請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/73162
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 吳安宇 | |
dc.contributor.author | Ching-Yao Chou | en |
dc.contributor.author | 周敬堯 | zh_TW |
dc.date.accessioned | 2021-06-17T07:20:19Z | - |
dc.date.available | 2024-07-17 | |
dc.date.copyright | 2019-07-17 | |
dc.date.issued | 2019 | |
dc.date.submitted | 2019-07-05 | |
dc.identifier.citation | [1] F. Touati and R. Tabish, “U-healthcare system: State-of-the-art review and challenges,” Journal of medical systems, vol. 37, no. 3, p. 9949, 2013.
[2] A. Pantelopoulos and N. G. Bourbakis, “A survey on wearable sensor-based systems for health monitoring and prognosis,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 40, no. 1, pp. 1–12, 2010. [3] H. C. Koh, G. Tan et al., “Data mining applications in healthcare,” Journal of healthcare information management, vol. 19, no. 2, p. 65, 2011. [4] N. Lavrac, E. Keravnou, and B. Zupan, “Intelligent data analysis in medicine,” Encyclopedia of computer science and technology, vol. 42, no. 9, pp. 113–157, 2000. [5] N. Barakat, A. P. Bradley, and M. N. H. Barakat, “Intelligible support vector machines for diagnosis of diabetes mellitus,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 4, pp. 1114–1120, 2010. [6] C. Wen, M.-F. Yeh, K.-C. Chang, and R.-G. Lee, “Real-time ecg telemonitoring system design with mobile phone platform,” Measurement, vol. 41, no. 4, pp. 463–470, 2008. [7] S. M. S. Jalaleddine, C. G. Hutchens, R. D. Strattan, and W. A. Coberly, “Ecg data compression techniques-a unified approach,” IEEE Transactions on Biomedical Engineering, vol. 37, no. 4, pp. 329–343, 1990. [8] M. L. Hilton, “Wavelet and wavelet packet compression of electrocardiograms,” IEEE Transactions on Biomedical Engineering, vol. 44, no. 5, pp. 394–402, 1997. [9] D. L. Donoho, “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1289–1306, 2006. [10] R. G. Baraniuk, “Compressive sensing [lecture notes],” IEEE Signal Processing Magazine, vol. 24, no. 4, pp. 118–121, 2007. [11] H. Mamaghanian, N. Khaled, D. Atienza, and P. Vandergheynst, “Compressed sensing for real-time energy-efficient ecg compression on wireless body sensor nodes,” IEEE Transactions on Biomedical Engineering, vol. 58, no. 9, pp. 2456–2466, 2011. [12] A. M. R. Dixon, E. G. Allstot, D. Gangopadhyay, and D. J. Allstot, “Compressed sensing system considerations for ecg and emg wireless biosensors,” IEEE Transactions on Biomedical Circuits and Systems, vol. 6, no. 2, pp. 156–166, 2012. [13] W. Shi and S. Dustdar, “The promise of edge computing,” Computer, vol. 49, no. 5, pp. 78–81, 2016. [14] M. A. T. Figueiredo, R. D. Nowak, and S. J. Wright, “Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems,” IEEE Journal of Selected Topics in Signal Processing, vol. 1, no. 4, pp. 586–597, 2007. [15] M. Zoni-Berisso, F. Lercari, T. Carazza, and S. Domenicucci, “Epidemiology of atrial fibrillation: European perspective,” Clinical epidemiology, vol. 6, p. 213, 2014. [16] F. Ren and D. Marković, “A configurable 12–237 ks/s 12.8 mw sparseapproximation engine for mobile data aggregation of compressively sampled physiological signals,” IEEE Journal of Solid-State Circuits, vol. 51, no. 1, pp. 68–78, 2016. [17] Y. Lin, Y. Chen, N. Huang, and A. Wu, “Low-complexity stochastic gradient pursuit algorithm and architecture for robust compressive sensing reconstruction,” IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 638–650, 2017. [18] T. Chen, H. Kuo, and A. Wu, “A 232–1996-ks/s robust compressive sensing reconstruction engine for real-time physiological signals monitoring,” IEEE Journal of Solid-State ircuits, vol. 54, no. 1, pp. 307–317, 2019. [19] Y. Chen, T. Krishna, J. S. Emer, and V. Sze, “Eyeriss: An energy-efficient reconfigurable accelerator for deep convolutional neural networks,” IEEE Journal of SolidState Circuits, vol. 52, no. 1, pp. 127–138, 2017. [20] S. Yin, P. Ouyang, S. Tang, F. Tu, X. Li, S. Zheng, T. Lu, J. Gu, L. Liu, and S. Wei, “A high energy efficient reconfigurable hybrid neural network processor for deep learning pplications,” IEEE Journal of Solid-State Circuits, vol. 53, no. 4, pp. 968–982, 2018. [21] H. Kuo, Y. Lin, and A. Wu, “Compressive sensing based ecg monitoring with effective af detection,” IEEE International Conference on Acoustics, Speech