首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching 基于直方图均衡化和去相关拉伸的高安全性结构彩色QR码鲁棒数据检索
Mahssa Abdolahi, Hao Jiang, B. Kaminska
In this work, robust readout of the data (232 English characters) stored in high-security structural colour QR codes, was achieved by using multiple image processing techniques, specifically, histogram equalization and decorrelation stretching. The decoded structural colour QR codes are generic diffractive RGB-pixelated periodic nanocones selectively activated by laser exposure to obtain the particular design of interest. The samples were imaged according to the criteria determined by the diffraction grating equation for the lighting and viewing angles given the red, green, and blue periodicities of the grating. However, illumination variations all through the samples, cross-module and cross-channel interference effects result in acquiring images with dissimilar lighting conditions which cannot be directly retrieved by the decoding script and need significant preprocessing. According to the intensity plots, even if the intensity values are very close (above ~200) at some typical regions of the images with different lighting conditions, their inconsistencies (below ~100) at the pixels of one representative region may lead to the requirement for using different methods for recovering the data from all red, green, and blue channels. In many cases, a successful data readout could be achieved by downscaling the images to ~300-pixel dimensions (along with bilinear interpolation resampling), histogram equalization (HE), linear spatial low-pass mean filtering, and gamma function, each used either independently or with other complementary processes. The majority of images, however, could be fully decoded using decorrelation stretching (DS) either as a standalone or combinational process for obtaining a more distinctive colour definition.
在这项工作中,通过使用多种图像处理技术,特别是直方图均衡化和去相关拉伸,实现了存储在高安全性结构彩色QR码中的数据(232个英文字符)的鲁棒读出。解码的结构彩色QR码是通用的衍射rgb像素周期纳米锥,通过激光照射选择性激活以获得感兴趣的特定设计。根据光栅的红、绿、蓝周期性,根据衍射光栅方程确定的光照和视角标准对样品进行成像。然而,由于整个样本的光照变化、跨模块和跨通道的干扰效应,导致解码脚本无法直接检索到光照条件不同的图像,需要进行大量的预处理。从亮度图中可以看出,即使在不同光照条件下图像的某些典型区域亮度值非常接近(在~200以上),但在一个代表性区域像素处亮度值的不一致性(在~100以下)可能导致需要使用不同的方法从所有红、绿、蓝通道恢复数据。在许多情况下,成功的数据读出可以通过将图像缩小到~300像素的尺寸(以及双线性插值重采样)、直方图均衡化(HE)、线性空间低通平均滤波和伽马函数来实现,每个都可以单独使用或与其他互补过程一起使用。然而,大多数图像可以使用去相关拉伸(DS)作为一个独立的或组合的过程来完全解码,以获得更独特的色彩清晰度。
{"title":"Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching","authors":"Mahssa Abdolahi, Hao Jiang, B. Kaminska","doi":"10.1109/UEMCON47517.2019.8993032","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993032","url":null,"abstract":"In this work, robust readout of the data (232 English characters) stored in high-security structural colour QR codes, was achieved by using multiple image processing techniques, specifically, histogram equalization and decorrelation stretching. The decoded structural colour QR codes are generic diffractive RGB-pixelated periodic nanocones selectively activated by laser exposure to obtain the particular design of interest. The samples were imaged according to the criteria determined by the diffraction grating equation for the lighting and viewing angles given the red, green, and blue periodicities of the grating. However, illumination variations all through the samples, cross-module and cross-channel interference effects result in acquiring images with dissimilar lighting conditions which cannot be directly retrieved by the decoding script and need significant preprocessing. According to the intensity plots, even if the intensity values are very close (above ~200) at some typical regions of the images with different lighting conditions, their inconsistencies (below ~100) at the pixels of one representative region may lead to the requirement for using different methods for recovering the data from all red, green, and blue channels. In many cases, a successful data readout could be achieved by downscaling the images to ~300-pixel dimensions (along with bilinear interpolation resampling), histogram equalization (HE), linear spatial low-pass mean filtering, and gamma function, each used either independently or with other complementary processes. The majority of images, however, could be fully decoded using decorrelation stretching (DS) either as a standalone or combinational process for obtaining a more distinctive colour definition.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116927006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm 在雾到云范式中使用机器学习进行性能预测的架构模式
