首页 > 最新文献

2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Design of a Therapeutic Crane with Rehabilitation Monitoring for Patients with Reduced Mobility 行动不便患者康复监测治疗起重机的设计
Lenin Mendoza, R. Bastidas, Valeryia Perez, Jaime Huaytalla, Deyby Huamanchahua
The present investigation has designed a therapeutic crane that helps patients who have lower body problems. As an alternative to the lack of equipment for physical rehabilitation, which leads to the reincorporation of people with reduced mobility to their activities of daily life, the objective proposed to solve the problem is the design and construction of a therapeutic crane with a system to monitor the rehabilitation process. The design and the solution were carried out based on the needs presented by the clinical areas in the implementation of rehabilitation technology that facilitates and promotes a better therapeutic process for patients. In addition, this therapeutic crane has functional duality, it is used for gait training with the support of the bodyweight that allows walking upright; as well as helping patients with cognitive impairment in the standing process; also, it has two vertical curved rails that help support the feet with hand restraints and offers a safe and functional environment, lifting a maximum weight of 180 kg of mass and a height of up to 1.95 m. The solution focuses on the construction of a square tube structure that forms an arch, has a handrail for holding the patient offering firmness and stability; providing the security of a device of reliability and easy handling; since it only requires an operator to monitor the process and an accessible environment for commissioning.
本研究设计了一种治疗起重机,以帮助有下半身问题的患者。由于缺乏物理康复设备,导致行动不便的人重新融入日常生活活动,因此提出的解决问题的目标是设计和建造一种治疗起重机,该起重机带有监测康复过程的系统。设计和解决方案是基于临床领域在实施康复技术方面提出的需求,以促进和促进患者更好的治疗过程。此外,这种治疗起重机具有功能双重性,它用于步态训练与支持的体重,允许直立行走;以及在站立过程中帮助认知障碍患者;此外,它有两个垂直弯曲的轨道,帮助支持脚和手约束,提供一个安全和功能的环境,提升最大重量180公斤的质量和高达1.95米的高度。解决方案的重点是建造一个方形管结构,形成一个拱门,有一个扶手,以保持病人的坚固和稳定;提供了安全可靠、操作方便的设备;因为它只需要操作员监控过程和可访问的调试环境。
{"title":"Design of a Therapeutic Crane with Rehabilitation Monitoring for Patients with Reduced Mobility","authors":"Lenin Mendoza, R. Bastidas, Valeryia Perez, Jaime Huaytalla, Deyby Huamanchahua","doi":"10.1109/UEMCON53757.2021.9666643","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666643","url":null,"abstract":"The present investigation has designed a therapeutic crane that helps patients who have lower body problems. As an alternative to the lack of equipment for physical rehabilitation, which leads to the reincorporation of people with reduced mobility to their activities of daily life, the objective proposed to solve the problem is the design and construction of a therapeutic crane with a system to monitor the rehabilitation process. The design and the solution were carried out based on the needs presented by the clinical areas in the implementation of rehabilitation technology that facilitates and promotes a better therapeutic process for patients. In addition, this therapeutic crane has functional duality, it is used for gait training with the support of the bodyweight that allows walking upright; as well as helping patients with cognitive impairment in the standing process; also, it has two vertical curved rails that help support the feet with hand restraints and offers a safe and functional environment, lifting a maximum weight of 180 kg of mass and a height of up to 1.95 m. The solution focuses on the construction of a square tube structure that forms an arch, has a handrail for holding the patient offering firmness and stability; providing the security of a device of reliability and easy handling; since it only requires an operator to monitor the process and an accessible environment for commissioning.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Identification of Student’s Cognitive Style from Online Laboratory Experimentation using Machine Learning Techniques 利用机器学习技术从在线实验室实验中自动识别学生认知风格
A. Yousef, Ayman Atia, Amira Youssef, Noha A. Saad Eldien, A. Hamdy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy
Online learning has emerged as powerful learning methods for the transformation from traditional education to open learning through smart learning platforms due to Covid-19 pandemic. Despite its effectiveness, many studies have indicated the necessity of linking online learning methods with the cognitive learning styles of students. The level of students always improves if the teaching methods and educational interventions are appropriate to the cognitive style of each student individually. Currently, psychological measures are used to assess students’ cognitive styles, but about the application in virtual environment, the matter becomes complicated. The main goal of this study is to provide an efficient solution based on machine learning techniques to automatically identify the students’ cognitive styles by analyzing their mouse interaction behaviors while carrying out online laboratory experiments. This will help in the design of an effective online laboratory experimentation system that is able to individualize the experiment instructions and feedback according to the identified cognitive style of each student. The results reveal that the KNN and SVM classifiers have a good accuracy in predicting most cognitive learning styles. In comparison to KNN, the enlarged studies ensemble the KNN, linear regression, neural network, and SVM reveal a 13% increase in overall total RMS error. We believe that this finding will enable educators and policy makers to predict distinct cognitive types in the assessment of students when they interact with online experiments. We believe that integrating deep learning algorithms with a greater emphasis on mouse location traces will improve the accuracy of our classifiers’ predictions.
