Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435205
Irzal Ahmad Sabilla, Zakiya Azizah Cahyaningtyas, R. Sarno, Asra Al Fauzi, D. Wijaya, Rudy Gunawan
Both human biological genders have the same hormone but at different levels. The difference in hormone levels makes the two genders distinguishable from several aspects. One of the things that are influenced by hormones is sweat. The odor of sweat is related to the apocrine glands found in human armpits. This experiment studied the classification of both genders based on daytime sweat in adult human armpits. The sampling method used an electronic nose (E-nose) system to collect the armpit sweat odor. The E-nose system sensor array consisted of seven sensors: TGS 822, TGS 2612, TGS 2620, TGS 826, TGS 2603, TGS 2600, and TGS 813. These sensors generate resistance ratio (Rs/Ro) values which are learned by the machine learning methods for classification and disease potential based on the volatile organic compound (VOC) in sweat. The study shows the male samples have higher amine gas than female samples, one of which is Trimethylamine (TMA). TMA is a compound that will be broken down into trimethylamine-N-oxide (TMAO), a factor to various cardiovascular diseases. The result achieved 94.12% accuracy in classifying human biological gender using principal component analysis (PCA) as the pre-processing method and support vector machine (SVM) as the machine learning method.
人类两种生理性别都有相同的激素,但水平不同。激素水平的差异使两性在几个方面得以区分。受荷尔蒙影响的事情之一就是出汗。汗臭与人类腋下的大汗腺有关。该实验研究了基于成人腋窝白天汗液的两性分类。采样方法采用电子鼻(E-nose)系统采集腋下汗液气味。电子鼻系统传感器阵列由7个传感器组成:TGS 822、TGS 2612、TGS 2620、TGS 826、TGS 2603、TGS 2600和TGS 813。这些传感器产生电阻比(Rs/Ro)值,通过机器学习方法学习分类和基于汗液中挥发性有机化合物(VOC)的疾病潜力。研究表明,男性样本的胺类气体含量高于女性样本,其中一种是三甲胺(TMA)。TMA是一种会分解成三甲胺- n -氧化物(TMAO)的化合物,是导致各种心血管疾病的一个因素。采用主成分分析(PCA)作为预处理方法,支持向量机(SVM)作为机器学习方法,对人类生物性别进行分类,准确率达到94.12%。
{"title":"Classification of Human Gender from Sweat Odor using Electronic Nose with Machine Learning Methods","authors":"Irzal Ahmad Sabilla, Zakiya Azizah Cahyaningtyas, R. Sarno, Asra Al Fauzi, D. Wijaya, Rudy Gunawan","doi":"10.1109/APWiMob51111.2021.9435205","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435205","url":null,"abstract":"Both human biological genders have the same hormone but at different levels. The difference in hormone levels makes the two genders distinguishable from several aspects. One of the things that are influenced by hormones is sweat. The odor of sweat is related to the apocrine glands found in human armpits. This experiment studied the classification of both genders based on daytime sweat in adult human armpits. The sampling method used an electronic nose (E-nose) system to collect the armpit sweat odor. The E-nose system sensor array consisted of seven sensors: TGS 822, TGS 2612, TGS 2620, TGS 826, TGS 2603, TGS 2600, and TGS 813. These sensors generate resistance ratio (Rs/Ro) values which are learned by the machine learning methods for classification and disease potential based on the volatile organic compound (VOC) in sweat. The study shows the male samples have higher amine gas than female samples, one of which is Trimethylamine (TMA). TMA is a compound that will be broken down into trimethylamine-N-oxide (TMAO), a factor to various cardiovascular diseases. The result achieved 94.12% accuracy in classifying human biological gender using principal component analysis (PCA) as the pre-processing method and support vector machine (SVM) as the machine learning method.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123803099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435207
O. Ozdemir
This paper investigates the performance of a non-orthogonal multiple access (NOMA) based two-way relaying system where the users want to exchange independent messages with the help of a decode-and-forward relay. We consider transmission over three phases where the first and second phases are allocated to the transmissions of the users and after detection the relay applies superposition coding and transmits the network encoded symbol to the users in the third phase. Exact analytical expressions are derived to characterize the achievable average rate of the system over independent Rayleigh fading channels. Computer simulations are also presented to confirm the theoretical analysis. Analytical and simulation results show that the proposed three-phase two-way relaying scheme with NOMA outperforms the two-phase and four-phase NOMA-based two-way relaying scenarios in terms of achievable average rate.
