首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living 桌面人机界面,以协助老年人的日常生活任务
Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M.R. Alrashidi, D. Dow
Old age is associated with declines in vision, hearing, sensory function, motor function, and cognition. These declines make managing activities of daily living harder. Computer mobile devices could help, but many elderly people find the interface too small and navigation too complex. A larger computer interface in a natural setting, such as a tabletop, could provide a more usable interface and be able to provide better assistance for some elderly people. The purpose of this project was to develop a prototype human computer interface that projects images onto a tabletop, uses an imaging system to identify hand position over the tabletop in relation to the projected image, detects menu selections of the hand over projected buttons, and takes actions, such as displaying the selected next menu. A prototype was developed using custom LabView programs for generation of images of menu selections to be projected, image processing and control of the system. Hand recognition was simplified by having the user wear a white glove with a black square on the back for the imaging system to search for. Button selection was recognized by holding the hand over a projected menu button for several seconds. The prototype function showed promise. Further testing and development will be necessary toward wider implementation. Such a projected tabletop human computer interface may improve computer derive assistance for elderly people compared to mobile or computer display interfaces.
老年与视力、听力、感觉功能、运动功能和认知能力的下降有关。这些衰退使得管理日常生活活动变得更加困难。电脑移动设备可以提供帮助,但许多老年人发现界面太小,导航太复杂。在自然环境中设置一个更大的计算机界面,例如桌面,可以提供一个更可用的界面,并能够为一些老年人提供更好的帮助。该项目的目的是开发一个原型人机界面,将图像投射到桌面上,使用成像系统识别桌面上与投影图像相关的手的位置,检测手在投影按钮上的菜单选择,并采取行动,例如显示所选的下一个菜单。利用自定义LabView程序开发了一个原型,用于生成待投影菜单选择图像、图像处理和系统控制。通过让用户戴上背面有黑色方块的白手套,以便成像系统进行搜索,简化了手部识别。通过将手放在投射菜单按钮上几秒钟来识别按钮选择。原型函数显示出了希望。进一步的测试和开发对于更广泛的实施是必要的。与移动或计算机显示界面相比,这种投影桌面人机界面可以改善老年人的计算机派生帮助。
{"title":"Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living","authors":"Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M.R. Alrashidi, D. Dow","doi":"10.1109/UEMCON47517.2019.8992972","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992972","url":null,"abstract":"Old age is associated with declines in vision, hearing, sensory function, motor function, and cognition. These declines make managing activities of daily living harder. Computer mobile devices could help, but many elderly people find the interface too small and navigation too complex. A larger computer interface in a natural setting, such as a tabletop, could provide a more usable interface and be able to provide better assistance for some elderly people. The purpose of this project was to develop a prototype human computer interface that projects images onto a tabletop, uses an imaging system to identify hand position over the tabletop in relation to the projected image, detects menu selections of the hand over projected buttons, and takes actions, such as displaying the selected next menu. A prototype was developed using custom LabView programs for generation of images of menu selections to be projected, image processing and control of the system. Hand recognition was simplified by having the user wear a white glove with a black square on the back for the imaging system to search for. Button selection was recognized by holding the hand over a projected menu button for several seconds. The prototype function showed promise. Further testing and development will be necessary toward wider implementation. Such a projected tabletop human computer interface may improve computer derive assistance for elderly people compared to mobile or computer display interfaces.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124502263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Phase Time-to-Digital Converter Differential Vernier Ring Oscillator 多相时间-数字转换器差分游标环振荡器
A. Annagrebah, E. Bechetoille, I. Laktineh, H. Chanal
This paper reports the development of an adjustable, Time-to-Digital Converter (TDC) based on two vernier Ring Oscillators (RO). The TDC aims to measure timing in Resistive Plate Chamber (RPC) detector for CMS experiment. Considering previous designs, the contribution from power supply noise and intrinsic transistor noise had been minimizing with differential stages and proper transistor sizing. To reduce the timing resolution and deadtime inherent to Vernier TDC architecture, as many Phase Detector (PD) as possible had been implemented. Such functionality permits to choose whether reducing the dead time or measuring redundantly the start-stop time difference for an improved precision. The prototype TDC fabricated in a 130-nm technology consumes 8.5 mW power under 1.2-V supply. The measurement of this chip shown a timing accuracy of 5.48 ps at a timing resolution of 8 ps for the first data allowed by the first phase detection.