Souvik Sengupta, Jordi García, X. Masip-Bruin, Andrés Prieto-González
The Fog-to-Cloud (F2C) paradigm is emerging to both provide higher functional efficiency for latency-sensitive services and also help modern computing systems to be more intelligent. As it is still in its infancy, the biggest challenge for this domain is to build a proper resource allocation technique as part of an efficient resource management module. The diversified and distributed nature of that paradigm creates some additional hurdles for choosing the appropriate resources for executing some tasks. Significantly, efficient resource consumption estimation and performance forecasting are core issues in the design and development of a proper and smart resource management mechanism for F2C systems. Considering this fact, in this paper, we aim at designing an architectural framework for a prediction-based resource management mechanism for F2C systems. The performance prediction is based on supervised machine learning technology. The proposal has been evaluated and validated by predicting the performance and resources usage of F2C resources through several tests. Primarily, we have run an image recognition application on different F2C resources and collected performance-related information and resource consumption information. Then, by adopting the multivariate regression methodology, we perform some standard machine learning techniques to predict the performance and estimate the resource consumption of the F2C resources. Finally, to justify the effectiveness of our proposal, we calculated the value of a cost function between estimated values and the real measured values.
雾到云(F2C)模式正在兴起,它既为对延迟敏感的服务提供更高的功能效率,也帮助现代计算系统变得更加智能。由于该领域仍处于起步阶段,因此该领域面临的最大挑战是构建适当的资源分配技术,作为高效资源管理模块的一部分。该范式的多样化和分布式特性为选择执行某些任务所需的适当资源造成了一些额外的障碍。值得注意的是,有效的资源消耗估算和性能预测是设计和开发合适和智能的F2C系统资源管理机制的核心问题。考虑到这一事实,在本文中,我们的目标是为F2C系统设计一个基于预测的资源管理机制的架构框架。性能预测基于监督式机器学习技术。通过多次测试,预测了F2C资源的性能和资源使用情况,对该方案进行了评估和验证。首先,我们在不同的F2C资源上运行了一个图像识别应用程序,收集了与性能相关的信息和资源消耗信息。然后,通过采用多元回归方法,我们执行一些标准的机器学习技术来预测性能并估计F2C资源的资源消耗。最后,为了证明我们建议的有效性,我们计算了估计值和实际测量值之间的成本函数的值。
{"title":"An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm","authors":"Souvik Sengupta, Jordi García, X. Masip-Bruin, Andrés Prieto-González","doi":"10.1109/UEMCON47517.2019.8992939","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992939","url":null,"abstract":"The Fog-to-Cloud (F2C) paradigm is emerging to both provide higher functional efficiency for latency-sensitive services and also help modern computing systems to be more intelligent. As it is still in its infancy, the biggest challenge for this domain is to build a proper resource allocation technique as part of an efficient resource management module. The diversified and distributed nature of that paradigm creates some additional hurdles for choosing the appropriate resources for executing some tasks. Significantly, efficient resource consumption estimation and performance forecasting are core issues in the design and development of a proper and smart resource management mechanism for F2C systems. Considering this fact, in this paper, we aim at designing an architectural framework for a prediction-based resource management mechanism for F2C systems. The performance prediction is based on supervised machine learning technology. The proposal has been evaluated and validated by predicting the performance and resources usage of F2C resources through several tests. Primarily, we have run an image recognition application on different F2C resources and collected performance-related information and resource consumption information. Then, by adopting the multivariate regression methodology, we perform some standard machine learning techniques to predict the performance and estimate the resource consumption of the F2C resources. Finally, to justify the effectiveness of our proposal, we calculated the value of a cost function between estimated values and the real measured values.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"608 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Based Smart Security and Home Automation System 基于物联网的智能安全和家庭自动化系统
Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.
