Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993032
Mahssa Abdolahi, Hao Jiang, B. Kaminska
In this work, robust readout of the data (232 English characters) stored in high-security structural colour QR codes, was achieved by using multiple image processing techniques, specifically, histogram equalization and decorrelation stretching. The decoded structural colour QR codes are generic diffractive RGB-pixelated periodic nanocones selectively activated by laser exposure to obtain the particular design of interest. The samples were imaged according to the criteria determined by the diffraction grating equation for the lighting and viewing angles given the red, green, and blue periodicities of the grating. However, illumination variations all through the samples, cross-module and cross-channel interference effects result in acquiring images with dissimilar lighting conditions which cannot be directly retrieved by the decoding script and need significant preprocessing. According to the intensity plots, even if the intensity values are very close (above ~200) at some typical regions of the images with different lighting conditions, their inconsistencies (below ~100) at the pixels of one representative region may lead to the requirement for using different methods for recovering the data from all red, green, and blue channels. In many cases, a successful data readout could be achieved by downscaling the images to ~300-pixel dimensions (along with bilinear interpolation resampling), histogram equalization (HE), linear spatial low-pass mean filtering, and gamma function, each used either independently or with other complementary processes. The majority of images, however, could be fully decoded using decorrelation stretching (DS) either as a standalone or combinational process for obtaining a more distinctive colour definition.
{"title":"Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching","authors":"Mahssa Abdolahi, Hao Jiang, B. Kaminska","doi":"10.1109/UEMCON47517.2019.8993032","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993032","url":null,"abstract":"In this work, robust readout of the data (232 English characters) stored in high-security structural colour QR codes, was achieved by using multiple image processing techniques, specifically, histogram equalization and decorrelation stretching. The decoded structural colour QR codes are generic diffractive RGB-pixelated periodic nanocones selectively activated by laser exposure to obtain the particular design of interest. The samples were imaged according to the criteria determined by the diffraction grating equation for the lighting and viewing angles given the red, green, and blue periodicities of the grating. However, illumination variations all through the samples, cross-module and cross-channel interference effects result in acquiring images with dissimilar lighting conditions which cannot be directly retrieved by the decoding script and need significant preprocessing. According to the intensity plots, even if the intensity values are very close (above ~200) at some typical regions of the images with different lighting conditions, their inconsistencies (below ~100) at the pixels of one representative region may lead to the requirement for using different methods for recovering the data from all red, green, and blue channels. In many cases, a successful data readout could be achieved by downscaling the images to ~300-pixel dimensions (along with bilinear interpolation resampling), histogram equalization (HE), linear spatial low-pass mean filtering, and gamma function, each used either independently or with other complementary processes. The majority of images, however, could be fully decoded using decorrelation stretching (DS) either as a standalone or combinational process for obtaining a more distinctive colour definition.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116927006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Fog-to-Cloud (F2C) paradigm is emerging to both provide higher functional efficiency for latency-sensitive services and also help modern computing systems to be more intelligent. As it is still in its infancy, the biggest challenge for this domain is to build a proper resource allocation technique as part of an efficient resource management module. The diversified and distributed nature of that paradigm creates some additional hurdles for choosing the appropriate resources for executing some tasks. Significantly, efficient resource consumption estimation and performance forecasting are core issues in the design and development of a proper and smart resource management mechanism for F2C systems. Considering this fact, in this paper, we aim at designing an architectural framework for a prediction-based resource management mechanism for F2C systems. The performance prediction is based on supervised machine learning technology. The proposal has been evaluated and validated by predicting the performance and resources usage of F2C resources through several tests. Primarily, we have run an image recognition application on different F2C resources and collected performance-related information and resource consumption information. Then, by adopting the multivariate regression methodology, we perform some standard machine learning techniques to predict the performance and estimate the resource consumption of the F2C resources. Finally, to justify the effectiveness of our proposal, we calculated the value of a cost function between estimated values and the real measured values.
