首页 > 最新文献

2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

英文 中文
Real time embedded system IPs protection using chaotic maps 使用混沌映射的实时嵌入式系统ip保护
K. Salah
In this paper and for the first time, a novel chaotic maps algorithm is proposed to be used in hardware on-chip security for real-time embedded systems. The aim is to cipher the original program rom by changing the contents and the locations of the original data to ban extracting designs of secure IPs. As we know, many strong ciphers have been applied widely, such as DES, AES and RSA. But most of them cannot be directly used to encrypt real-time embedded systems because their encryption speed is not fast enough and they are computationally intensive. So, in this work we present a fast chaotic-based encryption algorithm which is suitable for real-time embedded systems in terms of performance, area and power efficiency. To illustrate the effectiveness of the proposed algorithm, numerical simulations are presented. Moreover, the proposed chaotic algorithm is implemented using RTL-design. The proposed encryption gives 64 bits of encrypted data per clock cycle. The hardware implementation results give a synthesis clock frequency of 400 MHz and a throughput of 3.2 Gbps while using low area. This makes the proposed algorithm suitable for embedded systems. The RTL implementation results match the Matlab simulation results. The strong structural complexity of our proposed algorithm makes it difficult to predict the key and make it able to resist exhaustive attack, statistical attack and differential attack. All these features show that our proposed algorithm is very suitable for hardware on-chip security for real-time embedded systems. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. Moreover, it is cost-effective solution.
本文首次提出了一种新的混沌映射算法,用于实时嵌入式系统的硬件片上安全。其目的是通过改变原始数据的内容和位置来加密原始程序,以禁止提取安全ip的设计。众所周知,许多强密码得到了广泛的应用,如DES、AES和RSA。但由于加密速度不够快且计算量大,大多数加密算法不能直接用于实时嵌入式系统的加密。因此,本文提出了一种在性能、面积和功耗方面都适合于实时嵌入式系统的基于混沌的快速加密算法。为了说明该算法的有效性,给出了数值模拟。此外,混沌算法采用rtl设计实现。提出的加密每个时钟周期提供64位加密数据。硬件实现结果表明,在低面积下,合成时钟频率为400 MHz,吞吐量为3.2 Gbps。这使得该算法适用于嵌入式系统。RTL实现结果与Matlab仿真结果吻合。该算法具有较强的结构复杂性,使得密钥难以预测,并能抵抗穷举攻击、统计攻击和差分攻击。所有这些特征表明我们提出的算法非常适合用于实时嵌入式系统的硬件片上安全。详尽的密码分析已经完成,我们可以断定系统是安全的。此外,它是一种经济高效的解决方案。
{"title":"Real time embedded system IPs protection using chaotic maps","authors":"K. Salah","doi":"10.1109/UEMCON.2017.8248987","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248987","url":null,"abstract":"In this paper and for the first time, a novel chaotic maps algorithm is proposed to be used in hardware on-chip security for real-time embedded systems. The aim is to cipher the original program rom by changing the contents and the locations of the original data to ban extracting designs of secure IPs. As we know, many strong ciphers have been applied widely, such as DES, AES and RSA. But most of them cannot be directly used to encrypt real-time embedded systems because their encryption speed is not fast enough and they are computationally intensive. So, in this work we present a fast chaotic-based encryption algorithm which is suitable for real-time embedded systems in terms of performance, area and power efficiency. To illustrate the effectiveness of the proposed algorithm, numerical simulations are presented. Moreover, the proposed chaotic algorithm is implemented using RTL-design. The proposed encryption gives 64 bits of encrypted data per clock cycle. The hardware implementation results give a synthesis clock frequency of 400 MHz and a throughput of 3.2 Gbps while using low area. This makes the proposed algorithm suitable for embedded systems. The RTL implementation results match the Matlab simulation results. The strong structural complexity of our proposed algorithm makes it difficult to predict the key and make it able to resist exhaustive attack, statistical attack and differential attack. All these features show that our proposed algorithm is very suitable for hardware on-chip security for real-time embedded systems. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. Moreover, it is cost-effective solution.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1943 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129170371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing the existing noninvasive hemoglobin measurement techniques 分析现有的无创血红蛋白检测技术
M. Hasan, N. Sakib, Richard R. Love, Sheikh Iqbal Ahamed
To meet the potential research challenges, such as cost, accuracy, and portability, a number of research has been conducted around the world in the domain of noninvasive measurement techniques. In this paper, we explored, analyzed, and critiqued concurrent research approaches that endeavored to meet the research challenges in noninvasive hemoglobin (Hb) measurement. Here, besides the conventional invasive Hb measurement methods, we covered the Hb measurement techniques based on various scientific contribution and advancement. We studied smartphone-image, IR-LED, and spectra-based solutions as well as noninvasive point-of-care (POC) devices. From that insight, in this paper, we delineated the novel smartphone-based approaches to measure hemoglobin level noninvasively that can leverage the computation, portability, and affordability of smartphone devices, and assure the desired accuracy and consistency. Apart from that, this paper describes how these novel proposals can overcome the limitations of the data collection and analysis in the state-of-the-art approaches in this domain.
