首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Ubiquitous Access for Local Water Management Through HCI Based App Development 通过基于HCI的应用程序开发,无处不在地访问本地水管理
Drashti Pathak, A. Varde, C. Alo, F. Oteng
Climate conditions are uncertain, thus it is crucial to get advance information on parameters such as precipitation at various regions to plan sustainable living. It is useful to obtain this information anywhere and anytime to facilitate local water management. Accordingly, the main goal of our project is to develop a Hydro-climate Data App that estimates water related climactic parameters at given locations based on global predictive models in Earth and Environmental Science. We consider climate data for regions in New Jersey. Users are required to input a location and year for which the app displays the latitude and longitude, and predicts the output on precipitation, humidity and temperature. This app is interactive and user-friendly, deploying aspects of HCI (Human Computer Interaction), such that expert as well as non-expert users can easily access and interpret it. Challenges in this work include procurement and deployment of accurate prediction techniques. To address these, we research various scientific models, e.g. CCSM (Community Climate System Model) and embed suitable ones into the app using HCI aspects such as ethnographic studies. As evident from our evaluation, this app is beneficial to environmental scientists, students and local residents. It is useful for research on climate change and sustainability. This work fits the scope of SDGs (Sustainable Development Goals) of the United Nations, mapping to at least 3 of its 17 goals. It addresses the theme of IoT (Internet of Things) that entails providing Internet based information in everyday devices for ubiquitous access.
气候条件是不确定的,因此提前获得各地区降水等参数的信息对于规划可持续生活至关重要。随时随地获取这些信息有助于当地的水资源管理。因此,我们项目的主要目标是开发一个水文气候数据应用程序,该应用程序可以根据地球与环境科学中的全球预测模型估计给定地点与水相关的气候参数。我们考虑新泽西地区的气候数据。用户需要输入地点和年份,应用程序会显示纬度和经度,并预测降水、湿度和温度的输出。该应用程序具有互动性和用户友好性,部署了HCI(人机交互)的各个方面,因此专家和非专业用户都可以轻松访问和解释它。这项工作的挑战包括采购和部署准确的预测技术。为了解决这些问题,我们研究了各种科学模型,例如CCSM(社区气候系统模型),并使用人类学研究等HCI方面将合适的模型嵌入到应用程序中。从我们的评估中可以看出,这个应用程序对环境科学家、学生和当地居民都是有益的。它对气候变化和可持续性的研究很有帮助。这项工作符合联合国可持续发展目标(SDGs)的范围,至少与17个目标中的3个相对应。它解决了IoT(物联网)的主题,这需要在日常设备中提供基于互联网的信息,以便无处不在的访问。
{"title":"Ubiquitous Access for Local Water Management Through HCI Based App Development","authors":"Drashti Pathak, A. Varde, C. Alo, F. Oteng","doi":"10.1109/UEMCON47517.2019.8993053","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993053","url":null,"abstract":"Climate conditions are uncertain, thus it is crucial to get advance information on parameters such as precipitation at various regions to plan sustainable living. It is useful to obtain this information anywhere and anytime to facilitate local water management. Accordingly, the main goal of our project is to develop a Hydro-climate Data App that estimates water related climactic parameters at given locations based on global predictive models in Earth and Environmental Science. We consider climate data for regions in New Jersey. Users are required to input a location and year for which the app displays the latitude and longitude, and predicts the output on precipitation, humidity and temperature. This app is interactive and user-friendly, deploying aspects of HCI (Human Computer Interaction), such that expert as well as non-expert users can easily access and interpret it. Challenges in this work include procurement and deployment of accurate prediction techniques. To address these, we research various scientific models, e.g. CCSM (Community Climate System Model) and embed suitable ones into the app using HCI aspects such as ethnographic studies. As evident from our evaluation, this app is beneficial to environmental scientists, students and local residents. It is useful for research on climate change and sustainability. This work fits the scope of SDGs (Sustainable Development Goals) of the United Nations, mapping to at least 3 of its 17 goals. It addresses the theme of IoT (Internet of Things) that entails providing Internet based information in everyday devices for ubiquitous access.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities FBAD:智慧城市物联网医疗的基于雾的攻击检测
Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, E. Aloufi, M. Zohdy, Ming Hua
The number of zero-day attacks has been exponentially increasing due to a variety of heterogeneous Internet of Things (IoT) protocols. Many centralized-based techniques have been introduced to identify malicious activities in IoT environments. However, these techniques have suffered including a high latency to satisfy IoT requirements. This paper proposes a fog-based attack detection (FBAD) framework using an ensemble of online sequential extreme learning machine (EOS-ELM) for efficiently detecting malicious activities. We indicate a high-level view of the efficient proposed framework for deploying the distributed attack detection technique in fog computing due to high accuracy and low latency, as it is closer to the IoT devices at the network edge. Furthermore, we compare the performance of our framework with other existing approaches including ELM and OS-ELM. The results of the experiment demonstrate that distributed architecture outperforms centralized architecture in terms of the detection time and classification accuracy.