{"title":"Achievable Rate Analysis for Two-Way Relay Non-Orthogonal Multiple Access Systems","authors":"O. Ozdemir","doi":"10.1109/APWiMob51111.2021.9435207","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435207","url":null,"abstract":"This paper investigates the performance of a non-orthogonal multiple access (NOMA) based two-way relaying system where the users want to exchange independent messages with the help of a decode-and-forward relay. We consider transmission over three phases where the first and second phases are allocated to the transmissions of the users and after detection the relay applies superposition coding and transmits the network encoded symbol to the users in the third phase. Exact analytical expressions are derived to characterize the achievable average rate of the system over independent Rayleigh fading channels. Computer simulations are also presented to confirm the theoretical analysis. Analytical and simulation results show that the proposed three-phase two-way relaying scheme with NOMA outperforms the two-phase and four-phase NOMA-based two-way relaying scenarios in terms of achievable average rate.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"os-56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435254
Moh. Zulfiqar Naufal Maulana, R. Sarno, K. R. Sungkono
Process mining is a set of techniques that combine the scientific point of view of the data with the point of view of running processes correctly. The process mining can be performed with several algorithms, such as Alpha miner, Inductive Miner, and Fodina. Those existing algorithms only form a process model. Nevertheless, a system can be built not only a process model but also collaboration process models. Collaboration process models are several interconnected process models that are carried out by sending messages between those activities. Besides shortcoming of depicting collaboration process models, another issue is called an Invisible Task in a Non-Free Choice relationship. This issue occurs when particular conditions, i.e. skip, redo and switch, are happened in activities which are interdependent with other activities. Alpha $ is a pioneering algorithm that describes the Invisible Task in Non-Free Choice (IT-in-NFC); however, this algorithm cannot handle collaboration process models. This study proposes Modified Alpha ++ that contains rules of storing messages of activities and modifies Alpha ++ algorithm with additional Invisible Task rules to present Alpha $. The evaluation results show a process model obtained by Modified Alpha ++ is better than other algorithms, i.e. Alpha ++, Fodina and Inductive Miner. That statement is proven with the Fitness, Precision, and F -Measure values of the process model by Modified Alpha ++ are 1. On the other hand, process models of Alpha ++, Fodina and Alpha ++ obtain less than one F -Measure value.
