-
Combinatorial Sample-and Back-Focal-Plane (BFP) Imaging. Pt. I: Instrument and acquisition parameters affecting BFP images and their analysis
Authors:
Omer Shavit,
Hervé Suaudeau,
Carine Julien,
Hodaya Klimovsky,
Natalia Mañas-Chavernas,
Adi Salomon,
Martin Oheim
Abstract:
The back-focal plane (BFP) of a high-numerical aperture objective contains the fluoro-phore radiation pattern, which encodes information about the axial fluorophore position, molecular orientation and the local refractive index of the embedding medium. BFP image acquisition and analysis are common to conoscopy, k-space imaging, supercritical-angle fluorescence (SAF) and single-molecule detection,…
▽ More
The back-focal plane (BFP) of a high-numerical aperture objective contains the fluoro-phore radiation pattern, which encodes information about the axial fluorophore position, molecular orientation and the local refractive index of the embedding medium. BFP image acquisition and analysis are common to conoscopy, k-space imaging, supercritical-angle fluorescence (SAF) and single-molecule detection, but they are rarely being used in biological fluorescence. This work addresses a critical gap in quantitative microscopy by enabling reliable, real-time BFP imaging under low-light conditions and/or short exposure times, typical of biological experiments. By systematically analyzing how key parameters - such as Bertrand lens position, defocus, pixel size, and binning - affect BFP image quality and SAF/UAF ratios, we provide a robust framework for accurate axial fluorophore localization and near-membrane refractive-index measurements. The described hardware- and software integration allows for multi-dimensional image-series and online quality control, reducing experimental error and enhancing reproducibility. Our contributions lay the foundation for standardized BFP imaging across laboratories, expanding its application to dynamic biological systems, and opening the door to machine learning-based analysis pipelines. Ultimately, this work transforms BFP imaging from an expert-dependent technique into a reproducible and scalable tool for surface-sensitive fluorescence microscopy.
△ Less
Submitted 19 May, 2025;
originally announced May 2025.
-
ML Mule: Mobile-Driven Context-Aware Collaborative Learning
Authors:
Haoxiang Yu,
Javier Berrocal,
Christine Julien
Abstract:
Artificial intelligence has been integrated into nearly every aspect of daily life, powering applications from object detection with computer vision to large language models for writing emails and compact models for use in smart homes. These machine learning models at times cater to the needs of individual users but are often detached from them, as they are typically stored and processed in centra…
▽ More
Artificial intelligence has been integrated into nearly every aspect of daily life, powering applications from object detection with computer vision to large language models for writing emails and compact models for use in smart homes. These machine learning models at times cater to the needs of individual users but are often detached from them, as they are typically stored and processed in centralized data centers. This centralized approach raises privacy concerns, incurs high infrastructure costs, and struggles to provide real time, personalized experiences. Federated and fully decentralized learning methods have been proposed to address these issues, but they still depend on centralized servers or face slow convergence due to communication constraints. We propose ML Mule, an approach that utilizes individual mobile devices as 'mules' to train and transport model snapshots as the mules move through physical spaces, sharing these models with the physical 'spaces' the mules inhabit. This method implicitly forms affinity groups among devices associated with users who share particular spaces, enabling collaborative model evolution and protecting users' privacy. Our approach addresses several major shortcomings of traditional, federated, and fully decentralized learning systems. ML Mule represents a new class of machine learning methods that are more robust, distributed, and personalized, bringing the field closer to realizing the original vision of intelligent, adaptive, and genuinely context-aware smart environments. Our results show that ML Mule converges faster and achieves higher model accuracy compared to other existing methods.
△ Less
Submitted 28 March, 2025; v1 submitted 13 January, 2025;
originally announced January 2025.
-
Thoughtful Things: Building Human-Centric Smart Devices with Small Language Models
Authors:
Evan King,
Haoxiang Yu,
Sahil Vartak,
Jenna Jacob,
Sangsu Lee,
Christine Julien
Abstract:
Everyday devices like light bulbs and kitchen appliances are now embedded with so many features and automated behaviors that they have become complicated to actually use. While such "smart" capabilities can better support users' goals, the task of learning the "ins and outs" of different devices is daunting. Voice assistants aim to solve this problem by providing a natural language interface to de…
▽ More
Everyday devices like light bulbs and kitchen appliances are now embedded with so many features and automated behaviors that they have become complicated to actually use. While such "smart" capabilities can better support users' goals, the task of learning the "ins and outs" of different devices is daunting. Voice assistants aim to solve this problem by providing a natural language interface to devices, yet such assistants cannot understand loosely-constrained commands, they lack the ability to reason about and explain devices' behaviors to users, and they rely on connectivity to intrusive cloud infrastructure. Toward addressing these issues, we propose thoughtful things: devices that leverage lightweight, on-device language models to take actions and explain their behaviors in response to unconstrained user commands. We propose an end-to-end framework that leverages formal modeling, automated training data synthesis, and generative language models to create devices that are both capable and thoughtful in the presence of unconstrained user goals and inquiries. Our framework requires no labeled data and can be deployed on-device, with no cloud dependency. We implement two thoughtful things (a lamp and a thermostat) and deploy them on real hardware, evaluating their practical performance.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
What's in People's Digital File Collections?
