Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993053
Drashti Pathak, A. Varde, C. Alo, F. Oteng
Climate conditions are uncertain, thus it is crucial to get advance information on parameters such as precipitation at various regions to plan sustainable living. It is useful to obtain this information anywhere and anytime to facilitate local water management. Accordingly, the main goal of our project is to develop a Hydro-climate Data App that estimates water related climactic parameters at given locations based on global predictive models in Earth and Environmental Science. We consider climate data for regions in New Jersey. Users are required to input a location and year for which the app displays the latitude and longitude, and predicts the output on precipitation, humidity and temperature. This app is interactive and user-friendly, deploying aspects of HCI (Human Computer Interaction), such that expert as well as non-expert users can easily access and interpret it. Challenges in this work include procurement and deployment of accurate prediction techniques. To address these, we research various scientific models, e.g. CCSM (Community Climate System Model) and embed suitable ones into the app using HCI aspects such as ethnographic studies. As evident from our evaluation, this app is beneficial to environmental scientists, students and local residents. It is useful for research on climate change and sustainability. This work fits the scope of SDGs (Sustainable Development Goals) of the United Nations, mapping to at least 3 of its 17 goals. It addresses the theme of IoT (Internet of Things) that entails providing Internet based information in everyday devices for ubiquitous access.
{"title":"Ubiquitous Access for Local Water Management Through HCI Based App Development","authors":"Drashti Pathak, A. Varde, C. Alo, F. Oteng","doi":"10.1109/UEMCON47517.2019.8993053","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993053","url":null,"abstract":"Climate conditions are uncertain, thus it is crucial to get advance information on parameters such as precipitation at various regions to plan sustainable living. It is useful to obtain this information anywhere and anytime to facilitate local water management. Accordingly, the main goal of our project is to develop a Hydro-climate Data App that estimates water related climactic parameters at given locations based on global predictive models in Earth and Environmental Science. We consider climate data for regions in New Jersey. Users are required to input a location and year for which the app displays the latitude and longitude, and predicts the output on precipitation, humidity and temperature. This app is interactive and user-friendly, deploying aspects of HCI (Human Computer Interaction), such that expert as well as non-expert users can easily access and interpret it. Challenges in this work include procurement and deployment of accurate prediction techniques. To address these, we research various scientific models, e.g. CCSM (Community Climate System Model) and embed suitable ones into the app using HCI aspects such as ethnographic studies. As evident from our evaluation, this app is beneficial to environmental scientists, students and local residents. It is useful for research on climate change and sustainability. This work fits the scope of SDGs (Sustainable Development Goals) of the United Nations, mapping to at least 3 of its 17 goals. It addresses the theme of IoT (Internet of Things) that entails providing Internet based information in everyday devices for ubiquitous access.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992963
Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, E. Aloufi, M. Zohdy, Ming Hua
The number of zero-day attacks has been exponentially increasing due to a variety of heterogeneous Internet of Things (IoT) protocols. Many centralized-based techniques have been introduced to identify malicious activities in IoT environments. However, these techniques have suffered including a high latency to satisfy IoT requirements. This paper proposes a fog-based attack detection (FBAD) framework using an ensemble of online sequential extreme learning machine (EOS-ELM) for efficiently detecting malicious activities. We indicate a high-level view of the efficient proposed framework for deploying the distributed attack detection technique in fog computing due to high accuracy and low latency, as it is closer to the IoT devices at the network edge. Furthermore, we compare the performance of our framework with other existing approaches including ELM and OS-ELM. The results of the experiment demonstrate that distributed architecture outperforms centralized architecture in terms of the detection time and classification accuracy.
