Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993058
Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy
The Internet of Things (IoT) and mobile sensing applications bring great potential to the modern world, as they enhance and improve quality of life. However, this technology possess security and privacy risks to people who become targets of massive data collection. Embedded sensors have infiltrated everyday personal devices, and large amounts of data are continuously collected through trace data. Location data, search queries, preferences, etc., are all being recorded. In this paper, we surveyed IoT technology and mobile sensing applications, discussed privacy implications, and summarized current proposed solutions to the privacy issue. We then proposed a new solution that represents a balance between data integrity and privacy. We proposed a combination of three existing security measures; cryptography, data obfuscation, and access control mechanisms.
{"title":"Location Tracking of Mobile Objects and the Privacy Tradeoff","authors":"Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy","doi":"10.1109/UEMCON47517.2019.8993058","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993058","url":null,"abstract":"The Internet of Things (IoT) and mobile sensing applications bring great potential to the modern world, as they enhance and improve quality of life. However, this technology possess security and privacy risks to people who become targets of massive data collection. Embedded sensors have infiltrated everyday personal devices, and large amounts of data are continuously collected through trace data. Location data, search queries, preferences, etc., are all being recorded. In this paper, we surveyed IoT technology and mobile sensing applications, discussed privacy implications, and summarized current proposed solutions to the privacy issue. We then proposed a new solution that represents a balance between data integrity and privacy. We proposed a combination of three existing security measures; cryptography, data obfuscation, and access control mechanisms.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993063
Min Chen
The problem on accurately predicting customer churn is critical to the long-term success in subscription business like music, games, magazines etc. It is quite challenging to design machine learning model to predict the customer churn accurately due to the large volume of the time-series data and the temporal issues of the data. In this paper, a parallel artificial neural network is proposed to create a highly-accurate customer churn model on a large customer dataset. The proposed model has achieved significant improvement in the accuracy of churn prediction. The scalability and effectiveness of the proposed algorithm is also studied.
{"title":"Music Streaming Service Prediction with MapReduce-based Artificial Neural Network","authors":"Min Chen","doi":"10.1109/UEMCON47517.2019.8993063","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993063","url":null,"abstract":"The problem on accurately predicting customer churn is critical to the long-term success in subscription business like music, games, magazines etc. It is quite challenging to design machine learning model to predict the customer churn accurately due to the large volume of the time-series data and the temporal issues of the data. In this paper, a parallel artificial neural network is proposed to create a highly-accurate customer churn model on a large customer dataset. The proposed model has achieved significant improvement in the accuracy of churn prediction. The scalability and effectiveness of the proposed algorithm is also studied.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"9 Suppl 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993054
Brody E. Nagy, Sean A. Demers, D. Dow
Clean water sustains life. Contamination puts health at risk. Municipal water in developed regions is regulated by government environmental protection agencies, but well-water is not regulated. Well-water typically has recommended water tests and recommended maximum allowed levels of key contaminants, but the responsibility falls to the owner of the well. Many well-owners do not have the training or resources to coordinate annual water tests, interpret the test results and take appropriate treatment actions, if necessary. The goal of this study was to develop an automatic water testing system and record the results in a web service database accessible by the well owner and appropriate stakeholders. An Arduino based testing system was developed that tested for pH level, coliform bacteria, total dissolved solids (TDS), and lead. These four tests do not cover all the regulated contaminants, but these test values would be affected by many of the other contaminants of interest. Thus, these four water tests can serve a screening function, to warn if water contamination levels may be changing and need closer examination by a certified water testing service. The prototype obtained sampled water from a reservoir, but the envisioned system would have the water intake mechanism directly connected to the plumbing of the building to automatically obtain samples. The function of the prototype appears promising. The test results were sent by WiFi over an HTTP Request to a web service that was developed for this project. The web service received HTTP requests, had a SQL database, and front-end web pages for user system configuration and observation of test results. Further testing and development are necessary toward deployment. Such a home-based automatic testing system would reduce the risk of well-water being contaminated, but still being consumed because the well-owner did not realize the level of the contamination. Risk to health for many people who rely on well-water would be reduced.