Authors:
Jesse David Dinneen,
Charles-Antoine Julien
Abstract:
Thoughtfully designing services and rigorously testing software to support personal information management (PIM) requires understanding the relevant collections, but relatively little is known about what people keep in their file collections, especially personal collections. Complementing recent work on the structure of 348 file collections, we examine those collections' contents, how much content…
▽ More
Thoughtfully designing services and rigorously testing software to support personal information management (PIM) requires understanding the relevant collections, but relatively little is known about what people keep in their file collections, especially personal collections. Complementing recent work on the structure of 348 file collections, we examine those collections' contents, how much content is duplicated, and how collections used for personal matters differ from those used for study and work. Though all collections contain many images, some intuitively common file types are surprisingly scarce. Personal collections contain more audio than others, knowledge workers' collections contain more text documents but far fewer folders, and IT collections exhibit unusual traits. Collection duplication is correlated to collections' structural traits, but surprisingly, not to collection age. We discuss our findings in light of prior works and provide implications for various kinds of information research.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Cheating off your neighbors: Improving activity recognition through corroboration
Authors:
Haoxiang Yu,
Jingyi An,
Evan King,
Edison Thomaz,
Christine Julien
Abstract:
Understanding the complexity of human activities solely through an individual's data can be challenging. However, in many situations, surrounding individuals are likely performing similar activities, while existing human activity recognition approaches focus almost exclusively on individual measurements and largely ignore the context of the activity. Consider two activities: attending a small grou…
▽ More
Understanding the complexity of human activities solely through an individual's data can be challenging. However, in many situations, surrounding individuals are likely performing similar activities, while existing human activity recognition approaches focus almost exclusively on individual measurements and largely ignore the context of the activity. Consider two activities: attending a small group meeting and working at an office desk. From solely an individual's perspective, it can be difficult to differentiate between these activities as they may appear very similar, even though they are markedly different. Yet, by observing others nearby, it can be possible to distinguish between these activities. In this paper, we propose an approach to enhance the prediction accuracy of an individual's activities by incorporating insights from surrounding individuals. We have collected a real-world dataset from 20 participants with over 58 hours of data including activities such as attending lectures, having meetings, working in the office, and eating together. Compared to observing a single person in isolation, our proposed approach significantly improves accuracy. We regard this work as a first step in collaborative activity recognition, opening new possibilities for understanding human activity in group settings.
△ Less
Submitted 27 May, 2023;
originally announced June 2023.
-
Sasha: Creative Goal-Oriented Reasoning in Smart Homes with Large Language Models
Authors:
Evan King,
Haoxiang Yu,
Sangsu Lee,
Christine Julien
Abstract:
Smart home assistants function best when user commands are direct and well-specified (e.g., "turn on the kitchen light"), or when a hard-coded routine specifies the response. In more natural communication, however, human speech is unconstrained, often describing goals (e.g., "make it cozy in here" or "help me save energy") rather than indicating specific target devices and actions to take on those…
▽ More
Smart home assistants function best when user commands are direct and well-specified (e.g., "turn on the kitchen light"), or when a hard-coded routine specifies the response. In more natural communication, however, human speech is unconstrained, often describing goals (e.g., "make it cozy in here" or "help me save energy") rather than indicating specific target devices and actions to take on those devices. Current systems fail to understand these under-specified commands since they cannot reason about devices and settings as they relate to human situations. We introduce large language models (LLMs) to this problem space, exploring their use for controlling devices and creating automation routines in response to under-specified user commands in smart homes. We empirically study the baseline quality and failure modes of LLM-created action plans with a survey of age-diverse users. We find that LLMs can reason creatively to achieve challenging goals, but they experience patterns of failure that diminish their usefulness. We address these gaps with Sasha, a smarter smart home assistant. Sasha responds to loosely-constrained commands like "make it cozy" or "help me sleep better" by executing plans to achieve user goals, e.g., setting a mood with available devices, or devising automation routines. We implement and evaluate Sasha in a hands-on user study, showing the capabilities and limitations of LLM-driven smart homes when faced with unconstrained user-generated scenarios.
