skip to main content
research-article
Public Access

On Exploiting Structured Human Interactions to Enhance Sensing Accuracy in Cyber-physical Systems

Authors Info & Claims
Published:24 July 2017Publication History
Skip Abstract Section

Abstract

In this article, we describe a general methodology for enhancing sensing accuracy in cyber-physical systems that involve structured human interactions in noisy physical environment. We define structured human interactions as domain-specific workflow. A novel workflow-aware sensing model is proposed to jointly correct unreliable sensor data and keep track of states in a workflow. We also propose a new inference algorithm to handle cases with partially known states and objects as supervision. Our model is evaluated with extensive simulations. As a concrete application, we develop a novel log service called Emergency Transcriber, which can automatically document operational procedures followed by teams of first responders in emergency response scenarios. Evaluation shows that our system has significant improvement over commercial off-the-shelf (COTS) sensors and keeps track of workflow states with high accuracy in noisy physical environment.

References

  1. Artin Avanes and Johann-Christoph Freytag. 2008. Adaptive workflow scheduling under resource allocation constraints and network dynamics. Proc. VLDB Endow. 1, 2 (2008), 1631--1637.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Xu Cheng, Ji Xu, Jian Pei, and Jiangchuan Liu. 2010. Hierarchical distributed data classification in wireless sensor networks. Comput. Commun. 33, 12 (2010), 1404--1413. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Martin Cooke, Phil Green, Ljubomir Josifovski, and Ascension Vizinho. 2001. Robust automatic speech recognition with missing and unreliable acoustic data. Speech Commun. 34, 3 (2001), 267--285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. eSpeak. 2016. Speech Synthesizer (2016). Retrieved from http://espeak.sourceforge.net/.Google ScholarGoogle Scholar
  5. EvolveMed. 2016. TalkChart (2016). Retrieved from https://www.talkchart.com/.Google ScholarGoogle Scholar
  6. Mark Gales and Steve Young. 2008. The application of hidden Markov models in speech recognition. Found. Trends Sign. Process. 1, 3 (2008), 195--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Google. 2016. Google Speech API (2016). Retrieved from https://www.google.com/intl/en/chrome/demos/ speech.html.Google ScholarGoogle Scholar
  8. Biing Hwang Juang and Laurence R. Rabiner. 1991. Hidden markov models for speech recognition. Technometrics 33, 3 (1991), 251--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michael Kastner, Mohamed Wagdy Saleh, Stefan Wagner, Michael Affenzeller, and Witold Jacak. 2009. Heuristic methods for searching and clustering hierarchical workflows. In Proceedings of the Conference on Computer Aided Systems Theory (EUROCAST’09). Springer, 737--744. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Insup Lee and Oleg Sokolsky. 2010. Medical cyber physical systems. In Proceedings of the 47th Design Automation Conference. ACM, 743--748. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mark S. Link, Lauren C. Berkow, Peter J. Kudenchuk, Henry R. Halperin, Erik P. Hess, Vivek K. Moitra, Robert W. Neumar, Brian J. O’Neil, James H. Paxton, Scott M. Silvers, et al. 2015. Part 7: Adult advanced cardiovascular life support 2015 american heart association guidelines update for cardiopulmonary resuscitation and emergency cardiovascular care. Circulation 132, 18 suppl. 2 (2015), S444--S464. Google ScholarGoogle ScholarCross RefCross Ref
  12. Richard P. Lippmann. 1997. Speech recognition by machines and humans. Speech Commun. 22, 1 (1997), 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gonzalo Navarro. 2001. A guided tour to approximate string matching. ACM Comput. Surveys (CSUR) 33, 1 (2001), 31--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Nuance. 2016. Dragon Medical Speech Recognition Retrieved from http://www.nuance.com/for-healthcare/dragon-medical/index.htm.Google ScholarGoogle Scholar
  15. Lawrence R. Rabiner. 1989. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77, 2 (1989), 257--286. Google ScholarGoogle ScholarCross RefCross Ref
  16. Lu Su, Jing Gao, Yong Yang, Tarek F. Abdelzaher, Bolin Ding, and Jiawei Han. 2011. Hierarchical aggregate classification with limited supervision for data reduction in wireless sensor networks. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems. ACM, 40--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lu Su, Shaohan Hu, Shen Li, Feng Liang, Jing Gao, Tarek F. Abdelzaher, and Jiawei Han. 2012. Quality of information based data selection and transmission in wireless sensor networks. In Proceedings of the 33rd IEEE Real-Time Systems Symposium (RTSS’12). IEEE, 327--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Carolyn Talcott. 2008. Cyber-physical systems and events. In Software-Intensive Systems and New Computing Paradigms. Springer, 101--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Steve Young. 2008. HMMs and related speech recognition technologies. In Springer Handbook of Speech Processing. Springer, 539--558. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. On Exploiting Structured Human Interactions to Enhance Sensing Accuracy in Cyber-physical Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Cyber-Physical Systems
      ACM Transactions on Cyber-Physical Systems  Volume 1, Issue 3
      July 2017
      91 pages
      ISSN:2378-962X
      EISSN:2378-9638
      DOI:10.1145/3068423
      • Editor:
      • Tei-Wei Kuo
      Issue’s Table of Contents

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 July 2017
      • Revised: 1 March 2017
      • Accepted: 1 March 2017
      • Received: 1 May 2016
      Published in tcps Volume 1, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader