首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
A new tree target tracking algorithm in WSNs 一种新的WSNs树目标跟踪算法
A. Odeh, Eman Abdelfattah
Wireless sensor networks are becoming increasingly the essential part of the digital world. Target tracking system is a significant part of wireless sensor networks. It has its own advantages and challenges. In this paper, a new Tree-Based target-tracking algorithm is proposed, by employing the minimum traffic rate to reduce the time and energy consumption. The proposed algorithm consists of four phases that create a tree structure from undirected and connected graph. It reduces the communication cost, overcomes message-flooding problem, maximizes the life time for each node to maximize the overall life time of the network.
无线传感器网络正日益成为数字世界的重要组成部分。目标跟踪系统是无线传感器网络的重要组成部分。它有自己的优势和挑战。本文提出了一种新的基于树的目标跟踪算法,该算法采用最小通信量来减少时间和能量的消耗。该算法由四个阶段组成,从无向图和连通图生成树状结构。它降低了通信成本,克服了消息泛滥问题,使每个节点的生存时间最大化,从而使网络的整体生存时间最大化。
{"title":"A new tree target tracking algorithm in WSNs","authors":"A. Odeh, Eman Abdelfattah","doi":"10.1109/UEMCON.2017.8249006","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249006","url":null,"abstract":"Wireless sensor networks are becoming increasingly the essential part of the digital world. Target tracking system is a significant part of wireless sensor networks. It has its own advantages and challenges. In this paper, a new Tree-Based target-tracking algorithm is proposed, by employing the minimum traffic rate to reduce the time and energy consumption. The proposed algorithm consists of four phases that create a tree structure from undirected and connected graph. It reduces the communication cost, overcomes message-flooding problem, maximizes the life time for each node to maximize the overall life time of the network.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy issues affecting cloud-based IP camera 影响基于云的IP摄像机的安全和隐私问题
Jimmy Liranzo, T. Hayajneh
Consumers have overwhelmingly adopted the use of Internet of Things (IoT) inside their homes, these devices are connected to the internet sending and receiving data 24/7, a security breach or privacy exposure from one of these devices could lead to more nightmares than horror movies. These have lead us to review the current capabilities of Cloud-Based IP Cameras, its existing security and privacy issues affecting these devices. We present an analysis of the main privacy and security concerns currently affecting thousands of consumers IP Cameras globally, the uncertainty of not knowing what happens to your data when is stored in the Cloud and propose set of recommendations to help protect consumer's IoT devices in the intimacy of their home. Stop those nightmares before they happen because there is no peace of mind knowing an unknown person may be watching your children baby monitor and tracking all your movement inside your home. Although there are still challenges to address, is better to be an educated consumer who knows and understand the risk of these devices and take measures to prevent unwanted exposure.
绝大多数消费者已经在家中使用物联网(IoT),这些设备连接到互联网,全天候发送和接收数据,这些设备的安全漏洞或隐私暴露可能会导致比恐怖电影更多的噩梦。这些都促使我们审视基于云的IP摄像头的当前功能,以及影响这些设备的现有安全和隐私问题。我们分析了目前影响全球成千上万消费者IP摄像机的主要隐私和安全问题,以及不知道存储在云中数据会发生什么情况的不确定性,并提出了一组建议,以帮助保护消费者在家中的物联网设备。在这些噩梦发生之前阻止它们,因为知道一个不知名的人可能在看着你的孩子,婴儿监视器,跟踪你在家里的所有活动,你的心是不会平静的。尽管仍有挑战需要解决,但最好是成为一个受过教育的消费者,了解和理解这些设备的风险,并采取措施防止不必要的接触。
{"title":"Security and privacy issues affecting cloud-based IP camera","authors":"Jimmy Liranzo, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249043","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249043","url":null,"abstract":"Consumers have overwhelmingly adopted the use of Internet of Things (IoT) inside their homes, these devices are connected to the internet sending and receiving data 24/7, a security breach or privacy exposure from one of these devices could lead to more nightmares than horror movies. These have lead us to review the current capabilities of Cloud-Based IP Cameras, its existing security and privacy issues affecting these devices. We present an analysis of the main privacy and security concerns currently affecting thousands of consumers IP Cameras globally, the uncertainty of not knowing what happens to your data when is stored in the Cloud and propose set of recommendations to help protect consumer's IoT devices in the intimacy of their home. Stop those nightmares before they happen because there is no peace of mind knowing an unknown person may be watching your children baby monitor and tracking all your movement inside your home. Although there are still challenges to address, is better to be an educated consumer who knows and understand the risk of these devices and take measures to prevent unwanted exposure.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A real time spectrum scanning technique based on compressive sensing for cognitive radio networks 基于压缩感知的认知无线电网络实时频谱扫描技术
Fatima Salahdine, Hassan El Ghazi
This paper describes a real time spectrum scanning method using software defined radio (SDR) units to perform and evaluate the wideband spectrum occupancy survey. The proposed method is based on compressive sensing in order to reduce the scanning time as the conventional spectrum scanning requires a great deal of processing time. It consists of performing spectrum scanning on the compressed measurements through the compressive sensing framework. Energy, autocorrelation, and Euclidean distance based sensing techniques were used to perform the spectrum sensing on the compressed signals instead of the entire signals. Also, an SNR estimation technique is used to enhance the scanning performance. The results of the experiments were analyzed and compared in terms of processing time, number of sensed channels, SNR, occupancy, detection rate, and false detection rate. Through analyzing the results, the proposed method is faster than the conventional spectrum scanning.
