首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Overhead View Person Detection Using YOLO 俯视图人员检测使用YOLO
Misbah Ahmad, Imran Ahmed, A. Adnan
In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.
在视频监控系统中,人员检测是一项重要任务。近年来,不同的计算机视觉和深度学习算法被开发出来,提供了鲁棒的人检测结果。这些已开发的技术大多集中在正面和非对称视图上。因此,在本文中,人的检测已经从一个显著改变的角度进行,即俯视图。一种深度学习模型,即YOLO (You Look Only Once),已经在俯视视角的人检测环境中进行了探索。该模型在正面视图数据集上进行训练,在俯视图人数据集上进行测试。在此基础上,利用分类边界框信息进行了俯视图人员计数。YOLO模型的TPR可达95%,FPR可达0.2%,效果显著。
{"title":"Overhead View Person Detection Using YOLO","authors":"Misbah Ahmad, Imran Ahmed, A. Adnan","doi":"10.1109/UEMCON47517.2019.8992980","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992980","url":null,"abstract":"In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A new Quantum Processor Architecture 一种新的量子处理器架构
Michael Joseph, K. Elleithy, Mohamed Mohamed
This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.
本文分析了离子阱和超导这两种领先的量子计算架构的现状,概述了这两种方法面临的挑战,并提出了一种结合这两种技术的最佳方面以及隔离量子比特的新方法的新架构。这种新架构保留了离子捕获架构在接近室温下操作其量子比特的能力,同时通过利用一种新的屏蔽技术和采用超导架构的表面代码布局来消除其可扩展性问题。通过消除超导结构的极低温度要求,这种新结构具有成本效益,可扩展性和大规模生产的实用性。
{"title":"A new Quantum Processor Architecture","authors":"Michael Joseph, K. Elleithy, Mohamed Mohamed","doi":"10.1109/UEMCON47517.2019.8992935","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992935","url":null,"abstract":"This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Based Smart Security and Home Automation System 基于物联网的智能安全和家庭自动化系统
Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.
物联网(Internet of Things, IoT)将通过互联网远程连接和监控现实世界中的物体(事物)的概念概念化[1]。当涉及到我们的房子时,这个概念可以适当地结合起来,使它更智能、更安全、更自动化。这个物联网项目的重点是建立一个智能无线家庭安全系统,当有人入侵时,通过互联网向主人发出警报,并有选择地发出警报。此外,通过使用同一套传感器,也可以将其用于家庭自动化。与现有的类似系统相比,更喜欢这个系统的优势在于,由WI-FI连接的微控制器管理系统发送的警报和状态可以被用户从任何距离的手机上接收,而不管他的手机是否连接到互联网。当前原型中使用的微控制器是TI-CC3200 Launchpad板,它带有嵌入式微控制器和板载Wi-Fi屏蔽,利用它可以控制和管理家中的所有电器。
{"title":"IoT Based Smart Security and Home Automation System","authors":"Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag","doi":"10.1109/UEMCON47517.2019.8992994","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992994","url":null,"abstract":"Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack PDF幻影:利用PDF攻击攻击学术会议的论文提交过程
Dat Tran, Chetan Jaiswal
First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.
PDF (Portable Document Format,可移植文档格式)于近30年前首次发布,已成为文本文档最常用的格式之一。如今,PDF被个人、公司和组织广泛使用。在大多数著名的学术会议上,包括ieee,论文都要求以PDF格式提交。随着近年来PDF的日益普及,它已成为许多攻击的目标,其中一些攻击称为内容屏蔽攻击。内容屏蔽攻击的思想是使底层文本(由文本挖掘软件提取并由机器读取)以不同的方式显示给人类。受到相同思想的启发,但设计和实现方式不同,我们提出的攻击针对大型学术会议的论文提交过程,该过程包括两个子过程:抄袭检测和论文审稿人的自动分配。我们的进攻克服了以前进攻的许多弱点。此外,我们还引入了一种防止攻击者从PDF文档中获取真实主题信息的方法来避免针对自动审稿人分配过程的内容屏蔽攻击。
{"title":"PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack","authors":"Dat Tran, Chetan Jaiswal","doi":"10.1109/UEMCON47517.2019.8992996","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992996","url":null,"abstract":"First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Study of Detectability of RFID System With Varying Atmospheric Conditions 不同大气条件下RFID系统可探测性的性能研究
Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik
Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.
如今,射频识别(RFID)系统已成为健康监测系统、收费广场收费、自然栖息地监测等众多应用的可靠解决方案。在RFID系统中,数据可以存储在标签中,标签可以被RFID阅读器读取。但这项技术的一个主要问题是,它的可探测性可能会受到不同大气条件的影响,比如温度、湿度、土壤的存在(以防防御目的)。因此,研究不同大气条件对电磁波传播的影响,以预测射频识别系统的性能是当前研究的重点。本文给出了射频识别系统在不同大气条件下的行为模式。在低频射频识别系统的研究中,我们考虑了干旱大气条件。观察了两个参数对RFID系统读取范围(RFID收发器之间的最大距离)的影响,即收发器之间的温度和土层厚度。
{"title":"Performance Study of Detectability of RFID System With Varying Atmospheric Conditions","authors":"Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik","doi":"10.1109/UEMCON47517.2019.8993107","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993107","url":null,"abstract":"Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scaling Blockchains to Support Electronic Health Records for Hospital Systems 扩展区块链以支持医院系统的电子健康记录
Alyssa Donawa, I. Orukari, C. Baker
Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.
