MILA: Low-Cost BCI Framework for Acquiring EEG Data with Iot
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet of Things Meets Brain-Computer Interface: a Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity Xiang Zhang, Student Member, IEEE, Lina Yao, Member, IEEE, Shuai Zhang, Student Member, IEEE, Salil Kanhere, Member, IEEE, Michael Sheng, Member, IEEE, and Yunhao Liu, Fellow, IEEE Abstract—A Brain-Computer Interface (BCI) acquires brain signals, analyzes and translates them into commands that are relayed to actuation devices for carrying out desired actions. With the widespread connectivity of everyday devices realized by the advent of the Internet of Things (IoT), BCI can empower individuals to directly control objects such as smart home appliances or assistive robots, directly via their thoughts. However, realization of this vision is faced with a number of challenges, most importantly being the issue of accurately interpreting the intent of the individual from the raw brain signals that are often of low fidelity and subject to noise. Moreover, pre-processing brain signals and the subsequent feature engineering are both time-consuming and highly reliant on human domain expertise. To address the aforementioned issues, in this paper, we propose a unified deep learning based framework that enables effective human-thing cognitive interactivity in order to bridge individuals and IoT objects. We design a reinforcement learning based Selective Attention Mechanism (SAM) to discover the distinctive features from the input brain signals. In addition, we propose a modified Long Short-Term Memory (LSTM) to distinguish the inter-dimensional information forwarded from the SAM. To evaluate the efficiency of the proposed framework, we conduct extensive real-world experiments and demonstrate that our model outperforms a number of competitive state-of-the-art baselines. -
Electroencephalography (EEG)-Based Brain Computer Interfaces for Rehabilitation
Virginia Commonwealth University VCU Scholars Compass Theses and Dissertations Graduate School 2012 Electroencephalography (EEG)-based brain computer interfaces for rehabilitation Dandan Huang Virginia Commonwealth University Follow this and additional works at: https://scholarscompass.vcu.edu/etd Part of the Biomedical Engineering and Bioengineering Commons © The Author Downloaded from https://scholarscompass.vcu.edu/etd/2761 This Dissertation is brought to you for free and open access by the Graduate School at VCU Scholars Compass. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of VCU Scholars Compass. For more information, please contact [email protected]. School of Engineering Virginia Commonwealth University This is to certify that the dissertation prepared by Dandan Huang entitled “Electroencephalography (EEG)-based brain computer interfaces for rehabilitation” has been approved by her committee as satisfactory completion of the dissertation requirement for the degree of Doctoral of Philosophy. Ou Bai, Ph.D., Director of Dissertation, School of Engineering Ding-Yu Fei, Ph.D., School of Engineering Azhar Rafiq, M.D., School of Medicine Martin L. Lenhardt, Ph.D., School of Engineering Kayvan Najarian, Ph.D., School of Engineering Gerald Miller, Ph.D., Chair, Department of Biomedical Engineering, School of Engineering Rosalyn Hobson, Ph.D., Associate Dean of Graduate Studies, School of Engineering Charles J. Jennett, Ph.D., Dean, School of Engineering F. Douglas Boudinot, Ph.D., Dean of the Graduate School ______________________________________________________________________ Date © Dandan Huang 2012 All Rights Reserved ELECTROENCEPHALOGRAPHY-BASED BRAIN-COMPUTER INTERFACES FOR REHABILITATION A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at Virginia Commonwealth University. -
The Internet of Things (Iot): an Overview
Updated February 12, 2020 The Internet of Things (IoT): An Overview The Internet of Things (IoT) is a system of interrelated incorporation of IIoT and analytics is viewed by experts as devices connected to a network and/or to one another, the Fourth Industrial Revolution, or 4IR. exchanging data without necessarily requiring human-to- machine interaction. In other words, IoT is a collection of Internet of Medical Things (IoMT): The healthcare field electronic devices that can share information among has begun incorporating IoT, creating the Internet of themselves. Examples include smart factories, smart home Medical Things (IoMT). These devices, such as heart devices, medical monitoring devices, wearable fitness monitors and pace makers, collect and send patient health trackers, smart city infrastructures, and vehicular statistics over various networks to healthcare providers for telematics. Potential issues for Congress include regulation, monitoring, analysis, and