由于新冠肺炎疫情,在线学习成为通过智能学习平台从传统教育向开放学习转变的有力学习方式。尽管其有效性,但许多研究表明,将在线学习方法与学生的认知学习风格联系起来是必要的。如果教学方法和教育干预措施适合每个学生的个体认知风格,学生的水平就会得到提高。目前,对学生认知风格的评价多采用心理测量方法,但在虚拟环境中的应用,问题就变得复杂起来。本研究的主要目标是提供一种基于机器学习技术的有效解决方案,通过分析学生在进行在线实验室实验时的鼠标交互行为来自动识别学生的认知风格。这将有助于设计一个有效的在线实验室实验系统,该系统能够根据每个学生识别的认知风格个性化实验指导和反馈。结果表明,KNN和SVM分类器在预测大多数认知学习风格方面都有较好的准确性。与KNN相比,扩大的研究集成了KNN、线性回归、神经网络和支持向量机,结果显示,总均方根误差增加了13%。我们相信,这一发现将使教育工作者和政策制定者能够预测学生在与在线实验互动时的不同认知类型。我们相信,将深度学习算法与更强调鼠标位置痕迹的集成将提高分类器预测的准确性。
{"title":"Automatic Identification of Student’s Cognitive Style from Online Laboratory Experimentation using Machine Learning Techniques","authors":"A. Yousef, Ayman Atia, Amira Youssef, Noha A. Saad Eldien, A. Hamdy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy","doi":"10.1109/UEMCON53757.2021.9666516","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666516","url":null,"abstract":"Online learning has emerged as powerful learning methods for the transformation from traditional education to open learning through smart learning platforms due to Covid-19 pandemic. Despite its effectiveness, many studies have indicated the necessity of linking online learning methods with the cognitive learning styles of students. The level of students always improves if the teaching methods and educational interventions are appropriate to the cognitive style of each student individually. Currently, psychological measures are used to assess students’ cognitive styles, but about the application in virtual environment, the matter becomes complicated. The main goal of this study is to provide an efficient solution based on machine learning techniques to automatically identify the students’ cognitive styles by analyzing their mouse interaction behaviors while carrying out online laboratory experiments. This will help in the design of an effective online laboratory experimentation system that is able to individualize the experiment instructions and feedback according to the identified cognitive style of each student. The results reveal that the KNN and SVM classifiers have a good accuracy in predicting most cognitive learning styles. In comparison to KNN, the enlarged studies ensemble the KNN, linear regression, neural network, and SVM reveal a 13% increase in overall total RMS error. We believe that this finding will enable educators and policy makers to predict distinct cognitive types in the assessment of students when they interact with online experiments. We believe that integrating deep learning algorithms with a greater emphasis on mouse location traces will improve the accuracy of our classifiers’ predictions.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
COVID-19 Contact Tracing Using BLE and RFID for Data Protection and Integrity 利用BLE和RFID进行COVID-19接触者追踪以实现数据保护和完整性
Harish Anantharajah, K. Harika, Andrew Jayasinghe, Michal Aibin
Responding to the rapid spread of the COVID-19 virus, the need for contact tracing and self-isolation has become the focus of many health experts and governments as being the primary option for containing the spread of the disease. The utilization of the smartphone has been the focus of many efforts by creating mobile applications that harness the potential of GPS and BLE technologies to make contact tracing as efficient and effective as possible. The prevailing issue with this system is the concern of privacy and data protection of app users. In order to address this problem, through this paper, we are suggesting the use of passive RFID technology similar to that of most public transit systems. This system contains a client-held RFID card and a receiver, and a server that processes the data. Through this paper, we hope to present an alternative, less invasive system that will help governments and health officials prevent the spread of COVID-19 in their communities.