△ Less
Submitted 25 January, 2024; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Characterization of real-analytic infinitesimal CR automorphisms for a class of hypersurfaces in $\Bbb C^4.$
Authors:
Cyril Julien,
Francine Meylan
Abstract:
In this paper, motivated by the work of Kim and Kolar for the case of pseudoconvex models which are sums of squares of polynomials, we study the Lie algebra of real-analytic infinitesimal $CR$ automorphisms of a model hypersurface $M_0$ given by \begin{equation}
M_0= \{(z,w) \in \mathbb C^{3} \times \mathbb C \ | \ \Im w= P\bar Q + Q\bar P + R\bar R \}, \end{equation} where $P,$ $Q$ and $R$ are…
▽ More
In this paper, motivated by the work of Kim and Kolar for the case of pseudoconvex models which are sums of squares of polynomials, we study the Lie algebra of real-analytic infinitesimal $CR$ automorphisms of a model hypersurface $M_0$ given by \begin{equation}
M_0= \{(z,w) \in \mathbb C^{3} \times \mathbb C \ | \ \Im w= P\bar Q + Q\bar P + R\bar R \}, \end{equation} where $P,$ $Q$ and $R$ are homogeneous polynomials. In particular, we classify $M_0$ with respect to the description of its nilpotent rotations when $P,$ $Q$ and $R$ are monomials. We also give an example of a model $M_0$ for which the real dimension of its generalized (exotic) rotations is $3.$
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
iDML: Incentivized Decentralized Machine Learning
Authors:
Haoxiang Yu,
Hsiao-Yuan Chen,
Sangsu Lee,
Sriram Vishwanath,
Xi Zheng,
Christine Julien
Abstract:
With the rising emergence of decentralized and opportunistic approaches to machine learning, end devices are increasingly tasked with training deep learning models on-devices using crowd-sourced data that they collect themselves. These approaches are desirable from a resource consumption perspective and also from a privacy preservation perspective. When the devices benefit directly from the traine…
▽ More
With the rising emergence of decentralized and opportunistic approaches to machine learning, end devices are increasingly tasked with training deep learning models on-devices using crowd-sourced data that they collect themselves. These approaches are desirable from a resource consumption perspective and also from a privacy preservation perspective. When the devices benefit directly from the trained models, the incentives are implicit - contributing devices' resources are incentivized by the availability of the higher-accuracy model that results from collaboration. However, explicit incentive mechanisms must be provided when end-user devices are asked to contribute their resources (e.g., computation, communication, and data) to a task performed primarily for the benefit of others, e.g., training a model for a task that a neighbor device needs but the device owner is uninterested in. In this project, we propose a novel blockchain-based incentive mechanism for completely decentralized and opportunistic learning architectures. We leverage a smart contract not only for providing explicit incentives to end devices to participate in decentralized learning but also to create a fully decentralized mechanism to inspect and reflect on the behavior of the learning architecture.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
"Get ready for a party": Exploring smarter smart spaces with help from large language models
Authors:
Evan King,
Haoxiang Yu,
Sangsu Lee,
Christine Julien
Abstract:
The right response to someone who says "get ready for a party" is deeply influenced by meaning and context. For a smart home assistant (e.g., Google Home), the ideal response might be to survey the available devices in the home and change their state to create a festive atmosphere. Current practical systems cannot service such requests since they require the ability to (1) infer meaning behind an…
▽ More
The right response to someone who says "get ready for a party" is deeply influenced by meaning and context. For a smart home assistant (e.g., Google Home), the ideal response might be to survey the available devices in the home and change their state to create a festive atmosphere. Current practical systems cannot service such requests since they require the ability to (1) infer meaning behind an abstract statement and (2) map that inference to a concrete course of action appropriate for the context (e.g., changing the settings of specific devices). In this paper, we leverage the observation that recent task-agnostic large language models (LLMs) like GPT-3 embody a vast amount of cross-domain, sometimes unpredictable contextual knowledge that existing rule-based home assistant systems lack, which can make them powerful tools for inferring user intent and generating appropriate context-dependent responses during smart home interactions. We first explore the feasibility of a system that places an LLM at the center of command inference and action planning, showing that LLMs have the capacity to infer intent behind vague, context-dependent commands like "get ready for a party" and respond with concrete, machine-parseable instructions that can be used to control smart devices. We furthermore demonstrate a proof-of-concept implementation that puts an LLM in control of real devices, showing its ability to infer intent and change device state appropriately with no fine-tuning or task-specific training. Our work hints at the promise of LLM-driven systems for context-awareness in smart environments, motivating future research in this area.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Guidelines for Artifacts to Support Industry-Relevant Research on Self-Adaptation
Authors:
Danny Weyns,
Ilias Gerostathopoulos,
Barbora Buhnova,
Nicolas Cardozo,
Emilia Cioroaica,
Ivana Dusparic,
Lars Grunske,
Pooyan Jamshidi,
Christine Julien,
Judith Michael,
Gabriel Moreno,