remote configuration. At a digital privacy, and data security as discussed below. personal health level, wearable IoT devices, such as fitness trackers and smart watches, can track a user’s physical IoT Characteristics activities, basic vital data, and sleeping patterns. According IoT devices are often called “smart” devices because they to a 2019 survey by Pew Research, about one-in-five have sensors and can conduct complex data analytics. IoT Americans uses a smart watch or fitness tracker. devices collect data using sensors and offer services to the user based on the analyses of that data and according to Smart Cities: IoT devices and systems in the utilities, user-defined parameters. For example, a smart refrigerator transportation, and infrastructure sectors may be grouped uses sensors (e.g., cameras) to inventory stored items and under the category of “smart city.” Utilities can use IoT to can alert the user when items run low based on image create “smart” grids and meters for electricity, water, and recognition analyses. -
Fog Computing: a Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R. -
The Internet of Things: Impact on Public Safety Communications
Cybersecurity and Infrastructure Security Agency The Internet of Things March 2019 The Internet of Things: Impact on Public Safety Communications The Internet of Things (IoT) is the network of physical devices and connectivity that enables objects to connect to one another, to the Internet, and exchange data amongst themselves.1, 2 IoT allows connected devices to be sensed or controlled remotely across network infrastructures, creating opportunities for more direct, cross-platform integration and improved efficiencies for the transfer of data between devices. IoT presents undeniable implications for public safety IoT goes beyond simply connecting communications. In turn, comprehensively addressing the objects to the Internet; it allows ever-growing IoT environment presents a unique challenge to physical objects to intelligently self- service providers, equipment manufacturers, and consumers. identify and communicate with other Harnessing network architecture changes and equipping devices, creating a new model of everyday objects to be IoT-enabled will allow public safety information sharing with a variety of stakeholders to maximize existing infrastructure investments potential applications. and provide near-real time decision support experiences that can change how they operate. IoT Benefits IoT-enabled devices can provide numerous benefits to public safety, as shown in Table 1. For example, a traffic accident response team could use the data collected from a variety of Internet-connected devices ― such as the involved vehicles (e.g., -
Home Automation System Using Google Assistant
© 2021 JETIR June 2021, Volume 8, Issue 6 www.jetir.org (ISSN-2349-5162) HOME AUTOMATION SYSTEM USING GOOGLE ASSISTANT MUDASIR M, NEHA V, NIHAAL THATHIR K, PAVAN YADAV M, POLLARPU SREERAMULU, SMITHA PATIL B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India Assistant Professor, Department of Computer Science and Engineering, Presidency University, Bangalore, India Abstract: Nowadays Technology keeps on upgrading. The idea behind Google assistant-controlled Home automation is to control home devices with voice. On the market there are many devices available to do that, but making our own is awesome. In this project, the Google assistant requires voice commands. Adafruit account which is a cloud based free IoT web server used to create virtual switches, is linking to IFTTT website abbreviated as “If This Than That” which is used to create if else conditional statements. The voice commands for Google assistant have been added through IFTTT website. In this home automation, as the user gives commands to the Google assistant, Home appliances like Bulb, Fan and Motor etc., can be controlled accordingly. The commands given through the Google assistant are decoded and then sent to the microcontroller, the microcontroller in turn control the relays connected to it. The device connected to the respective relay can be turned ON or OFF as per the users request to the Google Assistant. -
Predictive Analysis of 3D Reram-Based PUF for Securing the Internet of Things