本文介绍了一种利用软件无线电(SDR)单元进行宽带频谱占用调查和评估的实时频谱扫描方法。传统的频谱扫描需要大量的处理时间,为了减少扫描时间,提出了一种基于压缩感知的方法。它包括通过压缩感知框架对压缩测量值进行频谱扫描。利用能量、自相关和基于欧几里得距离的感知技术对压缩信号进行频谱感知,而不是对整个信号进行频谱感知。同时,采用信噪比估计技术提高了扫描性能。从处理时间、感知通道数、信噪比、占用率、检测率、误检率等方面对实验结果进行分析比较。分析结果表明,该方法比传统的光谱扫描方法速度更快。
{"title":"A real time spectrum scanning technique based on compressive sensing for cognitive radio networks","authors":"Fatima Salahdine, Hassan El Ghazi","doi":"10.1109/UEMCON.2017.8249008","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249008","url":null,"abstract":"This paper describes a real time spectrum scanning method using software defined radio (SDR) units to perform and evaluate the wideband spectrum occupancy survey. The proposed method is based on compressive sensing in order to reduce the scanning time as the conventional spectrum scanning requires a great deal of processing time. It consists of performing spectrum scanning on the compressed measurements through the compressive sensing framework. Energy, autocorrelation, and Euclidean distance based sensing techniques were used to perform the spectrum sensing on the compressed signals instead of the entire signals. Also, an SNR estimation technique is used to enhance the scanning performance. The results of the experiments were analyzed and compared in terms of processing time, number of sensed channels, SNR, occupancy, detection rate, and false detection rate. Through analyzing the results, the proposed method is faster than the conventional spectrum scanning.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Real time embedded system IPs protection using chaotic maps 使用混沌映射的实时嵌入式系统ip保护
K. Salah
In this paper and for the first time, a novel chaotic maps algorithm is proposed to be used in hardware on-chip security for real-time embedded systems. The aim is to cipher the original program rom by changing the contents and the locations of the original data to ban extracting designs of secure IPs. As we know, many strong ciphers have been applied widely, such as DES, AES and RSA. But most of them cannot be directly used to encrypt real-time embedded systems because their encryption speed is not fast enough and they are computationally intensive. So, in this work we present a fast chaotic-based encryption algorithm which is suitable for real-time embedded systems in terms of performance, area and power efficiency. To illustrate the effectiveness of the proposed algorithm, numerical simulations are presented. Moreover, the proposed chaotic algorithm is implemented using RTL-design. The proposed encryption gives 64 bits of encrypted data per clock cycle. The hardware implementation results give a synthesis clock frequency of 400 MHz and a throughput of 3.2 Gbps while using low area. This makes the proposed algorithm suitable for embedded systems. The RTL implementation results match the Matlab simulation results. The strong structural complexity of our proposed algorithm makes it difficult to predict the key and make it able to resist exhaustive attack, statistical attack and differential attack. All these features show that our proposed algorithm is very suitable for hardware on-chip security for real-time embedded systems. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. Moreover, it is cost-effective solution.