{"title":"FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities","authors":"Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, E. Aloufi, M. Zohdy, Ming Hua","doi":"10.1109/UEMCON47517.2019.8992963","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992963","url":null,"abstract":"The number of zero-day attacks has been exponentially increasing due to a variety of heterogeneous Internet of Things (IoT) protocols. Many centralized-based techniques have been introduced to identify malicious activities in IoT environments. However, these techniques have suffered including a high latency to satisfy IoT requirements. This paper proposes a fog-based attack detection (FBAD) framework using an ensemble of online sequential extreme learning machine (EOS-ELM) for efficiently detecting malicious activities. We indicate a high-level view of the efficient proposed framework for deploying the distributed attack detection technique in fog computing due to high accuracy and low latency, as it is closer to the IoT devices at the network edge. Furthermore, we compare the performance of our framework with other existing approaches including ELM and OS-ELM. The results of the experiment demonstrate that distributed architecture outperforms centralized architecture in terms of the detection time and classification accuracy.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"32 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992966
G. Raja, S. Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan
In the past twenty years, Unmanned Aerial Vehicles (UAVs) have demonstrated their ability in supporting both military and civilian applications. It has proved itself useful in tasks which are dangerous or too costly with usual methods. Certain applications also contains tasks which can be processed faster by using multiple UAVs that work together and perform smaller tasks which can be further combined to get the intended result. However, to achieve this, we need autonomous coordination among the multi UAVs. Multiple UAVs flying as a swarm, incorporates a pattern or a shape that has to be maintained through out the flight. But there can be cases where the pattern or shape of swarm has to be changed. Under such circumstances, collision has to be avoided between the UAVs as they travel to their new position forming a new shape. We have proposed an algorithm which helps in finding optimal goal positions for the UAVs to flock and to find the trajectory which supports collision free movement to its assigned position. We also ensure that the total distance travelled by individual UAV is minimized. The optimal goal position assignment is done using Hungarian Algorithm. Deep Q Learning method is used to find the optimal flight parameters for a collision free trajectory for the UAVs to reach its goal. Results from simulation show that the algorithm is sufficiently fast for practical applications as optimal assignments and flight parameters were computed for 50 UAVs in less than 1s.
{"title":"Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking Environment","authors":"G. Raja, S. Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan","doi":"10.1109/UEMCON47517.2019.8992966","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992966","url":null,"abstract":"In the past twenty years, Unmanned Aerial Vehicles (UAVs) have demonstrated their ability in supporting both military and civilian applications. It has proved itself useful in tasks which are dangerous or too costly with usual methods. Certain applications also contains tasks which can be processed faster by using multiple UAVs that work together and perform smaller tasks which can be further combined to get the intended result. However, to achieve this, we need autonomous coordination among the multi UAVs. Multiple UAVs flying as a swarm, incorporates a pattern or a shape that has to be maintained through out the flight. But there can be cases where the pattern or shape of swarm has to be changed. Under such circumstances, collision has to be avoided between the UAVs as they travel to their new position forming a new shape. We have proposed an algorithm which helps in finding optimal goal positions for the UAVs to flock and to find the trajectory which supports collision free movement to its assigned position. We also ensure that the total distance travelled by individual UAV is minimized. The optimal goal position assignment is done using Hungarian Algorithm. Deep Q Learning method is used to find the optimal flight parameters for a collision free trajectory for the UAVs to reach its goal. Results from simulation show that the algorithm is sufficiently fast for practical applications as optimal assignments and flight parameters were computed for 50 UAVs in less than 1s.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993027
A. Manzak, Sadi Evren Seker
Today's central processing unit (CPU) technology makes it possible for a processor to adjust its voltage and clock frequency dynamically depending on its current CPU load, memory load, or operating system requests. Higher energy saving is possible if the application's power profile can be estimated or determined fast and accurate. If the application's power profile is completely known prior to execution, then maximum/optimum power saving is possible using off-line dynamic voltage and frequency scaling (DVFS) algorithms. The question is, how to determine full power-profile of an application prior to execution and how much power saving is possible. In this paper, we discuss the methodology to determine full power profile of an application and calculate potential energy savings using off-line DVFS algorithms for randomly generated and real-life cases.
{"title":"Low Power Design for DVFS Capable Software","authors":"A. Manzak, Sadi Evren Seker","doi":"10.1109/UEMCON47517.2019.8993027","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993027","url":null,"abstract":"Today's central processing unit (CPU) technology makes it possible for a processor to adjust its voltage and clock frequency dynamically depending on its current CPU load, memory load, or operating system requests. Higher energy saving is possible if the application's power profile can be estimated or determined fast and accurate. If the application's power profile is completely known prior to execution, then maximum/optimum power saving is possible using off-line dynamic voltage and frequency scaling (DVFS) algorithms. The question is, how to determine full power-profile of an application prior to execution and how much power saving is possible. In this paper, we discuss the methodology to determine full power profile of an application and calculate potential energy savings using off-line DVFS algorithms for randomly generated and real-life cases.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.