由于各种异构物联网(IoT)协议,零日攻击的数量呈指数级增长。已经引入了许多基于集中式的技术来识别物联网环境中的恶意活动。然而,这些技术在满足物联网需求方面存在高延迟等问题。本文提出了一种基于雾的攻击检测(FBAD)框架,该框架使用在线顺序极限学习机(EOS-ELM)集成来有效检测恶意活动。我们指出了在雾计算中部署分布式攻击检测技术的高效建议框架的高级视图,因为它更接近网络边缘的物联网设备,因此具有高精度和低延迟。此外,我们将我们的框架与其他现有方法(包括ELM和OS-ELM)的性能进行了比较。实验结果表明,分布式体系结构在检测时间和分类精度方面优于集中式体系结构。
{"title":"FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities","authors":"Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, E. Aloufi, M. Zohdy, Ming Hua","doi":"10.1109/UEMCON47517.2019.8992963","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992963","url":null,"abstract":"The number of zero-day attacks has been exponentially increasing due to a variety of heterogeneous Internet of Things (IoT) protocols. Many centralized-based techniques have been introduced to identify malicious activities in IoT environments. However, these techniques have suffered including a high latency to satisfy IoT requirements. This paper proposes a fog-based attack detection (FBAD) framework using an ensemble of online sequential extreme learning machine (EOS-ELM) for efficiently detecting malicious activities. We indicate a high-level view of the efficient proposed framework for deploying the distributed attack detection technique in fog computing due to high accuracy and low latency, as it is closer to the IoT devices at the network edge. Furthermore, we compare the performance of our framework with other existing approaches including ELM and OS-ELM. The results of the experiment demonstrate that distributed architecture outperforms centralized architecture in terms of the detection time and classification accuracy.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"32 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking Environment 蜂群环境下基于深度q学习的无人机间避碰
G. Raja, S. Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan
In the past twenty years, Unmanned Aerial Vehicles (UAVs) have demonstrated their ability in supporting both military and civilian applications. It has proved itself useful in tasks which are dangerous or too costly with usual methods. Certain applications also contains tasks which can be processed faster by using multiple UAVs that work together and perform smaller tasks which can be further combined to get the intended result. However, to achieve this, we need autonomous coordination among the multi UAVs. Multiple UAVs flying as a swarm, incorporates a pattern or a shape that has to be maintained through out the flight. But there can be cases where the pattern or shape of swarm has to be changed. Under such circumstances, collision has to be avoided between the UAVs as they travel to their new position forming a new shape. We have proposed an algorithm which helps in finding optimal goal positions for the UAVs to flock and to find the trajectory which supports collision free movement to its assigned position. We also ensure that the total distance travelled by individual UAV is minimized. The optimal goal position assignment is done using Hungarian Algorithm. Deep Q Learning method is used to find the optimal flight parameters for a collision free trajectory for the UAVs to reach its goal. Results from simulation show that the algorithm is sufficiently fast for practical applications as optimal assignments and flight parameters were computed for 50 UAVs in less than 1s.