电子健康记录(EHRs)改善了医疗保健的许多方面,并允许医疗提供者更轻松地管理患者。区块链已被提出作为支持电子健康记录(EHRs)的有前途的解决方案,但也与支持现实世界医疗保健系统的可扩展性问题有关。本文量化了与当前区块链相关的可扩展性问题和瓶颈,并透视了区块链在支持医疗保健系统方面的局限性。我们特别指出,比特币、以太坊和IOTA等知名区块链无法支持大型医院系统(如肯塔基大学医疗保健系统)的交易,每天有超过750万笔未密封的交易。然后,我们讨论了如何通过侧链来缓解区块链的瓶颈,使知名的区块链能够支持每天超过3000万笔交易的更大的医院系统。然后,我们介绍了患者-健康链架构,为如何实现侧链的EHR系统扩展区块链提供了未来的方向。
{"title":"Scaling Blockchains to Support Electronic Health Records for Hospital Systems","authors":"Alyssa Donawa, I. Orukari, C. Baker","doi":"10.1109/UEMCON47517.2019.8993101","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993101","url":null,"abstract":"Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems 一种用于自主微系统无接触编程和三维定位的低功耗光接收器
B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister
Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.
用于自主微系统的光学接收器提供了诸如实现无接触光学编程和低功耗3D光学定位等优点。提出了一种小型、低功耗的光接收器,用于将程序数据传输到微控制器的SRAM中,并检测来自灯塔定位系统的光脉冲。集成的光电二极管与基于逆变器的放大器设计相结合,从光输入产生数字波形。脉冲宽度调制方案用于允许时钟和数据恢复(CDR)在没有任何片上时钟源的情况下运行。该接收机在主机和待机功率分别为1.52 μ W和640 nW时能够实现320 kbps的数据速率,而占地面积为16,900 μ m2。该光学接收器也可以作为灯塔定位接收器,为单片集成系统实现完全集成、低功耗的定位方法。本文演示了一个灯塔定位程序在单片集成系统上的成功编程。采用市售HTC Vive V1灯塔基站,该光接收机能够提供相对方位和仰角数据,均方根误差分别为0.386度和0.312度,而功耗仅为1 mW。
{"title":"A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems","authors":"B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister","doi":"10.1109/UEMCON47517.2019.8992964","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992964","url":null,"abstract":"Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
What is A Robot Swarm: A Definition for Swarming Robotics 什么是机器人群:蜂群机器人的定义
Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela
The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.
swarm是一种多智能体系统,最近在自主机器人领域受到了广泛的关注。尽管在群体理论和多智能体人工智能领域进行了各种各样的理论和模拟研究工作,但群体的实际应用仍然有限。虽然许多限制因素都在技术方面,但其中一个限制因素可能是缺乏对群体能力和应用的认识,而不是传统的机器人技术。为了帮助解决后一个限制因素,本文提出了自主机器人背景下群体的定义,描述了许多可以通过使用群体来解决的现实世界问题,并详细介绍了群体机器人系统的当前应用。
{"title":"What is A Robot Swarm: A Definition for Swarming Robotics","authors":"Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela","doi":"10.1109/UEMCON47517.2019.8993024","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993024","url":null,"abstract":"The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security 树莓派网状传感器网络用于便携式周边安全
Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.
无线传感器网络在远程环境下的周界监测中发挥着重要作用。虽然存在用于提供视听监控的商用无线传感器网络,但它们的部署成本往往很高。在本文中,我们描述并实现了一个由廉价电池供电的树莓派节点组成的无线网状网络。树莓派的选择使构建具有成本效益的可扩展和消耗性的传感器节点成为可能。我们进行了一系列测试,以说明我们的网络在建筑物监控用例中的有效性。我们的节点建造成本低至每个节点49.00美元,并且能够实现50英尺的节点到节点传输。自定义睡眠状态使电池寿命持续14小时,4节AA电池。我们的结果支持我们的论文,即全pi网状传感器能够提供便携式周界安全性。
{"title":"A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security","authors":"Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993000","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993000","url":null,"abstract":"Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification 基于脑电图的生物识别技术利用图像识别进行患者身份识别
Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke
Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.
生物识别技术通过指纹、人脸识别或语音识别等手段,在安全领域得到了广泛的应用。在医疗领域,使用患者手环或患者卡进行识别可能会导致病历的错误。为了克服这些局限性,本文提出了一种利用脑电图(EEG)信号对患者身份进行分类的新方法,从而防止治疗错误的患者。该系统采用了OpenBCI Cyton、EEGlab、MATLAB、带通滤波器等多种硬件和软件。这项研究的主要目的是通过捕捉观看一系列引发注意力和记忆的图像的信号来强调对每个人的每个脑电图信号模式的识别。
{"title":"EEG-Based Biometrics Utilizing Image Recognition for Patient Identification","authors":"Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke","doi":"10.1109/UEMCON47517.2019.8992962","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992962","url":null,"abstract":"Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1