{"title":"Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices","authors":"Divyashikha Sethia, Anadi Shakya, Ritika Aggarwal, Saksham Bhayana","doi":"10.1109/UEMCON47517.2019.8993103","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993103","url":null,"abstract":"Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993074
Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj
This work aims to analyze the last 6 years of professional basketball data using knowledge discovery tools. The goal is to outline some insight into how teams win and what separates these winning teams from the losing teams. Using Microsoft SQL Server Management Studio, Microsoft Business Intelligence, R and PowerBI, we analyzed regular season game data to find previously unknown trends between winning and losing teams. Using decision trees, naive Bayes and association rules, we will look at defensive and offensive data between teams. The following stats are considered: defensive and offensive rebounds, blocks, steals, turnovers, 2 point shot percentage and 3 point shot percentage. Results show that teams who earn more defensive rebounds win more games while teams that earn higher than average offensive rebounds lose more games. This is because teams that get more offensive rebounds are missing more of their shots.
本研究旨在利用知识发现工具分析近6年的职业篮球数据。我们的目标是勾勒出一些关于团队如何获胜的见解,以及这些获胜的团队与失败的团队之间的区别。使用Microsoft SQL Server Management Studio、Microsoft Business Intelligence、R和PowerBI,我们分析了常规赛的比赛数据,以发现胜败球队之间以前未知的趋势。使用决策树,朴素贝叶斯和关联规则,我们将查看球队之间的防守和进攻数据。考虑以下数据:防守和进攻篮板,盖帽,抢断,失误,2分命中率和3分命中率。结果显示,防守篮板多的球队赢得更多比赛,而进攻篮板高于平均水平的球队输掉更多比赛。这是因为得到更多进攻篮板的球队投篮失误更多。
{"title":"Data Mining in The NBA: An Applied Approach","authors":"Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj","doi":"10.1109/UEMCON47517.2019.8993074","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993074","url":null,"abstract":"This work aims to analyze the last 6 years of professional basketball data using knowledge discovery tools. The goal is to outline some insight into how teams win and what separates these winning teams from the losing teams. Using Microsoft SQL Server Management Studio, Microsoft Business Intelligence, R and PowerBI, we analyzed regular season game data to find previously unknown trends between winning and losing teams. Using decision trees, naive Bayes and association rules, we will look at defensive and offensive data between teams. The following stats are considered: defensive and offensive rebounds, blocks, steals, turnovers, 2 point shot percentage and 3 point shot percentage. Results show that teams who earn more defensive rebounds win more games while teams that earn higher than average offensive rebounds lose more games. This is because teams that get more offensive rebounds are missing more of their shots.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993009
K. Saho, K. Uemura, M. Fujimoto, M. Matsumoto
This study shows a significant relationship between the kinematic parameters of the sit-to-stand-to-sit movements (STSTS) sensed with a Micro-Doppler radar (MDR) and the scale of High-level Instrumental Activities of Daily Living (HL-IADLs) defined as an ability to perform modern daily activities independently. HL-IADLs are useful in evaluating the degree of disability in daily life; hence, this study aims to develop an MDR system that would enable HL-IADL impairment to be unconstrainedly monitored on a daily basis. The study participants were 65–74 years old. Their motion parameters (e.g., velocity and acceleration) in natural STSTS were extracted via a single 24-GHz MDR installed on the ceiling. Their HL-IADL scales were evaluated using a questionnaire-based scale, called the Japan Science and Technology Agency Index of Competence (JST-IC). The relationship between the JST-IC and the extracted STSTS kinematic parameters was then statistically analyzed. The results reveal that the extracted parameters were associated with the JST-IC score, suggesting the possibility of the HL-IADL impairment detection based on the MDR monitoring.