Shiva Nejati,
Patrizio Pelliccione,
Federico Quin,
Genaina Rodrigues,
Bradley Schmerl,
Marco Vieira,
Thomas Vogel,
Rebekka Wohlrab
Abstract:
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevan…
▽ More
Artifacts support evaluating new research results and help comparing them with the state of the art in a field of interest. Over the past years, several artifacts have been introduced to support research in the field of self-adaptive systems. While these artifacts have shown their value, it is not clear to what extent these artifacts support research on problems in self-adaptation that are relevant to industry. This paper provides a set of guidelines for artifacts that aim at supporting industry-relevant research on self-adaptation. The guidelines that are grounded on data obtained from a survey with practitioners were derived during working sessions at the 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Artifact providers can use the guidelines for aligning future artifacts with industry needs; they can also be used to evaluate the industrial relevance of existing artifacts. We also propose an artifact template.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Dataset: Analysis of IFTTT Recipes to Study How Humans Use Internet-of-Things (IoT) Devices
Authors:
Haoxiang Yu,
Jie Hua,
Christine Julien
Abstract:
With the rapid development and usage of Internet-of-Things (IoT) and smart-home devices, researchers continue efforts to improve the "smartness" of those devices to address daily needs in people's lives. Such efforts usually begin with understanding evolving user behaviors on how humans utilize the devices and what they expect in terms of their behavior. However, while research efforts abound, the…
▽ More
With the rapid development and usage of Internet-of-Things (IoT) and smart-home devices, researchers continue efforts to improve the "smartness" of those devices to address daily needs in people's lives. Such efforts usually begin with understanding evolving user behaviors on how humans utilize the devices and what they expect in terms of their behavior. However, while research efforts abound, there is a very limited number of datasets that researchers can use to both understand how people use IoT devices and to evaluate algorithms or systems for smart spaces. In this paper, we collect and characterize more than 50,000 recipes from the online If-This-Then-That (IFTTT) service to understand a seemingly straightforward but complicated question: "What kinds of behaviors do humans expect from their IoT devices?"
△ Less
Submitted 30 September, 2021;
originally announced October 2021.
-
Library of Congress Subject Heading (LCSH) Browsing and Natural Language Searching
Authors:
Charles-Antoine Julien,
Banafsheh Asadi,
Jesse David Dinneen,
Fei Shu
Abstract:
Controlled topical vocabularies (CVs) are built into information systems to aid browsing and retrieval of items that may be unfamiliar, but it is unclear how this feature should be integrated with standard keyword searching. Few systems or scholarly prototypes have attempted this, and none have used the most widely used CV, the Library of Congress Subject Headings (LCSH), which organizes monograph…
▽ More
Controlled topical vocabularies (CVs) are built into information systems to aid browsing and retrieval of items that may be unfamiliar, but it is unclear how this feature should be integrated with standard keyword searching. Few systems or scholarly prototypes have attempted this, and none have used the most widely used CV, the Library of Congress Subject Headings (LCSH), which organizes monograph collections in academic libraries throughout the world. This paper describes a working prototype of a Web application that concurrently allows topic exploration using an outline tree view of the LCSH hierarchy and natural language keyword searching of a real-world Science and Engineering bibliographic collection. Pilot testing shows the system is functional, and work to fit the complex LCSH structure into a usable hierarchy is ongoing. This study contributes to knowledge of the practical design decisions required when developing linked interactions between topical hierarchy browsing and natural language searching, which promise to facilitate information discovery and exploration.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
The ubiquitous digital file: A review of file management research
Authors:
Jesse David Dinneen,
Charles-Antoine Julien
Abstract:
Computer users spend time every day interacting with digital files and folders, including downloading, moving, naming, navigating to, searching for, sharing, and deleting them. Such file management has been the focus of many studies across various fields, but has not been explicitly acknowledged nor made the focus of dedicated review. In this article we present the first dedicated review of this t…
▽ More
Computer users spend time every day interacting with digital files and folders, including downloading, moving, naming, navigating to, searching for, sharing, and deleting them. Such file management has been the focus of many studies across various fields, but has not been explicitly acknowledged nor made the focus of dedicated review. In this article we present the first dedicated review of this topic and its research, synthesizing more than 230 publications from various research domains to establish what is known and what remains to be investigated, particularly by examining the common motivations, methods, and findings evinced by the previously furcate body of work. We find three typical research motivations in the literature reviewed: understanding how and why users store, organize, retrieve, and share files and folders, understanding factors that determine their behavior, and attempting to improve the user experience through novel interfaces and information services. Relevant conceptual frameworks and approaches to designing and testing systems are described, and open research challenges and the significance for other research areas are discussed. We conclude that file management is a ubiquitous, challenging, and relatively unsupported activity that invites and has received attention from several disciplines and has broad importance for topics across information science.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Personal Data Gentrification