为应对COVID-19病毒的快速传播,追踪接触者和自我隔离的必要性已成为许多卫生专家和各国政府关注的焦点,并作为遏制该疾病传播的主要选择。通过创建利用GPS和BLE技术潜力的移动应用程序,使接触追踪尽可能高效和有效,智能手机的利用一直是许多努力的重点。该系统的主要问题是对应用程序用户的隐私和数据保护的担忧。为了解决这个问题,通过本文,我们建议使用与大多数公共交通系统类似的无源RFID技术。该系统包含一个客户端持有的RFID卡和一个接收器,以及一个处理数据的服务器。通过这篇论文,我们希望提出一种替代的、侵入性较小的系统,帮助政府和卫生官员防止COVID-19在他们的社区传播。
{"title":"COVID-19 Contact Tracing Using BLE and RFID for Data Protection and Integrity","authors":"Harish Anantharajah, K. Harika, Andrew Jayasinghe, Michal Aibin","doi":"10.1109/UEMCON53757.2021.9666565","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666565","url":null,"abstract":"Responding to the rapid spread of the COVID-19 virus, the need for contact tracing and self-isolation has become the focus of many health experts and governments as being the primary option for containing the spread of the disease. The utilization of the smartphone has been the focus of many efforts by creating mobile applications that harness the potential of GPS and BLE technologies to make contact tracing as efficient and effective as possible. The prevailing issue with this system is the concern of privacy and data protection of app users. In order to address this problem, through this paper, we are suggesting the use of passive RFID technology similar to that of most public transit systems. This system contains a client-held RFID card and a receiver, and a server that processes the data. Through this paper, we hope to present an alternative, less invasive system that will help governments and health officials prevent the spread of COVID-19 in their communities.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"98 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explainable Customer Segmentation Using K-means Clustering 基于k均值聚类的可解释客户细分
Riyo Hayat Khan, Dibyo Fabian Dofadar, Md. Golam Rabiul Alam
Explainable AI has gained popularity in recent years, but the application of it in unsupervised learning is still a few. In this research, explainability was integrated with clustering, an unsupervised method. Customer segmentation is one of the most important aspects in the competitive business world. The most common approach for customer segmentation is clustering, however, assignments of the clusters often can be hard to interpret. To make the cluster assignments more interpretable, a decision tree based explainability was implemented for customer segmentation in this research for small and large datasets. Using the Elbow Method and Silhouette Score, an optimal number of clusters were found, then ExKMC algorithm was implemented for both datasets.
近年来,可解释的人工智能越来越受欢迎,但它在无监督学习中的应用仍然很少。在本研究中,可解释性与聚类这一无监督方法相结合。在竞争激烈的商业世界中,客户细分是最重要的方面之一。客户细分最常用的方法是集群,然而,集群的分配通常很难解释。为了使聚类分配更具可解释性,本研究在小数据集和大数据集的客户细分中实现了基于可解释性的决策树。采用肘部法和廓形评分法找到最优聚类数,然后对两个数据集实施ExKMC算法。
{"title":"Explainable Customer Segmentation Using K-means Clustering","authors":"Riyo Hayat Khan, Dibyo Fabian Dofadar, Md. Golam Rabiul Alam","doi":"10.1109/uemcon53757.2021.9666609","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666609","url":null,"abstract":"Explainable AI has gained popularity in recent years, but the application of it in unsupervised learning is still a few. In this research, explainability was integrated with clustering, an unsupervised method. Customer segmentation is one of the most important aspects in the competitive business world. The most common approach for customer segmentation is clustering, however, assignments of the clusters often can be hard to interpret. To make the cluster assignments more interpretable, a decision tree based explainability was implemented for customer segmentation in this research for small and large datasets. Using the Elbow Method and Silhouette Score, an optimal number of clusters were found, then ExKMC algorithm was implemented for both datasets.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection System for CAN Bus In-Vehicle Network based on Machine Learning Algorithms 基于机器学习算法的CAN总线车载网络入侵检测系统
Asma Alfardus, D. Rawat
The advent of automotive industry has an increasing market demand pertaining to installation of intelligent transportation facilities in modern vehicles. Now more comfortable and safer travelling experience is one best trait of these vehicles. Moreover, it has opened new gates to advancement in automotive sector. Modern vehicles are connected to advance systems and technologies using various communication protocols. Amongst numerous communication protocols, one widely used protocol is the controller area network (CAN) bus which serves as a central medium for in-vehicle communications. However, the communication in these vehicles may impose greater threats and may ultimately compromise the security by breaching the system. Various attacks on CAN bus may compromise the confidentiality, integrity and availability of vehicular data through intrusions which may endanger the physical safety of vehicle and passengers. In this paper, a novel machine learning based approach is used to devise an Intrusion Detection System for the CAN bus network. The proposed system is scalable and adaptable to a diverse set of emerging attacks on autonomous vehicles. Results witnessed the accuracy of 100% of our proposed system in detecting and safeguarding threats against multiple impersonation and denial of service attacks as well as 99% accuracy of fuzzy attacks.
