Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992980
Misbah Ahmad, Imran Ahmed, A. Adnan
In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.
在视频监控系统中,人员检测是一项重要任务。近年来,不同的计算机视觉和深度学习算法被开发出来,提供了鲁棒的人检测结果。这些已开发的技术大多集中在正面和非对称视图上。因此,在本文中,人的检测已经从一个显著改变的角度进行,即俯视图。一种深度学习模型,即YOLO (You Look Only Once),已经在俯视视角的人检测环境中进行了探索。该模型在正面视图数据集上进行训练,在俯视图人数据集上进行测试。在此基础上,利用分类边界框信息进行了俯视图人员计数。YOLO模型的TPR可达95%,FPR可达0.2%,效果显著。
{"title":"Overhead View Person Detection Using YOLO","authors":"Misbah Ahmad, Imran Ahmed, A. Adnan","doi":"10.1109/UEMCON47517.2019.8992980","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992980","url":null,"abstract":"In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992935
Michael Joseph, K. Elleithy, Mohamed Mohamed
This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.
{"title":"A new Quantum Processor Architecture","authors":"Michael Joseph, K. Elleithy, Mohamed Mohamed","doi":"10.1109/UEMCON47517.2019.8992935","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992935","url":null,"abstract":"This paper analyzes the current state of the two leading Quantum Computing architectures, namely Ion Trap and Super Conducting, outlines the challenges facing both methods and proposes a new architecture that incorporates the best aspect of both techniques along with a novel method to isolate the Qubits. This new architecture retains the Ion Trapped architecture ability to operate its Qubits at near room temperature while eliminating its scalability issue by utilizing a novel shielding technique and by adopting the surface code layout of the superconducting architecture. By eliminating the extremely low-temperature requirement of the superconducting architecture, this new architecture is poised to be cost-effective, scalable, and practical for mass production.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.
物联网(Internet of Things, IoT)将通过互联网远程连接和监控现实世界中的物体(事物)的概念概念化[1]。当涉及到我们的房子时,这个概念可以适当地结合起来,使它更智能、更安全、更自动化。这个物联网项目的重点是建立一个智能无线家庭安全系统,当有人入侵时,通过互联网向主人发出警报,并有选择地发出警报。此外,通过使用同一套传感器,也可以将其用于家庭自动化。与现有的类似系统相比,更喜欢这个系统的优势在于,由WI-FI连接的微控制器管理系统发送的警报和状态可以被用户从任何距离的手机上接收,而不管他的手机是否连接到互联网。当前原型中使用的微控制器是TI-CC3200 Launchpad板,它带有嵌入式微控制器和板载Wi-Fi屏蔽,利用它可以控制和管理家中的所有电器。
{"title":"IoT Based Smart Security and Home Automation System","authors":"Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag","doi":"10.1109/UEMCON47517.2019.8992994","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992994","url":null,"abstract":"Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992996
Dat Tran, Chetan Jaiswal
First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.
PDF (Portable Document Format,可移植文档格式)于近30年前首次发布,已成为文本文档最常用的格式之一。如今,PDF被个人、公司和组织广泛使用。在大多数著名的学术会议上,包括ieee,论文都要求以PDF格式提交。随着近年来PDF的日益普及,它已成为许多攻击的目标,其中一些攻击称为内容屏蔽攻击。内容屏蔽攻击的思想是使底层文本(由文本挖掘软件提取并由机器读取)以不同的方式显示给人类。受到相同思想的启发,但设计和实现方式不同,我们提出的攻击针对大型学术会议的论文提交过程,该过程包括两个子过程:抄袭检测和论文审稿人的自动分配。我们的进攻克服了以前进攻的许多弱点。此外,我们还引入了一种防止攻击者从PDF文档中获取真实主题信息的方法来避免针对自动审稿人分配过程的内容屏蔽攻击。
{"title":"PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack","authors":"Dat Tran, Chetan Jaiswal","doi":"10.1109/UEMCON47517.2019.8992996","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992996","url":null,"abstract":"First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993107
Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik
Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.
{"title":"Performance Study of Detectability of RFID System With Varying Atmospheric Conditions","authors":"Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik","doi":"10.1109/UEMCON47517.2019.8993107","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993107","url":null,"abstract":"Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993101
Alyssa Donawa, I. Orukari, C. Baker
Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.
{"title":"Scaling Blockchains to Support Electronic Health Records for Hospital Systems","authors":"Alyssa Donawa, I. Orukari, C. Baker","doi":"10.1109/UEMCON47517.2019.8993101","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993101","url":null,"abstract":"Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992964
B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister
Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.
{"title":"A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems","authors":"B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister","doi":"10.1109/UEMCON47517.2019.8992964","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992964","url":null,"abstract":"Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993024
Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela
The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.
{"title":"What is A Robot Swarm: A Definition for Swarming Robotics","authors":"Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela","doi":"10.1109/UEMCON47517.2019.8993024","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993024","url":null,"abstract":"The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993000
Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.
{"title":"A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security","authors":"Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993000","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993000","url":null,"abstract":"Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992962
Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke
Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.
{"title":"EEG-Based Biometrics Utilizing Image Recognition for Patient Identification","authors":"Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke","doi":"10.1109/UEMCON47517.2019.8992962","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992962","url":null,"abstract":"Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}