MosquIoT: A System Based on IoT and Machine Learning for the Monitoring
of Aedes aegypti (Diptera: Culicidae)
- URL: http://arxiv.org/abs/2401.16258v1
- Date: Mon, 29 Jan 2024 16:08:18 GMT
- Title: MosquIoT: A System Based on IoT and Machine Learning for the Monitoring
of Aedes aegypti (Diptera: Culicidae)
- Authors: Javier Aira, Teresa Olivares Montes, Francisco M. Delicado, Dar\`io
Vezzani
- Abstract summary: This paper presents the design, development, and testing of an innovative system named MosquIoT.
Based on traditional ovitraps with embedded Internet of Things (IoT) and Tiny Machine Learning (TinyML) technologies, it enables the detection and quantification of Ae. aegypti eggs.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Millions of people around the world are infected with mosquito-borne diseases
each year. One of the most dangerous species is Aedes aegypti, the main vector
of viruses such as dengue, yellow fever, chikungunya, and Zika, among others.
Mosquito prevention and eradication campaigns are essential to avoid major
public health consequences. In this respect, entomological surveillance is an
important tool. At present, this traditional monitoring tool is executed
manually and requires digital transformation to help authorities make better
decisions, improve their planning efforts, speed up execution, and better
manage available resources. Therefore, new technological tools based on proven
techniques need to be designed and developed. However, such tools should also
be cost-effective, autonomous, reliable, and easy to implement, and should be
enabled by connectivity and multi-platform software applications. This paper
presents the design, development, and testing of an innovative system named
MosquIoT. It is based on traditional ovitraps with embedded Internet of Things
(IoT) and Tiny Machine Learning (TinyML) technologies, which enable the
detection and quantification of Ae. aegypti eggs. This innovative and promising
solution may help dynamically understand the behavior of Ae. aegypti
populations in cities, shifting from the current reactive entomological
monitoring model to a proactive and predictive digital one.
Related papers
- Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges [0.0]
The Internet of Things (IoT) is one of the fastest-growing computing industries.
Traditional malware detection methods are becoming ineffective against these new types of malware.
Machine Learning (ML) and Deep Learning (DL) approaches have proven effective in dealing with these new IoT malware variants.
arXiv Detail & Related papers (2024-10-14T19:04:43Z) - MultiIoT: Benchmarking Machine Learning for the Internet of Things [70.74131118309967]
The next generation of machine learning systems must be adept at perceiving and interacting with the physical world.
sensory data from motion, thermal, geolocation, depth, wireless signals, video, and audio are increasingly used to model the states of physical environments.
Existing efforts are often specialized to a single sensory modality or prediction task.
This paper proposes MultiIoT, the most expansive and unified IoT benchmark to date, encompassing over 1.15 million samples from 12 modalities and 8 real-world tasks.
arXiv Detail & Related papers (2023-11-10T18:13:08Z) - From Generative AI to Generative Internet of Things: Fundamentals,
Framework, and Outlooks [82.964958051535]
Generative Artificial Intelligence (GAI) possesses the capabilities of generating realistic data and facilitating advanced decision-making.
By integrating GAI into modern Internet of Things (IoT), Generative Internet of Things (GIoT) is emerging and holds immense potential to revolutionize various aspects of society.
arXiv Detail & Related papers (2023-10-27T02:58:11Z) - Elephants and Algorithms: A Review of the Current and Future Role of AI
in Elephant Monitoring [47.24825031148412]
Artificial intelligence (AI) and machine learning (ML) present revolutionary opportunities to enhance our understanding of animal behavior and conservation strategies.
Using elephants, a crucial species in Africa's protected areas, as our focal point, we delve into the role of AI and ML in their conservation.
New AI and ML techniques offer solutions to streamline this process, helping us extract vital information that might otherwise be overlooked.
arXiv Detail & Related papers (2023-06-23T22:35:51Z) - Acoustic Identification of Ae. aegypti Mosquitoes using Smartphone Apps
and Residual Convolutional Neural Networks [0.8808021343665321]
We advocate for smartphone apps as low-cost, easy-to-deploy solution for raising awareness among the population on the proliferation of Aedes aegypti mosquitoes.
devising such a smartphone app is challenging, for many reasons, including the required maturity level of techniques for identifying mosquitoes based on features that can be captured using smartphone resources.
arXiv Detail & Related papers (2023-06-16T13:41:01Z) - Safe AI for health and beyond -- Monitoring to transform a health
service [51.8524501805308]
We will assess the infrastructure required to monitor the outputs of a machine learning algorithm.
We will present two scenarios with examples of monitoring and updates of models.
arXiv Detail & Related papers (2023-03-02T17:27:45Z) - Machine Learning and Computer Vision Techniques in Continuous Beehive
Monitoring Applications: A survey [0.0]
We survey 50 existing papers focusing on the methods of automated beehive monitoring methods using the computer vision techniques.
This paper is aimed at veterinary and apidology professionals and experts, who might not be familiar with machine learning to introduce them to its possibilities.
We hope that this paper will inspire other scientists to use machine learning techniques for other applications in beehive monitoring.
arXiv Detail & Related papers (2022-07-29T21:56:59Z) - Survey of Machine Learning Based Intrusion Detection Methods for
Internet of Medical Things [2.223733768286313]
Internet of Medical Things (IoMT) represents an application of the Internet of Things.
The sensitive and private nature of this data may represent a prime interest for attackers.
The use of traditional security methods on equipment that is limited in terms of storage and computing capacity is ineffective.
arXiv Detail & Related papers (2022-02-19T18:40:55Z) - EEG-Based Brain-Computer Interfaces Are Vulnerable to Backdoor Attacks [68.01125081367428]
Recent studies have shown that machine learning algorithms are vulnerable to adversarial attacks.
This article proposes to use narrow period pulse for poisoning attack of EEG-based BCIs, which is implementable in practice and has never been considered before.
arXiv Detail & Related papers (2020-10-30T20:49:42Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z) - A Proposed IoT Smart Trap using Computer Vision for Sustainable Pest
Control in Coffee Culture [0.0]
The Internet of Things (IoT) is emerging as a multi-purpose technology with enormous potential for improving the quality of life in several areas.
In this paper, a smart trap with IoT capabilities that uses computer vision to identify the insect of interest is proposed.
The demonstration of proposed solution is exposed and the main conclusions are the perception about pest concentration at the plantation and the viability as alternative pest control over traditional control based on pesticides.
arXiv Detail & Related papers (2020-04-09T12:04:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.