{"title":"Process Discovery of Collaboration Business Process Containing Invisible Task in Non-Free Choice by using Modified Alpha ++","authors":"Moh. Zulfiqar Naufal Maulana, R. Sarno, K. R. Sungkono","doi":"10.1109/APWiMob51111.2021.9435254","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435254","url":null,"abstract":"Process mining is a set of techniques that combine the scientific point of view of the data with the point of view of running processes correctly. The process mining can be performed with several algorithms, such as Alpha miner, Inductive Miner, and Fodina. Those existing algorithms only form a process model. Nevertheless, a system can be built not only a process model but also collaboration process models. Collaboration process models are several interconnected process models that are carried out by sending messages between those activities. Besides shortcoming of depicting collaboration process models, another issue is called an Invisible Task in a Non-Free Choice relationship. This issue occurs when particular conditions, i.e. skip, redo and switch, are happened in activities which are interdependent with other activities. Alpha $ is a pioneering algorithm that describes the Invisible Task in Non-Free Choice (IT-in-NFC); however, this algorithm cannot handle collaboration process models. This study proposes Modified Alpha ++ that contains rules of storing messages of activities and modifies Alpha ++ algorithm with additional Invisible Task rules to present Alpha $. The evaluation results show a process model obtained by Modified Alpha ++ is better than other algorithms, i.e. Alpha ++, Fodina and Inductive Miner. That statement is proven with the Fitness, Precision, and F -Measure values of the process model by Modified Alpha ++ are 1. On the other hand, process models of Alpha ++, Fodina and Alpha ++ obtain less than one F -Measure value.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435271
Gusna Ikhsan, R. Sarno, K. R. Sungkono
A business process is a series of activities or work that is structured and interrelated to solve a problem. Business Process Model Notation (BPMN) is a standard that often use to create a series of business processes. There are not only one or two processes in a business process, but many processes which cross each other. Processes which have activities related to one another are called collaborative business processes. Process mining techniques analyze a process model that is generated based on actual processes with a process model as the Standard Operational Procedure (SOP). Existing process mining techniques depict activities of each process without consider the linkages between activities in a process with another process. In addition, there is an issue that should be handled by process mining techniques, i.e. non-fee choice. This paper proposes a Modification of Alpha++ for discovering linkages of activities in collaboration business processes. Alpha++ is chosen because this algorithm can form non-free choice relationship. In the evaluation, the proposed Modification of Alpha++ will be compared with Alpha++, Inductive Miner, and Heuristic Miner. The evaluation shows the proposed Modification Alpha++ algorithm can model event log data correctly based on the proposed business process. Modification Alpha++ can find non-free choice constructs on the event log data. Modification Alpha++ gets the best calculation results for fitness, precision, and f-measure with a value of 1.
{"title":"Modification of Alpha++ for Discovering Collaboration Business Processes Containing Non-Free Choice","authors":"Gusna Ikhsan, R. Sarno, K. R. Sungkono","doi":"10.1109/APWiMob51111.2021.9435271","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435271","url":null,"abstract":"A business process is a series of activities or work that is structured and interrelated to solve a problem. Business Process Model Notation (BPMN) is a standard that often use to create a series of business processes. There are not only one or two processes in a business process, but many processes which cross each other. Processes which have activities related to one another are called collaborative business processes. Process mining techniques analyze a process model that is generated based on actual processes with a process model as the Standard Operational Procedure (SOP). Existing process mining techniques depict activities of each process without consider the linkages between activities in a process with another process. In addition, there is an issue that should be handled by process mining techniques, i.e. non-fee choice. This paper proposes a Modification of Alpha++ for discovering linkages of activities in collaboration business processes. Alpha++ is chosen because this algorithm can form non-free choice relationship. In the evaluation, the proposed Modification of Alpha++ will be compared with Alpha++, Inductive Miner, and Heuristic Miner. The evaluation shows the proposed Modification Alpha++ algorithm can model event log data correctly based on the proposed business process. Modification Alpha++ can find non-free choice constructs on the event log data. Modification Alpha++ gets the best calculation results for fitness, precision, and f-measure with a value of 1.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435258
Abitha K. Thyagarajan, Priyeash Balasubramanian, Vydeki D, K. M
In a communication model, the Signal to Noise Ratio (SNR), Channel Quality Indicator (CQI) and modulation schemes are important factors that influence the quality of the communication, and so it is vital to establish the relationship between these factors. In this work, an SNR-CQI mapping relationship was derived, which was observed to yield a greater data rate over existing relationships described in the literature. A simple downlink transmission for a single User Equipment (UE) in a 5G network was simulated and validated using a new mapping proposed as well as existing mappings. The 256QAM modulation scheme was found to give the maximum throughput. Finally, a single simulation was developed, in which the downlink traffic for four UEs within a single cell was simulated. The UEs were scheduled using the Proportional Fair scheduling algorithm. Various application requirements such as gaming, video, and audio traffic were simulated. The result shows that the proposed mapping improves the throughput of the 5G downlink system by 30.75% more than the existing mapping schemes.