随着汽车工业的兴起,现代汽车中智能交通设施的安装需求日益增长。现在,更舒适、更安全的旅行体验是这些车辆的一大特点。此外,它还打开了汽车行业发展的新大门。现代车辆使用各种通信协议连接到先进的系统和技术。在众多通信协议中,一种被广泛使用的协议是控制器局域网(CAN)总线,它作为车载通信的中心介质。然而,这些车辆中的通信可能会带来更大的威胁,并可能最终通过破坏系统而危及安全性。针对CAN总线的各种攻击可能会通过入侵破坏车辆数据的保密性、完整性和可用性,从而危及车辆和乘客的人身安全。本文提出了一种基于机器学习的CAN总线入侵检测系统设计方法。所提出的系统具有可扩展性,可适应针对自动驾驶汽车的各种新出现的攻击。结果表明,我们提出的系统在检测和防御多种冒充和拒绝服务攻击方面的准确率为100%,在模糊攻击方面的准确率为99%。
{"title":"Intrusion Detection System for CAN Bus In-Vehicle Network based on Machine Learning Algorithms","authors":"Asma Alfardus, D. Rawat","doi":"10.1109/uemcon53757.2021.9666745","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666745","url":null,"abstract":"The advent of automotive industry has an increasing market demand pertaining to installation of intelligent transportation facilities in modern vehicles. Now more comfortable and safer travelling experience is one best trait of these vehicles. Moreover, it has opened new gates to advancement in automotive sector. Modern vehicles are connected to advance systems and technologies using various communication protocols. Amongst numerous communication protocols, one widely used protocol is the controller area network (CAN) bus which serves as a central medium for in-vehicle communications. However, the communication in these vehicles may impose greater threats and may ultimately compromise the security by breaching the system. Various attacks on CAN bus may compromise the confidentiality, integrity and availability of vehicular data through intrusions which may endanger the physical safety of vehicle and passengers. In this paper, a novel machine learning based approach is used to devise an Intrusion Detection System for the CAN bus network. The proposed system is scalable and adaptable to a diverse set of emerging attacks on autonomous vehicles. Results witnessed the accuracy of 100% of our proposed system in detecting and safeguarding threats against multiple impersonation and denial of service attacks as well as 99% accuracy of fuzzy attacks.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Wireless Mesh Security to Minimize Privacy and Security Breach 无线网状网络安全分析以减少隐私和安全漏洞
Krishna D Jadhav, S. Balaji
Due to its minimal price and expandable wireless open system interconnection options for the coming years, wireless mesh networking is appealing, developing, and novel medium of speech, which is why it is becoming a somewhat widely used communication field. In all network types, one of the essential factors for prevalent and trustworthy communication is cybersecurity. The IEEE 802.11 working gathering has created various correspondence guidelines. Yet, they are by and by focusing on the 802.11s standard because of its dynamic setup and geography learning abilities. Information, voice, and directions are steered between hubs employing remote lattice organising. WMNs incidentally give nearby 802.11g admittance to customers and connection neighbours utilising 802.11a "backhaul," but this isn’t generally the situation because of changing requirements, for example, top information rate and inclusion range. The small cross-sectional organisation emerged as a fundamental innovation to enable broadband system management in large regions. It benefits specialised organisations by reducing the cost of sending networks and end customers by providing ubiquitous Internet access anywhere, anytime. Given the idea of wireless mesh networking and the lack of integrated organisational technology, small grid networks are powerless against malicious attacks. In the meantime, the limit of multi-radio multi-channel correspondence, the need for heterogeneous organisation coordination, and the interest for multi-bounce remote equality often render conventional security strategies ineffectual or challenging to carry out. Thus, wireless mesh networking presents new issues that require more viable and relevant arrangements. WMNs have piqued the curiosity of both scholastics and industry because of their promising future. Numerous testbeds are built for research purposes, and business items for veritable WMNs are accessible. Anyway, a few concerns should be cleared up before they can very well become widespread. For example, the accessible MAC and routing conventions are not customisable; the throughput drops impressively with an increasing number