Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615049
Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer
Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.
{"title":"A Formal Optimization Model for 5G Mobile Network Slice Resource Allocation","authors":"Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer","doi":"10.1109/IEMCON.2018.8615049","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615049","url":null,"abstract":"Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614852
Tarek El Salti, Mark Orlando, Simon Hood, Gerhard Knelsen, Melanie Iarocci, Zachary Lazzara, Yongmei Xie, Joseph Chun-Chung Cheung, I. Woungang
Indoor Location Based Services (LBSs) are likely to make significant contributions to society and the economy in the near future. Unlike outdoor LBSs, the technologies and methodologies used are still very much under development, and there are a number of challenges which must be addressed, namely: accuracy, precision, and time complexity. For the accuracy metric, the Euclidean distance error is calculated based on the difference between the known location (points of interests) and the localized position. Regarding the precision metric, the distribution of the distance errors is computed. In this paper, new fingerprinting-based algorithms, namely, the Nearest Neighbor Version 2 (NNV2), Nearest Neighbor Version 3 (NNV3) and Nearest Neighbor Version 4 (NNV4), are proposed, and tested to determine the most effective and efficient one with respect to those challenges. Our analysis reveals that: (1) the time complexity for each of the Nearest Neighbour (NN) and KNN algorithms (i.e., K is constant) is $(1ast mathbf{n}ast mathbf{m}+1ast mathbf{m})$ -comparison which is more than that for NNV2 and NNV4 (i.e., n is the number of centroids between any two rows, m refers to the Received Signal Strength Indicators (RSSIs) acquired at the offline stage, and 1 is the number of rows that holds some of the grid points), (2) NNV4 outperforms the NN, KNN and Path-loss based Fingerprint Localization algorithms (PFL) in terms of accuracy by approximately 29%, 13%, 22%; respectively, (3) NNV4 outperforms the NN, KNN and PFL in terms of precision by approximately 53%, 28%, 52%; respectively, and (4) NNV4 has a lower probability of positional error compared to those for the existing indoor localization algorithms.
{"title":"A New Set of Bluetooth-Based Fingerprinting Algorithms for Indoor Location Services","authors":"Tarek El Salti, Mark Orlando, Simon Hood, Gerhard Knelsen, Melanie Iarocci, Zachary Lazzara, Yongmei Xie, Joseph Chun-Chung Cheung, I. Woungang","doi":"10.1109/IEMCON.2018.8614852","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614852","url":null,"abstract":"Indoor Location Based Services (LBSs) are likely to make significant contributions to society and the economy in the near future. Unlike outdoor LBSs, the technologies and methodologies used are still very much under development, and there are a number of challenges which must be addressed, namely: accuracy, precision, and time complexity. For the accuracy metric, the Euclidean distance error is calculated based on the difference between the known location (points of interests) and the localized position. Regarding the precision metric, the distribution of the distance errors is computed. In this paper, new fingerprinting-based algorithms, namely, the Nearest Neighbor Version 2 (NNV2), Nearest Neighbor Version 3 (NNV3) and Nearest Neighbor Version 4 (NNV4), are proposed, and tested to determine the most effective and efficient one with respect to those challenges. Our analysis reveals that: (1) the time complexity for each of the Nearest Neighbour (NN) and KNN algorithms (i.e., K is constant) is $(1ast mathbf{n}ast mathbf{m}+1ast mathbf{m})$ -comparison which is more than that for NNV2 and NNV4 (i.e., n is the number of centroids between any two rows, m refers to the Received Signal Strength Indicators (RSSIs) acquired at the offline stage, and 1 is the number of rows that holds some of the grid points), (2) NNV4 outperforms the NN, KNN and Path-loss based Fingerprint Localization algorithms (PFL) in terms of accuracy by approximately 29%, 13%, 22%; respectively, (3) NNV4 outperforms the NN, KNN and PFL in terms of precision by approximately 53%, 28%, 52%; respectively, and (4) NNV4 has a lower probability of positional error compared to those for the existing indoor localization algorithms.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614791
Nikunj Parekh, Swathi Kurunji, Alan Beck
Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.