{"title":"SNR-CQI Mapping for 5G Downlink Network","authors":"Abitha K. Thyagarajan, Priyeash Balasubramanian, Vydeki D, K. M","doi":"10.1109/APWiMob51111.2021.9435258","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435258","url":null,"abstract":"In a communication model, the Signal to Noise Ratio (SNR), Channel Quality Indicator (CQI) and modulation schemes are important factors that influence the quality of the communication, and so it is vital to establish the relationship between these factors. In this work, an SNR-CQI mapping relationship was derived, which was observed to yield a greater data rate over existing relationships described in the literature. A simple downlink transmission for a single User Equipment (UE) in a 5G network was simulated and validated using a new mapping proposed as well as existing mappings. The 256QAM modulation scheme was found to give the maximum throughput. Finally, a single simulation was developed, in which the downlink traffic for four UEs within a single cell was simulated. The UEs were scheduled using the Proportional Fair scheduling algorithm. Various application requirements such as gaming, video, and audio traffic were simulated. The result shows that the proposed mapping improves the throughput of the 5G downlink system by 30.75% more than the existing mapping schemes.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435224
Gede Utama Laksana, Linawati, D. Wiharta
Nowadays, Indonesia is preparing infrastructures and policies for upcoming 5G deployment. Spectrum availability is one of the prerequisites for deploying wireless-based services. One of the ways to increase network capacity is by adding radio frequency spectrum allocation. The most interesting problem with the use of low frequency bands in Indonesia is in the 700 MHz band. Currently, it is allocated to analog TV. After Analog Switch-Off (ASO) is completed, there will be digital dividends in the 700 MHz band, with a magnitude of 112 MHz which can be allocated as the IMT band. Then the Government has set a deadline for the Migration of Analog Television to Digital Television by end of 2022. Therefore this study aims to investigate the availability of the Radio Frequency Spectrum for the implementation of 5G technology, and its telecommunication network model according to Bali topology. We focus on the utilization of 700 MHz radio frequency band for 5G technology in Bali. The observation of the radio frequency band occupancy monitoring report of the Class I Denpasar Radio Frequency Spectrum Monitoring Center (Balmon Kelas I Denpasar) is carried out which in accordance with established standard operating procedures by referring to the Spectrum Monitoring Handbook, ITU-R. Modeling and simulation methods using the Spectrum Engineering Advanced Monte Carlo Analysis Tool (Seamcat) are applied.
目前,印尼正在为即将到来的5G部署准备基础设施和政策。频谱可用性是部署基于无线的服务的先决条件之一。增加网络容量的方法之一是增加无线电频谱分配。在印度尼西亚使用低频段最有趣的问题是在700兆赫频段。目前,它被分配给模拟电视。模拟关断(Analog switch off, ASO)完成后,700 MHz频段将产生数字红利,其幅度为112 MHz,可分配为IMT频段。然后,政府为模拟电视向数字电视的迁移设定了最后期限,即2022年底。因此,本研究旨在研究5G技术实施的无线电频谱的可用性,以及基于Bali拓扑的电信网络模型。我们专注于在巴厘岛利用700 MHz无线电频段用于5G技术。参照ITU-R《频谱监测手册》,按照既定标准操作程序,对第一类登巴萨无线电频谱监测中心(Balmon Kelas I Denpasar)的无线电频段占用监测报告进行观察。利用频谱工程高级蒙特卡罗分析工具(seamat)进行建模和仿真。
{"title":"Radio Frequency Band 700 MHz Utilization Plan for 5G Technology Implementation in Bali Province","authors":"Gede Utama Laksana, Linawati, D. Wiharta","doi":"10.1109/APWiMob51111.2021.9435224","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435224","url":null,"abstract":"Nowadays, Indonesia is preparing infrastructures and policies for upcoming 5G deployment. Spectrum availability is one of the prerequisites for deploying wireless-based services. One of the ways to increase network capacity is by adding radio frequency spectrum allocation. The most interesting problem with the use of low frequency bands in Indonesia is in the 700 MHz band. Currently, it is allocated to analog TV. After Analog Switch-Off (ASO) is completed, there will be digital dividends in the 700 MHz band, with a magnitude of 112 MHz which can be allocated as the IMT band. Then the Government has set a deadline for the Migration of Analog Television to Digital Television by end of 2022. Therefore this study aims to investigate the availability of the Radio Frequency Spectrum for the implementation of 5G technology, and its telecommunication network model according to Bali topology. We focus on the utilization of 700 MHz radio frequency band for 5G technology in Bali. The observation of the radio frequency band occupancy monitoring report of the Class I Denpasar Radio Frequency Spectrum Monitoring Center (Balmon Kelas I Denpasar) is carried out which in accordance with established standard operating procedures by referring to the Spectrum Monitoring Handbook, ITU-R. Modeling and simulation methods using the Spectrum Engineering Advanced Monte Carlo Analysis Tool (Seamcat) are applied.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130582413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435232