of hubs or bounces in WMNs. Because of the weakness of WMNs against various malicious attacks, the security and protection of correspondence is a serious concern. For example, enemies can sniff long-distance correspondence to obtain sensitive data. Attackers can carry out DoS attacks and control the substance of the information sent through compromised hubs, thereby endangering the company’s secret, accessibility authenticity, and integrity. WMNs, like compact Impromptu Organisations (MANETs), share a typical medium, no traffic aggregate point, and incredible topography. Due to these restrictions, normal safety frameworks in wired associations can’t be quickly applied to WMNs. Also, the techniques utilised in MANETs are not viable with WMNs. This is because of the manner in which WMNs expand MANETs in different ways. Framework cent
由于其低廉的价格和未来几年可扩展的无线开放系统互连选项,无线网状网络是一种吸引人的、发展中的、新颖的语音媒介,这就是为什么它正在成为一个广泛使用的通信领域。在所有网络类型中,普遍和可信的通信的基本因素之一是网络安全。IEEE 802.11工作组已经创建了各种通信指南。然而,由于802.11s标准的动态设置和地理学习能力,他们逐渐关注它。信息、声音和方向在使用远程点阵组织的中心之间进行控制。wmn顺便给附近使用802.11a“回程”的客户和连接邻居提供802.11g准入,但由于需求的变化(例如,最高信息速率和包含范围),通常情况并非如此。小型横断面组织作为一项基本创新出现,使宽带系统管理能够在大区域。它通过随时随地提供无处不在的互联网接入,降低了发送网络和终端客户的成本,从而使专业组织受益。考虑到无线网状网络的概念和集成组织技术的缺乏,小型网格网络对恶意攻击无能为力。同时,多无线电多信道通信的限制、异构组织协调的需要以及对多跳远程平等的兴趣往往使传统的安全策略无效或难以实现。因此,无线网状网络提出了新的问题,需要更可行和相关的安排。WMNs因其前景光明而激起了学术界和工业界的好奇心。为研究目的建立了许多测试平台,并且可以访问真正的wmn的业务项目。无论如何,有几个问题应该在它们广泛传播之前澄清。例如,可访问的MAC和路由约定是不可定制的;吞吐量随着wmn中集线器或反弹数量的增加而显著下降。由于wmn在面对各种恶意攻击时的弱点,通信的安全性和保护成为一个值得关注的问题。例如,敌人可以嗅探远距离通信以获取敏感数据。攻击者可以实施DoS攻击,控制通过被攻破的集线器发送的信息的实质内容,从而危及企业的机密性、可访问性、真实性和完整性。wmn就像紧凑的即兴组织(manet)一样,共享一个典型的媒介,没有流量聚合点,以及令人难以置信的地形。由于这些限制,有线关联中的常规安全框架不能快速应用到wmn中。此外,在无线网络中使用的技术在无线网络中是不可行的。这是因为wmn以不同的方式扩展manet的方式。框架中心通常配备各种收音机。然后,在这一点上,许多通道被分配到每个中心,以处理并发的数据移动和多样性。
{"title":"Analysis of Wireless Mesh Security to Minimize Privacy and Security Breach","authors":"Krishna D Jadhav, S. Balaji","doi":"10.1109/uemcon53757.2021.9666593","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666593","url":null,"abstract":"Due to its minimal price and expandable wireless open system interconnection options for the coming years, wireless mesh networking is appealing, developing, and novel medium of speech, which is why it is becoming a somewhat widely used communication field. In all network types, one of the essential factors for prevalent and trustworthy communication is cybersecurity. The IEEE 802.11 working gathering has created various correspondence guidelines. Yet, they are by and by focusing on the 802.11s standard because of its dynamic setup and geography learning abilities. Information, voice, and directions are steered between hubs employing remote lattice organising. WMNs incidentally give nearby 802.11g admittance to customers and connection neighbours utilising 802.11a \"backhaul,\" but this isn’t generally the situation because of changing requirements, for example, top information rate and inclusion range. The small cross-sectional organisation emerged as a fundamental innovation to enable broadband system management in large regions. It benefits specialised organisations by reducing the cost of sending networks and end customers by providing ubiquitous Internet access anywhere, anytime. Given the idea of wireless mesh networking and the lack of integrated organisational technology, small grid networks are powerless against malicious attacks. In the meantime, the limit of multi-radio multi-channel correspondence, the need for heterogeneous organisation coordination, and the interest for multi-bounce remote equality often render conventional security strategies ineffectual or challenging to carry out. Thus, wireless mesh networking presents new issues that require more viable and relevant arrangements. WMNs have piqued the curiosity of both scholastics and industry because of their promising future. Numerous testbeds are built for research purposes, and business items for veritable WMNs are accessible. Anyway, a few concerns should be cleared up before they can very well become widespread. For example, the accessible MAC and routing conventions are not customisable; the throughput drops impressively with an increasing number of hubs or bounces in WMNs. Because of the weakness of WMNs against various malicious attacks, the security and protection of correspondence is a