Authors:
Juan Luis Herrera,
Javier Berrocal,
Jose Garcia-Alonso,
Juan Manuel Murillo,
Hsiao-Yuan Chen,
Christine Julien,
Niko Mäkitalo,
Tommi Mikkonen
Abstract:
We live in an era in which the most valued services are not paid for in money, but in personal data. Every day, service providers collect the personal information of billions of individuals, information that sustain their infrastructure by marketing profiles labeled with this information to personal data consumers, such as advertisers. Not all uses of this personal data are for marketing; data con…
▽ More
We live in an era in which the most valued services are not paid for in money, but in personal data. Every day, service providers collect the personal information of billions of individuals, information that sustain their infrastructure by marketing profiles labeled with this information to personal data consumers, such as advertisers. Not all uses of this personal data are for marketing; data consumers can also include, for instance, public health authorities tracking pandemics. In either case, individuals have undergone a process of Personal Data Gentrification, as data ownership has shifted from individuals to service providers and data consumers, as if the data is worth nothing to the individuals; these new owners then harness the data to obtain large profits. Current privacy-enhancing technologies are beginning to allow individuals to control and share less information. However, not sharing individuals' personal information at all could lead to Personal Data Blight, in which the potential of personal data in applications that benefit all of society remains forever latent. In this paper, we propose Personal Data Enfranchisement as a middle ground, empowering individuals to control the sharing of their personal information to shift the business flows of personal information. Based on these insights, we propose a model to gradually and incrementally make a shift from our current situation towards one of Personal Data Enfranchisement. Finally, we present a roadmap and some challenges towards achieving this bold vision.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
Opportunistic Federated Learning: An Exploration of Egocentric Collaboration for Pervasive Computing Applications
Authors:
Sangsu Lee,
Xi Zheng,
Jie Hua,
Haris Vikalo,
Christine Julien
Abstract:
Pervasive computing applications commonly involve user's personal smartphones collecting data to influence application behavior. Applications are often backed by models that learn from the user's experiences to provide personalized and responsive behavior. While models are often pre-trained on massive datasets, federated learning has gained attention for its ability to train globally shared models…
▽ More
Pervasive computing applications commonly involve user's personal smartphones collecting data to influence application behavior. Applications are often backed by models that learn from the user's experiences to provide personalized and responsive behavior. While models are often pre-trained on massive datasets, federated learning has gained attention for its ability to train globally shared models on users' private data without requiring the users to share their data directly. However, federated learning requires devices to collaborate via a central server, under the assumption that all users desire to learn the same model. We define a new approach, opportunistic federated learning, in which individual devices belonging to different users seek to learn robust models that are personalized to their user's own experiences. However, instead of learning in isolation, these models opportunistically incorporate the learned experiences of other devices they encounter opportunistically. In this paper, we explore the feasibility and limits of such an approach, culminating in a framework that supports encounter-based pairwise collaborative learning. The use of our opportunistic encounter-based learning amplifies the performance of personalized learning while resisting overfitting to encountered data.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Multi-Modal Data Collection for Measuring Health, Behavior, and Living Environment of Large-Scale Participant Cohorts: Conceptual Framework and Findings from Deployments
Authors:
Congyu Wu,
Hagen Fritz,
Zoltan Nagy,
Juan P. Maestre,
Edison Thomaz,
Christine Julien,
Darla M. Castelli,
Kaya de Barbaro,
Gabriella M. Harari,
R. Cameron Craddock,
Kerry A. Kinney,
Samuel D. Gosling,
David M. Schnyer
Abstract:
As mobile technologies become ever more sensor-rich, portable, and ubiquitous, data captured by smart devices are lending rich insights into users' daily lives with unprecedented comprehensiveness, unobtrusiveness, and ecological validity. A number of human-subject studies have been conducted in the past decade to examine the use of mobile sensing to uncover individual behavioral patterns and heal…
▽ More