and Signal Processing (CASSP), pp. 1008–1012, 2017. [22] I. Ramirez, P. Sprechmann, and G. Sapiro, “Classification and clustering via dictionary learning with structured incoherence and shared features,” IEEE Computer Society onference on Computer Vision and Pattern Recognition (CVPR), pp. 3501–3508, 2010. [23] S. Kong and D. Wang, “A dictionary learning approach for classification: separating the particularity and the commonality,” European conference on computer vision (ECCV), pp. 86–199, 2012. [24] T. H. Vu and V. Monga, “Fast low-rank shared dictionary learning for image classification,” IEEE Transactions on Image Processing, vol. 26, no. 11, pp. 5160–5175, 2017. [25] R. Calderbank, S. Jafarpour, and R. Schapire, “Compressed learning: Universal sparse dimensionality reduction and learning in the measurement domain,” preprint, 2009. [26] O. Maillard and R. Munos, “Compressed least-squares regression,” Advances in Neural Information Processing Systems (NIPS), pp. 1213–1221, 2009. [27] R. Durrant and A. Kabán, “Sharp generalization error bounds for randomly-projected classifiers,” International Conference on Machine Learning (ICML), pp. 693–701, 2013. [28] A. Kabán, “New bounds on compressive linear least squares regression,” Artificial Intelligence and Statistics, pp. 448–456, 2014. [29] M. Shoaib, N. K. Jha, and N. Verma, “Signal processing with direct computations on compressively sensed data,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, ol. 23, no. 1, pp. 30–43, 2015. [30] K. Kulkarni and P. Turaga, “Reconstruction-free action inference from compressive imagers,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, no. 4, pp. 72–784, 2016. [31] S. Lohit, K. Kulkarni, and P. Turaga, “Direct inference on compressive measurements using convolutional neural networks,” IEEE International Conference on Image Processing (ICIP), pp. 1913–1917, 2016. [32] M. Tsai, C. Chou, and A. Wu, “Robust compressed analysis using subspace-based dictionary for ecg telemonitoring systems,” IEEE International Workshop on Signal Processing ystems (SiPS), pp. 1–5, 2017. [33] C. Chou, E. Chang, H. Li, and A. Wu, “Low-complexity privacy-preserving compressive analysis using subspace-based dictionary for ecg telemonitoring system,” IEEE Transactions on Biomedical Circuits and Systems, vol. 12, no. 4, pp. 801–811, 2018. [34] C. Chou and A. Wu, “Low-complexity compressive analysis in sub-eigenspace for ecg telemonitoring system,” IEEE International Conference on Acoustics, Speech and Signal rocessing (ICASSP), pp. 7575–7579, 2019. [35] C. Wang, B. Zhang, K. Ren, J. M. Roveda, C. W. Chen, and Z. Xu, “A privacyaware cloud-assisted healthcare monitoring system via compressive sensing,” IEEE Conference on Computer Communications, pp. 2130–2138, 2014. [36] A. M. Abdulghani and E. Rodriguez-Villegas, “Compressive sensing: From “compressing while sampling” to “compressing and securing while sampling”,” International Conference of the IEEE Engineering in Medicine and Biology, pp. 1127–1130, 2010. [37] V. Cambareri, J. Haboba, F. Pareschi, H. R. Rovatti, G. Setti, and K. Wong, “A two-class information concealing system based on compressed sensing,” IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1356–1359, 2013. [38] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “Low-complexity multiclass encryption by compressed sensing,” IEEE Transactions on Signal Processing, vol. 63, no. 9, pp. 2183–2195, 2015. [39] T. P. Jose and Deepthi P. P, “Secure sensor node design for ecg in body area network,” IEEE Region 10 Conference (TENCON), pp. 2957–2961, 2016. [40] R. Dautov and G. R. Tsouri, “Securing while sampling in wireless body area networks with application to electrocardiography,” IEEE Journal of Biomedical and Health Informatics, vol. 20, no. 1, pp. 135–142, 2016. [41] Y. Rachlin and D. Baron, “The secrecy of compressed sensing measurements,” Annual Allerton Conference on Communication, Control, and Computing, pp. 813–817, 2008. [42] Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust management for internet of things,” Journal of network and computer applications, vol. 42, pp. 120–134, 2014. [43] E. J. Candes and T. Tao, “Near-optimal signal recovery from random projections: Universal encoding strategies?” IEEE Transactions on Information Theory, vol. 52, no. 12, pp. 5406–5425, 