本文首次提出了一种新的混沌映射算法,用于实时嵌入式系统的硬件片上安全。其目的是通过改变原始数据的内容和位置来加密原始程序,以禁止提取安全ip的设计。众所周知,许多强密码得到了广泛的应用,如DES、AES和RSA。但由于加密速度不够快且计算量大,大多数加密算法不能直接用于实时嵌入式系统的加密。因此,本文提出了一种在性能、面积和功耗方面都适合于实时嵌入式系统的基于混沌的快速加密算法。为了说明该算法的有效性,给出了数值模拟。此外,混沌算法采用rtl设计实现。提出的加密每个时钟周期提供64位加密数据。硬件实现结果表明,在低面积下,合成时钟频率为400 MHz,吞吐量为3.2 Gbps。这使得该算法适用于嵌入式系统。RTL实现结果与Matlab仿真结果吻合。该算法具有较强的结构复杂性,使得密钥难以预测,并能抵抗穷举攻击、统计攻击和差分攻击。所有这些特征表明我们提出的算法非常适合用于实时嵌入式系统的硬件片上安全。详尽的密码分析已经完成,我们可以断定系统是安全的。此外,它是一种经济高效的解决方案。
{"title":"Real time embedded system IPs protection using chaotic maps","authors":"K. Salah","doi":"10.1109/UEMCON.2017.8248987","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248987","url":null,"abstract":"In this paper and for the first time, a novel chaotic maps algorithm is proposed to be used in hardware on-chip security for real-time embedded systems. The aim is to cipher the original program rom by changing the contents and the locations of the original data to ban extracting designs of secure IPs. As we know, many strong ciphers have been applied widely, such as DES, AES and RSA. But most of them cannot be directly used to encrypt real-time embedded systems because their encryption speed is not fast enough and they are computationally intensive. So, in this work we present a fast chaotic-based encryption algorithm which is suitable for real-time embedded systems in terms of performance, area and power efficiency. To illustrate the effectiveness of the proposed algorithm, numerical simulations are presented. Moreover, the proposed chaotic algorithm is implemented using RTL-design. The proposed encryption gives 64 bits of encrypted data per clock cycle. The hardware implementation results give a synthesis clock frequency of 400 MHz and a throughput of 3.2 Gbps while using low area. This makes the proposed algorithm suitable for embedded systems. The RTL implementation results match the Matlab simulation results. The strong structural complexity of our proposed algorithm makes it difficult to predict the key and make it able to resist exhaustive attack, statistical attack and differential attack. All these features show that our proposed algorithm is very suitable for hardware on-chip security for real-time embedded systems. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. Moreover, it is cost-effective solution.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1943 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129170371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reevaluating the effectiveness of visual cues for website security 重新评估网站安全的视觉提示的有效性
Neha A. Rana, T. Hayajneh
Certificate authorities (CAs) are responsible for providing security for the online world. Anytime an individual enters personal information on a website, there are possibilities of interception by a hacker to reveal this data. For this purpose, security has been implemented on websites to protect data from being stolen. Not all websites are secured, but those that do, display some sort of notification indicating that a trusted CA has confirmed its legitimacy through digital signatures and validation. These visual indicators are meant to raise awareness, and in turn, allow the user to make an educated decision to proceed or seize in their next move. This paper investigates the studies conducted on visual cues. The goal is to find out how often Internet users actually look at these security indicators and how useful they actually consider them to be. This paper also attempts to explore if notifications are being ignored and if so, is it intentional and why, or do they go unnoticed due to the lack of knowledge. While researching this topic, it was found that there are other tools such as add-ons available to enhance security notifications but the valued impact was not significant. The focus of this paper is to determine if people find these visual cues to be ambiguous or a nuisance and over time discontinue using them, or do they go unnoticed all together? The conclusions made from researching this area of security is to resolve user behavior speculations and standardize visual cues with a teachable component.
