Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947258
Yifei Yan, Shun-wai Zhang
Aiming to maximize the energy efficiency of wireless communication to achieve green communication, this paper studies the energy efficiency optimization problem of full-duplex relay cooperative system based on simultaneous wireless information and power transfer (SWIPT). For the power-splitting protocol, the energy efficiency is optimized for the power-splitting factor and transmission power. Firstly, a SWIPT-based full-duplex relay cooperative system model is established. Then, it is proved that the energy efficiency formula is a convex function with respect to the power-splitting factor, and the optimal power-splitting factor is obtained. Meanwhile, this paper studies the scheme to improve the energy efficiency of the system by optimizing the source transmission power. Furthermore, a joint optimization algorithm based on iteration is proposed to jointly optimize the power-splitting factor and transmission power. Finally, the simulation results demonstrate the effectiveness of the proposed optimization algorithm.
{"title":"Energy Efficiency Maximization of the SWIPT-based Full-Duplex Relay Cooperative System","authors":"Yifei Yan, Shun-wai Zhang","doi":"10.1109/ICCT46805.2019.8947258","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947258","url":null,"abstract":"Aiming to maximize the energy efficiency of wireless communication to achieve green communication, this paper studies the energy efficiency optimization problem of full-duplex relay cooperative system based on simultaneous wireless information and power transfer (SWIPT). For the power-splitting protocol, the energy efficiency is optimized for the power-splitting factor and transmission power. Firstly, a SWIPT-based full-duplex relay cooperative system model is established. Then, it is proved that the energy efficiency formula is a convex function with respect to the power-splitting factor, and the optimal power-splitting factor is obtained. Meanwhile, this paper studies the scheme to improve the energy efficiency of the system by optimizing the source transmission power. Furthermore, a joint optimization algorithm based on iteration is proposed to jointly optimize the power-splitting factor and transmission power. Finally, the simulation results demonstrate the effectiveness of the proposed optimization algorithm.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947185
Wenhai Zhou, Fan-tong Kong
Correlative electromagnetic side channel attack (CEMA) is a common and effective method in side channel attacks. However, a large amount of data acquisition and processing restricts the time of key cracking. This paper proposes a fast side channel attack method, which encrypts the selected plaintexts and filters the collected electromagnetic data on frequency domain, and then performs CEMA analysis. Finally, only 150 pieces of electromagnetic data are used to successfully crack all the keys of the advanced encryption standard (AES) cryptographic algorithm, and the cracking time is reduced to 1/50 of the traditional method.
{"title":"Electromagnetic Side Channel Attack against Embedded Encryption Chips","authors":"Wenhai Zhou, Fan-tong Kong","doi":"10.1109/ICCT46805.2019.8947185","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947185","url":null,"abstract":"Correlative electromagnetic side channel attack (CEMA) is a common and effective method in side channel attacks. However, a large amount of data acquisition and processing restricts the time of key cracking. This paper proposes a fast side channel attack method, which encrypts the selected plaintexts and filters the collected electromagnetic data on frequency domain, and then performs CEMA analysis. Finally, only 150 pieces of electromagnetic data are used to successfully crack all the keys of the advanced encryption standard (AES) cryptographic algorithm, and the cracking time is reduced to 1/50 of the traditional method.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947020
T. Kai, Zhongwei Li, Jiang Wenqi, Guan Yadong, Weiming Tong
Aiming at solving of missing and false alarm in anomaly detection of In-vehicle CAN communication, which only detects a single CAN message but ignores the correlation among multiple messages, an anomaly detection algorithm of vehicular CAN bus based on linear chain conditional random field (Linear-CRF) is proposed in this paper. Based on L-BFGS (Limited-memory BFGS) learning algorithm, the double-contour modes of Linear-CRF normal model and anomaly model are constructed respectively. The algorithm of message anomaly detection based on Linear-CRF model is elaborated in detail. The proposed anomaly detection algorithm is simulated and analyzed. The simulation results show that the proposed algorithm can effectively identify the relevance of the context content of the message, and effectively improve the detection accuracy of the In-vehicle CAN bus anomaly message.