Asep Hadian Sudrajat Ganidisastra, Y. Bandung
The ability to provide an academic resource for a remote student has increased the use of m-learning in distance education. Online exams as a tool to measure the student's outcome need a proctoring method to detect cheats. Several methods had been proposed to fulfill these needs, from a no-proctoring exam to automatic online supervision. A visual verification during an online exam is required to verify a student took the exam, therefore a CNN-FR is used to do it. The problem that exists in face recognition is the system invariant against pose and lighting variations. In some proposed methods, an additional process such as image equalization and SURF features is executed to overcome the problems. In this paper, we proposed an incremental training process on face recognition training, so there will be no need to add another process so it will reduce the computation cost and time. To acquired high accuracy we've analyzed four different face detectors, which are Haar-cascade, LBP, MTCNN, and Yolo-face, as in face recognition a Facenet model was tested. The evaluation of the proposed method shows that a deep learning face detector has overcome the others, on the other hand, an incremental training of facenet model results in a smaller dataset size by 1% with a faster training time of 7% on Yolo-face face detector and 64% on MTCNN compared to batch training. The proposed method results in an equally high accuracy rate as in batch training (98%).
{"title":"An Incremental Training on Deep Learning Face Recognition for M-Learning Online Exam Proctoring","authors":"Asep Hadian Sudrajat Ganidisastra, Y. Bandung","doi":"10.1109/APWiMob51111.2021.9435232","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435232","url":null,"abstract":"The ability to provide an academic resource for a remote student has increased the use of m-learning in distance education. Online exams as a tool to measure the student's outcome need a proctoring method to detect cheats. Several methods had been proposed to fulfill these needs, from a no-proctoring exam to automatic online supervision. A visual verification during an online exam is required to verify a student took the exam, therefore a CNN-FR is used to do it. The problem that exists in face recognition is the system invariant against pose and lighting variations. In some proposed methods, an additional process such as image equalization and SURF features is executed to overcome the problems. In this paper, we proposed an incremental training process on face recognition training, so there will be no need to add another process so it will reduce the computation cost and time. To acquired high accuracy we've analyzed four different face detectors, which are Haar-cascade, LBP, MTCNN, and Yolo-face, as in face recognition a Facenet model was tested. The evaluation of the proposed method shows that a deep learning face detector has overcome the others, on the other hand, an incremental training of facenet model results in a smaller dataset size by 1% with a faster training time of 7% on Yolo-face face detector and 64% on MTCNN compared to batch training. The proposed method results in an equally high accuracy rate as in batch training (98%).","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435223
Fahad Hassan, M. Usman, Shahzaib Hamid, M. A. Usman, C. Politis, Gandeva Bayu Satrya
Due to innovation in machine automation and artificial intelligence (AI), surveillance and security paradigms are changing. The unmanned aerial vehicles are designed for surveillance of high importance area, that are either difficult to access or are located in dangerous zones. This paper focuses on design and construction of hex-copter with surveillance capabilities. The designed hex-copter has the ability to fly autonomously and cover the predefined path as well as send the video signals which are to be viewed on the ground base station, i.e., PC and smart phones etc., also the UAV is fully capable of self-controlled flight and solar based self-powering mechanism. For self-control mechanism, our design includes an ArduPilot Mega (APM) Version 2.8 flight controller having an in-built microcontroller with capability of interfacing with GPS and Inertial measurement sensor unit. The auto-flight path is generated with the help of mission planner software. For the surveillance purpose, a camera is attached with the hex-copter that transmits video data wirelessly to the ground station. This system provides an extremely maneuverable and versatile platform for applications like surveillance and aerial photography. It can be used for government agencies, military applications, and disaster relief etc.