本文报道了一种基于两个游标环振荡器(RO)的可调时间数字转换器(TDC)。TDC旨在测量CMS实验中电阻板室(RPC)探测器的定时。考虑到以前的设计,通过不同的级和适当的晶体管尺寸,电源噪声和晶体管固有噪声的贡献已经最小化。为了降低游标TDC结构固有的时序分辨率和死区时间,人们实现了尽可能多的相位检测器(PD)。这样的功能允许选择是否减少死区时间或测量冗余的启停时间差,以提高精度。采用130纳米技术制造的原型TDC在1.2 v电源下功耗为8.5 mW。该芯片的测量显示,第一相位检测允许的第一个数据的定时分辨率为8 ps,定时精度为5.48 ps。
{"title":"A Multi-Phase Time-to-Digital Converter Differential Vernier Ring Oscillator","authors":"A. Annagrebah, E. Bechetoille, I. Laktineh, H. Chanal","doi":"10.1109/UEMCON47517.2019.8992933","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992933","url":null,"abstract":"This paper reports the development of an adjustable, Time-to-Digital Converter (TDC) based on two vernier Ring Oscillators (RO). The TDC aims to measure timing in Resistive Plate Chamber (RPC) detector for CMS experiment. Considering previous designs, the contribution from power supply noise and intrinsic transistor noise had been minimizing with differential stages and proper transistor sizing. To reduce the timing resolution and deadtime inherent to Vernier TDC architecture, as many Phase Detector (PD) as possible had been implemented. Such functionality permits to choose whether reducing the dead time or measuring redundantly the start-stop time difference for an improved precision. The prototype TDC fabricated in a 130-nm technology consumes 8.5 mW power under 1.2-V supply. The measurement of this chip shown a timing accuracy of 5.48 ps at a timing resolution of 8 ps for the first data allowed by the first phase detection.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Convolutional Neural Networks for Breast Cancer Detection 用于乳腺癌检测的深度卷积神经网络
Ankita Roy
Breast cancer is one of the main causes of cancer death worldwide. In the midst of the treatment of different disorders and diseases, one critical aspect in saving a patient is early detection. Correct detection and assessment of mammograms is hindered by human-error and inter-observer variations between pathologists. Existing convolutional neural network structures have shown promise in detection, but are hindered in their requirements for very large datasets to train on. The purpose of this paper is to explore a streamlined method classification of hematoxylin and eosin (H&E) stained tissue cancer mammograms into non-carcinomas and carcinomas using a small training set. This is done by the creation of more sample sets through changing elements of the data such as shear ratio and rotation. We assumed a 4-layer DCNN (deep convolutional neural network). We first train the DCNN with our augmented dataset, increasing dataset size by x200. We implement a highly accurate and reduced chance of overfitting gradient boosting algorithm. The overall classification accuracy of benign versus malignant was 88%.