As mobile technologies become ever more sensor-rich, portable, and ubiquitous, data captured by smart devices are lending rich insights into users' daily lives with unprecedented comprehensiveness, unobtrusiveness, and ecological validity. A number of human-subject studies have been conducted in the past decade to examine the use of mobile sensing to uncover individual behavioral patterns and health outcomes. While understanding health and behavior is the focus for most of these studies, we find that minimal attention has been placed on measuring personal environments, especially together with other human-centric data modalities. Moreover, the participant cohort size in most existing studies falls well below a few hundred, leaving questions open about the reliability of findings on the relations between mobile sensing signals and human outcomes. To address these limitations, we developed a home environment sensor kit for continuous indoor air quality tracking and deployed it in conjunction with established mobile sensing and experience sampling techniques in a cohort study of up to 1584 student participants per data type for 3 weeks at a major research university in the United States. In this paper, we begin by proposing a conceptual framework that systematically organizes human-centric data modalities by their temporal coverage and spatial freedom. Then we report our study design and procedure, technologies and methods deployed, descriptive statistics of the collected data, and results from our extensive exploratory analyses. Our novel data, conceptual development, and analytical findings provide important guidance for data collection and hypothesis generation in future human-centric sensing studies.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
WS2-QDs Decorated RGO Lattice on e-textile: Development of Ultrasensitive Wearable Quantum Thermometer
Authors:
Abid,
Poonam Sehrawat,
C. M. Julien,
S. S. Islam
Abstract:
We report the fabrication and human trial of a novel wearable temperature sensor based on WS2-QDs/RGO; which performs instant measurement like thermometer in a wide temperature range: 77K-398 K, in both static- and instant mode. The device is simple, scalable, flexible and cost-effective, where nanoscience and technology played a vital role behind its concept and realization. The WS2-QDs/RGO heter…
▽ More
We report the fabrication and human trial of a novel wearable temperature sensor based on WS2-QDs/RGO; which performs instant measurement like thermometer in a wide temperature range: 77K-398 K, in both static- and instant mode. The device is simple, scalable, flexible and cost-effective, where nanoscience and technology played a vital role behind its concept and realization. The WS2-QDs/RGO heterostructure is developed by decorating WS2-QDs on pre-RGO coated cotton textile. In static mode, the crucial parameters such as temperature coefficient of resistance (TCR) and thermal hysteresis (Hth) were analyzed in depth to get the intricate mechanism behind the working of a temperature sensor; and check its worthiness to be a better candidate in the field of temperature sensor. Temperature sensing data at both high- and low temperatures are very much encouraging; and endorses its viability. Human trial is conducted to make reliable and hassle free temperature monitoring like thermometer where the sensor device is found capable to measure accurate body temperature with exceptional resolution i.e. the minimum change in temperature the device can measure is ~0.06K in addition to, fast response- and recovery time ~1.4 s and 1.7 s respectively. In every sense, the developed sensor has exhibited highest degree of superiority vis-a-vis its counterpart commercial thermometer used in healthcare. Besides, the device has passed through all deformation test successfully and proved its mettle. This sensor device proved its flexibility and stability under various mechanical deformation(s), showing its promising potential for future generation wearable health monitoring devices. To the best of our knowledge, this is the first report on WS2 in general, and WS2-QDs, in specific, based temperature sensing device and its operational demonstration as of now.
△ Less
Submitted 6 September, 2020;
originally announced September 2020.
-
rIoT: Enabling Seamless Context-Aware Automation in the Internet of Things
Authors:
Jie Hua,
Chenguang Liu,
Tomasz Kalbarczyk,
Catherine Wright,
Gruia-Catalin Roman,
Christine Julien
Abstract:
Advances in mobile computing capabilities and an increasing number of Internet of Things (IoT) devices have enriched the possibilities of the IoT but have also increased the cognitive load required of IoT users. Existing context-aware systems provide various levels of automation in the IoT. Many of these systems adaptively take decisions on how to provide services based on assumptions made a prior…
▽ More
Advances in mobile computing capabilities and an increasing number of Internet of Things (IoT) devices have enriched the possibilities of the IoT but have also increased the cognitive load required of IoT users. Existing context-aware systems provide various levels of automation in the IoT. Many of these systems adaptively take decisions on how to provide services based on assumptions made a priori. The approaches are difficult to personalize to an individual's dynamic environment, and thus today's smart IoT spaces often demand complex and specialized interactions with the user in order to provide tailored services. We propose rIoT, a framework for seamless and personalized automation of human-device interaction in the IoT. rIoT leverages existing technologies to operate across heterogeneous devices and networks to provide a one-stop solution for device interaction in the IoT. We show how rIoT exploits similarities between contexts and employs a decision-tree like method to adaptively capture a user's preferences from a small number of interactions with the IoT space. We measure the performance of rIoT on two real-world data sets and a real mobile device in terms of accuracy, learning speed, and latency in comparison to two state-of-the-art machine learning algorithms.