物联网(Internet of Things, IoT)将通过互联网远程连接和监控现实世界中的物体(事物)的概念概念化[1]。当涉及到我们的房子时,这个概念可以适当地结合起来,使它更智能、更安全、更自动化。这个物联网项目的重点是建立一个智能无线家庭安全系统,当有人入侵时,通过互联网向主人发出警报,并有选择地发出警报。此外,通过使用同一套传感器,也可以将其用于家庭自动化。与现有的类似系统相比,更喜欢这个系统的优势在于,由WI-FI连接的微控制器管理系统发送的警报和状态可以被用户从任何距离的手机上接收,而不管他的手机是否连接到互联网。当前原型中使用的微控制器是TI-CC3200 Launchpad板,它带有嵌入式微控制器和板载Wi-Fi屏蔽,利用它可以控制和管理家中的所有电器。
{"title":"IoT Based Smart Security and Home Automation System","authors":"Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag","doi":"10.1109/UEMCON47517.2019.8992994","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992994","url":null,"abstract":"Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack PDF幻影:利用PDF攻击攻击学术会议的论文提交过程
Dat Tran, Chetan Jaiswal
First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.
PDF (Portable Document Format,可移植文档格式)于近30年前首次发布,已成为文本文档最常用的格式之一。如今,PDF被个人、公司和组织广泛使用。在大多数著名的学术会议上,包括ieee,论文都要求以PDF格式提交。随着近年来PDF的日益普及,它已成为许多攻击的目标,其中一些攻击称为内容屏蔽攻击。内容屏蔽攻击的思想是使底层文本(由文本挖掘软件提取并由机器读取)以不同的方式显示给人类。受到相同思想的启发,但设计和实现方式不同,我们提出的攻击针对大型学术会议的论文提交过程,该过程包括两个子过程:抄袭检测和论文审稿人的自动分配。我们的进攻克服了以前进攻的许多弱点。此外,我们还引入了一种防止攻击者从PDF文档中获取真实主题信息的方法来避免针对自动审稿人分配过程的内容屏蔽攻击。
{"title":"PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack","authors":"Dat Tran, Chetan Jaiswal","doi":"10.1109/UEMCON47517.2019.8992996","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992996","url":null,"abstract":"First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Study of Detectability of RFID System With Varying Atmospheric Conditions 不同大气条件下RFID系统可探测性的性能研究
Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik
Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.
如今,射频识别(RFID)系统已成为健康监测系统、收费广场收费、自然栖息地监测等众多应用的可靠解决方案。在RFID系统中,数据可以存储在标签中,标签可以被RFID阅读器读取。但这项技术的一个主要问题是,它的可探测性可能会受到不同大气条件的影响,比如温度、湿度、土壤的存在(以防防御目的)。因此,研究不同大气条件对电磁波传播的影响,以预测射频识别系统的性能是当前研究的重点。本文给出了射频识别系统在不同大气条件下的行为模式。在低频射频识别系统的研究中,我们考虑了干旱大气条件。观察了两个参数对RFID系统读取范围(RFID收发器之间的最大距离)的影响,即收发器之间的温度和土层厚度。
{"title":"Performance Study of Detectability of RFID System With Varying Atmospheric Conditions","authors":"Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik","doi":"10.1109/UEMCON47517.2019.8993107","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993107","url":null,"abstract":"Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scaling Blockchains to Support Electronic Health Records for Hospital Systems 扩展区块链以支持医院系统的电子健康记录
Alyssa Donawa, I. Orukari, C. Baker
Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.
电子健康记录(EHRs)改善了医疗保健的许多方面,并允许医疗提供者更轻松地管理患者。区块链已被提出作为支持电子健康记录(EHRs)的有前途的解决方案,但也与支持现实世界医疗保健系统的可扩展性问题有关。本文量化了与当前区块链相关的可扩展性问题和瓶颈,并透视了区块链在支持医疗保健系统方面的局限性。我们特别指出,比特币、以太坊和IOTA等知名区块链无法支持大型医院系统(如肯塔基大学医疗保健系统)的交易,每天有超过750万笔未密封的交易。然后,我们讨论了如何通过侧链来缓解区块链的瓶颈,使知名的区块链能够支持每天超过3000万笔交易的更大的医院系统。然后,我们介绍了患者-健康链架构,为如何实现侧链的EHR系统扩展区块链提供了未来的方向。
{"title":"Scaling Blockchains to Support Electronic Health Records for Hospital Systems","authors":"Alyssa Donawa, I. Orukari, C. Baker","doi":"10.1109/UEMCON47517.2019.8993101","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993101","url":null,"abstract":"Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems 一种用于自主微系统无接触编程和三维定位的低功耗光接收器
B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister
Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.