{"title":"Monitoring Resources of Machine Learning Engine In Microservices Architecture","authors":"Nikunj Parekh, Swathi Kurunji, Alan Beck","doi":"10.1109/IEMCON.2018.8614791","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614791","url":null,"abstract":"Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614771
Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah
Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.
{"title":"A Voice Controlled E-Commerce Web Application","authors":"Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah","doi":"10.1109/IEMCON.2018.8614771","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614771","url":null,"abstract":"Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614823
G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, Basil C. Mbonu, Mercy C. Nneji
Antenatal classes are sometimes called parentcraft which help to prepare expectant mothers for their baby's birth, feeding the baby and to look after the baby. It is the best way to ensure expectant mothers stay healthy during pregnancy as well as to deliver confidence and information. This paper looks into the current state of antenatal education. It investigates the way antenatal classes are accessed by expectant mothers, the challenges they face in getting access to these classes and their attitudes towards these classes. For most women, it could be stressful and very inconvenient to attend physical antenatal classes. An online collaborative approach of interactive antenatal lecture for expectant mothers is proposed to replace these classes by providing live streaming lectures, discussion and interactive sessions between users. In order to accomplish this task, some face-to-face interviews were conducted. Questionnaires were also distributed. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the specification, development, and implementation. The web based system is implemented using PHP framework as Back-end, Front-End using HTML, CSS, JavaScript, XAMPP Server and MySQL was employed to handle the database structure. The web based system was implemented and tested using carefully thought out test cases which were successful. The proposed system offers antenatal education to expectant mothers no matter their location as well as a platform for discussion between expectant mothers, midwives, or anyone at all; sharing useful information amongst themselves and giving advice and encouragement to one another.
{"title":"Online Collaborative Approach of Interactive Antenatal Lectures for Expectant Mothers","authors":"G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, Basil C. Mbonu, Mercy C. Nneji","doi":"10.1109/IEMCON.2018.8614823","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614823","url":null,"abstract":"Antenatal classes are sometimes called parentcraft which help to prepare expectant mothers for their baby's birth, feeding the baby and to look after the baby. It is the best way to ensure expectant mothers stay healthy during pregnancy as well as to deliver confidence and information. This paper looks into the current state of antenatal education. It investigates the way antenatal classes are accessed by expectant mothers, the challenges they face in getting access to these classes and their attitudes towards these classes. For most women, it could be stressful and very inconvenient to attend physical antenatal classes. An online collaborative approach of interactive antenatal lecture for expectant mothers is proposed to replace these classes by providing live streaming lectures, discussion and interactive sessions between users. In order to accomplish this task, some face-to-face interviews were conducted. Questionnaires were also distributed. This paper adopted the Structured Systems Analysis and Design Method (SSADM) for the specification, development, and implementation. The web based system is implemented using PHP framework as Back-end, Front-End using HTML, CSS, JavaScript, XAMPP Server and MySQL was employed to handle the database structure. The web based system was implemented and tested using carefully thought out test cases which were successful. The proposed system offers antenatal education to expectant mothers no matter their location as well as a platform for discussion between expectant mothers, midwives, or anyone at all; sharing useful information amongst themselves and giving advice and encouragement to one another.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614913
I. Zafar, Asma Shaheen, A. Nazir, B. Maqbool, Wasi Haider Butt, Jahan Zeb
Requirement engineering (RE) is initial and critical phase of software engineering. The success of software project is based on good requirement engineering practices. The purpose of requirement engineering practices is to elicit all intended user needs and document them for clarity of understanding and for future reference. In developing countries like Pakistan best RE practices are not fully used in software industry. In this study, major reasons for not using best RE practices are identified based on literature review of research work done related to RE in different countries. Literature review revealed that lack of knowledge of requirement engineering processes, lack of cost, lack of time are major factors behind not using RE practices in software development. A survey was conducted to base on factors identified to highlight major obstacles in way of using best requirement engineering practices in Pakistan. Survey results depicted the main issues are lack of budget, lack of time, lack of dedicated team and communication difficulties.