乳腺癌是全世界癌症死亡的主要原因之一。在治疗各种失调和疾病的过程中,早期发现是挽救病人生命的一个关键方面。乳房x光片的正确检测和评估受到人为错误和病理学家之间观察者之间的差异的阻碍。现有的卷积神经网络结构在检测方面已经显示出前景,但在对非常大的数据集进行训练的要求方面受到阻碍。本文的目的是探索一种利用小训练集将苏木精和伊红(H&E)染色的组织癌乳房x线照片分类为非癌和癌的简化方法。这是通过改变数据的元素(如剪切比和旋转)来创建更多的样本集来完成的。我们假设一个4层的DCNN(深度卷积神经网络)。我们首先使用增强的数据集训练DCNN,将数据集大小增加x200。我们实现了一个高度精确和减少过拟合机会的梯度增强算法。良性与恶性的总体分类准确率为88%。
{"title":"Deep Convolutional Neural Networks for Breast Cancer Detection","authors":"Ankita Roy","doi":"10.1109/uemcon47517.2019.8993023","DOIUrl":"https://doi.org/10.1109/uemcon47517.2019.8993023","url":null,"abstract":"Breast cancer is one of the main causes of cancer death worldwide. In the midst of the treatment of different disorders and diseases, one critical aspect in saving a patient is early detection. Correct detection and assessment of mammograms is hindered by human-error and inter-observer variations between pathologists. Existing convolutional neural network structures have shown promise in detection, but are hindered in their requirements for very large datasets to train on. The purpose of this paper is to explore a streamlined method classification of hematoxylin and eosin (H&E) stained tissue cancer mammograms into non-carcinomas and carcinomas using a small training set. This is done by the creation of more sample sets through changing elements of the data such as shear ratio and rotation. We assumed a 4-layer DCNN (deep convolutional neural network). We first train the DCNN with our augmented dataset, increasing dataset size by x200. We implement a highly accurate and reduced chance of overfitting gradient boosting algorithm. The overall classification accuracy of benign versus malignant was 88%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities 基于DCNN的面部表情识别及ASD儿童iOS应用的开发
Md Inzamam Ul Haque, Damian Valles
In this paper, continued work of a research project is discussed which achieved the end goal of the project - to build a mobile device application that can teach children with Autism Spectrum Disorder (ASD) to recognize human facial expressions utilizing computer vision and image processing. Universally, there are seven facial expressions categories: angry, disgust, happy, sad, fear, surprise, and neutral. To recognize all these facial expressions and to predict the current mood of a person is a difficult task for a child. A child with ASD, this problem presents itself in a more sophisticated manner due to the nature of the disorder. The main goal of this research was to develop a deep Convolutional Neural Network (DCNN) for facial expression recognition, which can help young children with ASD to recognize facial expressions, using mobile devices. The Kaggle's FER2013 and Karolinska Directed Emotional Faces (KDEF) dataset have been used to train and test with the DCNN model, which can classify facial expressions from different viewpoints and in different lighting contrasts. An 86.44% accuracy was achieved with good generalizability for the DCNN model. The results show an improvement of the DCNN accuracy in dealing with lighting contrast changes, and the implementation of image processing before performing the facial expression classification. As a byproduct of this research project, an app suitable for the iOS platform was developed for running both the DCNN model and image processing algorithm. The app can be used by speech-language pathologies, teacher, care-takers, and parents as a technological tool when working with children with ASD.
本文讨论了一个研究项目的后续工作,该项目实现了该项目的最终目标——构建一个移动设备应用程序,该应用程序可以教自闭症谱系障碍(ASD)儿童利用计算机视觉和图像处理识别人类面部表情。一般来说,有七种面部表情:愤怒、厌恶、快乐、悲伤、恐惧、惊讶和中性。对孩子来说,识别所有这些面部表情并预测一个人当前的情绪是一项艰巨的任务。对于患有自闭症谱系障碍的孩子来说,由于这种障碍的性质,这个问题会以一种更复杂的方式表现出来。本研究的主要目标是开发一种用于面部表情识别的深度卷积神经网络(DCNN),它可以帮助患有ASD的幼儿使用移动设备识别面部表情。Kaggle的FER2013和卡罗林斯卡定向情绪面孔(KDEF)数据集被用于训练和测试DCNN模型,该模型可以从不同的角度和不同的光照对比中分类面部表情。DCNN模型的准确率为86.44%,具有良好的泛化能力。结果表明,DCNN在处理光照对比度变化方面的准确率有所提高,并在进行面部表情分类前进行了图像处理。作为本研究项目的副产品,我们开发了一款适用于iOS平台的app,可以同时运行DCNN模型和图像处理算法。这款应用程序可以被语言病理学家、教师、看护人员和家长作为一种技术工具,在与自闭症儿童打交道时使用。
{"title":"Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities","authors":"Md Inzamam Ul Haque, Damian Valles","doi":"10.1109/UEMCON47517.2019.8993051","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993051","url":null,"abstract":"In this paper, continued work of a research project is discussed which achieved the end goal of the project - to build a mobile device application that can teach children with Autism Spectrum Disorder (ASD) to recognize human facial expressions utilizing computer vision and image processing. Universally, there are seven facial expressions categories: angry, disgust, happy, sad, fear, surprise, and neutral. To recognize all these facial expressions and to predict the current mood of a person is a difficult task for a child. A child with ASD, this problem presents itself in a more sophisticated manner due to the nature of the disorder. The main goal of this research was to develop a deep Convolutional Neural Network (DCNN) for facial expression recognition, which can