用于自主微系统的光学接收器提供了诸如实现无接触光学编程和低功耗3D光学定位等优点。提出了一种小型、低功耗的光接收器,用于将程序数据传输到微控制器的SRAM中,并检测来自灯塔定位系统的光脉冲。集成的光电二极管与基于逆变器的放大器设计相结合,从光输入产生数字波形。脉冲宽度调制方案用于允许时钟和数据恢复(CDR)在没有任何片上时钟源的情况下运行。该接收机在主机和待机功率分别为1.52 μ W和640 nW时能够实现320 kbps的数据速率,而占地面积为16,900 μ m2。该光学接收器也可以作为灯塔定位接收器,为单片集成系统实现完全集成、低功耗的定位方法。本文演示了一个灯塔定位程序在单片集成系统上的成功编程。采用市售HTC Vive V1灯塔基站,该光接收机能够提供相对方位和仰角数据,均方根误差分别为0.386度和0.312度,而功耗仅为1 mW。
{"title":"A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems","authors":"B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister","doi":"10.1109/UEMCON47517.2019.8992964","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992964","url":null,"abstract":"Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
What is A Robot Swarm: A Definition for Swarming Robotics 什么是机器人群:蜂群机器人的定义
Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela
The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.
swarm是一种多智能体系统,最近在自主机器人领域受到了广泛的关注。尽管在群体理论和多智能体人工智能领域进行了各种各样的理论和模拟研究工作,但群体的实际应用仍然有限。虽然许多限制因素都在技术方面,但其中一个限制因素可能是缺乏对群体能力和应用的认识,而不是传统的机器人技术。为了帮助解决后一个限制因素,本文提出了自主机器人背景下群体的定义,描述了许多可以通过使用群体来解决的现实世界问题,并详细介绍了群体机器人系统的当前应用。
{"title":"What is A Robot Swarm: A Definition for Swarming Robotics","authors":"Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela","doi":"10.1109/UEMCON47517.2019.8993024","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993024","url":null,"abstract":"The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security 树莓派网状传感器网络用于便携式周边安全
Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.
无线传感器网络在远程环境下的周界监测中发挥着重要作用。虽然存在用于提供视听监控的商用无线传感器网络,但它们的部署成本往往很高。在本文中,我们描述并实现了一个由廉价电池供电的树莓派节点组成的无线网状网络。树莓派的选择使构建具有成本效益的可扩展和消耗性的传感器节点成为可能。我们进行了一系列测试,以说明我们的网络在建筑物监控用例中的有效性。我们的节点建造成本低至每个节点49.00美元,并且能够实现50英尺的节点到节点传输。自定义睡眠状态使电池寿命持续14小时,4节AA电池。我们的结果支持我们的论文,即全pi网状传感器能够提供便携式周界安全性。
{"title":"A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security","authors":"Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993000","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993000","url":null,"abstract":"Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification 基于脑电图的生物识别技术利用图像识别进行患者身份识别
Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke
Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.
生物识别技术通过指纹、人脸识别或语音识别等手段,在安全领域得到了广泛的应用。在医疗领域,使用患者手环或患者卡进行识别可能会导致病历的错误。为了克服这些局限性,本文提出了一种利用脑电图(EEG)信号对患者身份进行分类的新方法,从而防止治疗错误的患者。该系统采用了OpenBCI Cyton、EEGlab、MATLAB、带通滤波器等多种硬件和软件。这项研究的主要目的是通过捕捉观看一系列引发注意力和记忆的图像的信号来强调对每个人的每个脑电图信号模式的识别。
{"title":"EEG-Based Biometrics Utilizing Image Recognition for Patient Identification","authors":"Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke","doi":"10.1109/UEMCON47517.2019.8992962","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992962","url":null,"abstract":"Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1