{"title":"Automated Well Water Contamination Tester and Web Service","authors":"Brody E. Nagy, Sean A. Demers, D. Dow","doi":"10.1109/UEMCON47517.2019.8993054","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993054","url":null,"abstract":"Clean water sustains life. Contamination puts health at risk. Municipal water in developed regions is regulated by government environmental protection agencies, but well-water is not regulated. Well-water typically has recommended water tests and recommended maximum allowed levels of key contaminants, but the responsibility falls to the owner of the well. Many well-owners do not have the training or resources to coordinate annual water tests, interpret the test results and take appropriate treatment actions, if necessary. The goal of this study was to develop an automatic water testing system and record the results in a web service database accessible by the well owner and appropriate stakeholders. An Arduino based testing system was developed that tested for pH level, coliform bacteria, total dissolved solids (TDS), and lead. These four tests do not cover all the regulated contaminants, but these test values would be affected by many of the other contaminants of interest. Thus, these four water tests can serve a screening function, to warn if water contamination levels may be changing and need closer examination by a certified water testing service. The prototype obtained sampled water from a reservoir, but the envisioned system would have the water intake mechanism directly connected to the plumbing of the building to automatically obtain samples. The function of the prototype appears promising. The test results were sent by WiFi over an HTTP Request to a web service that was developed for this project. The web service received HTTP requests, had a SQL database, and front-end web pages for user system configuration and observation of test results. Further testing and development are necessary toward deployment. Such a home-based automatic testing system would reduce the risk of well-water being contaminated, but still being consumed because the well-owner did not realize the level of the contamination. Risk to health for many people who rely on well-water would be reduced.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993031
Giovanni Miraglia, L. Hook
The use of a feedback motion plan instead of the decoupled scheme consisting of separate plan and control phases can facilitate the task of proving the properties of an autonomous system. The advantage of using a feedback motion plan is the possibility to validate the whole plan offline before its execution, which means that trajectories having different initial states can be tested simultaneously. In this paper, we formulate a feedback motion plan based on the extension of the wavefront expansion to the case of vehicles having bounded curvature. Additionally, the use of a transition function and a Gaussian filter limits undesired oscillations in the resultant trajectories. The method is suitable for both single goal missions and path following. The paper illustrates the algorithm for the generation of the plan and presents simulation data containing example trajectories and analysis of tuning parameters. Finally, future developments are discussed.
{"title":"A Feedback Motion Plan for Vehicles with Bounded Curvature Constraints","authors":"Giovanni Miraglia, L. Hook","doi":"10.1109/UEMCON47517.2019.8993031","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993031","url":null,"abstract":"The use of a feedback motion plan instead of the decoupled scheme consisting of separate plan and control phases can facilitate the task of proving the properties of an autonomous system. The advantage of using a feedback motion plan is the possibility to validate the whole plan offline before its execution, which means that trajectories having different initial states can be tested simultaneously. In this paper, we formulate a feedback motion plan based on the extension of the wavefront expansion to the case of vehicles having bounded curvature. Additionally, the use of a transition function and a Gaussian filter limits undesired oscillations in the resultant trajectories. The method is suitable for both single goal missions and path following. The paper illustrates the algorithm for the generation of the plan and presents simulation data containing example trajectories and analysis of tuning parameters. Finally, future developments are discussed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993061
Brian H. Curtin, Suzanne J. Matthews
Animal conservationists need unobtrusive methods of observing and studying wildlife in remote areas. Many commercial options for wildlife observation are expensive, obtrusive, or sub-optimal in remote environments. In this paper, we explore the viability of a Raspberry Pi-based camera system augmented with a deep learning image recognition model for detecting wildlife of interest. Unlike traditional sensor nodes that would have to transmit every captured image, localized image recognition enables only pictures of desired animals to be transferred to the user. For the purposes of this study, we use TensorFlow and Keras to create a convolutional neural network that runs on a Raspberry Pi 3B+. We trained the model on nearly 3,600 images gathered from publicly available image databases that are split into three classes. Our experiments suggest that our system can detect snow leopards with between 74 percent and 97 percent accuracy. We believe that our results show the viability of employing deep learning image recognition models on the Raspberry Pi to create an inexpensive system to observe wildlife.