help young children with ASD to recognize facial expressions, using mobile devices. The Kaggle's FER2013 and Karolinska Directed Emotional Faces (KDEF) dataset have been used to train and test with the DCNN model, which can classify facial expressions from different viewpoints and in different lighting contrasts. An 86.44% accuracy was achieved with good generalizability for the DCNN model. The results show an improvement of the DCNN accuracy in dealing with lighting contrast changes, and the implementation of image processing before performing the facial expression classification. As a byproduct of this research project, an app suitable for the iOS platform was developed for running both the DCNN model and image processing algorithm. The app can be used by speech-language pathologies, teacher, care-takers, and parents as a technological tool when working with children with ASD.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122026752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a Threat Model for Vehicular Fog Computing 面向车辆雾计算的威胁模型研究
Mohammad Aminul Hoque, Ragib Hasan
Security is a huge challenge in vehicular networks due to the large size of the network, high mobility of nodes, and continuous change of network topology. These challenges are also applicable to the vehicular fog, which is a new computing paradigm in the context of vehicular networks. In vehicular fog computing, the vehicles serve as fog nodes. This is a promising model for latency-sensitive and location-aware services, which also incurs some unique security and privacy issues. However, there is a lack of a systematic approach to design security solutions of the vehicular fog using a comprehensive threat model. Threat modeling is a step-by-step process to analyze, identify, and prioritize all the potential threats and vulnerabilities of a system and solve them with known security solutions. A well-designed threat model can help to understand the security and privacy threats, vulnerabilities, requirements, and challenges along with the attacker model, the attack motives, and attacker capabilities. Threat model analysis in vehicular fog computing is critical because only brainstorming and threat models of other vehicular network paradigms will not provide a complete scenario of potential threats and vulnerabilities. In this paper, we have explored the threat model of vehicular fog computing and identified the threats and vulnerabilities using STRIDE and CIAA threat modeling processes. We posit that this initiative will help to improve the security and privacy system design of vehicular fog computing.
由于网络规模庞大、节点的高移动性以及网络拓扑结构的不断变化,车用网络的安全性是一个巨大的挑战。这些挑战同样适用于车载雾,这是一种新的车载网络计算范式。在车载雾计算中,车辆作为雾节点。对于延迟敏感和位置感知服务来说,这是一个很有前途的模型,但也会产生一些独特的安全和隐私问题。然而,目前还缺乏一种系统的方法来使用综合威胁模型来设计车辆雾的安全解决方案。威胁建模是一个循序渐进的过程,用于分析、识别和确定系统的所有潜在威胁和漏洞的优先级,并使用已知的安全解决方案来解决它们。设计良好的威胁模型可以帮助您了解安全和隐私威胁、漏洞、需求和挑战,以及攻击者模型、攻击动机和攻击者能力。汽车雾计算中的威胁模型分析至关重要,因为只有头脑风暴和其他汽车网络范例的威胁模型不能提供潜在威胁和漏洞的完整场景。在本文中,我们探索了车载雾计算的威胁模型,并使用STRIDE和CIAA威胁建模流程识别了威胁和漏洞。我们认为这一举措将有助于改进车辆雾计算的安全和隐私系统设计。
{"title":"Towards a Threat Model for Vehicular Fog Computing","authors":"Mohammad Aminul Hoque, Ragib Hasan","doi":"10.1109/UEMCON47517.2019.8993064","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993064","url":null,"abstract":"Security is a huge challenge in vehicular networks due to the large size of the network, high mobility of nodes, and continuous change of network topology. These challenges are also applicable to the vehicular fog, which is a new computing paradigm in the context of vehicular networks. In vehicular fog computing, the vehicles serve as fog nodes. This is a promising model for latency-sensitive and location-aware services, which also incurs some unique security and privacy issues. However, there is a lack of a systematic approach to design security solutions of the vehicular fog using a comprehensive threat model. Threat modeling is a step-by-step process to analyze, identify, and prioritize all the potential threats and vulnerabilities of a system and solve them with known security solutions. A well-designed threat model can help to understand the security and privacy threats, vulnerabilities, requirements, and challenges along with the attacker model, the attack motives, and attacker capabilities. Threat model analysis in vehicular fog computing is critical because only brainstorming and threat models of other vehicular network paradigms will not provide a complete scenario of potential threats and vulnerabilities. In this paper, we have explored the threat model of vehicular fog computing and identified the threats and vulnerabilities using STRIDE and CIAA threat modeling processes. We posit that this initiative will help to improve the security and privacy system design of vehicular fog computing.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Application of Robot Operating System in Robot Flocks 机器人操作系统在机器人群中的应用
J. Fernandes, Keye Li, J. Mirabile, Gregg Vesonder