serious concern. For example, enemies can sniff long-distance correspondence to obtain sensitive data. Attackers can carry out DoS attacks and control the substance of the information sent through compromised hubs, thereby endangering the company’s secret, accessibility authenticity, and integrity. WMNs, like compact Impromptu Organisations (MANETs), share a typical medium, no traffic aggregate point, and incredible topography. Due to these restrictions, normal safety frameworks in wired associations can’t be quickly applied to WMNs. Also, the techniques utilised in MANETs are not viable with WMNs. This is because of the manner in which WMNs expand MANETs in different ways. Framework cent","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring Human Activity Using Wearable Sensors 利用可穿戴传感器推断人类活动
S. Chawathe
This paper presents methods that use data from wearable sensors, such as those found in low-cost commodity hardware, to infer the human activity (such as reading or walking) corresponding to the sensor readings. A related task is the identification of individuals based on the same data. The classification accuracy of the methods used in this work is higher than earlier work using the same dataset. Further, a significant reduction in the number of sensor data streams produces only a very small impact on this accuracy, which is a feature of practical significance due to implications for network bandwidth and energy budgets in such systems.
本文介绍了使用来自可穿戴传感器(例如在低成本商品硬件中发现的传感器)的数据来推断与传感器读数相对应的人类活动(例如阅读或行走)的方法。一个相关的任务是基于相同的数据识别个体。本工作中使用的方法的分类精度高于使用相同数据集的早期工作。此外,传感器数据流数量的显著减少只会对这种精度产生非常小的影响,这是一个具有实际意义的特征,因为这类系统中的网络带宽和能量预算会受到影响。
{"title":"Inferring Human Activity Using Wearable Sensors","authors":"S. Chawathe","doi":"10.1109/uemcon53757.2021.9666707","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666707","url":null,"abstract":"This paper presents methods that use data from wearable sensors, such as those found in low-cost commodity hardware, to infer the human activity (such as reading or walking) corresponding to the sensor readings. A related task is the identification of individuals based on the same data. The classification accuracy of the methods used in this work is higher than earlier work using the same dataset. Further, a significant reduction in the number of sensor data streams produces only a very small impact on this accuracy, which is a feature of practical significance due to implications for network bandwidth and energy budgets in such systems.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design a Hand Orthosis to Aid Post-Stroke Patients With Hemiplegia 设计一种帮助中风后偏瘫患者的手部矫形器
Jhulino Oroya, D. Oroya, Deyby Huamanchahua
Stroke is the third cause of all disabilities for people over 25 years old. Indeed, the percentage of people who suffer from hemiplegia after stroke is higher than 75%. Patients with hemiplegia have considerable difficulty performing activities of daily living, such as feeding or grasping objects. Assistive devices for stroke patients have been developing since a very long time ago; however, some of them are not well accepted by patients because they are not comfortable, wearable, portable, lightweight and useful. This research presents the first version of the design of dynamic orthosis to aid post-stroke patients with hemiplegia to grasp cylindrical and spherical objects. The proposed orthosis was designed by using a cyclic design methodology called Iterative Design which is used for continuous product improvement; moreover, this paper presents a detailed description of the control algorithm and the electromechanical design in which a flexible power transmission element was introduced to perform the opening and closing of the hand. Then, a motion study was performed to determine the range of motion (ROM) of the orthosis. Results show that the orthosis is able to cover 88.8% of the ROM of the metacarpophalangeal (MCP) joint and 72.7% of the ROM of the proximal interphalangeal (PIP) joint. These results indicate that the hand orthosis can assist patients in performing grasping tasks. In addition, the main feature of this orthosis is ergonomic because it was designed using anthropometric measurements of the hand. Other features of the orthosis are lightweight (230 g), portable and easy to use.