Predictive Analysis of 3D ReRAM-based PUF for Securing the Internet of Things Jeeson Kim Hussein Nili School of Engineering Electrical and Computer Engineering RMIT University University of California Santa Barbara Melbourne, Australia Santa Barbara, USA [email protected] [email protected] Gina C. Adam Nhan Duy Truong Electrical and Computer Engineering School of Engineering University of California Santa Barbara RMIT University Santa Barbara, USA Melbourne, Australia gina [email protected] [email protected] Dmitri B. Strukov Omid Kavehei Electrical and Computer Engineering Electrical and Information Engineering University of California Santa Barbara The University of Sydney Santa Barbara, USA Sydney, Australia [email protected] [email protected] Abstract—In recent years, an explosion of IoT devices challenge [2, 3]. Widely used traditional cryptographic and its use leads threats to the privacy and security solutions, for example, advanced encryption standard concerns of individual users and merchandises. As one (AES) and elliptic curve cryptography (ECC), can be of promising solutions, physical unclonable function (PUF) has been extensively studied. This paper investigates quality used for both the integrity and the authentication of of randomness in the first generation of 3D analog ReRAM exchanging data and messages. PUF primitives using measured and gathered data from IoT hardware anti-counterfeiting, integrated circuit fabricated ReRAM crossbars. This study is significant as (IC) trust and physical tampering are also critical the randomness quality of a PUF directly relates to its tasks [4]. In 2014, defense advanced research projects resilience against various model-building attacks, includ- ing machine learning attack. -
Paving the Way for Self-Driving Vehicles”
June 13, 2017 The Honorable John Thune, Chairman The Honorable Bill Nelson, Ranking Member U.S. Senate Committee on Commerce, Science & Transportation 512 Dirksen Senate Office Building Washington, DC 20510 RE: Hearing on “Paving the Way for Self-Driving Vehicles” Dear Chairman Thune and Ranking Member Nelson: We write to your regarding the upcoming hearing “Paving the Way for Self-Driving Vehicles,”1 on the privacy and safety risks of connected and autonomous vehicles. For more than a decade, the Electronic Privacy Information Center (“EPIC”) has warned federal agencies and Congress about the growing risks to privacy resulting from the increasing collection and use of personal data concerning the operation of motor vehicles.2 EPIC was established in 1994 to focus public attention on emerging privacy and civil liberties issues. EPIC engages in a wide range of public policy and litigation activities. EPIC testified before the House of Representatives in 2015 on “the Internet of Cars.”3 Recently, EPIC 1 Paving the Way for Self-Driving Vehicles, 115th Cong. (2017), S. Comm. on Commerce, Science, and Transportation, https://www.commerce.senate.gov/public/index.cfm/pressreleases?ID=B7164253-4A43- 4B70-8A73-68BFFE9EAD1A (June 14, 2017). 2 See generally EPIC, “Automobile Event Data Recorders (Black Boxes) and Privacy,” https://epic.org/privacy/edrs/. See also EPIC, Comments, Docket No. NHTSA-2002-13546 (Feb. 28, 2003), available at https://epic.org/privacy/drivers/edr_comments.pdf (“There need to be clear guidelines for how the data can be accessed and processed by third parties following the use limitation and openness or transparency principles.”); EPIC, Comments on Federal Motor Vehicle Safety Standards; V2V Communications, Docket No. -
Internet of Things
INTERNET OF THINGS Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world. WHY SHOULD WE CARE? • Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits. • New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever. • The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks. • With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives. SIMPLE TIPS TO OWN IT. • Shake up your password protocol. Change your device’s factory security settings from the default password. This is one of the most important steps to take in the protection of IoT devices. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and create a unique password for your IoT devices. Read the Creating a Password Tip Sheet for more information. -
A National Review of Amplitude Integrated Electroencephalography (Aeeg) A
Issue: Ir Med J; Vol 113; No. 9; P192 A National Review of Amplitude Integrated Electroencephalography (aEEG) A. Jenkinson1, M.A. Boyle2, D. Sweetman1 1. The National Maternity Hospital, Dublin. 2. The Rotunda Hospital, Dublin. Dear Sir, The use of amplitude integrated encephalography (aEEG) has become well integrated into routine care in the neonatal intensive care unit (NICU), to monitor brain function where encephalopathy or seizures are suspected.1 Early aEEG abnormalities and their rate of resolution have clinical and prognostic significance in severely ill newborns with altered levels of consciousness. 