由于机器自动化和人工智能(AI)的创新,监视和安全范例正在发生变化。无人机是针对难以进入或位于危险区域的高度重要区域进行监视而设计的。本文主要研究具有监视能力的六旋翼直升机的设计与制造。所设计的六旋翼直升机具有自主飞行和覆盖预定路径的能力,并发送视频信号,供地面基站,即PC和智能手机等观看,并且无人机完全能够自我控制飞行和基于太阳能的自供电机构。对于自我控制机制,我们的设计包括一个ArduPilot Mega (APM) 2.8版本的飞行控制器,其内置微控制器具有与GPS和惯性测量传感器单元接口的能力。在任务规划软件的帮助下,自动生成飞行路径。为了监视目的,六轴直升机上安装了一个摄像头,该摄像头将视频数据无线传输到地面站。该系统为监视和航空摄影等应用提供了一个非常灵活和通用的平台。它可用于政府机构,军事应用,救灾等。
{"title":"Solar Powered Autonomous Hex-Copter for Surveillance, Security and Monitoring","authors":"Fahad Hassan, M. Usman, Shahzaib Hamid, M. A. Usman, C. Politis, Gandeva Bayu Satrya","doi":"10.1109/APWiMob51111.2021.9435223","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435223","url":null,"abstract":"Due to innovation in machine automation and artificial intelligence (AI), surveillance and security paradigms are changing. The unmanned aerial vehicles are designed for surveillance of high importance area, that are either difficult to access or are located in dangerous zones. This paper focuses on design and construction of hex-copter with surveillance capabilities. The designed hex-copter has the ability to fly autonomously and cover the predefined path as well as send the video signals which are to be viewed on the ground base station, i.e., PC and smart phones etc., also the UAV is fully capable of self-controlled flight and solar based self-powering mechanism. For self-control mechanism, our design includes an ArduPilot Mega (APM) Version 2.8 flight controller having an in-built microcontroller with capability of interfacing with GPS and Inertial measurement sensor unit. The auto-flight path is generated with the help of mission planner software. For the surveillance purpose, a camera is attached with the hex-copter that transmits video data wirelessly to the ground station. This system provides an extremely maneuverable and versatile platform for applications like surveillance and aerial photography. It can be used for government agencies, military applications, and disaster relief etc.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122435533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435236
M. Adnan, Tazeem Ahmad, Tao Yang
The network scalability and energy performance have great importance in wireless sensor networks (WSNs). WSN consists of a vast number of nodes with small memory and battery capacity, which makes an energy-efficient design of WSNs very essential. Since the entire network's life depends on the sensor nodes, effective energy usage, clustering has been proved one of the best approaches to enhance energy efficiency and network lifetime. In this paper, we design a type 2 fuzzy logic based clustering scheme in a multi-hop WSN to reduce energy consumption and improve network scalability. In this clustering scheme, we propose a Cluster head (CH) selection strategy where a sensor node is elected as a CH based on type 2 fuzzy logic inputs. To balance the load of CHs we also select their radius size based on the fuzzy logic inputs. We compare our proposed scheme with the well-known TTDPF and CHCCF schemes. The simulation results show that our proposed schemes outperform the TTDFP and CHCCF schemes in terms of network lifetime and other metrics.