△ Less
Submitted 3 February, 2020; v1 submitted 31 October, 2019;
originally announced November 2019.
-
Does the Web of Science Accurately Represent Chinese Scientific Performance?
Authors:
Fei Shu,
Charles-Antoine Julien,
Vincent Lariviere
Abstract:
The purpose of this study is to compare Web of Science (WoS) with a Chinese bibliometric database in terms of authors and their performance, demonstrate the extent of the overlap between the two groups of Chinese most productive authors in both international and Chinese bibliometric databases, and determine how different disciplines may affect this overlap. The results of this study indicate that…
▽ More
The purpose of this study is to compare Web of Science (WoS) with a Chinese bibliometric database in terms of authors and their performance, demonstrate the extent of the overlap between the two groups of Chinese most productive authors in both international and Chinese bibliometric databases, and determine how different disciplines may affect this overlap. The results of this study indicate that Chinese bibliometric databases, or a combination of WoS and Chinese bibliometric databases, should be used to evaluate Chinese research performance except in few disciplines in which Chinese research performance could be assessed using WoS only.
△ Less
Submitted 9 December, 2018;
originally announced December 2018.
-
Nonlinear Viscoelastic Modeling of Adhesive Failure for Polyacrylate Pressure-Sensitive Adhesives
Authors:
Chopin Julien,
Villey Richard,
Yarusso David,
Barthel Etienne,
Creton Costantino,
Ciccotti Matteo
Abstract:
We investigate experimentally the adherence energy $Γ$ of model polyacrylate Pressure Sensitive Adhesives (PSAs) with combined large strain rheological measurements in uniaxial extension and an instrumented peel test. We develop a nonlinear model for such peel test which captures the dependence of $Γ(V)$ with peeling rate $V$ revealing the key role played by the extensional rheology. Our model exp…
▽ More
We investigate experimentally the adherence energy $Γ$ of model polyacrylate Pressure Sensitive Adhesives (PSAs) with combined large strain rheological measurements in uniaxial extension and an instrumented peel test. We develop a nonlinear model for such peel test which captures the dependence of $Γ(V)$ with peeling rate $V$ revealing the key role played by the extensional rheology. Our model explains in particular why traditional linear viscoelastic approaches correctly predict the slope of $Γ(V)$ curves for sufficiently elastic PSAs characterized by a simple rate-independent debonding criterion. However, for more viscoelastic adhesives, we identified a more complex rate-dependent debonding criterion yielding a significant modification of the $Γ(V)$ curves, an effect that has been largely overlooked so far. This investigation opens the way towards the understanding of fibrils debonding, which is the main missing block to predict the adherence of PSAs.
△ Less
Submitted 30 July, 2018;
originally announced July 2018.
-
Corner singularities and shape of stretched elastic sheets
Authors:
Chopin Julien,
Panaitescu Andreea,
Kudrolli Arshad
Abstract:
We investigate the deformation of a longitudinally stretched rectangular sheet which is clamped at two opposite boundaries and free otherwise with experiments, numerical analysis and asymptotic analysis of the biharmonic elastic equation governing their planar equilibrium configurations. The displacement field of the sheet is measured by tracking embedded fluorescent tracers with a digital image c…
▽ More
We investigate the deformation of a longitudinally stretched rectangular sheet which is clamped at two opposite boundaries and free otherwise with experiments, numerical analysis and asymptotic analysis of the biharmonic elastic equation governing their planar equilibrium configurations. The displacement field of the sheet is measured by tracking embedded fluorescent tracers with a digital image correlation (DIC) technique. The experiments and numerical finite element analysis (FEA) are found to be in overall good agreement except at the very corners where large deformations occur. We find that the deformed sheet can be broadly divided into a uniaxially stretched central region and two clamp dominated side regions. A subregion characterized by a diverging stress can be identified at each of the four clamped-free corners within the clamp dominated region. We postulate that the divergence at the corners is regularized by nonlinear elastic deformations occurring in this subregion at the very corners and provide a nontrivial scaling for its size. Within the intermediate corner dominated subregion, measured displacements grow with distance $r$ from the corners as $r^α$, with power $α< 1$ consistent with the development of stress singularities at the intersection of the free and clamped edges.
△ Less
Submitted 30 July, 2018;
originally announced July 2018.