2 The most common use of aEEG is in infants with neonatal encephalopathy undergoing therapeutic hypothermia (TH). While TH is performed in tertiary centres, local and regional centres play an important role in the diagnosis and initial management of these infants. The Therapeutic Hypothermia Working Group National Report from 2018 reported that 28/69 (40%) of infants requiring Therapeutic Hypothermia were outborn in local or regional units requiring transfer.3 The report also highlighted that early and accurate aEEG interpretation is important in the care of these infants with many seizures being sub-clinical or electrographic without clinical correlation. We performed a national audit on aEEG in neonatal services in Ireland, surveying 18 neonatal units that are divided into Level 1 (Local), Level 2 (Regional) and Level 3 (Tertiary). One unit was excluded from our study as it provides a continuous EEG monitoring service on a 24-hour basis as part of the Neonatal Brain Research Group. Our findings showed that while no Level 1 unit had aEEG, it is widely available in Level 2 and Level 3 units [3/4 (75%) and 3/3 (100%)] respectively. -
Using Amplitude-Integrated EEG in Neonatal Intensive Care
Journal of Perinatology (2010) 30, S73–S81 r 2010 Nature America, Inc. All rights reserved. 0743-8346/10 www.nature.com/jp REVIEW Using amplitude-integrated EEG in neonatal intensive care JD Tao and AM Mathur Department of Pediatrics, Washington University School of Medicine, St Louis, MO, USA monitoring can be applied, for example, to infants admitted with The implementation of amplitude-integrated electroencephalography encephalopathy, seizures or other brain malformations. Both term (aEEG) has enhanced the neurological monitoring of critically ill infants. and preterm infants may benefit from the clinical application of Limited channel leads are applied to the patient and data are displayed in a aEEG findings. Much similar to continuous monitoring of vital semilogarithmic, time-compressed scale. Several classifications are currently signs, bedside aEEG can help guide decision-making in real time in use to describe patient tracings, incorporating voltage criteria, pattern for infants admitted to the NICU. This article will review the recognition, cyclicity, and the presence or absence of seizures. In term history, classification and application of aEEG in both term and neonates, aEEG has been used to determine the prognosis and treatment for preterm infants. those affected by hypoxic–ischemic encephalopathy, seizures, meningitis and even congenital heart disease. Its application as inclusion criteria for therapeutic hypothermia remains controversial. In preterm infants, Background normative values and patterns corresponding to gestational age are being 2 established. As these standards emerge, the predictive value of aEEG Starting in the 1960s, Maynard et al., developed the first use of increases, especially in the setting of preterm brain injury and an instrument to study cerebral activity in resuscitated patients with intraventricular hemorrhage. -
Electroencephalography Source Connectivity: Toward High Time/Space Resolution Brain Networks
Electroencephalography source connectivity: toward high time/space resolution brain networks Hassan M.1, 2 and Wendling F.1, 2 1 University of Rennes 1, LTSI, F-35000 Rennes, France 2INSERM, U1099, F-35000 Rennes, France Abstract— The human brain is a large-scale network which function depends on dynamic interactions between spatially-distributed regions. In the rapidly-evolving field of network neuroscience, two yet unresolved challenges are potential breakthroughs. First, functional brain networks should be estimated from noninvasive and easy to use neuroimaging techniques. Second, the time/space resolution of these techniques should be high enough to assess the dynamics of identified networks. Emerging evidence suggests that Electroencephalography (EEG) source connectivity method may offer solutions to both issues provided that scalp EEG signals are appropriately processed. Therefore, the performance of EEG source connectivity method strongly depends on signal processing (SP) that involves various methods such as preprocessing techniques, inverse solutions, statistical couplings between signals and network science. The main objective of this tutorial-like review is to provide an overview on EEG source connectivity. We describe the major contributions that the SP community brought to this research field. We emphasize the methodological issues that need to be carefully addressed to obtain relevant results and we stress the current limitations that need further investigation. We also report results obtained in concrete applications, in both normal and pathological brain states. Future directions in term of signal processing methods and applications are eventually provided. Index Terms— EEG signal processing, functional brain networks, EEG source connectivity, statistical couplings, inverse solutions. 1 I. INTRODUCTION Over the past decades, neuroscience research has significantly improved our understanding of the normal brain.