scholarly journals A Method for Computerized Olfactory Assessment and Training Outside of Laboratory or Clinical Settings

i-Perception ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 204166952110239
Author(s):  
Simon Niedenthal ◽  
Johannes Nilsson ◽  
Teodor Jernsäther ◽  
David Cuartielles ◽  
Maria Larsson ◽  
...  

There are currently few ways to reliably and objectively assess olfaction outside of the research laboratory or clinic. The COVID-19 pandemic has highlighted the need for remote olfactory assessment; in particular, smell training at home is a promising method for olfactory rehabilitation, but further methodological advances might enhance its effectiveness and range of use. Here, we present Exerscent, a portable, low-cost olfactory display designed primarily for uses outside of the laboratory and that can be operated with a personal computer. Exerscent includes Radio Frequency Identification (RFID) tags that are attached to odor stimuli and read with a MFRC522 module RFID reader/antenna that encodes the odor in order to provide adaptive challenges for the user (e.g., an odor identification task). Hardware parts are commercially available or 3D printed. Instructions and code for building the Exerscent are freely available online ( https://osf.io/kwftm/ ). As a proof of concept, we present a case study in which a participant trained daily to identify 54 odors, improving from 81% to 96% accuracy over 16 consecutive days. In addition, results from a laboratory experiment with 11 volunteers indicated a very high level of perceived usability and engagement. Exerscent may be used for olfactory skills development (e.g., perfumery, enology), and rehabilitation purposes (e.g., postviral olfactory loss), but it also allows for other forms of technological interactions such as olfactory-based recreational interactions.

2020 ◽  
Author(s):  
Simon Niedenthal ◽  
Johannes Nilsson ◽  
Maria Larsson ◽  
Jonas Olofsson

There are currently few ways to reliably and objectively assess olfaction outside of the research laboratory or clinic. Smell training is a promising method for olfactory rehabilitation at home, but further methodological advances might enhance itseffectiveness and range of use. Here we present Exerscent, a portable, low-cost olfactory display designed primarily for uses outside of the laboratory and that can be operated witha personal computer. Exerscent includes RFID tags that are attached to odor stimuli using a sensor box that encodes the odor in order to provide adaptive challenges for the user(e.g. an odor identification task). Hardware parts are commercially available or 3D printed. Instructions and code for building the Exerscent is freely available online(https://osf.io/kwftm/). As a proof of concept, we present a case study in which a participant trained daily to identify 54 odors, improving from 81% to 96% accuracy over 16 consecutive days. Exerscent may be primarily used for olfactory skills development (e.g. perfumery, enology), and rehabilitation purposes (e.g. postviral olfactory loss), butit also allows for other forms of technological interactions such as olfactory-based recreational interactions. We discuss how Exerscent and similar methods might enablewidespread, networked olfactory research in a variety of settings, including homes, elder care facilities and schools.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4740
Author(s):  
Sergio Terranova ◽  
Filippo Costa ◽  
Giuliano Manara ◽  
Simone Genovesi

A new class of Radio Frequency IDentification (RFID) tags, namely the three-dimensional (3D)-printed chipless RFID one, is proposed, and their performance is assessed. These tags can be realized by low-cost materials, inexpensive manufacturing processes and can be mounted on metallic surfaces. The tag consists of a solid dielectric cylinder, which externally appears as homogeneous. However, the information is hidden in the inner structure of the object, where voids are created to encrypt information in the object. The proposed chipless tag represents a promising solution for anti-counterfeiting or security applications, since it avoids an unwanted eavesdropping during the reading process or information retrieval from a visual inspection that may affect other chipless systems. The adopted data-encoding algorithm does not rely on On–Off or amplitude schemes that are commonly adopted in the chipless RFID implementations but it is based on the maximization of available states or the maximization of non-overlapping regions of uncertainty. The performance of such class of chipless RFID tags are finally assessed by measurements on real prototypes.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
M. Akbari ◽  
H. He ◽  
J. Juuti ◽  
M. M. Tentzeris ◽  
J. Virkki ◽  
...  

This paper introduces 3D direct writing and microdispensing of graphene ultrahigh frequency (UHF) radio-frequency-identification (RFID) antennas on textile, wood, and cardboard substrates, subsequently cured either by conventional oven or photonically by pulsed Xenon flashes. Photonic-cured passive UHF RFID graphene tags on cardboard, wood, and textile substrates achieve read ranges of 5.4, 4.6, and 4 meters, respectively. These results are superior to those achieved by the oven-cured tags that featured read ranges of 4.8, 4.5, and 3.6 meters, respectively. This work presents the first integration of 3D printing and photonic curing of graphene antennas on low-cost versatile substrates.


2015 ◽  
Vol 2 (2) ◽  
pp. 86-96 ◽  
Author(s):  
M. Zomorrodi ◽  
N.C. Karmakar

The electromagnetic (EM) imaging technique at mm-band 60 GHz is proposed for data encoding purpose in the chipless Radio Frequency Identification (RFID) systems. The fully printable chipless RFID tag comprises tiny conductive EM polarizers to create high cross-polar radar cross-section. Synthetic aperture radar approach is applied for formation of the tag's EM-image and revealing the tag's content. The achieved high data encoding capacity of 2 bits/cm2in this technique based on a fully printable tag is very convincing for many applications. The system immunity to multipath interference, bending effect, and printing inaccuracy suggests huge potentials for low-cost item tagging. Tags are also readable through a tick paper envelop; hence secure identification is provided by the proposed technique.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3746 ◽  
Author(s):  
Antonio Lazaro ◽  
Ramon Villarino ◽  
David Girbau

In this article, an overview of recent advances in the field of battery-less near-field communication (NFC) sensors is provided, along with a brief comparison of other short-range radio-frequency identification (RFID) technologies. After reviewing power transfer using NFC, recommendations are made for the practical design of NFC-based tags and NFC readers. A list of commercial NFC integrated circuits with energy-harvesting capabilities is also provided. Finally, a survey of the state of the art in NFC-based sensors is presented, which demonstrates that a wide range of sensors (both chemical and physical) can be used with this technology. Particular interest arose in wearable sensors and cold-chain traceability applications. The availability of low-cost devices and the incorporation of NFC readers into most current mobile phones make NFC technology key to the development of green Internet of Things (IoT) applications.


IoT (Internet of Things) made headway from Machine to Machine communication without human intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26 times more connected things than people. Hence, the concern of security rises along with the high installments. The BlockChain Technology takes place of all central entities, which is peer to peer communication with the distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification) reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the previous block must match with the previous hash of the next block. Then only the blocks of data are secured. While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly offered by the blockchain technology and how can we easily identify if the data has been tampered along the way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets in this paper.


Sign in / Sign up

Export Citation Format

Share Document