{"title":"Why Pakistani Software Companies don't use Best Practices for Requirement Engineering Processes","authors":"I. Zafar, Asma Shaheen, A. Nazir, B. Maqbool, Wasi Haider Butt, Jahan Zeb","doi":"10.1109/IEMCON.2018.8614913","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614913","url":null,"abstract":"Requirement engineering (RE) is initial and critical phase of software engineering. The success of software project is based on good requirement engineering practices. The purpose of requirement engineering practices is to elicit all intended user needs and document them for clarity of understanding and for future reference. In developing countries like Pakistan best RE practices are not fully used in software industry. In this study, major reasons for not using best RE practices are identified based on literature review of research work done related to RE in different countries. Literature review revealed that lack of knowledge of requirement engineering processes, lack of cost, lack of time are major factors behind not using RE practices in software development. A survey was conducted to base on factors identified to highlight major obstacles in way of using best requirement engineering practices in Pakistan. Survey results depicted the main issues are lack of budget, lack of time, lack of dedicated team and communication difficulties.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614869
H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji
This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.
{"title":"Fast Prediction of Equivalent Model of Installed Patch Antenna Radiation Pattern","authors":"H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8614869","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614869","url":null,"abstract":"This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615085
Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim
In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)
{"title":"Vehicle Counting Quantitative Comparison Using Background Subtraction, Viola Jones and Deep Learning Methods","authors":"Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim","doi":"10.1109/IEMCON.2018.8615085","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615085","url":null,"abstract":"In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614763
F. J. Dian, A. Yousefi, Sungjoon Lim
the data rate of Bluetooth Low Energy (BLE) is 1Mbps, and 2Mbps for BLE 4.2 and BLE 5, respectively. However, the throughput of a BLE system would be much lower since we need to account for various protocol overheads, adaptive RF connection adjustments for maintaining robust links amid interference, and protocol limitations based on BLE data exchange strategy and operations such as connection intervals, packet size and packet acknowledgment scheme. In this paper, we practically investigate the maximum throughput achievable in a simple BLE 4.2 network of two nodes, used in a data logging application. In this type of application, one node always has data to transmit and the other node which collects the transmitted sensor data does not have any data to send. We will also consider the effect of BLE parameters in this study. The result of our study shows that the maximum amount of throughput is 221.7 kbps for this application under the condition that the wireless link is error free and application always has data to transmit.
BLE (Bluetooth Low Energy)协议的数据速率为1Mbps, BLE 4.2协议为2Mbps, BLE 5协议为2Mbps。然而,BLE系统的吞吐量会低得多,因为我们需要考虑各种协议开销、自适应RF连接调整以在干扰中保持稳健的链路,以及基于BLE数据交换策略和操作(如连接间隔、数据包大小和数据包确认方案)的协议限制。在本文中,我们实际研究了在数据记录应用中使用的简单双节点BLE 4.2网络所能实现的最大吞吐量。在这种类型的应用程序中,一个节点总是有数据要传输,而收集传输的传感器数据的另一个节点没有任何数据要发送。我们还将在本研究中考虑BLE参数的影响。研究结果表明,在无线链路无差错且应用程序始终有数据传输的情况下,该应用程序的最大吞吐量为221.7 kbps。
{"title":"A practical study on Bluetooth Low Energy (BLE) throughput","authors":"F. J. Dian, A. Yousefi, Sungjoon Lim","doi":"10.1109/IEMCON.2018.8614763","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614763","url":null,"abstract":"the data rate of Bluetooth Low Energy (BLE) is 1Mbps, and 2Mbps for BLE 4.2 and BLE 5, respectively. However, the throughput of a BLE system would be much lower since we need to account for various protocol overheads, adaptive RF connection adjustments for maintaining robust links amid interference, and protocol limitations based on BLE data exchange strategy and operations such as connection intervals, packet size and packet acknowledgment scheme. In this paper, we practically investigate the maximum throughput achievable in a simple BLE 4.2 network of two nodes, used in a data logging application. In this type of application, one node always has data to transmit and the other node which collects the transmitted sensor data does not have any data to send. We will also consider the effect of BLE parameters in this study. The result of our study shows that the maximum amount of throughput is 221.7 kbps for this application under the condition that the wireless link is error free and application always has data to transmit.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614929
Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy
This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.
{"title":"Smart Intelligent System for Women and Child Security","authors":"Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy","doi":"10.1109/IEMCON.2018.8614929","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614929","url":null,"abstract":"This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}