scispace - formally typeset
Search or ask a question
Author

Paul J.M. Havinga

Bio: Paul J.M. Havinga is an academic researcher from University of Twente. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 49, co-authored 449 publications receiving 11299 citations. Previous affiliations of Paul J.M. Havinga include University College Dublin & ITC Enschede.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors provide a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks and present a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand.
Abstract: In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree.

738 citations

01 Jan 2004
TL;DR: An energy-efficient medium access protocol designed for wireless sensor networks that reduces the number of transceiver state switches and hence the energy wasted in preamble transmissions and is compared to SMAC and EMACs by simulation.
Abstract: In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The main goal of the medium access protocol is to minimize overhead of the physical layer. The protocol reduces the number of transceiver state switches and hence the energy wasted in preamble transmissions. The protocol is compared to SMAC and EMACs by simulation. The LMAC protocol is able to extend the network lifetime by a factor 2.4 and 3.8, compared to EMACs and SMAC respectively.

473 citations

Journal ArticleDOI
19 Jan 2015-Sensors
TL;DR: This paper reviews the studies done so far that implement activity recognition systems on mobile phones and use only their on-board sensors, and discusses their limitations and present various recommendations for future research.
Abstract: Physical activity recognition using embedded sensors has enabled many context-aware applications in different areas, such as healthcare Initially, one or more dedicated wearable sensors were used for such applications However, recently, many researchers started using mobile phones for this purpose, since these ubiquitous devices are equipped with various sensors, ranging from accelerometers to magnetic field sensors In most of the current studies, sensor data collected for activity recognition are analyzed offline using machine learning tools However, there is now a trend towards implementing activity recognition systems on these devices in an online manner, since modern mobile phones have become more powerful in terms of available resources, such as CPU, memory and battery The research on offline activity recognition has been reviewed in several earlier studies in detail However, work done on online activity recognition is still in its infancy and is yet to be reviewed In this paper, we review the studies done so far that implement activity recognition systems on mobile phones and use only their on-board sensors We discuss various aspects of these studies Moreover, we discuss their limitations and present various recommendations for future research

452 citations

Journal ArticleDOI
10 Jun 2014-Sensors
TL;DR: This paper explores how these various motion sensors behave in different situations in the activity recognition process, and shows that they are each capable of taking the lead roles individually, depending on the type of activity being recognized, the body position, the used data features and the classification method employed.
Abstract: For physical activity recognition, smartphone sensors, such as an accelerometer and a gyroscope, are being utilized in many research studies. So far, particularly, the accelerometer has been extensively studied. In a few recent studies, a combination of a gyroscope, a magnetometer (in a supporting role) and an accelerometer (in a lead role) has been used with the aim to improve the recognition performance. How and when are various motion sensors, which are available on a smartphone, best used for better recognition performance, either individually or in combination? This is yet to be explored. In order to investigate this question, in this paper, we explore how these various motion sensors behave in different situations in the activity recognition process. For this purpose, we designed a data collection experiment where ten participants performed seven different activities carrying smart phones at different positions. Based on the analysis of this data set, we show that these sensors, except the magnetometer, are each capable of taking the lead roles individually, depending on the type of activity being recognized, the body position, the used data features and the classification method employed (personalized or generalized). We also show that their combination only improves the overall recognition performance when their individual performances are not very high, so that there is room for performance improvement. We have made our data set and our data collection application publicly available, thereby making our experiments reproducible.

426 citations

Proceedings Article
01 Feb 2010
TL;DR: In this article, the authors present the main techniques utilized, their advantages and drawbacks, performance metrics and usage examples, and discuss the research challenges, such as user behavior and technical limitations, as well as the remaining open research questions.
Abstract: This paper surveys the current research directions of activity recognition using inertial sensors, with potential application in healthcare, wellbeing and sports The analysis of related work is organized according to the five main steps involved in the activity recognition process: preprocessing, segmentation, feature extraction, dimensionality reduction and classification For each step, we present the main techniques utilized, their advantages and drawbacks, performance metrics and usage examples We also discuss the research challenges, such as user behavior and technical limitations, as well as the remaining open research questions

406 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.

5,626 citations