{"title":"In-vehicle CAN Bus Anomaly Detection Algorithm Based on Linear Chain Condition Random Field","authors":"T. Kai, Zhongwei Li, Jiang Wenqi, Guan Yadong, Weiming Tong","doi":"10.1109/ICCT46805.2019.8947020","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947020","url":null,"abstract":"Aiming at solving of missing and false alarm in anomaly detection of In-vehicle CAN communication, which only detects a single CAN message but ignores the correlation among multiple messages, an anomaly detection algorithm of vehicular CAN bus based on linear chain conditional random field (Linear-CRF) is proposed in this paper. Based on L-BFGS (Limited-memory BFGS) learning algorithm, the double-contour modes of Linear-CRF normal model and anomaly model are constructed respectively. The algorithm of message anomaly detection based on Linear-CRF model is elaborated in detail. The proposed anomaly detection algorithm is simulated and analyzed. The simulation results show that the proposed algorithm can effectively identify the relevance of the context content of the message, and effectively improve the detection accuracy of the In-vehicle CAN bus anomaly message.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947088
Xuan Yang, Shuming Zhang, Bo Gao, Jingjing Cao
In the downlink user grouping of multiuser massive MIMO systems, the difference of packet sizes between users assigned to the same group may cause a waste of resource block (RB), which deteriorates the overall system throughput. In this paper, an algorithm with rather low complexity is proposed combining user grouping with resource allocation. Specifically, we group users in terms of each RB. In the process of user grouping on each RB, we obtain a candidate set which is much smaller than the original user set according to the user correlation to reduce the algorithm complexity. Users are assigned to the same group (i.e., RB) with objective to reducing multiuser interference. The user grouping in a RB is finished after this RB is completely allocated to its users. The proposed algorithm ensures that users with larger packets can be assigned to more groups (i.e., more RBs) while users with smaller packets are assigned to less groups. Finally, compared with other existed algorithms, the advantages of the proposed algorithm in system throughput and fairness are validated by simulations.
{"title":"A Low Complexity Joint User Grouping and Resource Allocation Algorithm in Massive MIMO Systems","authors":"Xuan Yang, Shuming Zhang, Bo Gao, Jingjing Cao","doi":"10.1109/ICCT46805.2019.8947088","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947088","url":null,"abstract":"In the downlink user grouping of multiuser massive MIMO systems, the difference of packet sizes between users assigned to the same group may cause a waste of resource block (RB), which deteriorates the overall system throughput. In this paper, an algorithm with rather low complexity is proposed combining user grouping with resource allocation. Specifically, we group users in terms of each RB. In the process of user grouping on each RB, we obtain a candidate set which is much smaller than the original user set according to the user correlation to reduce the algorithm complexity. Users are assigned to the same group (i.e., RB) with objective to reducing multiuser interference. The user grouping in a RB is finished after this RB is completely allocated to its users. The proposed algorithm ensures that users with larger packets can be assigned to more groups (i.e., more RBs) while users with smaller packets are assigned to less groups. Finally, compared with other existed algorithms, the advantages of the proposed algorithm in system throughput and fairness are validated by simulations.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132311969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947120
Xi Cai, Suyuan Li, Xinyu Liu, Guang Han
Fall is an abnormal activity event in daily life, which is becoming a major cause of accidental death for the elderly. The purpose of fall detection is to minimize serious consequences and negative impacts after falling. Recently, most conventional vision-based fall detection methods mainly rely on hand-crafted features, which is inclined to be influenced by noises, etc. In this paper, a novel method is proposed to detect fall event during a video sequence by combining optical flow and wide residual network. The wide residual network contains fewer layers and achieves the same performance as residual network, which can make the neural network train faster. In addition, to model the video motion, we adopt optical flow images as input to the wide residual network. And finally, softmax classifier is utilized to distinguish fall event. The experimental results also confirm the fact that the proposed algorithm can achieve a reliable accuracy.
{"title":"A Novel Method Based on Optical Flow Combining with Wide Residual Network for Fall Detection","authors":"Xi Cai, Suyuan Li, Xinyu Liu, Guang Han","doi":"10.1109/ICCT46805.2019.8947120","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947120","url":null,"abstract":"Fall is an abnormal activity event in daily life, which is becoming a major cause of accidental death for the elderly. The purpose of fall detection is to minimize serious consequences and negative impacts after falling. Recently, most conventional vision-based fall detection methods mainly rely on hand-crafted features, which is inclined to be influenced by noises, etc. In this paper, a novel method is proposed to detect fall event during a video sequence by combining optical flow and wide residual network. The wide residual network contains fewer layers and achieves the same performance as residual network, which can make the neural network train faster. In addition, to model the video motion, we adopt optical flow images as input to the wide residual network. And finally, softmax classifier is utilized to distinguish fall event. The experimental results also confirm the fact that the proposed algorithm can achieve a reliable accuracy.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947261
Qiaoshou Liu, Zhong-pei Zhang
Ultra-dense networks is an effective technology to increase the network capacity by deploying a large number of small base stations. But, in cellular downlink networks, the inter-cell interference deteriorates rapidly with the increase of small base station (SBS) density. How to manage and coordinate inter-cell interference is a hot research topic in 5G wireless communication system. In this paper, we assume that each user-equipment tagged with its closest SBS (the nearest SBS in distance) and all other SBSs using the same frequency spectrum resources simultaneously act as interferers. We propose our model based on Poisson point process and coordinate the interference to improve the signal-to- interference ratio by joint allocation of spectrum resources with power control between the first and second closest SBSs of each UE. The simulation results show the coverage probability is greatly improved with our allocation algorithm.