{"title":"Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry Pi","authors":"Brian H. Curtin, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993061","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993061","url":null,"abstract":"Animal conservationists need unobtrusive methods of observing and studying wildlife in remote areas. Many commercial options for wildlife observation are expensive, obtrusive, or sub-optimal in remote environments. In this paper, we explore the viability of a Raspberry Pi-based camera system augmented with a deep learning image recognition model for detecting wildlife of interest. Unlike traditional sensor nodes that would have to transmit every captured image, localized image recognition enables only pictures of desired animals to be transferred to the user. For the purposes of this study, we use TensorFlow and Keras to create a convolutional neural network that runs on a Raspberry Pi 3B+. We trained the model on nearly 3,600 images gathered from publicly available image databases that are split into three classes. Our experiments suggest that our system can detect snow leopards with between 74 percent and 97 percent accuracy. We believe that our results show the viability of employing deep learning image recognition models on the Raspberry Pi to create an inexpensive system to observe wildlife.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992991
Kervins Nicolas, Yi Wang
A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type of attack pertains to a coin being spent more in more that one transaction in the network. This paper is motivated by a goal to create a blockchain that can withstand double spending attacks. This way, honest miners will be able to safely and securely exchange cryptocurrency. There currently lack valuable prevention methods in the network therefore we designed a novel countermeasure to combat double spending attacks on the blockchain system. We proposed the MSP (Multistage Secure Pool) framework in order to address the vulnerabilities on the blockchain. This was designed to handle both discrete and general issues that affect the overall security of the blockchain. Our evaluation using this application shows that there was a decrease in the amount of attacks propagating through the system based on our system's robustness and capabilities. We also present machine learning capabilities of the system in our study in order to enable a progressive aspect to the design. Providing our application with the ability to analyze data in order to recognize and classify distinct actions will enable for greater comprehension. An application that learns, updates and configures to meet specified defensive standards present key design features which enables for greater understanding and future analysis of the overall blockchain network.
{"title":"A novel double spending attack countermeasure in blockchain","authors":"Kervins Nicolas, Yi Wang","doi":"10.1109/UEMCON47517.2019.8992991","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992991","url":null,"abstract":"A blockchain database containing files regarding transactions of cryptocurrency is sometime vulnerable to double spending attack. This type of attack pertains to a coin being spent more in more that one transaction in the network. This paper is motivated by a goal to create a blockchain that can withstand double spending attacks. This way, honest miners will be able to safely and securely exchange cryptocurrency. There currently lack valuable prevention methods in the network therefore we designed a novel countermeasure to combat double spending attacks on the blockchain system. We proposed the MSP (Multistage Secure Pool) framework in order to address the vulnerabilities on the blockchain. This was designed to handle both discrete and general issues that affect the overall security of the blockchain. Our evaluation using this application shows that there was a decrease in the amount of attacks propagating through the system based on our system's robustness and capabilities. We also present machine learning capabilities of the system in our study in order to enable a progressive aspect to the design. Providing our application with the ability to analyze data in order to recognize and classify distinct actions will enable for greater comprehension. An application that learns, updates and configures to meet specified defensive standards present key design features which enables for greater understanding and future analysis of the overall blockchain network.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993043
Agnelo R. Silva, R. Akbar, Richard H. Chen, K. Bakian-Dogaheh, Negar Golestani, M. Moghaddam, D. Entekhabi
A novel approach for duty-cycled wake-up radios (WuRs) is proposed with focus on environmental monitoring applications involving wireless sensing devices left unattended in harsh conditions. In this scenario, a higher data latency (on the order of seconds or minutes) is potentially acceptable if significant improvements are achieved in terms of a) communication range, b) reliability, and c) energy-efficiency. The solution is solely based on off-the-shelf components with two main novelties implemented by software. First, the Receiver Bandwidth Filter of a commercial sub-GHz radio transceiver is configured with a small value typically not used in data communications (e.g., 9.5 kHz). Such action leads to a higher reliability of the WuR operation in outdoors where longer distances are involved and multiple signal interfering factors may be present. Second, the WuR addressing feature is achieved at the analog domain without requiring data decoding of any symbol. Nonetheless, more than 1,000 nodes can still be individually awoken with the proposed solution considering the 915MHz-ISM band. The preliminary empirical results from five outdoors sites involving more than 30 nodes show no false-positives and less than 3% of false-negative cases for distances higher than 225m and non line-of-sight (NLOS) and obstructed line-of-sight (OLOS) due to vegetation, rocks, and topography. By accepting a longer wake-up latency (e.g., 1 minute), the proposed solution which combines WuR and duty-cycling techniques can excel existing commercial WUR solutions in terms of energy-efficiency by more than one order of magnitude.