中风是25岁以上人群致残的第三大原因。事实上,中风后偏瘫患者的比例高于75%。偏瘫患者在进行日常生活活动时有相当大的困难,例如进食或抓握物体。为中风患者设计的辅助设备在很久以前就开始发展了;然而,其中一些由于不舒适、不可穿戴、不便携、不轻便、不实用而不被患者所接受。本研究提出了动态矫形器设计的第一个版本,以帮助中风后偏瘫患者掌握圆柱形和球形物体。所提出的矫形器是通过使用称为迭代设计的循环设计方法设计的,该方法用于持续的产品改进;此外,本文还详细介绍了控制算法和机电设计,其中引入了柔性动力传动元件来实现手的开闭。然后,进行运动研究以确定矫形器的运动范围(ROM)。结果表明,该矫形器可覆盖掌指关节(MCP) 88.8%的关节活动度和近端指间关节(PIP) 72.7%的关节活动度。这些结果表明,手部矫形器可以帮助患者执行抓握任务。此外,这种矫形器的主要特点是符合人体工程学,因为它是根据手部的人体测量学设计的。矫形器的其他特点是重量轻(230克),便于携带和使用。
{"title":"Design a Hand Orthosis to Aid Post-Stroke Patients With Hemiplegia","authors":"Jhulino Oroya, D. Oroya, Deyby Huamanchahua","doi":"10.1109/UEMCON53757.2021.9666638","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666638","url":null,"abstract":"Stroke is the third cause of all disabilities for people over 25 years old. Indeed, the percentage of people who suffer from hemiplegia after stroke is higher than 75%. Patients with hemiplegia have considerable difficulty performing activities of daily living, such as feeding or grasping objects. Assistive devices for stroke patients have been developing since a very long time ago; however, some of them are not well accepted by patients because they are not comfortable, wearable, portable, lightweight and useful. This research presents the first version of the design of dynamic orthosis to aid post-stroke patients with hemiplegia to grasp cylindrical and spherical objects. The proposed orthosis was designed by using a cyclic design methodology called Iterative Design which is used for continuous product improvement; moreover, this paper presents a detailed description of the control algorithm and the electromechanical design in which a flexible power transmission element was introduced to perform the opening and closing of the hand. Then, a motion study was performed to determine the range of motion (ROM) of the orthosis. Results show that the orthosis is able to cover 88.8% of the ROM of the metacarpophalangeal (MCP) joint and 72.7% of the ROM of the proximal interphalangeal (PIP) joint. These results indicate that the hand orthosis can assist patients in performing grasping tasks. In addition, the main feature of this orthosis is ergonomic because it was designed using anthropometric measurements of the hand. Other features of the orthosis are lightweight (230 g), portable and easy to use.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Types of Lower-Limb Orthoses for Rehabilitation and Assistance: A Systematic Review 用于康复和辅助的下肢矫形器类型:系统综述
Deyby Huamanchahua, Jhon Rodrigo Ortiz Zacarias, Joel Asto-Evangelista, Iraiz Lucero Quintanilla Mosquera
The movement problems in lower extremities resulting from accidents, paralysis, degenerative diseases, and elderly people with loss of mobility due to muscle weakness have been a problem that has been addressed for a long time, however, robotic devices focused on this type of rehabilitation and assistance have had a slow technological development in this area is necessary an improvement in this type of devices both in their design, control, and performance. To be more productive and accessible to people who require them. The purpose of this article is to present a systematic study of this type of robotic device for lower limb orthoses for rehabilitation and assistance. The objective is to provide the designer and researcher with a matrix for the development of a much more efficient lower limb orthotic robotic device. The procedure that was followed was the collection of data from different specialized search engines that assisted in the collection of information from the different research from the year 2016 to 2021. A selection was made of all the analyzed research where finally only 94 research were selected.