{"title":"The Joint Allocation of Spectrum Resources With Power Control in Ultra Dense Networks","authors":"Qiaoshou Liu, Zhong-pei Zhang","doi":"10.1109/ICCT46805.2019.8947261","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947261","url":null,"abstract":"Ultra-dense networks is an effective technology to increase the network capacity by deploying a large number of small base stations. But, in cellular downlink networks, the inter-cell interference deteriorates rapidly with the increase of small base station (SBS) density. How to manage and coordinate inter-cell interference is a hot research topic in 5G wireless communication system. In this paper, we assume that each user-equipment tagged with its closest SBS (the nearest SBS in distance) and all other SBSs using the same frequency spectrum resources simultaneously act as interferers. We propose our model based on Poisson point process and coordinate the interference to improve the signal-to- interference ratio by joint allocation of spectrum resources with power control between the first and second closest SBSs of each UE. The simulation results show the coverage probability is greatly improved with our allocation algorithm.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an X-band 4×4 on-chip butler matrix is presented based on 0.18$mu$m SiGe BiCMOS process. The matrix, implemented by lumped components such as inductors and capacitors, shows broadband performance with the size less than 2mm2. The measurement results are consistent with simulation ones.
{"title":"Design of X-band 4×4 On-chip Butler Matrix Based on 0.18µm SiGe BiCMOS Process","authors":"Xiaohui Tao, Rui Cao, Zhuang Li, Dawei Rong, Lihui Jiang, Liguo Sun","doi":"10.1109/ICCT46805.2019.8947045","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947045","url":null,"abstract":"In this paper, an X-band 4×4 on-chip butler matrix is presented based on 0.18$mu$m SiGe BiCMOS process. The matrix, implemented by lumped components such as inductors and capacitors, shows broadband performance with the size less than 2mm2. The measurement results are consistent with simulation ones.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947033
Rui Ding, Jue Wang, Ye Li, Li You, Qiang Sun
In this paper, we propose a modeling approach for maritime wireless channels based on a stochastic ray-tracing approach. Taking into consideration the line-of-sight (LOS) path, the specular reflection path, and the diffuse reflection paths from the sea surface, the maritime wireless fading channel is modeled by combining all the propagation paths arrived at the receiver point. In contrast to the conventional ray-tracing approaches where the propagation environments (and hence, the rays) are considered to be fixed, our stochastic ray-tracing approach assumes varying propagation environment caused by practical factors such as the sea wave. In this case, the locations of the reflection and receiver points randomly vary following a stochastic process. Based on the proposed channel model, we further investigate the deep fading effect in maritime wireless propagations caused by destructive combination of sparse rays. We show by simulations that the role of sea wave has two sides. Specifically, the sea wave is beneficial to compensate the deep fading in the areas where the LOS path and the specular reflection path have been destructively combined, while on the other hand it might induce more outage in the areas where deep fading has not occurred.
{"title":"A Stochastic Ray-Tracing Approach for Maritime Line-of-Sight Channel Modeling","authors":"Rui Ding, Jue Wang, Ye Li, Li You, Qiang Sun","doi":"10.1109/ICCT46805.2019.8947033","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947033","url":null,"abstract":"In this paper, we propose a modeling approach for maritime wireless channels based on a stochastic ray-tracing approach. Taking into consideration the line-of-sight (LOS) path, the specular reflection path, and the diffuse reflection paths from the sea surface, the maritime wireless fading channel is modeled by combining all the propagation paths arrived at the receiver point. In contrast to the conventional ray-tracing approaches where the propagation environments (and hence, the rays) are considered to be fixed, our stochastic ray-tracing approach assumes varying propagation environment caused by practical factors such as the sea wave. In this case, the locations of the reflection and receiver points randomly vary following a stochastic process. Based on the proposed channel model, we further investigate the deep fading effect in maritime wireless propagations caused by destructive combination of sparse rays. We show by simulations that the role of sea wave has two sides. Specifically, the sea wave is beneficial to compensate the deep fading in the areas where the LOS path and the specular reflection path have been destructively combined, while on the other hand it might induce more outage in the areas where deep fading has not occurred.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124422210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947202
Yanhua Zhang, Yueheng Li, T. Xue
Compact MIMO (multiple-input multiple-output) systems will inevitably introduce the element mutual coupling, which unfortunately decreases the whole system’s performance. Different receive S-parameter matching networks were already designed to combat this adverse effect, and interestingly, the related performance evaluation indexes of these work are mainly subject to channel capacity and signal correlation. In this paper, the symbol error rate (SER) of the compact MIMO systems with various S-parameter matching networks are studied in a Nakagami-m fading environment, including detailed derivation of the closed-form SER formula based on moment generating function (MGF) method and its corresponding numerical simulations. The results show that the SERs of the compact MIMO systems with common matching networks are greatly reduced especially under the optimum matching in the small antenna spacing case.