{"title":"An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm","authors":"Souvik Sengupta, Jordi García, X. Masip-Bruin, Andrés Prieto-González","doi":"10.1109/UEMCON47517.2019.8992939","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992939","url":null,"abstract":"The Fog-to-Cloud (F2C) paradigm is emerging to both provide higher functional efficiency for latency-sensitive services and also help modern computing systems to be more intelligent. As it is still in its infancy, the biggest challenge for this domain is to build a proper resource allocation technique as part of an efficient resource management module. The diversified and distributed nature of that paradigm creates some additional hurdles for choosing the appropriate resources for executing some tasks. Significantly, efficient resource consumption estimation and performance forecasting are core issues in the design and development of a proper and smart resource management mechanism for F2C systems. Considering this fact, in this paper, we aim at designing an architectural framework for a prediction-based resource management mechanism for F2C systems. The performance prediction is based on supervised machine learning technology. The proposal has been evaluated and validated by predicting the performance and resources usage of F2C resources through several tests. Primarily, we have run an image recognition application on different F2C resources and collected performance-related information and resource consumption information. Then, by adopting the multivariate regression methodology, we perform some standard machine learning techniques to predict the performance and estimate the resource consumption of the F2C resources. Finally, to justify the effectiveness of our proposal, we calculated the value of a cost function between estimated values and the real measured values.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"608 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.
物联网(Internet of Things, IoT)将通过互联网远程连接和监控现实世界中的物体(事物)的概念概念化[1]。当涉及到我们的房子时,这个概念可以适当地结合起来,使它更智能、更安全、更自动化。这个物联网项目的重点是建立一个智能无线家庭安全系统,当有人入侵时,通过互联网向主人发出警报,并有选择地发出警报。此外,通过使用同一套传感器,也可以将其用于家庭自动化。与现有的类似系统相比,更喜欢这个系统的优势在于,由WI-FI连接的微控制器管理系统发送的警报和状态可以被用户从任何距离的手机上接收,而不管他的手机是否连接到互联网。当前原型中使用的微控制器是TI-CC3200 Launchpad板,它带有嵌入式微控制器和板载Wi-Fi屏蔽,利用它可以控制和管理家中的所有电器。
{"title":"IoT Based Smart Security and Home Automation System","authors":"Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag","doi":"10.1109/UEMCON47517.2019.8992994","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992994","url":null,"abstract":"Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992996
Dat Tran, Chetan Jaiswal
First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.
PDF (Portable Document Format,可移植文档格式)于近30年前首次发布,已成为文本文档最常用的格式之一。如今,PDF被个人、公司和组织广泛使用。在大多数著名的学术会议上,包括ieee,论文都要求以PDF格式提交。随着近年来PDF的日益普及,它已成为许多攻击的目标,其中一些攻击称为内容屏蔽攻击。内容屏蔽攻击的思想是使底层文本(由文本挖掘软件提取并由机器读取)以不同的方式显示给人类。受到相同思想的启发,但设计和实现方式不同,我们提出的攻击针对大型学术会议的论文提交过程,该过程包括两个子过程:抄袭检测和论文审稿人的自动分配。我们的进攻克服了以前进攻的许多弱点。此外,我们还引入了一种防止攻击者从PDF文档中获取真实主题信息的方法来避免针对自动审稿人分配过程的内容屏蔽攻击。
{"title":"PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack","authors":"Dat Tran, Chetan Jaiswal","doi":"10.1109/UEMCON47517.2019.8992996","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992996","url":null,"abstract":"First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993107
Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik
Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.
{"title":"Performance Study of Detectability of RFID System With Varying Atmospheric Conditions","authors":"Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik","doi":"10.1109/UEMCON47517.2019.8993107","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993107","url":null,"abstract":"Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993101
Alyssa Donawa, I. Orukari, C. Baker
Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.
{"title":"Scaling Blockchains to Support Electronic Health Records for Hospital Systems","authors":"Alyssa Donawa, I. Orukari, C. Baker","doi":"10.1109/UEMCON47517.2019.8993101","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993101","url":null,"abstract":"Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992964
B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister
Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.
{"title":"A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems","authors":"B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister","doi":"10.1109/UEMCON47517.2019.8992964","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992964","url":null,"abstract":"Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993024
Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela
The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.
{"title":"What is A Robot Swarm: A Definition for Swarming Robotics","authors":"Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela","doi":"10.1109/UEMCON47517.2019.8993024","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993024","url":null,"abstract":"The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993000
Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.
{"title":"A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security","authors":"Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993000","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993000","url":null,"abstract":"Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992962
Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke
Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.
{"title":"EEG-Based Biometrics Utilizing Image Recognition for Patient Identification","authors":"Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke","doi":"10.1109/UEMCON47517.2019.8992962","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992962","url":null,"abstract":"Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}