{"title":"Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring Applications","authors":"Agnelo R. Silva, R. Akbar, Richard H. Chen, K. Bakian-Dogaheh, Negar Golestani, M. Moghaddam, D. Entekhabi","doi":"10.1109/UEMCON47517.2019.8993043","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993043","url":null,"abstract":"A novel approach for duty-cycled wake-up radios (WuRs) is proposed with focus on environmental monitoring applications involving wireless sensing devices left unattended in harsh conditions. In this scenario, a higher data latency (on the order of seconds or minutes) is potentially acceptable if significant improvements are achieved in terms of a) communication range, b) reliability, and c) energy-efficiency. The solution is solely based on off-the-shelf components with two main novelties implemented by software. First, the Receiver Bandwidth Filter of a commercial sub-GHz radio transceiver is configured with a small value typically not used in data communications (e.g., 9.5 kHz). Such action leads to a higher reliability of the WuR operation in outdoors where longer distances are involved and multiple signal interfering factors may be present. Second, the WuR addressing feature is achieved at the analog domain without requiring data decoding of any symbol. Nonetheless, more than 1,000 nodes can still be individually awoken with the proposed solution considering the 915MHz-ISM band. The preliminary empirical results from five outdoors sites involving more than 30 nodes show no false-positives and less than 3% of false-negative cases for distances higher than 225m and non line-of-sight (NLOS) and obstructed line-of-sight (OLOS) due to vegetation, rocks, and topography. By accepting a longer wake-up latency (e.g., 1 minute), the proposed solution which combines WuR and duty-cycling techniques can excel existing commercial WUR solutions in terms of energy-efficiency by more than one order of magnitude.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993039
Chenbo Wang, Liang Hao, Baoji Wang, Jianhua Zhang, Yiming Lei
This paper investigates the bit error rate (BER) performance of the multiuser (MU) orthogonal frequency division multiplexing (OFDM) differential chaos shift keying (DCSK) system when the nonlinear distortion of power amplifiers is considered. Firstly, a nonlinear MU-OFDM-DCSK system model is established. Secondly, the close-form expression of BER performance is analytically derived. It is found that, BER function has a lower bound as operating point sweeps. Finally, the BER performance in linear and nonlinear systems are discussed when the system parameters sweep.
{"title":"Performance Analysis for Nonlinear MU-OFDM-DCSK Communication Systems","authors":"Chenbo Wang, Liang Hao, Baoji Wang, Jianhua Zhang, Yiming Lei","doi":"10.1109/UEMCON47517.2019.8993039","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993039","url":null,"abstract":"This paper investigates the bit error rate (BER) performance of the multiuser (MU) orthogonal frequency division multiplexing (OFDM) differential chaos shift keying (DCSK) system when the nonlinear distortion of power amplifiers is considered. Firstly, a nonlinear MU-OFDM-DCSK system model is established. Secondly, the close-form expression of BER performance is analytically derived. It is found that, BER function has a lower bound as operating point sweeps. Finally, the BER performance in linear and nonlinear systems are discussed when the system parameters sweep.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123938100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993026
Arjun Dutta, Amit Kumar, B. Kumar, Abhishek Roy, Poulami Paul, Swarnabha Roy, Rahul Agarwala, A. Chakraborty, A. Ghosh, Himadri Nath Saha, Anirup Roy, A. Adarsh
In this modern world agriculture plays a vital role in the development of the country, economy and its people. Agriculture depends a lot on the source and supply of water and that becomes a major issue in places which rely solely on the monsoons as their primary source of water, since the monsoons are not evenly distributed all over the country every year. In such cases, the scheduled watering of the crops can get hampered, and that might in turn hamper the quality and quantity of crops produced. To overcome this problem, the proposed smart irrigation system can be employed in the field of agriculture. In agriculture, apart from a water source, two more aspects are of prime importance, namely, the moisture content of the soil and its fertility. In this system, based on the soil type and the moisture levels, water will be provided to the agricultural field. At present, there are several techniques available to reduce the dependency on seasonal rain for agriculture. Mostly these techniques use electricity. However, in this paper our aim is to propose a low cost, sustainable solution to the problem of water supply in indoor cultivation, farms and agricultural fields.