{"title":"SER Performance of Compact MIMO Systems with Receive Matching Networks in Nakagami-m Fading Channel","authors":"Yanhua Zhang, Yueheng Li, T. Xue","doi":"10.1109/ICCT46805.2019.8947202","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947202","url":null,"abstract":"Compact MIMO (multiple-input multiple-output) systems will inevitably introduce the element mutual coupling, which unfortunately decreases the whole system’s performance. Different receive S-parameter matching networks were already designed to combat this adverse effect, and interestingly, the related performance evaluation indexes of these work are mainly subject to channel capacity and signal correlation. In this paper, the symbol error rate (SER) of the compact MIMO systems with various S-parameter matching networks are studied in a Nakagami-m fading environment, including detailed derivation of the closed-form SER formula based on moment generating function (MGF) method and its corresponding numerical simulations. The results show that the SERs of the compact MIMO systems with common matching networks are greatly reduced especially under the optimum matching in the small antenna spacing case.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ICCT46805.2019.8947044
H. Ghayvat, Sharnil Pandya, Ashish Patel
Falls are a noteworthy reason for grievances and deaths in elderlies. Notwithstanding when no damage happens, about majority of elderlies are identity unfit to get up without help. The expanded time of lying on the floor frequently prompts restorative complications, including muscle impairment, lack of hydration, unease, and trepidation of falling. Here, a fall sensing unit is accounted that is affixed to a subjects’ midsection and incorporates a 3-axis accelerometer, 3-axis gyroscope, a multiplexer, a filter, and a microcontroller. Moreover, the fall detection system also used IMU data on the mobile phone. Change in angular velocity, noise cancelation, and the ADC transformation was achieved by the hardware. The handled flag is conveyed to a PC through ZigBee and processed through the dedicated programming. Fall sensing approach comprised feature selection, mining and a machine learning calculation for characterizing the parameters. In this paper, we propose a fall discovery calculation which is shaped by feature selection, discovery, mining and handling. An aggregate of six highlights was ascertained in feature selection. Four of them are identified with the gravity vector which is extricated from accelerometer information by utilizing the low-pass filter. As falling generally happens in a vertical course, the gravity-related characteristics are helpful. The system also uses one of the ambient sensing units, which is a movement sensing unit. The PIR sensor-based movement sensing unit is used to enhance the accuracy of fall detection activity. The feature from the movement sensing unit substantially reduced the false alarms.
{"title":"Proposal and Preliminary Fall-related Activities Recognition in Indoor Environment","authors":"H. Ghayvat, Sharnil Pandya, Ashish Patel","doi":"10.1109/ICCT46805.2019.8947044","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947044","url":null,"abstract":"Falls are a noteworthy reason for grievances and deaths in elderlies. Notwithstanding when no damage happens, about majority of elderlies are identity unfit to get up without help. The expanded time of lying on the floor frequently prompts restorative complications, including muscle impairment, lack of hydration, unease, and trepidation of falling. Here, a fall sensing unit is accounted that is affixed to a subjects’ midsection and incorporates a 3-axis accelerometer, 3-axis gyroscope, a multiplexer, a filter, and a microcontroller. Moreover, the fall detection system also used IMU data on the mobile phone. Change in angular velocity, noise cancelation, and the ADC transformation was achieved by the hardware. The handled flag is conveyed to a PC through ZigBee and processed through the dedicated programming. Fall sensing approach comprised feature selection, mining and a machine learning calculation for characterizing the parameters. In this paper, we propose a fall discovery calculation which is shaped by feature selection, discovery, mining and handling. An aggregate of six highlights was ascertained in feature selection. Four of them are identified with the gravity vector which is extricated from accelerometer information by utilizing the low-pass filter. As falling generally happens in a vertical course, the gravity-related characteristics are helpful. The system also uses one of the ambient sensing units, which is a movement sensing unit. The PIR sensor-based movement sensing unit is used to enhance the accuracy of fall detection activity. The feature from the movement sensing unit substantially reduced the false alarms.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115019271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}