Flocking behavior is an exercise in both control and coordination. Members need to move in near-perfect time with each other to maintain a safe, but compact, distance amongst themselves. This balance could have a number of useful applications, ranging from automated vehicles to power grid coordination. Moreover, per Reynolds (1987), flocking behavior can be summarized as an algorithm, which automated systems can easily consume. Inspired by this premise, the group blueprinted a robot flock using Turtlebot3 Burgers and Robot Operating System, or ROS. To begin, the group created an algorithm in Scratch, a graphical programming language. Per Reynolds' model, as long as each individual member knows and follows the algorithm, a flock will form without any outside influence. The group theorized that this modular approach would bide well with the ROS system of nodes and messages. By deeming each member a flocking node and having a remote “master” perform functions such as localization, the ROS framework would naturally support robot flocking. However, after transcribing their program to C++, the group found some ongoing issues in development. They struggled to adapt ROS's message commands into their program, and the Burgers' given localization program had trouble supporting a multi-robot flock. Regardless, with further research, the group still believes that ROS can give rise to a viable flock.
群集行为是一种控制和协调的练习。成员们需要在近乎完美的时间内彼此移动,以保持彼此之间安全而紧凑的距离。这种平衡可以有许多有用的应用,从自动驾驶汽车到电网协调。此外,根据Reynolds(1987)的观点,群集行为可以概括为一种算法,自动化系统可以很容易地使用这种算法。受此启发,该团队设计了一个使用Turtlebot3汉堡和机器人操作系统(ROS)的机器人群。首先,该团队用图形化编程语言Scratch创建了一个算法。根据雷诺兹的模型,只要每个个体成员都知道并遵循算法,就会在没有任何外部影响的情况下形成一个群体。该小组从理论上认为,这种模块化方法将与节点和消息的ROS系统很好地结合在一起。通过将每个成员视为群集节点,并让远程“主人”执行定位等功能,ROS框架自然会支持机器人群集。然而,在将他们的程序翻译成c++之后,该团队发现了一些开发过程中持续存在的问题。他们努力将ROS的信息命令调整到他们的程序中,而伯格夫妇给出的定位程序在支持多机器人群方面遇到了麻烦。无论如何,通过进一步的研究,该小组仍然相信ROS可以产生一个可行的群体。
{"title":"Application of Robot Operating System in Robot Flocks","authors":"J. Fernandes, Keye Li, J. Mirabile, Gregg Vesonder","doi":"10.1109/UEMCON47517.2019.8993017","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993017","url":null,"abstract":"Flocking behavior is an exercise in both control and coordination. Members need to move in near-perfect time with each other to maintain a safe, but compact, distance amongst themselves. This balance could have a number of useful applications, ranging from automated vehicles to power grid coordination. Moreover, per Reynolds (1987), flocking behavior can be summarized as an algorithm, which automated systems can easily consume. Inspired by this premise, the group blueprinted a robot flock using Turtlebot3 Burgers and Robot Operating System, or ROS. To begin, the group created an algorithm in Scratch, a graphical programming language. Per Reynolds' model, as long as each individual member knows and follows the algorithm, a flock will form without any outside influence. The group theorized that this modular approach would bide well with the ROS system of nodes and messages. By deeming each member a flocking node and having a remote “master” perform functions such as localization, the ROS framework would naturally support robot flocking. However, after transcribing their program to C++, the group found some ongoing issues in development. They struggled to adapt ROS's message commands into their program, and the Burgers' given localization program had trouble supporting a multi-robot flock. Regardless, with further research, the group still believes that ROS can give rise to a viable flock.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Voice Interactive Games 语音互动游戏
J. P. Piotrowski, E. Yfantis, A. Campagna, Q. Cornu, G. Gallitano
Computer games are being controlled by joysticks or the keys of the computer keyboard, especially the four arrow keys, or the WASD, or both, and other keys of the keyboard. In this research paper we describe a new algorithm that replaces control with joystick or the arrow keys with voice commands. Thus, we replace the left arrow key with the voice command “left”, the right arrow key with the voice command “right”, the up-arrow key with the voice command “up”, and the down arrow key with the voice command “down”. In order to do that we first develop a new convolutional neural network architecture, then we teach the architecture how to recognize the words “lef”, “right”, “up”, “down”, with extremely high accuracy and very low probability of misclassification. Once the Convolutional Neural Network (CNN) is taught to recognize these words, we use the feedforward part of the network in our game programs so that they can capture, real time, the voice input commands of the player and play the game. The advantage of using the voice commands is that for many players it is easier, faster, eliminates the chance of pushing the wrong key by mistake, and provides a better player experience. We also present a pong game in Unity where the paddle controller uses our algorithm to control the two paddles of the game.
