011 ConecsSdf Architecture de contrôle adaptative : une.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
A Smart Sensor to Detect the Falls of the Elderly.
Motion detector ​ Bikesh Shrestha ​ Ari Rajamäki.
1 Time Scales Virtual Clocks and Algorithms Ricardo José de Carvalho National Observatory Time Service Division February 06, 2008.
1 Neural plug-in motor coil thermal modeling Mo-Yuen Chow; Tipsuwan Y Industrial Electronics Society, IECON 26th Annual Conference of the IEEE, Volume:
What Exactly are the Techniques of Software Verification and Validation A Storehouse of Vast Knowledge on Software Testing.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Software Faults and Fault Injection Models --Raviteja Varanasi.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
A comprehensive method for the evaluation of the sensitivity to SEUs of FPGA-based applications A comprehensive method for the evaluation of the sensitivity.
Extending the control of remote laboratories using domotic devices Ricardo Costa
Library & Bookstore Navigation using RFID grid ACE B4 dra 親 richie 卒論最終発表.
1 Performance Evaluation of Computer Systems and Networks Introduction, Outlines, Class Policy Instructor: A. Ghasemi Many thanks to Dr. Behzad Akbari.
Software Development Software Testing. Testing Definitions There are many tests going under various names. The following is a general list to get a feel.
1 SmartSpaghetti: Use of Smart Devices to Solve Health Care Problems Mostafa Uddin,A. Gupta, T. Nadeem, K. Maly Sandip Godambe, Arno Zaritsky BIBM/BIH.
Sensorless Sliding-Mode Control of Induction Motors Using Operating Condition Dependent Models 教 授: 王明賢 學 生: 謝男暉 南台科大電機系.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
Mobile Robot Navigation Using Fuzzy logic Controller
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks IEEE INFOCOM 2008, Phoenix, AZ, USA Jaehoon Jeong, Shuo Guo, Tian He.
HOME AUTOMATION: WEB BASED CONTROL Anthony Campbell Eric Poynter EKU, Dept. of Technology Computer Electronic Networking.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
An Efficient Localization Algorithm Focusing on Stop-and-Go Behavior of Mobile Nodes IEEE PerCom 2011 Takamasa Higuchi, Sae Fujii, Hirozumi Yamaguchi and.
Discovery and Systems Health Technical Area NASA Ames Research Center - Computational Sciences Division Automated Diagnosis Sriram Narasimhan University.
Name Of The College & Dept
Crowd Fraud Detection in Internet Advertising Tian Tian 1 Jun Zhu 1 Fen Xia 2 Xin Zhuang 2 Tong Zhang 2 Tsinghua University 1 Baidu Inc. 2 1.
Single Correlator Based UWB Receiver Implementation through Channel Shortening Equalizer By Syed Imtiaz Husain and Jinho Choi School of Electrical Engineering.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Ambient Intelligence: Everyday Living Aid System for Elders
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
SECURITY SYSTEM USING PIR. OVERVIEW  Introduction of Embedde system  Aim of the project  Current scenario  Limitations of Current scenario  Futurescope.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Introduction to Machine Learning, its potential usage in network area,
INTRODUCTION TO WIRELESS SENSOR NETWORKS
The Use of the Mobile Network as a Fire Alert System
Unit Testing - solid fundamentals
An Improved PIR Sensors Model for Indoor People Activity Detection
PARKING AUTOMATION SYSTEM
Software Architecture in Practice
IS301 – Software Engineering V:
Presented by Munezero Immaculee Joselyne PhD in Software Engineering
PARKING MANAGEMENT SYSTEM USING ZIGBEE
Fault-tolerant Control System Design and Analysis
AirPlace Indoor Positioning Platform for Android Smartphones
Internet of Things (IoT)
Human Complexity of Software
Internet of Things A Process Calculus Approach
Name Of The College & Dept
HOME AUTOMATION: WEB BASED CONTROL
An Adaptive Middleware for Supporting Time-Critical Event Response
by Xiang Mao and Qin Chen
Software Verification and Validation
Software Verification and Validation
Software Verification and Validation
Achieving Resilient Routing in the Internet
My Intelligent Home (Mii-Home) Project
IPSN19 杨景
Presentation transcript:

11th International Conference on Mobile and Ubiquitous Systems: Computing, Network and Services – Dec 2nd-5th London F. Veronese, S. Comai, M. Matteucci, F. Salice Method, Design and Implementation of a Multiuser Indoor Localization System with Concurrent Fault Detection Fabio Veronese – fabio.veronese@polimi.it Biomedical Engineer, IT PhD Fellow ATG – Assistive Technology Group Dept. of Electronics Information and Bioengineering

AAL – Ambient Assisted Living Introduction Indoor Humans Localization LBS – Location Based Services ↓ Advertising Notification – Services… any? AAL – Ambient Assisted Living

Methods, Design and Implementation Outline Motivation Methods, Design and Implementation Experimental Results Simulations Conclusions Future Work

What are users asked to do? Usually IT approaches refer to: INVASIVENESS WEARABILITY MOBILITY BUT… … is the USER where we locate the device?