由于事故、瘫痪、退行性疾病和老年人因肌肉无力而失去行动能力而导致的下肢运动问题一直是一个长期存在的问题,然而,专注于这类康复和辅助的机器人设备在这一领域的技术发展缓慢,需要在这类设备的设计、控制和性能方面进行改进。提高生产力,让需要它们的人更容易接近。本文的目的是对这类用于下肢矫形器康复和辅助的机器人装置进行系统的研究。目的是为设计人员和研究人员提供一个矩阵,以开发一个更有效的下肢矫形机器人设备。所遵循的程序是收集来自不同专业搜索引擎的数据,这些搜索引擎有助于收集来自2016年至2021年不同研究的信息。对所有分析的研究进行了选择,最终只选择了94项研究。
{"title":"Types of Lower-Limb Orthoses for Rehabilitation and Assistance: A Systematic Review","authors":"Deyby Huamanchahua, Jhon Rodrigo Ortiz Zacarias, Joel Asto-Evangelista, Iraiz Lucero Quintanilla Mosquera","doi":"10.1109/UEMCON53757.2021.9666710","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666710","url":null,"abstract":"The movement problems in lower extremities resulting from accidents, paralysis, degenerative diseases, and elderly people with loss of mobility due to muscle weakness have been a problem that has been addressed for a long time, however, robotic devices focused on this type of rehabilitation and assistance have had a slow technological development in this area is necessary an improvement in this type of devices both in their design, control, and performance. To be more productive and accessible to people who require them. The purpose of this article is to present a systematic study of this type of robotic device for lower limb orthoses for rehabilitation and assistance. The objective is to provide the designer and researcher with a matrix for the development of a much more efficient lower limb orthotic robotic device. The procedure that was followed was the collection of data from different specialized search engines that assisted in the collection of information from the different research from the year 2016 to 2021. A selection was made of all the analyzed research where finally only 94 research were selected.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Energy-Aware Task Migration Through Ant-Colony Optimization for Multiprocessors 基于蚁群优化的多处理器能量感知任务迁移
Dulana Rupanetti, Hassan A. Salamy
In this work, we introduce a novel strategy to improve the power dissipation of the Multiprocessor System on Chips (MPSoC) through a modified Ant-Colony Optimization (ACO) for task migration. Combined with a First-Fit task allocation heuristic, the ACO algorithm tries to split tasks and migrate them to processors with low task utilization to minimize the overall power consumption of the MPSoC. Finally, the task set, including split tasks, is scheduled through an Early-Deadline-First (EDF) scheduler. This paper describes the implementation and verification of the proposed work, and the results of the experiment attest to the improvements gained over the traditional allocating and scheduling algorithms in the literature.
在这项工作中,我们介绍了一种新的策略,通过改进蚁群优化(ACO)的任务迁移来提高多处理器片上系统(MPSoC)的功耗。结合First-Fit任务分配启发式算法,蚁群算法尝试拆分任务并将其迁移到任务利用率较低的处理器上,以最大限度地降低MPSoC的总体功耗。最后,任务集(包括分割任务)通过Early-Deadline-First (EDF)调度器进行调度。本文描述了所提出的工作的实现和验证,实验结果证明了比文献中传统的分配和调度算法所获得的改进。
{"title":"Energy-Aware Task Migration Through Ant-Colony Optimization for Multiprocessors","authors":"Dulana Rupanetti, Hassan A. Salamy","doi":"10.1109/uemcon53757.2021.9666584","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666584","url":null,"abstract":"In this work, we introduce a novel strategy to improve the power dissipation of the Multiprocessor System on Chips (MPSoC) through a modified Ant-Colony Optimization (ACO) for task migration. Combined with a First-Fit task allocation heuristic, the ACO algorithm tries to split tasks and migrate them to processors with low task utilization to minimize the overall power consumption of the MPSoC. Finally, the task set, including split tasks, is scheduled through an Early-Deadline-First (EDF) scheduler. This paper describes the implementation and verification of the proposed work, and the results of the experiment attest to the improvements gained over the traditional allocating and scheduling algorithms in the literature.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"5 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113938600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1