电脑游戏是由操纵杆或电脑键盘上的键来控制的,尤其是四个方向键,或WASD键,或两者兼而有之,以及键盘上的其他键。在这篇研究论文中,我们描述了一种新的算法,用操纵杆代替控制或用语音命令代替方向键。因此,我们将左箭头键替换为语音命令“左”,将右箭头键替换为语音命令“右”,将向上箭头键替换为语音命令“上”,将向下箭头键替换为语音命令“下”。为了做到这一点,我们首先开发了一个新的卷积神经网络架构,然后我们教该架构如何识别单词“左”,“右”,“上”,“下”,具有极高的准确率和极低的误分类概率。一旦卷积神经网络(CNN)学会识别这些单词,我们就会在游戏程序中使用网络的前馈部分,这样它们就可以实时捕捉玩家的语音输入命令并玩游戏。使用语音命令的优势在于,对于许多玩家来说,它更简单、更快捷,消除了误按错误键的可能性,并提供了更好的玩家体验。我们还在Unity中呈现了一款乒乓游戏,其中桨控制器使用我们的算法来控制游戏的两个桨。
{"title":"Voice Interactive Games","authors":"J. P. Piotrowski, E. Yfantis, A. Campagna, Q. Cornu, G. Gallitano","doi":"10.1109/UEMCON47517.2019.8993015","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993015","url":null,"abstract":"Computer games are being controlled by joysticks or the keys of the computer keyboard, especially the four arrow keys, or the WASD, or both, and other keys of the keyboard. In this research paper we describe a new algorithm that replaces control with joystick or the arrow keys with voice commands. Thus, we replace the left arrow key with the voice command “left”, the right arrow key with the voice command “right”, the up-arrow key with the voice command “up”, and the down arrow key with the voice command “down”. In order to do that we first develop a new convolutional neural network architecture, then we teach the architecture how to recognize the words “lef”, “right”, “up”, “down”, with extremely high accuracy and very low probability of misclassification. Once the Convolutional Neural Network (CNN) is taught to recognize these words, we use the feedforward part of the network in our game programs so that they can capture, real time, the voice input commands of the player and play the game. The advantage of using the voice commands is that for many players it is easier, faster, eliminates the chance of pushing the wrong key by mistake, and provides a better player experience. We also present a pong game in Unity where the paddle controller uses our algorithm to control the two paddles of the game.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems 多机器人无碰撞导航问题的累积训练与迁移学习
Trung-Thanh Nguyen, Amartya Hatua, A. Sung
Recently, the characteristics of robot autonomy, decentralized control, collective decision-making ability, high fault tolerance, etc. have significantly increased the applications of swarm robotics in targeted material delivery, precision farming, surveillance, defense and many other areas. In these multi-agent systems, safe collision avoidance is one of the most fundamental and important problems. Difference approaches, especially reinforcement learning, have been applied to solve this problem. This paper introduces a new cumulative learning approach which comprises of application of transfer learning with distributed multi-agent reinforcement learning techniques to solve collision-free navigation for swarm robotics. In our method, throughout the learning processes from the least complexity scenario to the most complex one, multiple agents can improve the shared policy through parameter sharing, reward shaping and multi-round multi-steps learning. We have adapted two policy gradient algorithms (TRPO and PPO) as the core of our distributed multiagent reinforcement learning method. The performance has shown that our new methodology can help reduce the training time and generate a robust navigation plan that can easily be generalized to complex in-door scenarios.