在过去的二十年中,无人驾驶飞行器(uav)已经证明了其支持军事和民用应用的能力。事实证明,在使用常规方法进行危险或成本过高的任务时,它是有用的。某些应用程序还包含可以通过使用多个协同工作的无人机来更快地处理任务,并执行可以进一步组合以获得预期结果的较小任务。然而,要实现这一目标,我们需要多无人机之间的自主协调。多架无人机作为一个群体飞行,在整个飞行过程中必须保持一个模式或形状。但在某些情况下,群体的模式或形状必须改变。在这种情况下,必须避免无人机之间的碰撞,因为它们要飞到新的位置,形成新的形状。我们提出了一种算法,可以帮助无人机找到最优的目标位置,并找到支持无碰撞运动到指定位置的轨迹。我们还确保单个无人机的总飞行距离最小。最优目标位置分配采用匈牙利算法。采用深度Q学习的方法,寻找无碰撞轨迹的最优飞行参数,使无人机达到目标。仿真结果表明,该算法能够在不到15秒的时间内计算出50架无人机的最优分配和飞行参数,具有较好的实用性。
{"title":"Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking Environment","authors":"G. Raja, S. Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan","doi":"10.1109/UEMCON47517.2019.8992966","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992966","url":null,"abstract":"In the past twenty years, Unmanned Aerial Vehicles (UAVs) have demonstrated their ability in supporting both military and civilian applications. It has proved itself useful in tasks which are dangerous or too costly with usual methods. Certain applications also contains tasks which can be processed faster by using multiple UAVs that work together and perform smaller tasks which can be further combined to get the intended result. However, to achieve this, we need autonomous coordination among the multi UAVs. Multiple UAVs flying as a swarm, incorporates a pattern or a shape that has to be maintained through out the flight. But there can be cases where the pattern or shape of swarm has to be changed. Under such circumstances, collision has to be avoided between the UAVs as they travel to their new position forming a new shape. We have proposed an algorithm which helps in finding optimal goal positions for the UAVs to flock and to find the trajectory which supports collision free movement to its assigned position. We also ensure that the total distance travelled by individual UAV is minimized. The optimal goal position assignment is done using Hungarian Algorithm. Deep Q Learning method is used to find the optimal flight parameters for a collision free trajectory for the UAVs to reach its goal. Results from simulation show that the algorithm is sufficiently fast for practical applications as optimal assignments and flight parameters were computed for 50 UAVs in less than 1s.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Low Power Design for DVFS Capable Software 支持DVFS软件的低功耗设计
A. Manzak, Sadi Evren Seker
Today's central processing unit (CPU) technology makes it possible for a processor to adjust its voltage and clock frequency dynamically depending on its current CPU load, memory load, or operating system requests. Higher energy saving is possible if the application's power profile can be estimated or determined fast and accurate. If the application's power profile is completely known prior to execution, then maximum/optimum power saving is possible using off-line dynamic voltage and frequency scaling (DVFS) algorithms. The question is, how to determine full power-profile of an application prior to execution and how much power saving is possible. In this paper, we discuss the methodology to determine full power profile of an application and calculate potential energy savings using off-line DVFS algorithms for randomly generated and real-life cases.
今天的中央处理单元(CPU)技术使处理器能够根据当前CPU负载、内存负载或操作系统请求动态调整其电压和时钟频率。如果应用程序的功率分布可以快速准确地估计或确定,则可以实现更高的节能。如果在执行之前完全知道应用程序的功率分布,那么使用离线动态电压和频率缩放(DVFS)算法可以实现最大/最优的功耗节省。问题是,如何在执行之前确定应用程序的完整功率配置以及可能节省多少功率。在本文中,我们讨论了确定应用程序的全功率分布的方法,并使用离线DVFS算法计算随机生成和实际情况下的潜在节能。
{"title":"Low Power Design for DVFS Capable Software","authors":"A. Manzak, Sadi Evren Seker","doi":"10.1109/UEMCON47517.2019.8993027","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993027","url":null,"abstract":"Today's central processing unit (CPU) technology makes it possible for a processor to adjust its voltage and clock frequency dynamically depending on its current CPU load, memory load, or operating system requests. Higher energy saving is possible if the application's power profile can be estimated or determined fast and accurate. If the application's power profile is completely known prior to execution, then maximum/optimum power saving is possible using off-line dynamic voltage and frequency scaling (DVFS) algorithms. The question is, how to determine full power-profile of an application prior to execution and how much power saving is possible. In this paper, we discuss the methodology to determine full power profile of an application and calculate potential energy savings using off-line DVFS algorithms for randomly generated and real-life cases.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices 具有可伸缩撤销的恒大小CP-ABE用于资源受限的物联网设备
Divyashikha Sethia, Anadi Shakya, Ritika Aggarwal, Saksham Bhayana
Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.