证书颁发机构(ca)负责为在线世界提供安全性。只要个人在网站上输入个人信息,就有可能被黑客拦截并泄露这些数据。为此,在网站上实施了安全措施,以保护数据不被窃取。并非所有网站都是安全的,但是那些安全的网站会显示某种通知,表明受信任的CA已经通过数字签名和验证确认了其合法性。这些视觉指示是为了提高用户的意识,反过来,让用户做出明智的决定,继续或抓住他们的下一步行动。本文对视觉线索的研究进行了调查。目的是找出互联网用户实际上查看这些安全指标的频率,以及他们实际上认为这些指标有多有用。本文还试图探讨通知是否被忽视,如果是,这是故意的,原因是什么,还是由于缺乏知识而被忽视。在研究这个主题的过程中,我们发现有其他的工具,如插件,可以增强安全通知,但有价值的影响并不显著。本文的重点是确定人们是否会发现这些视觉线索模棱两可或令人讨厌,并随着时间的推移而停止使用它们,或者它们是否会被完全忽视?从研究这一安全领域得出的结论是解决用户行为猜测,并使用可教的组件标准化视觉提示。
{"title":"Reevaluating the effectiveness of visual cues for website security","authors":"Neha A. Rana, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249042","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249042","url":null,"abstract":"Certificate authorities (CAs) are responsible for providing security for the online world. Anytime an individual enters personal information on a website, there are possibilities of interception by a hacker to reveal this data. For this purpose, security has been implemented on websites to protect data from being stolen. Not all websites are secured, but those that do, display some sort of notification indicating that a trusted CA has confirmed its legitimacy through digital signatures and validation. These visual indicators are meant to raise awareness, and in turn, allow the user to make an educated decision to proceed or seize in their next move. This paper investigates the studies conducted on visual cues. The goal is to find out how often Internet users actually look at these security indicators and how useful they actually consider them to be. This paper also attempts to explore if notifications are being ignored and if so, is it intentional and why, or do they go unnoticed due to the lack of knowledge. While researching this topic, it was found that there are other tools such as add-ons available to enhance security notifications but the valued impact was not significant. The focus of this paper is to determine if people find these visual cues to be ambiguous or a nuisance and over time discontinue using them, or do they go unnoticed all together? The conclusions made from researching this area of security is to resolve user behavior speculations and standardize visual cues with a teachable component.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol 利用响应路由协议增强战术传感器网络中的汇聚节点匿名性
Thomas Haakensen, P. Thulasiraman
Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.
战术无线传感器网络(wsn)部署在一个感兴趣的区域,用于任务中心作战。战术无线传感器网络中的汇聚节点是数据处理的聚合点。由于汇聚节点在网络中的重要作用,对于想要禁用战术WSN的攻击者来说,汇聚节点是一个高优先级的目标。本文主要研究战术无线传感器网络中汇聚节点漏洞的缓解问题。具体来说,我们研究了通过k-匿名技术保护汇聚节点的问题。为了实现k-匿名,我们使用了一种特定的路由协议,设计用于在WSN通信协议的约束下工作,特别是IEEE 802.15.4。我们使用和修改轻量级自组织按需下一代(LOADng)响应路由协议来实现匿名。这种修改后的LOADng协议可以防止攻击者在不增加常规传感器节点显著复杂性的情况下识别汇聚节点。在MATLAB中使用定制的模拟器对修改后的LOADng协议进行了仿真。我们演示了协议的有效性,并展示了该方法带来的一些性能折衷。
{"title":"Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol","authors":"Thomas Haakensen, P. Thulasiraman","doi":"10.1109/UEMCON.2017.8249005","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249005","url":null,"abstract":"Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security solutions and design scenarios for software defined data centers 软件定义数据中心的安全解决方案和设计方案
Sai Manogna Duttaluri, Bijan Karimi
The purpose of introducing Software Defined Networking in the architecture of data centers is to streamline the management of the network devices. Although this reduces the workload of configuring each network device, it gives rise to new problems in terms of security and design of the data center. In this paper, we will go through each ideal design structure for conventional data centers suggested by Cisco and recommend how to introduce an SDN Controller into each of those scenarios.