近年来,机器人的自主性、分散控制、集体决策能力、高容错性等特点显著增加了群体机器人在定向投送物资、精准农业、监控、国防等诸多领域的应用。在多智能体系统中,安全避碰是最基本、最重要的问题之一。差分方法,特别是强化学习,已经被应用于解决这个问题。将迁移学习与分布式多智能体强化学习技术相结合,提出了一种新的累积学习方法来解决群体机器人的无碰撞导航问题。在我们的方法中,在从最小复杂度场景到最复杂场景的整个学习过程中,多个智能体可以通过参数共享、奖励塑造和多轮多步学习来改进共享策略。我们采用了两种策略梯度算法(TRPO和PPO)作为分布式多智能体强化学习方法的核心。实验结果表明,我们的新方法可以帮助减少训练时间,并生成一个鲁棒的导航计划,可以很容易地推广到复杂的室内场景。
{"title":"Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems","authors":"Trung-Thanh Nguyen, Amartya Hatua, A. Sung","doi":"10.1109/UEMCON47517.2019.8992945","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992945","url":null,"abstract":"Recently, the characteristics of robot autonomy, decentralized control, collective decision-making ability, high fault tolerance, etc. have significantly increased the applications of swarm robotics in targeted material delivery, precision farming, surveillance, defense and many other areas. In these multi-agent systems, safe collision avoidance is one of the most fundamental and important problems. Difference approaches, especially reinforcement learning, have been applied to solve this problem. This paper introduces a new cumulative learning approach which comprises of application of transfer learning with distributed multi-agent reinforcement learning techniques to solve collision-free navigation for swarm robotics. In our method, throughout the learning processes from the least complexity scenario to the most complex one, multiple agents can improve the shared policy through parameter sharing, reward shaping and multi-round multi-steps learning. We have adapted two policy gradient algorithms (TRPO and PPO) as the core of our distributed multiagent reinforcement learning method. The performance has shown that our new methodology can help reduce the training time and generate a robust navigation plan that can easily be generalized to complex in-door scenarios.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Considerations for the Development of Secure Software Systems 开发安全软件系统的安全考虑
Maxwell Ruggieri, Tzu-Tang Hsu, M. Ali
Security is an important factor when it comes to the development of software systems. In each of the developing steps of the software system we have to think of what security measure we can put for the design, development, and deployment of the software system. Having a high level of trust in security and quality in developing software systems is a crucial to creating successful application. Industry such as the Software Assurance Forum for Excellence in Code also known as “SAFECode” and Open Web Application Security Project or “OWASP”, both are a non-profit, global industry that led the organization to focus on improving the security of software. They laid down the basis of the best security practice in how to develop secure software system. In this paper we will be looking through different ways of secure practice through different research paper, looking for the difficulty in implementing these different practices, and recommending the solution to the problem.