2006. [44] J. A. Tropp and A. C. Gilbert, “Signal recovery from random measurements via orthogonal matching pursuit,” IEEE Transactions on Information Theory, vol. 53, no. 12, pp. 4655–4666, 2007. [45] W. Dai and O. Milenkovic, “Subspace pursuit for compressive sensing signal reconstruction,” IEEE Transactions on Information Theory, vol. 55, no. 5, pp. 2230–2249, 2009. [46] A. Beck and M. Teboulle, “A fast iterative shrinkage-thresholding algorithm for linear inverse problems,” SIAM journal on imaging sciences, vol. 2, no. 1, pp. 183–202, 2009. [47] K. Engan, S. O. Aase, and J. H. Husoy, “Frame based signal compression using method of optimal directions (mod),” Proceedings of the IEEE International Symposium on Circuits and Systems VLSI, vol. 4, pp. 1–4, 1999. [48] M. Aharon, M. Elad, and A. Bruckstein, “K-svd: An algorithm for designing overcomplete dictionaries for sparse representation,” IEEE Transactions on Signal Processing, vol. 54, no. 11, pp. 4311–4322, 2006. [49] J. Mairal, F. Bach, J. Ponce, and G. Sapiro, “Online learning for matrix factorization and sparse coding,” Journal of Machine Learning Research, vol. 11, no. Jan, pp.19–60, 2010. [50] J. Mairal, F. Bach, and J. Ponce, “Task-driven dictionary learning,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 4, pp. 791–804, 2012. [51] K. Hsu, B. Cho, C. Chou, and A. Wu, “Low-complexity compressed analysis in eigenspace with limited labeled data for real-time electrocardiography telemonitoring,” IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 459–463, 2018. [52] I. Jolliffe, Principal component analysis, 2002. [53] X. He and P. Niyogi, “Locality preserving projections,” Advances in neural information processing systems, pp. 153–160, 2004. [54] M. Belkin and P. Niyogi, “Laplacian eigenmaps for dimensionality reduction and data representation,” Neural computation, vol. 15, no. 6, pp. 1373–1396, 2003. [55] S. Dasgupta and A. Gupta, “An elementary proof of a theorem of johnson and lindenstrauss,” Random Structures & Algorithms, vol. 22, no. 1, pp. 60–65, 2003. [56] L. F. Polanía, R. E. Carrillo, M. Blanco-Velasco, and K. E. Barner, “Exploiting prior knowledge in compressed sensing wireless ecg systems,” IEEE Journal of Biomedical and Health Informatics, vol. 19, no. 2, pp. 508–519, 2015. [57] D. H. Chae, Y. F. Alem, S. Durrani, and R. A. Kennedy, “Performance study of compressive sampling for ecg signal compression in noisy and varying sparsity acquisition,” IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1306–1309, 2013. [58] A. Mishra, F. Thakkar, C. Modi, and R. Kher, “Ecg signal compression using compressive sensing and wavelet transform,” International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 3404–3407, 2012. [59] L. F. Polania and K. E. Barner, “Multi-scale dictionary learning for compressive sensing ecg,” IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), pp. 36–41, 2013. [60] A. Singh and S. Dandapat, “Distributed compressive sensing for multichannel ecg signals over learned dictionaries,” IEEE India Conference (INDICON), pp. 1–6, 2014. [61] B. Krishnapuram, L. Carin, M. A. T. Figueiredo, and A. J. Hartemink, “Sparse multinomial logistic regression: fast algorithms and generalization bounds,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 6, pp. 957–968, 2005. [62] J. Yang, Z. Wang, Z. Lin, S. Cohen, and T. Huang, “Coupled dictionary training for image super-resolution,” IEEE Transactions on Image Processing, vol. 21, no. 8, pp.3467–3478, 2012. [63] D.-A. Huang and Y.-C. Frank Wang, “Coupled dictionary and feature space learning with applications to cross-domain image synthesis and recognition,” Proceedings of the IEEE international conference on computer vision (ICCV), pp. 2496–2503, 2013. [64] C.-C. Chang and C.