{"title":"Type-2 Fuzzy Logic Based Energy-Efficient Cluster Head Election for Multi-Hop Wireless Sensor Networks","authors":"M. Adnan, Tazeem Ahmad, Tao Yang","doi":"10.1109/APWiMob51111.2021.9435236","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435236","url":null,"abstract":"The network scalability and energy performance have great importance in wireless sensor networks (WSNs). WSN consists of a vast number of nodes with small memory and battery capacity, which makes an energy-efficient design of WSNs very essential. Since the entire network's life depends on the sensor nodes, effective energy usage, clustering has been proved one of the best approaches to enhance energy efficiency and network lifetime. In this paper, we design a type 2 fuzzy logic based clustering scheme in a multi-hop WSN to reduce energy consumption and improve network scalability. In this clustering scheme, we propose a Cluster head (CH) selection strategy where a sensor node is elected as a CH based on type 2 fuzzy logic inputs. To balance the load of CHs we also select their radius size based on the fuzzy logic inputs. We compare our proposed scheme with the well-known TTDPF and CHCCF schemes. The simulation results show that our proposed schemes outperform the TTDFP and CHCCF schemes in terms of network lifetime and other metrics.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-08DOI: 10.1109/APWiMob51111.2021.9435276
Budi Syihabuddin, M. R. Effendi, A. Munir
An analysis of square patch-based electromagnetics (EM) wave absorber characteristics in term of frequency response is proposed using a model of transmission line. The EM wave absorber modeled in a planar transmission line is arranged using an array of square patches deployed on the top side of dielectric substrate with the groundplane at the bottom side. The array is simulated through a single unit cell of square patch implementing appropriate boundaries surrounding the unit cell to form an EM wave absorber pattern of infinite extent. The performance of simulation is analyzed using transmission line model by deriving the input impedance at the border between the vacuum and the square patch. In order to analyze the correlation between the simulation and the proposed transmission line model, physical parameter of square patch corresponding to admittance component is varied to have similar frequency response. Three different widths of square patch are simulated for the analysis producing the frequency response of 11.95 GHz, 11.05 GHz, 9.95 GHz and 9.00 GHz. The approach of transmission line model shows that the size of square patch can be modeled and analyzed through admittance component affecting the shift of frequency response.
{"title":"Analysis of Square Patch-based Electromagnetics Wave Absorber Frequency Response Using Transmission Line Model","authors":"Budi Syihabuddin, M. R. Effendi, A. Munir","doi":"10.1109/APWiMob51111.2021.9435276","DOIUrl":"https://doi.org/10.1109/APWiMob51111.2021.9435276","url":null,"abstract":"An analysis of square patch-based electromagnetics (EM) wave absorber characteristics in term of frequency response is proposed using a model of transmission line. The EM wave absorber modeled in a planar transmission line is arranged using an array of square patches deployed on the top side of dielectric substrate with the groundplane at the bottom side. The array is simulated through a single unit cell of square patch implementing appropriate boundaries surrounding the unit cell to form an EM wave absorber pattern of infinite extent. The performance of simulation is analyzed using transmission line model by deriving the input impedance at the border between the vacuum and the square patch. In order to analyze the correlation between the simulation and the proposed transmission line model, physical parameter of square patch corresponding to admittance component is varied to have similar frequency response. Three different widths of square patch are simulated for the analysis producing the frequency response of 11.95 GHz, 11.05 GHz, 9.95 GHz and 9.00 GHz. The approach of transmission line model shows that the size of square patch can be modeled and analyzed through admittance component affecting the shift of frequency response.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}