{"title":"Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living","authors":"K. Saho, K. Uemura, M. Fujimoto, M. Matsumoto","doi":"10.1109/UEMCON47517.2019.8993009","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993009","url":null,"abstract":"This study shows a significant relationship between the kinematic parameters of the sit-to-stand-to-sit movements (STSTS) sensed with a Micro-Doppler radar (MDR) and the scale of High-level Instrumental Activities of Daily Living (HL-IADLs) defined as an ability to perform modern daily activities independently. HL-IADLs are useful in evaluating the degree of disability in daily life; hence, this study aims to develop an MDR system that would enable HL-IADL impairment to be unconstrainedly monitored on a daily basis. The study participants were 65–74 years old. Their motion parameters (e.g., velocity and acceleration) in natural STSTS were extracted via a single 24-GHz MDR installed on the ceiling. Their HL-IADL scales were evaluated using a questionnaire-based scale, called the Japan Science and Technology Agency Index of Competence (JST-IC). The relationship between the JST-IC and the extracted STSTS kinematic parameters was then statistically analyzed. The results reveal that the extracted parameters were associated with the JST-IC score, suggesting the possibility of the HL-IADL impairment detection based on the MDR monitoring.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992956
Ramnhell P. Alday, Maryli F. Rosas
Bikers Haven Restaurant has been well known around the city of Tagaytay and Amadeo as one of the favorite restaurants in the Philippines that serves the popular Batangas Lomi, a Filipino dish. They have made a great reputation through the years which made them able to maintain their legacy of serving authentic dishes to their customers. As convenient and successful it may sound, the business owner finds the manual storage, and data management troubling. With this former undealt trouble of improving data management, the restaurant has also lost potential advantages to improve the business, and to have a lead against competitors through technological forecasting. Data has been crucial nowadays as there has been significantly infinite potential once used appropriately. However, Bikers Haven restaurant failed to manage the said data efficiently, having them lost a great opportunity that has been waiting to be managed with utmost capability of providing the Business Intelligence for their organization. Yet, it was not too late, as aimed by both parties, the struggle will not last long. The aim of this research is to seek a Business Intelligence–––is used to turn data into actionable information for leadership, management, organization and decision making-solution for Bikers Haven restaurant's data management and efficiency, which includes data warehousing where data will be stored in an orderly manner and in most accessible process compared to the traditional storage and retrieval. Data warehousing will be implemented to integrate and maintain valuable data. For Bikers Haven restaurant, it will be an unpredictable edge against restaurants competing within the area. Furthermore, Business Intelligence through mining data will also be a remarkable improvement on organization of every business process and transaction to the restaurant since it will secure data in a modern way that can be studied to analyze trends and actively adapt to growing needs of the business. Having vision and track of the business allows the owners to predict the status and operational considerations of the restaurant which always had been a trouble for every entrepreneur who refuses to migrate into new technologies. This disruption convinced Bikers Haven Restaurant on the necessity of having Business Intelligence as a competitive advantage of the company which allowed the researcher to develop an accessible solution to improve data usage of the business. (Abstract)
{"title":"Business Intelligence Solution for Bikers Haven Restaurant","authors":"Ramnhell P. Alday, Maryli F. Rosas","doi":"10.1109/UEMCON47517.2019.8992956","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992956","url":null,"abstract":"Bikers Haven Restaurant has been well known around the city of Tagaytay and Amadeo as one of the favorite restaurants in the Philippines that serves the popular Batangas Lomi, a Filipino dish. They have made a great reputation through the years which made them able to maintain their legacy of serving authentic dishes to their customers. As convenient and successful it may sound, the business owner finds the manual storage, and data management troubling. With this former undealt trouble of improving data management, the restaurant has also lost potential advantages to improve the business, and to have a lead against competitors through technological forecasting. Data has been crucial nowadays as there has been significantly infinite potential once used appropriately. However, Bikers Haven restaurant failed to manage the said data efficiently, having them lost a great opportunity that has been waiting to be managed with utmost capability of providing the Business Intelligence for their organization. Yet, it was not too late, as aimed by both parties, the struggle will not last long. The aim of this research is to seek a Business Intelligence–––is used to turn data into actionable information for leadership, management, organization and decision making-solution for Bikers Haven restaurant's data management and efficiency, which includes data warehousing where data will be stored in an orderly manner and in most accessible process compared to the traditional storage and retrieval. Data warehousing will be implemented to integrate and maintain valuable data. For Bikers Haven restaurant, it will be an unpredictable edge against restaurants competing within the area. Furthermore, Business Intelligence through mining data will also be a remarkable improvement on organization of every business process and transaction to the restaurant since it will secure data in a modern way that can be studied to analyze trends and actively adapt to growing needs of the business. Having vision and track of the business allows the owners to predict the status and operational considerations of the restaurant which always had been a trouble for every entrepreneur who refuses to migrate into new technologies. This disruption convinced Bikers Haven Restaurant on the necessity of having Business Intelligence as a competitive advantage of the company which allowed the researcher to develop an accessible solution to improve data usage of the business. (Abstract)","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8992953
Zuhair Alqarni, J. Asumadu
In this paper a PVA is used to charge the battery through MPPT controlled booster converter. The charging characteristics of the battery are observed with different solar irradiations. The MPPT algorithm used to control the DC-DC booster converter is popular P&O method. The modelling of PVA with MPPT algorithm and required mathematical calculations are proposed in this paper. The power output of PVA with respect to solar irradiation is observed in a comparison with SOC of the battery. All graphs are plotted using MATLAB Simulink GUI environment with time reference with variable parameters.