-J. Lin, “Libsvm: A library for support vector machines,” ACM transactions on intelligent systems and technology (TIST), vol. 2, no. 3, p. 27, 2011, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. [65] Y. Zigel, A. Cohen, and A. Katz, “The weighted diagnostic distortion (wdd) measure for ecg signal compression,” IEEE Transactions on Biomedical Engineering, vol. 47, no. 11, pp. 1422–1430, 2000. [66] J. K. Baksalary and O. M. Baksalary, “Particular formulae for the moore-penrose inverse of a columnwise partitioned matrix,” Linear algebra and its applications, vol. 421, no. 1, pp. 16–23, 2007. [67] V. Markides and R. J. Schilling, “Atrial fibrillation: classification, pathophysiology, mechanisms and drug treatment,” Heart, vol. 89, no. 8, pp. 939–943, 2003. [68] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “On known-plaintext attacks to a compressed sensing-based encryption: A quantitative analysis,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2182–2195, 2015. [69] D. Agrawal and C. C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms,” Proceedings of the twentieth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems, pp. 247–255, 2001. [70] C. E. Shannon, “Communication theory of secrecy systems,” Bell system technical journal, vol. 28, no. 4, pp. 656–715, 1949. [71] A. Kraskov, H. Stögbauer, and P. Grassberger, “Estimating mutual information,” Physical review E, vol. 69, no. 6, p. 066138, 2004. [72] Z. Szabó, “Information theoretical estimators toolbox,” The Journal of Machine Learning Research, vol. 15, no. 1, pp. 283–287, 2014. [73] H. Toutounji and G. Pipa, “Spatiotemporal computations of an excitable and plastic brain: neuronal plasticity leads to noise-robust and noise-constructive computations,” PLoS computational biology, vol. 10, no. 3, p. e1003512, 2014. [74] J. L. V. M. Stanislaus and T. Mohsenin, “High performance compressive sensing reconstruction hardware with qrd process,” IEEE International Symposium on Circuits and Systems (ISCAS), pp. 29–32, 2012. [75] H. Rabah, A. Amira, B. K. Mohanty, S. Almaadeed, and P. K. Meher, “Fpga implementation of orthogonal matching pursuit for compressive sensing reconstruction,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 10, pp. 2209–2220, 2015. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/73162 | - |
dc.description.abstract | Long-term health-care monitoring, especially outside the hospital setting, offers great potential to substantially improve patient health, quality of life and outcomes. This potential depends on two aspects: 1) the ability to acquire signals that are informative with respect to patient stage; and 2) the ability to make relevant inference from such signals. Since the electrocardiography (ECG) signal recorded from the electrical activity of the heart over a period of time has been utilized for diagnosis for many diseases, the ECG monitoring is recognized as a promising technique to realize telemedicine.
As wireless wearable physiological sensor nodes are known to be resource-limited, it is a crucial problem to reduce the signal acquisition on these sensing system and enhance the energy efficiency of data transmission. Compressed Sensing (CS) is a revolutionary technology combining both sampling and compression through random projection, which enables sub-Nyquist sampling and low-energy data reduction, resulting in life-time extension of the sensor node. Moreover, health monitoring has emphasized the need for edge computing, leveraging the benefits of analyzing real-time data, without the bandwidth costs that come with sending the data offsite (i.e., to the cloud or the data center). Although CS has successfully enhanced the ability to acquire signals, the low-complexity data analytic for the compressed signals should be explored due to resource-constrained edge device. Nevertheless, the prior CS frameworks encounter two main challenges as follow. On the one hand, although the reconstruction can be extremely energy-intensive and time-consuming; in most cases, we only want to analyze the problematic physiological signals. However, the compressed signals are reconstructed before classification in reconstructed learning. Hence, large efforts are wasted in recovering uninterested (or normal) signals which are far more than interested (or high-risk) signals. On the other hand, the availability and transfer of personal information has also posed great concerns for potential privacy leakage. To make the transmitted data useful only for the intended utility but not easily repurposed into privacy intrusion, the concept of Privacy-Preserving Data Mining (PPDM) has recently been proposed. Unfortunately, there is no CS-based PPDM which makes the encrypted compressed signals able to be classified but unable to be reconstructed. To overcome the aforementioned challenges, this dissertation presents compressed learning based on information