在数据中心架构中引入软件定义网络的目的是简化网络设备的管理。虽然这减少了配置每个网络设备的工作量,但也给数据中心的安全性和设计带来了新的问题。在本文中,我们将介绍Cisco建议的传统数据中心的每种理想设计结构,并介绍如何将SDN控制器引入每种场景。
{"title":"Security solutions and design scenarios for software defined data centers","authors":"Sai Manogna Duttaluri, Bijan Karimi","doi":"10.1109/UEMCON.2017.8249071","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249071","url":null,"abstract":"The purpose of introducing Software Defined Networking in the architecture of data centers is to streamline the management of the network devices. Although this reduces the workload of configuring each network device, it gives rise to new problems in terms of security and design of the data center. In this paper, we will go through each ideal design structure for conventional data centers suggested by Cisco and recommend how to introduce an SDN Controller into each of those scenarios.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated facial expression recognition app development on smart phones using cloud computing 基于云计算的智能手机自动面部表情识别应用开发
Humaid Alshamsi, Veton Këpuska, H. Meng
Automated human emotion detection is a topic of significant interest in the field of computer vision. Over the past decade, much emphasis has been on using facial expression recognition (FER) to extract emotion from facial expressions. In this paper, the proposed system presents a novel method of facial recognition based on the cloud model, in combination with the traditional facial expression system. The process of predicting emotions from facial expression images contains several stages. The first stage of this system is the pre-processing stage, which is applied by detecting the face in images and then resizing the images. The second stage involves extracting features from facial expression images using Facial Landmarks and Center of Gravity (COG) feature extraction algorithms, which generate the training and testing datasets that contain the expressions of Anger, Disgust, Fear, Happiness, Neutrality, Sadness, and Surprise. Support Vector Machine (SVM) classifiers are then used for the classification stage in order to predict the emotion. In addition, a Confusion Matrix (CM) technique is used to evaluate the performance of these classifiers. The proposed system is tested on CK+, JAFFE, and KDEF databases. However, the proposed system achieved a prediction rate of 96.3% when Facial Landmarks and the Center of Gravity (COG)+SVM method are used.
人类情感自动检测是计算机视觉领域的一个重要研究课题。在过去的十年中,利用面部表情识别(FER)从面部表情中提取情感得到了很大的重视。本文提出了一种基于云模型的人脸识别方法,结合传统的人脸表情系统。从面部表情图像中预测情绪的过程包含几个阶段。该系统的第一阶段是预处理阶段,即检测图像中的人脸,然后调整图像的大小。第二阶段是使用面部地标和重心(COG)特征提取算法从面部表情图像中提取特征,生成包含愤怒、厌恶、恐惧、快乐、中立、悲伤和惊讶表情的训练和测试数据集。然后在分类阶段使用支持向量机(SVM)分类器来预测情绪。此外,使用混淆矩阵(CM)技术来评估这些分类器的性能。该系统在CK+、JAFFE和KDEF数据库上进行了测试。然而,当使用面部地标和重心(COG)+支持向量机方法时,该系统的预测率达到96.3%。
{"title":"Automated facial expression recognition app development on smart phones using cloud computing","authors":"Humaid Alshamsi, Veton Këpuska, H. Meng","doi":"10.1109/UEMCON.2017.8249000","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249000","url":null,"abstract":"Automated human emotion detection is a topic of significant interest in the field of computer vision. Over the past decade, much emphasis has been on using facial expression recognition (FER) to extract emotion from facial expressions. In this paper, the proposed system presents a novel method of facial recognition based on the cloud model, in combination with the traditional facial expression system. The process of predicting emotions from facial expression images contains several stages. The first stage of this system is the pre-processing stage, which is applied by detecting the face in images and then resizing the images. The second stage involves extracting features from facial expression images using Facial Landmarks and Center of Gravity (COG) feature extraction algorithms, which generate the training and testing datasets that contain the expressions of Anger, Disgust, Fear, Happiness, Neutrality, Sadness, and Surprise. Support Vector Machine (SVM) classifiers are then used for the classification stage in order to predict the emotion. In addition, a Confusion Matrix (CM) technique is used to evaluate the performance of these classifiers. The proposed system is tested on CK+, JAFFE, and KDEF databases. However, the proposed system achieved a prediction rate of 96.3% when Facial Landmarks and the Center of Gravity (COG)+SVM method are used.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient automated technique for epilepsy seizure detection using EEG signals 一种利用脑电图信号进行癫痫发作检测的高效自动化技术
Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy
Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can be considered as an input signal. This paper introduces a technique to detect epileptic signal and to compare the characteristics of the brain signals at different stages. Our algorithm is based on signal processing techniques to detect epilepsy in the EEG signal. The signal processing starts with sampling the signal at 178.6 Hz so that the signal operating frequency follows oversampling criteria. The sampled signal is given to the designed filter so that the unwanted noise can be removed and the signal is ready to be decomposed. Then, the signal is decomposed at five different signal levels so that its frequency spectrum is reduced to less than 200 Hz using different wavelet filters at each level. In the feature extraction, we have used signal features rather than statistical features so that we can still rely on time domain and frequency domain features for an EEG signal. These features are classified using Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANN) to detect the epilepsy in the EEG signal. The results were demonstrated for different sets of brain signal that show the normal behavior of the brain signals and epileptic behavior of the signal with seizure. A comparison of our work with the present traditional methodologies proves that our algorithm is more efficient in detecting epilepsy.