{"title":"Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation","authors":"Zuhair Alqarni, J. Asumadu","doi":"10.1109/UEMCON47517.2019.8992953","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992953","url":null,"abstract":"In this paper a PVA is used to charge the battery through MPPT controlled booster converter. The charging characteristics of the battery are observed with different solar irradiations. The MPPT algorithm used to control the DC-DC booster converter is popular P&O method. The modelling of PVA with MPPT algorithm and required mathematical calculations are proposed in this paper. The power output of PVA with respect to solar irradiation is observed in a comparison with SOC of the battery. All graphs are plotted using MATLAB Simulink GUI environment with time reference with variable parameters.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125200309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/UEMCON47517.2019.8993080
A. F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño
Rehabilitation robotics is a recent kind of service robot that include devices such as robotic prosthesis and exoskeletons. These devices could help motor disabled people to rehabilitate their motor functions, and could provide functional compensation to accomplish motor activities. In order to control robotic prosthesis and exoskeletons it is required to identify human movement intention, to be converted into commands for the device. Motor impaired people may use surface electromyography (sEMG) signals to control these devices, taking into account that sEMG signals directly reflects the human motion intention. Myoelectric control is an advanced technique related with the detection, processing, classification, and application of sEMG signals to control human-assisting robots or rehabilitation devices. Despite recent advances with myoelectric control algorithms, currently there is still an important need to develop suitable methods involving usability, for controlling prosthesis and exoskeletons in a natural way. Traditionally, acquiring EMG signals and developing myoelectric control algorithms require expensive hardware. With the advent of low-cost technologies (i.e. sensors, actuators, controllers) and hardware support of simulation software packages as Matlab, affordable research tools could be used to develop novel myoelectric control algorithms. This work describes the implementation and validation of a Matlab-based robotic arm using low-cost technologies such as Arduino commanded using myoelectric control. The platform permits implementation of a variety of EMG-based algorithms. It was carried out a set of experiments aimed to evaluate the platform, through an application of pattern recognition based myoelectric control to identify and execute seven movements of the robotic upper limb: 1-forearm pronation; 2- forearm supination; 3-wrist flexion; 4-wrist extension; 5- elbow flexion; 6- elbow extension; 7-resting. The algorithm use a feature extraction stage based on a combination of time and frequency domain features (mean absolute value, waveform length, root mean square) and a widely used k-NN classifier. Obtained mean classification errors were 5.9%. As future work, additional features in the myoelectric control algorithm will be evaluated, for real-time applications.
{"title":"A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation Engineering","authors":"A. F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño","doi":"10.1109/UEMCON47517.2019.8993080","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993080","url":null,"abstract":"Rehabilitation robotics is a recent kind of service robot that include devices such as robotic prosthesis and exoskeletons. These devices could help motor disabled people to rehabilitate their motor functions, and could provide functional compensation to accomplish motor activities. In order to control robotic prosthesis and exoskeletons it is required to identify human movement intention, to be converted into commands for the device. Motor impaired people may use surface electromyography (sEMG) signals to control these devices, taking into account that sEMG signals directly reflects the human motion intention. Myoelectric control is an advanced technique related with the detection, processing, classification, and application of sEMG signals to control human-assisting robots or rehabilitation devices. Despite recent advances with myoelectric control algorithms, currently there is still an important need to develop suitable methods involving usability, for controlling prosthesis and exoskeletons in a natural way. Traditionally, acquiring EMG signals and developing myoelectric control algorithms require expensive hardware. With the advent of low-cost technologies (i.e. sensors, actuators, controllers) and hardware support of simulation software packages as Matlab, affordable research tools could be used to develop novel myoelectric control algorithms. This work describes the implementation and validation of a Matlab-based robotic arm using low-cost technologies such as Arduino commanded using myoelectric control. The platform permits implementation of a variety of EMG-based algorithms. It was carried out a set of experiments aimed to evaluate the platform, through an application of pattern recognition based myoelectric control to identify and execute seven movements of the robotic upper limb: 1-forearm pronation; 2- forearm supination; 3-wrist flexion; 4-wrist extension; 5- elbow flexion; 6- elbow extension; 7-resting. The algorithm use a feature extraction stage based on a combination of time and frequency domain features (mean absolute value, waveform length, root mean square) and a widely used k-NN classifier. Obtained mean classification errors were 5.9%. As future work, additional features in the myoelectric control algorithm will be evaluated, for real-time applications.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}