splitting concept. On the one hand, to eliminate the abundant cost of recovering irrelevant data, a low-complexity two-stage classification-aided reconstruction (TS-CAR) framework is proposed. TS-CAR can not only directly classify the compressed signals, but also accelerate the speed of on-demand reconstruction by using the discriminative information in classification. Furthermore, we design the hardware architecture for TS-CAR algorithm. The proposed intelligent CS reconstruction engine is implemented in TSMC 40 nm CMOS technology. On the other hand, to achieve CS-based PPDM, a low-complexity privacy-preserving compressed analysis (PPCA) framework is proposed. The encryption and decoding protocol in PPCA only retains the discriminative information for classification; therefore, the system can achieve higher privacy without sacrificing the data usage. In summary, this dissertation focuses on low-complexity analyzing CS measurement in edge computing for future intelligent and secured wireless health-care monitoring. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T07:20:19Z (GMT). No. of bitstreams: 1 ntu-108-F03943134-1.pdf: 14314539 bytes, checksum: a2dc73cbab0211b539178585a45e6992 (MD5) Previous issue date: 2019 | en |
dc.description.tableofcontents | 誌謝 (vii)
摘要 (ix) Abstract (xi) 1 Introduction (1) 1.1 Background (1) 1.1.1 Wireless Healthcare with Machine Learning (1) 1.1.2 Compressed Sensing Based Monitoring System (2) 1.1.3 Edge Computing (4) 1.2 On-demand Reconstruction for Problematic Signals (7) 1.2.1 Design Challenges (7) 1.2.2 Research Contributions (8) 1.3 Privacy-Preserving Compressed Analysis (10) 1.3.1 Design Challenges (10) 1.3.2 Research Contributions (10) 1.4 Dissertation Organization (12) 2 Review of CS Related Frameworks (13) 2.1 Mathematical Preliminaries (13) 2.2 Challenges of CS Related Frameworks for On-demand Reconstruction (17) 2.3 Challenges of Prior CS-based Security Frameworks (19) 2.4 Information Splitting Concept (21) 2.5 Summary (22) 3 On-demand Reconstruction for Problematic CS Signals (23) 3.1 Proposed Two-Stage Classification-Aided Reconstruction Framework (23) 3.1.1 Classification: Compressed Learning-TDDL (24) 3.1.2 Reconstruction: Classification-Aided Reconstruction (30) 3.2 Numerical Experiments & Analysis of Computational Complexity (36) 3.2.1 Experimental Settings (36) 3.2.2 Evaluation of TS-CAR Framework (37) 3.2.3 Comparison of Sparse Coding Computation Algorithms (42) 3.3 Summary (43) 4 Architecture Design and VLSI Implementation of Intelligent CS Chip (45) 4.1 Hardware Implementation Reasons for Choosing FISTA (46) 4.2 Hardware Sharing Architecture (46) 4.3 Data Path of Each Step in Execution Flow (48) 4.4 Fixed-Point Analysis (51) 4.5 Implementation Results & Comparisons (55) 4.6 Summary (57) 5 Privacy-Preserving Compressed Analysis (59) 5.1 Proposed Privacy-Preserving Compressed Analysis Framework (59) 5.1.1 Off-line Stage: Subspace-Based Dictionary Learning (59) 5.1.2 On-line Stage: Encryption & Decoding Protocol (67) 5.2 Experimental Settings and Evaluation Metrics (73) 5.2.1 Experimental Settings (73) 5.2.2 Size Determination of Subspace-Based Dictionary (74) 5.2.3 Computational Secrecy Under Known-Plaintext Attack (75) 5.2.4 Privacy Metric (76) 5.3 Experimental Results and Discussion (77) 5.3.1 Performance Evaluation (77) 5.3.2 Analysis of Computational Complexity (79) 5.4 Summary (80) 6 Conclusions (81) 6.1 Design Achievements (81) 6.2 Future Works (84) A Appendix (87) A.1 Prerequisite of Representation With the Help of DR (87) Bibliography (89) | |
dc.language.iso | zh-TW | |
dc.title | 低複雜度之壓縮域學習用於即時無線醫療監控 | zh_TW |
dc.title | Low-Complexity Compressed Learning for Real-time Wireless Healthcare Monitoring | en |
dc.type | Thesis | |
dc.date.schoolyear | 107-2 | |
dc.description.degree | 博士 | |
dc.contributor.oralexamcommittee | 陳彥光,簡韶逸,盧奕璋,李宏毅,黃元豪 | |
dc.subject.keyword | 壓縮感知,壓縮學習, | zh_TW |
dc.subject.keyword | Compressed Sensing,Compressed Learning, | en |
dc.relation.page | 99 | |
dc.identifier.doi | 10.6342/NTU201901257 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2019-07-08 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電子工程學研究所 | zh_TW |
顯示於系所單位: | 電子工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-108-1.pdf 目前未授權公開取用 | 13.98 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。