癫痫是一种以癫痫发作为特征的神经系统疾病。癫痫病发作可以通过大脑的正常和异常活动来分析。这种异常活动只能通过使用有效的算法来观察。一个有效的算法的过程总是使用信号处理,其中癫痫信号可以被视为输入信号。本文介绍了一种检测癫痫信号的技术,并比较了不同阶段脑信号的特征。我们的算法是基于信号处理技术来检测脑电图信号中的癫痫。信号处理以178.6 Hz采样信号开始,使信号工作频率遵循过采样标准。采样后的信号被交给设计好的滤波器,这样就可以去除不需要的噪声,信号就可以被分解了。然后,在五个不同的信号电平上对信号进行分解,在每个电平上使用不同的小波滤波器将其频谱减小到200hz以下。在特征提取中,我们使用了信号特征而不是统计特征,这样我们仍然可以依赖于脑电信号的时域和频域特征。利用支持向量机(SVM)、k近邻(KNN)和人工神经网络(ANN)对这些特征进行分类,检测脑电图信号中的癫痫。结果证明了不同组的大脑信号显示正常行为的大脑信号和癫痫行为的信号与癫痫发作。我们的工作与目前传统方法的比较证明了我们的算法在检测癫痫方面更有效。
{"title":"An efficient automated technique for epilepsy seizure detection using EEG signals","authors":"Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy","doi":"10.1109/UEMCON.2017.8248991","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248991","url":null,"abstract":"Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can be considered as an input signal. This paper introduces a technique to detect epileptic signal and to compare the characteristics of the brain signals at different stages. Our algorithm is based on signal processing techniques to detect epilepsy in the EEG signal. The signal processing starts with sampling the signal at 178.6 Hz so that the signal operating frequency follows oversampling criteria. The sampled signal is given to the designed filter so that the unwanted noise can be removed and the signal is ready to be decomposed. Then, the signal is decomposed at five different signal levels so that its frequency spectrum is reduced to less than 200 Hz using different wavelet filters at each level. In the feature extraction, we have used signal features rather than statistical features so that we can still rely on time domain and frequency domain features for an EEG signal. These features are classified using Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANN) to detect the epilepsy in the EEG signal. The results were demonstrated for different sets of brain signal that show the normal behavior of the brain signals and epileptic behavior of the signal with seizure. A comparison of our work with the present traditional methodologies proves that our algorithm is more efficient in detecting epilepsy.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Eldercare robotics revolution-explaining robotics for eldercare 老年护理机器人革命——解释老年护理机器人
N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder
This paper examines the issue of providing appropriate and attentive care to an elderly population that is increasing. Using a TurtleBot 2 and a NAO robot, experiments were developed to test a number of ways in which robots might be used to improve the health and safety of an elderly person within his/her own home. A number of simulations were run in the lab in order to generate insight regarding the viability of implementing these robots in a real world setting. The tasks that the robots attempted addressed the following goals: remind an elderly person that it is time to take medication; determine if no motion has been detected in the home for n hours, locate the elderly person, and contact emergency services if necessary; and guide the elderly person out of his home in case of fire/emergency.
本文探讨的问题,提供适当的和细心的照顾老年人口,正在增加。使用TurtleBot 2和NAO机器人,开发了实验,以测试机器人可能用于改善老年人在家中的健康和安全的多种方法。为了深入了解这些机器人在现实世界中的可行性,我们在实验室中进行了大量的模拟。机器人尝试的任务有以下几个目标:提醒老年人该吃药了;确定家中是否有n小时未检测到任何活动,确定老人的位置,并在必要时联系紧急服务;在发生火警或紧急情况时,指引长者离开家中。
{"title":"Eldercare robotics revolution-explaining robotics for eldercare","authors":"N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder","doi":"10.1109/UEMCON.2017.8249030","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249030","url":null,"abstract":"This paper examines the issue of providing appropriate and attentive care to an elderly population that is increasing. Using a TurtleBot 2 and a NAO robot, experiments were developed to test a number of ways in which robots might be used to improve the health and safety of an elderly person within his/her own home. A number of simulations were run in the lab in order to generate insight regarding the viability of implementing these robots in a real world setting. The tasks that the robots attempted addressed the following goals: remind an elderly person that it is time to take medication; determine if no motion has been detected in the home for n hours, locate the elderly person, and contact emergency services if necessary; and guide the elderly person out of his home in case of fire/emergency.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1