{"title":"GSM Based Irrigation System","authors":"Arjun Dutta, Amit Kumar, B. Kumar, Abhishek Roy, Poulami Paul, Swarnabha Roy, Rahul Agarwala, A. Chakraborty, A. Ghosh, Himadri Nath Saha, Anirup Roy, A. Adarsh","doi":"10.1109/UEMCON47517.2019.8993026","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993026","url":null,"abstract":"In this modern world agriculture plays a vital role in the development of the country, economy and its people. Agriculture depends a lot on the source and supply of water and that becomes a major issue in places which rely solely on the monsoons as their primary source of water, since the monsoons are not evenly distributed all over the country every year. In such cases, the scheduled watering of the crops can get hampered, and that might in turn hamper the quality and quantity of crops produced. To overcome this problem, the proposed smart irrigation system can be employed in the field of agriculture. In agriculture, apart from a water source, two more aspects are of prime importance, namely, the moisture content of the soil and its fertility. In this system, based on the soil type and the moisture levels, water will be provided to the agricultural field. At present, there are several techniques available to reduce the dependency on seasonal rain for agriculture. Mostly these techniques use electricity. However, in this paper our aim is to propose a low cost, sustainable solution to the problem of water supply in indoor cultivation, farms and agricultural fields.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993002
Weiwei Lyu, Xianghong Cheng, Jinling Wang
Transfer alignment under the unknown external environment is a challenging problem in strapdown inertial navigation system (SINS). To suppress the filtering divergence when conducting transfer alignment, an adaptive compensation H∞ filter is proposed. This paper analyzes the cause of filtering divergence carefully and accordingly makes the corresponding adjustment and optimization. With the change of the unknown external environment, the robustness factor of the proposed filtering method can be dynamically adjusted. To solve the problem that the transfer alignment time is mainly determined according to experiences, the convergence criterion of the proposed filtering method is studied. The convergence criterion is based on the principles of mathematical statistics, and can automatically determine the convergence time of the filter. The aerial transfer alignment experiment illustrates that by using the convergence criterion, the alignment time can be effectively shortened and the response speed can be effectively improved.
{"title":"Adaptive Compensation H∞ Filter with Convergence Criterion for SINS’ Transfer Alignment","authors":"Weiwei Lyu, Xianghong Cheng, Jinling Wang","doi":"10.1109/UEMCON47517.2019.8993002","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993002","url":null,"abstract":"Transfer alignment under the unknown external environment is a challenging problem in strapdown inertial navigation system (SINS). To suppress the filtering divergence when conducting transfer alignment, an adaptive compensation H∞ filter is proposed. This paper analyzes the cause of filtering divergence carefully and accordingly makes the corresponding adjustment and optimization. With the change of the unknown external environment, the robustness factor of the proposed filtering method can be dynamically adjusted. To solve the problem that the transfer alignment time is mainly determined according to experiences, the convergence criterion of the proposed filtering method is studied. The convergence criterion is based on the principles of mathematical statistics, and can automatically determine the convergence time of the filter. The aerial transfer alignment experiment illustrates that by using the convergence criterion, the alignment time can be effectively shortened and the response speed can be effectively improved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128723393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}