用户可以从智能手机或物联网(IoT)设备等便携式设备直接访问和共享信息。但是,为了防止它们成为网络攻击的受害者,它们必须允许基于用户角色的选择性共享,例如使用密文-策略属性加密(CP-ABE)方案。然而,为了匹配资源约束,该方案必须对存储有效。它还必须保护设备免受恶意用户的攻击,并允许有效用户不间断地访问。提出了一种基于CCA安全代理的恒密文可伸缩撤销方案(C-PROSRCC),该方案为恒密文长度的CP-ABE方案提供了可伸缩撤销方案。该方案具有恒定数量的配对和计算。它还可以撤销任意数量的用户,并且不需要重新加密或重新分配密钥。我们已成功推行C-PROSRCC计划。与相关方案的定性和定量比较表明,C-PROSRCC在可接受的开销下性能更好。C-PROSRCC是选择的密文攻击(CCA)安全。我们还提供了一个案例研究,以演示C-PROSRCC在基于移动的家庭汽车选择性共享中的使用。
{"title":"Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices","authors":"Divyashikha Sethia, Anadi Shakya, Ritika Aggarwal, Saksham Bhayana","doi":"10.1109/UEMCON47517.2019.8993103","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993103","url":null,"abstract":"Users can directly access and share information from portable devices such as a smartphone or an Internet of Things (IoT) device. However, to prevent them from becoming victims to launch cyber attacks, they must allow selective sharing based on roles of the users such as with the Ciphertext-Policy Attribute Encryption (CP-ABE) scheme. However, to match the resource constraints, the scheme must be efficient for storage. It must also protect the device from malicious users as well as allow uninterrupted access to valid users. This paper presents the CCA secure PROxy-based Scalable Revocation for Constant Cipher-text (C-PROSRCC) scheme, which provides scalable revocation for a constant ciphertext length CP-ABE scheme. The scheme has a constant number of pairings and computations. It can also revoke any number of users and does not require re-encryption or redistribution of keys. We have successfully implemented the C-PROSRCC scheme. The qualitative and quantitative comparison with related schemes indicates that C-PROSRCC performs better with acceptable overheads. C-PROSRCC is Chosen Ciphertext Attack (CCA) secure. We also present a case study to demonstrate the use of C-PROSRCC for mobile-based selective sharing of a family car.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Mining in The NBA: An Applied Approach NBA中的数据挖掘:一种应用方法
Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj
This work aims to analyze the last 6 years of professional basketball data using knowledge discovery tools. The goal is to outline some insight into how teams win and what separates these winning teams from the losing teams. Using Microsoft SQL Server Management Studio, Microsoft Business Intelligence, R and PowerBI, we analyzed regular season game data to find previously unknown trends between winning and losing teams. Using decision trees, naive Bayes and association rules, we will look at defensive and offensive data between teams. The following stats are considered: defensive and offensive rebounds, blocks, steals, turnovers, 2 point shot percentage and 3 point shot percentage. Results show that teams who earn more defensive rebounds win more games while teams that earn higher than average offensive rebounds lose more games. This is because teams that get more offensive rebounds are missing more of their shots.