-
Depinning dynamics of crack fronts
Authors:
Chopin Julien,
Bhaskar Aditya,
Jog Atharv,
Ponson Laurent
Abstract:
We investigate experimentally and theoretically the dynamics of a crack front during the micro-instabilities taking place in heterogeneous materials between two successive equilibrium positions. We focus specifically on the spatio-temporal evolution of the front, as it relaxes to a straight configuration, after depinning from a single obstacle of controlled strength and size. We show that this dep…
▽ More
We investigate experimentally and theoretically the dynamics of a crack front during the micro-instabilities taking place in heterogeneous materials between two successive equilibrium positions. We focus specifically on the spatio-temporal evolution of the front, as it relaxes to a straight configuration, after depinning from a single obstacle of controlled strength and size. We show that this depinning dynamics is not controlled by inertia, but instead, by the rate dependency of the dissipative mechanisms taking place within the fracture process zone. This implies that the crack speed fluctuations around its average value $v_m$ can be predicted from an overdamped equation of motion $(v-v_m)/v_0 = (G-G_c(v_m))/G_c(v_m)$ involving the characteristic material speed $v_0 = G_c(v_m)/G_c'(v_m)$ that emerges from the variation of fracture energy with crack speed. Our findings pave the way to a quantitative description of the critical depinning dynamics of cracks in disordered solids and open up new perspectives for the prediction of the effective failure properties of heterogeneous materials.
△ Less
Submitted 30 July, 2018;
originally announced July 2018.
-
Saturated Fully Leafed Tree-Like Polyforms and Polycubes
Authors:
Blondin Massé Alexandre,
de Carufel Julien,
Goupil Alain
Abstract:
We present recursive formulas giving the maximal number of leaves in tree-like polyforms living in two-dimensional regular lattices and in tree-like polycubes in the three-dimensional cubic lattice.
We call these tree-like polyforms and polycubes \emph{fully leafed}.
The proof relies on a combinatorial algorithm that enumerates rooted directed trees that we call abundant.
In the last part, w…
▽ More
We present recursive formulas giving the maximal number of leaves in tree-like polyforms living in two-dimensional regular lattices and in tree-like polycubes in the three-dimensional cubic lattice.
We call these tree-like polyforms and polycubes \emph{fully leafed}.
The proof relies on a combinatorial algorithm that enumerates rooted directed trees that we call abundant.
In the last part, we concentrate on the particular case of polyforms and polycubes, that we call \emph{saturated}, which is the family of fully leafed structures that maximize the ratio
$\mbox{(number of leaves)}/\mbox{ (number of cells)}$.
In the polyomino case, we present a bijection between the set of saturated tree-like polyominoes of size $4k+1$ and the set of tree-like polyominoes of size $k$.
We exhibit a similar bijection between the set of saturated tree-like polycubes of size $41k+28$ and a family of polycubes, called $4$-trees, of size $3k+2$.
△ Less
Submitted 24 March, 2018;
originally announced March 2018.
-
PACO: A System-Level Abstraction for On-Loading Contextual Data to Mobile Devices
Authors:
Nathaniel Wendt,
Christine Julien
Abstract:
Spatiotemporal context is crucial in modern mobile applications that utilize increasing amounts of context to better predict events and user behaviors, requiring rich records of users' or devices' spatiotemporal histories. Maintaining these rich histories requires frequent sampling and indexed storage of spatiotemporal data that pushes the limits of resource-constrained mobile devices. Today's app…
▽ More
Spatiotemporal context is crucial in modern mobile applications that utilize increasing amounts of context to better predict events and user behaviors, requiring rich records of users' or devices' spatiotemporal histories. Maintaining these rich histories requires frequent sampling and indexed storage of spatiotemporal data that pushes the limits of resource-constrained mobile devices. Today's apps offload processing and storing contextual information, but this increases response time, often relies on the user's data connection, and runs the very real risk of revealing sensitive information. In this paper we motivate the feasibility of on-loading large amounts of context and introduce PACO (Programming Abstraction for Contextual On-loading), an architecture for on-loading data that optimizes for location and time while allowing flexibility in storing additional context. The PACO API's innovations enable on-loading very dense traces of information, even given devices' resource constraints. Using real-world traces and our implementation for Android, we demonstrate that PACO can support expressive application queries entirely on-device. Our quantitative evaluation assesses PACO's energy consumption, execution time, and spatiotemporal query accuracy. Further, PACO facilitates unified contextual reasoning across multiple applications and also supports user-controlled release of contextual data to other devices or the cloud; we demonstrate these assets through a proof-of-concept case study.
△ Less
Submitted 9 March, 2017;
originally announced March 2017.