在软件系统的开发中,安全性是一个重要的因素。在软件系统的每个开发步骤中,我们必须考虑我们可以为软件系统的设计、开发和部署采取哪些安全措施。在开发软件系统时,对安全性和质量有高度的信任是创建成功应用程序的关键。诸如软件保证卓越代码论坛(也称为“SAFECode”)和开放Web应用程序安全项目(或“OWASP”)等行业,都是非营利的全球行业,它们引导组织专注于提高软件的安全性。他们为如何开发安全的软件系统奠定了最佳安全实践的基础。在本文中,我们将通过不同的研究论文来研究不同的安全实践方式,寻找实现这些不同实践的难点,并推荐解决问题的方法。
{"title":"Security Considerations for the Development of Secure Software Systems","authors":"Maxwell Ruggieri, Tzu-Tang Hsu, M. Ali","doi":"10.1109/UEMCON47517.2019.8993081","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993081","url":null,"abstract":"Security is an important factor when it comes to the development of software systems. In each of the developing steps of the software system we have to think of what security measure we can put for the design, development, and deployment of the software system. Having a high level of trust in security and quality in developing software systems is a crucial to creating successful application. Industry such as the Software Assurance Forum for Excellence in Code also known as “SAFECode” and Open Web Application Security Project or “OWASP”, both are a non-profit, global industry that led the organization to focus on improving the security of software. They laid down the basis of the best security practice in how to develop secure software system. In this paper we will be looking through different ways of secure practice through different research paper, looking for the difficulty in implementing these different practices, and recommending the solution to the problem.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126735301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Secure IoT-Fag-Cloud Framework Using Blockchain Based on DAT for Mobile IoT 基于数据的移动物联网区块链安全IoT- fg - cloud框架
Joong-Lyul Lee, Stephen C. Kerns, Sangjin Hong
Internet of Things (IoT) devices are becoming important and familiar products in our everyday lives. Yet, many of these IoT devices have a multitude of vulnerabilities that create a security risk, despite being products that bring a lot of convenience to our lives. Blockchain (BC) technology is gaining popularity these days due to the importance of data security. However, this BC technology is not suitable for IoT devices, because it requires a lot of computing power also IoT devices uses a limited amount of memory and has a lower performing CPU for cost reasons. Also, IoT devices collect a large amount of data and transmit that data every hour and every day to a cloud system to analyze or process the collected data. For this reason, network latency is an important factor in a cloud computing system. In this paper, we propose a secure and distributed 10T-Fog-Cloud Framework using BC to compensate for the security weaknesses of IoT nodes, the delay aware tree construction (DATC) algorithm that considers the service delay for fog-cloud computing, and the mobility of mobile IoT nodes for BC to deal with the triangular routing problem. To verify this proposed framework, we performed security analysis and experiments for the effectiveness of the algorithm through simulation and confirmed that the overall service delay was reduced by choosing the minimum delay path by the DATC algorithm.
物联网(IoT)设备正在成为我们日常生活中重要和熟悉的产品。然而,尽管这些物联网设备为我们的生活带来了很多便利,但它们中的许多都存在大量漏洞,从而带来了安全风险。由于数据安全的重要性,区块链(BC)技术如今越来越受欢迎。然而,这种BC技术并不适合物联网设备,因为它需要大量的计算能力,而且物联网设备使用有限的内存,并且出于成本原因,CPU性能较低。此外,物联网设备每小时和每天都会收集大量数据并将这些数据传输到云系统以分析或处理收集到的数据。因此,网络延迟是云计算系统中的一个重要因素。在本文中,我们提出了一个安全的分布式的10t -雾云框架,利用BC来弥补物联网节点的安全弱点,考虑雾云计算服务延迟的延迟感知树构造(DATC)算法,以及利用BC的移动物联网节点的移动性来处理三角形路由问题。为了验证所提出的框架,我们通过仿真对算法的有效性进行了安全性分析和实验,并证实了DATC算法通过选择最小延迟路径来降低整体业务延迟。
{"title":"A Secure IoT-Fag-Cloud Framework Using Blockchain Based on DAT for Mobile IoT","authors":"Joong-Lyul Lee, Stephen C. Kerns, Sangjin Hong","doi":"10.1109/UEMCON47517.2019.8993056","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993056","url":null,"abstract":"Internet of Things (IoT) devices are becoming important and familiar products in our everyday lives. Yet, many of these IoT devices have a multitude of vulnerabilities that create a security risk, despite being products that bring a lot of convenience to our lives. Blockchain (BC) technology is gaining popularity these days due to the importance of data security. However, this BC technology is not suitable for IoT devices, because it requires a lot of computing power also IoT devices uses a limited amount of memory and has a lower performing CPU for cost reasons. Also, IoT devices collect a large amount of data and transmit that data every hour and every day to a cloud system to analyze or process the collected data. For this reason, network latency is an important factor in a cloud computing system. In this paper, we propose a secure and distributed 10T-Fog-Cloud Framework using BC to compensate for the security weaknesses of IoT nodes, the delay aware tree construction (DATC) algorithm that considers the service delay for fog-cloud computing, and the mobility of mobile IoT nodes for BC to deal with the triangular routing problem. To verify this proposed framework, we performed security analysis and experiments for the effectiveness of the algorithm through simulation and confirmed that the overall service delay was reduced by choosing the minimum delay path by the DATC algorithm.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1