本研究旨在利用知识发现工具分析近6年的职业篮球数据。我们的目标是勾勒出一些关于团队如何获胜的见解,以及这些获胜的团队与失败的团队之间的区别。使用Microsoft SQL Server Management Studio、Microsoft Business Intelligence、R和PowerBI,我们分析了常规赛的比赛数据,以发现胜败球队之间以前未知的趋势。使用决策树,朴素贝叶斯和关联规则,我们将查看球队之间的防守和进攻数据。考虑以下数据:防守和进攻篮板,盖帽,抢断,失误,2分命中率和3分命中率。结果显示,防守篮板多的球队赢得更多比赛,而进攻篮板高于平均水平的球队输掉更多比赛。这是因为得到更多进攻篮板的球队投篮失误更多。
{"title":"Data Mining in The NBA: An Applied Approach","authors":"Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj","doi":"10.1109/UEMCON47517.2019.8993074","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993074","url":null,"abstract":"This work aims to analyze the last 6 years of professional basketball data using knowledge discovery tools. The goal is to outline some insight into how teams win and what separates these winning teams from the losing teams. Using Microsoft SQL Server Management Studio, Microsoft Business Intelligence, R and PowerBI, we analyzed regular season game data to find previously unknown trends between winning and losing teams. Using decision trees, naive Bayes and association rules, we will look at defensive and offensive data between teams. The following stats are considered: defensive and offensive rebounds, blocks, steals, turnovers, 2 point shot percentage and 3 point shot percentage. Results show that teams who earn more defensive rebounds win more games while teams that earn higher than average offensive rebounds lose more games. This is because teams that get more offensive rebounds are missing more of their shots.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living 微多普勒雷达测量坐到站到坐的运动评估日常生活的高水平仪器活动
K. Saho, K. Uemura, M. Fujimoto, M. Matsumoto
This study shows a significant relationship between the kinematic parameters of the sit-to-stand-to-sit movements (STSTS) sensed with a Micro-Doppler radar (MDR) and the scale of High-level Instrumental Activities of Daily Living (HL-IADLs) defined as an ability to perform modern daily activities independently. HL-IADLs are useful in evaluating the degree of disability in daily life; hence, this study aims to develop an MDR system that would enable HL-IADL impairment to be unconstrainedly monitored on a daily basis. The study participants were 65–74 years old. Their motion parameters (e.g., velocity and acceleration) in natural STSTS were extracted via a single 24-GHz MDR installed on the ceiling. Their HL-IADL scales were evaluated using a questionnaire-based scale, called the Japan Science and Technology Agency Index of Competence (JST-IC). The relationship between the JST-IC and the extracted STSTS kinematic parameters was then statistically analyzed. The results reveal that the extracted parameters were associated with the JST-IC score, suggesting the possibility of the HL-IADL impairment detection based on the MDR monitoring.
该研究表明,微多普勒雷达(MDR)检测的坐-站-坐运动(STSTS)的运动学参数与日常生活高级工具活动(HL-IADLs)的规模之间存在显著关系,日常生活高级工具活动被定义为独立进行现代日常活动的能力。hl - iadl可用于评估日常生活中的残疾程度;因此,本研究旨在开发一种MDR系统,使HL-IADL损伤能够每天无约束地监测。研究参与者年龄在65-74岁之间。它们在自然STSTS中的运动参数(例如速度和加速度)是通过安装在天花板上的单个24 ghz MDR提取的。他们的HL-IADL量表使用基于问卷的量表进行评估,称为日本科学技术机构能力指数(JST-IC)。然后统计分析JST-IC与提取的STSTS运动学参数之间的关系。结果表明,提取的参数与JST-IC评分具有相关性,提示基于MDR监测的HL-IADL损伤检测的可能性。
{"title":"Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living","authors":"K. Saho, K. Uemura, M. Fujimoto, M. Matsumoto","doi":"10.1109/UEMCON47517.2019.8993009","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993009","url":null,"abstract":"This study shows a significant relationship between the kinematic parameters of the sit-to-stand-to-sit movements (STSTS) sensed with a Micro-Doppler radar (MDR) and the scale of High-level Instrumental Activities of Daily Living (HL-IADLs) defined as an ability to perform modern daily activities independently. HL-IADLs are useful in evaluating the degree of disability in daily life; hence, this study aims to develop an MDR system that would enable HL-IADL impairment to be unconstrainedly monitored on a daily basis. The study participants were 65–74 years old. Their motion parameters (e.g., velocity and acceleration) in natural STSTS were extracted via a single 24-GHz MDR installed on the ceiling. Their HL-IADL scales were evaluated using a questionnaire-based scale, called the Japan Science and Technology Agency Index of Competence (JST-IC). The relationship between the JST-IC and the extracted STSTS kinematic parameters was then statistically analyzed. The results reveal that the extracted parameters were associated with the JST-IC score, suggesting the possibility of the HL-IADL impairment detection based on the MDR monitoring.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business Intelligence Solution for Bikers Haven Restaurant Bikers Haven餐厅商业智能解决方案
Ramnhell P. Alday, Maryli F. Rosas