Dependability as a Target Indoor Humans Localization systems rarely provide a Dependable Service AAL Case Study implies: - User’s Needs Centered System Design - - Instrumented Environment -

Errors, Faults and Failures The result of localization can be not reliable WHY? → FAULTS! Natural Hardware - Human Made HOW can we DETECT them? Designing a Model of the systems Gathering extra data from another system

IHL systems provide an area where the person is with a certain error Modeling IHL Systems IHL systems provide an area where the person is with a certain error Let us consider the area centered in the estimation with a range based on the localization performances (3m ~ 84h percentile)

Gathering Information In AAL settings humans interact continuously, repeatedly and inevitably with Home Automation (HA) systems. →

Anonymous Interaction Detection Let us build a MODEL of interaction with DWS* What about More informative sensors? rs ( x,y ) Inactive No Information Toggled Person Interaction * Door Window Sensor

PIR* sensors have a more complicated behavior Presence Detection PIR* sensors have a more complicated behavior Inactive Active Inactive ( x,y ) rs No Movement Inactive Active Delay Active Inactive Persistence * Passive InfreRed

Presence Detection Model Let us define the behavior by cases: Entering and exiting a Sensor Area: Stopping in a Sensor Area Ideal Real Ideal Real

Concurrent Fault Detection Both systems have outputs based on the user position Indoor Humans Localization Human’s Real Position Fault Detection Apparatus Home Automation Sensor-detected Error Localization-detected Error

Fault Detection Policies The sets of possible locations from IHL and HA must allow a valid position All the HA activity must be motivated by a valid IHL position ? ?

Going MultiUser The handle multiuser we have to keep memory of the last IHL and HA valid position for each localized user ↓

Employed system were implemented based on AAL scenario settings: Who’s who? Employed system were implemented based on AAL scenario settings: Indoor Humans Localization Fault Detection Apparatus Home Automation

CAVEAT - Fault Observability “If a tree falls in the forest and no one is around to hear it… did it really fall?” If the user does not create a fault condition to produce an error which is visible then is the fault really happening?

Person Experimental Path Real World Tests TESTS No-fault Condition Natural Fault (Blinded Sensor) Human Fault (Forgotten Device) Sensor Positioning Person Experimental Path

Real World Results NO FAULT FORGOTTEN DEVICE SENSOR BLINDED

Making Real World Grow Limiting factors were making this not affordable: Few Devices Available Impossibility to test with several users Purchasing and Acquisition Times ↓ Large Environment Simulations: Unlimited Ideal Sensors Large Datasets Fast Generation

Simulated Tests TESTS No-fault Condition Natural Fault (Blinded Sensor) Human Fault (Forgotten Device)

Both Sensitivity and Specificity over 90% Simulations Results FORGOTTEN DEVICE NO FAULT BLINDED SENSOR Both Sensitivity and Specificity over 90%

Wrappin’ up The proposed method is based on the definition of a model representing a IHL and an HA systems, defining joint consistency conditions. The validity of the approach is proved applying it to a case study. The chosen case study subsystems are: LAURA localization system and a Z-wave based HA. The obtained experimental results showed the validity of our approach, correctly reporting errors in fault-free and fault injected conditions. Furthermore, we generated multiuser data, creating them based on the knowledge of the environment and the systems.

Conclusions Results of multiuser simulations show the system correctly detecting faults also in case of several targets. Both specificity and sensitivity above 90% represent a satisfying performance. Nonetheless, if the application requires it, system model parameters can be tuned to benefit selectively sensitivity or specificity. Concluding, our approach, even under some limitations in terms of fault observability, enables the dependable localization of a set of persons inside an instrumented house, detecting both natural and human-made faults.

Future Work GROWTH Real World installation Pattern Identification Fault Identification and Localization

Thanks Fabio Veronese – fabio.veronese@polimi.it Biomedical Engineer, IT PhD Fellow ATG – Assistive Technology Group Dept. of Electronics Information and Bioengineering