Bikers Haven Restaurant has been well known around the city of Tagaytay and Amadeo as one of the favorite restaurants in the Philippines that serves the popular Batangas Lomi, a Filipino dish. They have made a great reputation through the years which made them able to maintain their legacy of serving authentic dishes to their customers. As convenient and successful it may sound, the business owner finds the manual storage, and data management troubling. With this former undealt trouble of improving data management, the restaurant has also lost potential advantages to improve the business, and to have a lead against competitors through technological forecasting. Data has been crucial nowadays as there has been significantly infinite potential once used appropriately. However, Bikers Haven restaurant failed to manage the said data efficiently, having them lost a great opportunity that has been waiting to be managed with utmost capability of providing the Business Intelligence for their organization. Yet, it was not too late, as aimed by both parties, the struggle will not last long. The aim of this research is to seek a Business Intelligence–––is used to turn data into actionable information for leadership, management, organization and decision making-solution for Bikers Haven restaurant's data management and efficiency, which includes data warehousing where data will be stored in an orderly manner and in most accessible process compared to the traditional storage and retrieval. Data warehousing will be implemented to integrate and maintain valuable data. For Bikers Haven restaurant, it will be an unpredictable edge against restaurants competing within the area. Furthermore, Business Intelligence through mining data will also be a remarkable improvement on organization of every business process and transaction to the restaurant since it will secure data in a modern way that can be studied to analyze trends and actively adapt to growing needs of the business. Having vision and track of the business allows the owners to predict the status and operational considerations of the restaurant which always had been a trouble for every entrepreneur who refuses to migrate into new technologies. This disruption convinced Bikers Haven Restaurant on the necessity of having Business Intelligence as a competitive advantage of the company which allowed the researcher to develop an accessible solution to improve data usage of the business. (Abstract)
Bikers Haven餐厅是菲律宾最受欢迎的餐厅之一,在大雅台和阿马迪奥市都很有名,提供受欢迎的菲律宾菜Batangas Lomi。多年来,他们已经取得了很大的声誉,这使他们能够保持为顾客提供正宗菜肴的传统。虽然听起来方便且成功,但业务所有者发现手动存储和数据管理很麻烦。有了这个以前没有解决的问题,改进数据管理,餐厅也失去了潜在的优势,以改善业务,并通过技术预测领先于竞争对手。如今,数据至关重要,因为一旦使用得当,就会产生巨大的无限潜力。然而,Bikers Haven餐厅未能有效地管理这些数据,使他们失去了一个一直等待着为他们的组织提供商业智能的最大能力来管理的大好机会。然而,一切还不算太晚,正如双方所瞄准的那样,这场斗争不会持续太久。本研究的目的是为Bikers Haven餐厅的数据管理和效率寻求一种商业智能——用于将数据转化为可操作的信息,用于领导、管理、组织和决策——解决方案,其中包括数据仓库,与传统的存储和检索相比,数据将以有序的方式和最易访问的过程存储。将实施数据仓库,以集成和维护有价值的数据。对于Bikers Haven餐厅来说,这将是与该地区其他餐厅竞争的不可预测的优势。此外,通过挖掘数据的商业智能也将是对每个业务流程和交易的组织的显着改进,因为它将以现代的方式保护数据,可以研究分析趋势并积极适应不断增长的业务需求。对业务有远见和跟踪可以让老板预测餐厅的状态和运营考虑,这一直是每个拒绝迁移到新技术的企业家的麻烦。这种破坏使Bikers Haven Restaurant相信有必要将商业智能作为公司的竞争优势,这使得研究人员能够开发出一种可访问的解决方案来改善业务的数据使用。(抽象)
{"title":"Business Intelligence Solution for Bikers Haven Restaurant","authors":"Ramnhell P. Alday, Maryli F. Rosas","doi":"10.1109/UEMCON47517.2019.8992956","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992956","url":null,"abstract":"Bikers Haven Restaurant has been well known around the city of Tagaytay and Amadeo as one of the favorite restaurants in the Philippines that serves the popular Batangas Lomi, a Filipino dish. They have made a great reputation through the years which made them able to maintain their legacy of serving authentic dishes to their customers. As convenient and successful it may sound, the business owner finds the manual storage, and data management troubling. With this former undealt trouble of improving data management, the restaurant has also lost potential advantages to improve the business, and to have a lead against competitors through technological forecasting. Data has been crucial nowadays as there has been significantly infinite potential once used appropriately. However, Bikers Haven restaurant failed to manage the said data efficiently, having them lost a great opportunity that has been waiting to be managed with utmost capability of providing the Business Intelligence for their organization. Yet, it was not too late, as aimed by both parties, the struggle will not last long. The aim of this research is to seek a Business Intelligence–––is used to turn data into actionable information for leadership, management, organization and decision making-solution for Bikers Haven restaurant's data management and efficiency, which includes data warehousing where data will be stored in an orderly manner and in most accessible process compared to the traditional storage and retrieval. Data warehousing will be implemented to integrate and maintain valuable data. For Bikers Haven restaurant, it will be an unpredictable edge against restaurants competing within the area. Furthermore, Business Intelligence through mining data will also be a remarkable improvement on organization of every business process and transaction to the restaurant since it will secure data in a modern way that can be studied to analyze trends and actively adapt to growing needs of the business. Having vision and track of the business allows the owners to predict the status and operational considerations of the restaurant which always had been a trouble for every entrepreneur who refuses to migrate into new technologies. This disruption convinced Bikers Haven Restaurant on the necessity of having Business Intelligence as a competitive advantage of the company which allowed the researcher to develop an accessible solution to improve data usage of the business. (Abstract)","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation 电池充电应用:通过PVA和MPPT控制器调节电压
Zuhair Alqarni, J. Asumadu
In this paper a PVA is used to charge the battery through MPPT controlled booster converter. The charging characteristics of the battery are observed with different solar irradiations. The MPPT algorithm used to control the DC-DC booster converter is popular P&O method. The modelling of PVA with MPPT algorithm and required mathematical calculations are proposed in this paper. The power output of PVA with respect to solar irradiation is observed in a comparison with SOC of the battery. All graphs are plotted using MATLAB Simulink GUI environment with time reference with variable parameters.
本文采用PVA通过MPPT控制的升压变换器对蓄电池进行充电。观察了不同太阳辐照度下电池的充电特性。用于控制DC-DC升压变换器的MPPT算法是常用的P&O方法。本文提出了用MPPT算法对PVA进行建模,并进行了相应的数学计算。PVA相对于太阳辐照的功率输出与电池的SOC进行了比较。所有图形都是在MATLAB Simulink GUI环境下绘制的,带有可变参数的时间参考。
{"title":"Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation","authors":"Zuhair Alqarni, J. Asumadu","doi":"10.1109/UEMCON47517.2019.8992953","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992953","url":null,"abstract":"In this paper a PVA is used to charge the battery through MPPT controlled booster converter. The charging characteristics of the battery are observed with different solar irradiations. The MPPT algorithm used to control the DC-DC booster converter is popular P&O method. The modelling of PVA with MPPT algorithm and required mathematical calculations are proposed in this paper. The power output of PVA with respect to solar irradiation is observed in a comparison with SOC of the battery. All graphs are plotted using MATLAB Simulink GUI environment with time reference with variable parameters.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125200309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation Engineering 基于肌电控制的低成本康复机械臂平台
A. F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño
Rehabilitation robotics is a recent kind of service robot that include devices such as robotic prosthesis and exoskeletons. These devices could help motor disabled people to rehabilitate their motor functions, and could provide functional compensation to accomplish motor activities. In order to control robotic prosthesis and exoskeletons it is required to identify human movement intention, to be converted into commands for the device. Motor impaired people may use surface electromyography (sEMG) signals to control these devices, taking into account that sEMG signals directly reflects the human motion intention. Myoelectric control is an advanced technique related with the detection, processing, classification, and application of sEMG signals to control human-assisting robots or rehabilitation devices. Despite recent advances with myoelectric control algorithms, currently there is still an important need to develop suitable methods involving usability, for controlling prosthesis and exoskeletons in a natural way. Traditionally, acquiring EMG signals and developing myoelectric control algorithms require expensive hardware. With the advent of low-cost technologies (i.e. sensors, actuators, controllers) and hardware support of simulation software packages as Matlab, affordable research tools could be used to develop novel myoelectric control algorithms. This work describes the implementation and validation of a Matlab-based robotic arm using low-cost technologies such as Arduino commanded using myoelectric control. The platform permits implementation of a variety of EMG-based algorithms. It was carried out a set of experiments aimed to evaluate the platform, through an application of pattern recognition based myoelectric control to identify and execute seven movements of the robotic upper limb: 1-forearm pronation; 2- forearm supination; 3-wrist flexion; 4-wrist extension; 5- elbow flexion; 6- elbow extension; 7-resting. The algorithm use a feature extraction stage based on a combination of time and frequency domain features (mean absolute value, waveform length, root mean square) and a widely used k-NN classifier. Obtained mean classification errors were 5.9%. As future work, additional features in the myoelectric control algorithm will be evaluated, for real-time applications.
康复机器人是一种新型的服务机器人,包括机器人假体和外骨骼等设备。这些装置可以帮助运动障碍患者恢复运动功能,并为完成运动活动提供功能补偿。为了控制机器人假体和外骨骼,需要识别人类的运动意图,并将其转换为设备的命令。考虑到肌表电信号直接反映了人体的运动意图,运动障碍患者可能会使用肌表电信号来控制这些设备。肌电控制是一项先进的技术,涉及到肌电信号的检测、处理、分类和应用,以控制人类辅助机器人或康复设备。尽管最近在肌电控制算法方面取得了进展,但目前仍然需要开发合适的方法,包括可用性,以自然的方式控制假肢和外骨骼。传统上,获取肌电信号和开发肌电控制算法需要昂贵的硬件。随着低成本技术(即传感器,执行器,控制器)的出现以及Matlab等仿真软件包的硬件支持,可以使用负担得起的研究工具来开发新的肌电控制算法。这项工作描述了使用低成本技术(如Arduino)使用肌电控制命令的基于matlab的机械臂的实现和验证。该平台允许实现各种基于肌电图的算法。通过应用基于模式识别的肌电控制识别和执行机器人上肢的七种运动:1-前臂旋前;2-前臂旋后;3-wrist弯曲;4-wrist扩展;5-肘关节屈曲;6-肘部伸展;7-resting。该算法使用基于时域和频域特征(平均绝对值、波形长度、均方根)结合的特征提取阶段和广泛使用的k-NN分类器。得到的平均分类误差为5.9%。作为未来的工作,将评估肌电控制算法的其他功能,以实现实时应用。
{"title":"A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation Engineering","authors":"A. F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño","doi":"10.1109/UEMCON47517.2019.8993080","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993080","url":null,"abstract":"Rehabilitation robotics is a recent kind of service robot that include devices such as robotic prosthesis and exoskeletons. These devices could help motor disabled people to rehabilitate their motor functions, and could provide functional compensation to accomplish motor activities. In order to control robotic prosthesis and exoskeletons it is required to identify human movement intention, to be converted into commands for the device. Motor impaired people may use surface electromyography (sEMG) signals to control these devices, taking into account that sEMG signals directly reflects the human motion intention. Myoelectric control is an advanced technique related with the detection, processing, classification, and application of sEMG signals to control human-assisting robots or rehabilitation devices. Despite recent advances with myoelectric control algorithms, currently there is still an important need to develop suitable methods involving usability, for controlling prosthesis and exoskeletons in a natural way. Traditionally, acquiring EMG signals and developing myoelectric control algorithms require expensive hardware. With the advent of low-cost technologies (i.e. sensors, actuators, controllers) and hardware support of simulation software packages as Matlab, affordable research tools could be used to develop novel myoelectric control algorithms. This work describes the implementation and validation of a Matlab-based robotic arm using low-cost technologies such as Arduino commanded using myoelectric control. The platform permits implementation of a variety of EMG-based algorithms. It was carried out a set of experiments aimed to evaluate the platform, through an application of pattern recognition based myoelectric control to identify and execute seven movements of the robotic upper limb: 1-forearm pronation; 2- forearm supination; 3-wrist flexion; 4-wrist extension; 5- elbow flexion; 6- elbow extension; 7-resting. The algorithm use a feature extraction stage based on a combination of time and frequency domain features (mean absolute value, waveform length, root mean square) and a widely used k-NN classifier. Obtained mean classification errors were 5.9%. As future work, additional features in the myoelectric control algorithm will be evaluated, for real-time applications.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1