为了应对潜在的研究挑战,如成本、准确性和便携性,世界各地在非侵入性测量技术领域进行了大量的研究。在本文中,我们探索、分析和批评了努力满足无创血红蛋白(Hb)测量研究挑战的同步研究方法。在这里,除了常规的有创Hb测量方法外,我们还介绍了基于各种科学贡献和进展的Hb测量技术。我们研究了智能手机图像、红外- led和基于光谱的解决方案以及非侵入性护理点(POC)设备。根据这一见解,在本文中,我们描述了基于智能手机的新型方法,可以利用智能手机设备的计算能力、可移植性和可负担性来测量血红蛋白水平,并确保所需的准确性和一致性。除此之外,本文还描述了这些新颖的建议如何克服该领域最新方法中数据收集和分析的局限性。
{"title":"Analyzing the existing noninvasive hemoglobin measurement techniques","authors":"M. Hasan, N. Sakib, Richard R. Love, Sheikh Iqbal Ahamed","doi":"10.1109/UEMCON.2017.8249080","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249080","url":null,"abstract":"To meet the potential research challenges, such as cost, accuracy, and portability, a number of research has been conducted around the world in the domain of noninvasive measurement techniques. In this paper, we explored, analyzed, and critiqued concurrent research approaches that endeavored to meet the research challenges in noninvasive hemoglobin (Hb) measurement. Here, besides the conventional invasive Hb measurement methods, we covered the Hb measurement techniques based on various scientific contribution and advancement. We studied smartphone-image, IR-LED, and spectra-based solutions as well as noninvasive point-of-care (POC) devices. From that insight, in this paper, we delineated the novel smartphone-based approaches to measure hemoglobin level noninvasively that can leverage the computation, portability, and affordability of smartphone devices, and assure the desired accuracy and consistency. Apart from that, this paper describes how these novel proposals can overcome the limitations of the data collection and analysis in the state-of-the-art approaches in this domain.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new tree target tracking algorithm in WSNs 一种新的WSNs树目标跟踪算法
A. Odeh, Eman Abdelfattah
Wireless sensor networks are becoming increasingly the essential part of the digital world. Target tracking system is a significant part of wireless sensor networks. It has its own advantages and challenges. In this paper, a new Tree-Based target-tracking algorithm is proposed, by employing the minimum traffic rate to reduce the time and energy consumption. The proposed algorithm consists of four phases that create a tree structure from undirected and connected graph. It reduces the communication cost, overcomes message-flooding problem, maximizes the life time for each node to maximize the overall life time of the network.
无线传感器网络正日益成为数字世界的重要组成部分。目标跟踪系统是无线传感器网络的重要组成部分。它有自己的优势和挑战。本文提出了一种新的基于树的目标跟踪算法,该算法采用最小通信量来减少时间和能量的消耗。该算法由四个阶段组成,从无向图和连通图生成树状结构。它降低了通信成本,克服了消息泛滥问题,使每个节点的生存时间最大化,从而使网络的整体生存时间最大化。
{"title":"A new tree target tracking algorithm in WSNs","authors":"A. Odeh, Eman Abdelfattah","doi":"10.1109/UEMCON.2017.8249006","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249006","url":null,"abstract":"Wireless sensor networks are becoming increasingly the essential part of the digital world. Target tracking system is a significant part of wireless sensor networks. It has its own advantages and challenges. In this paper, a new Tree-Based target-tracking algorithm is proposed, by employing the minimum traffic rate to reduce the time and energy consumption. The proposed algorithm consists of four phases that create a tree structure from undirected and connected graph. It reduces the communication cost, overcomes message-flooding problem, maximizes the life time for each node to maximize the overall life time of the network.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Home gateway for RF/PON based gigabit Transmission system for cable network 基于射频/PON的千兆有线网络传输系统的家庭网关
Joo-Young Lee, Juho Lee, Sungkwon Park, Jaewon Lee, Eunhee Hyun, Junyoung Jung
To keep up with increasing bandwidth demands, cable network operators are migrating to fiber networks, which promise to deliver Gigabit speeds. However, migration to an all-fiber network infrastructure requires major investment and takes considerable time to complete. New network technologies and the demand to improve the quality of experience (QoE) are driving network operators towards the Ultra-Broadband era. The Ultra-Broadband Cable Network can be implemented in two ways: a coaxial-based access technology and a fiber-based access technology. However, those existing technologies have problems such as problems at extension of up/down stream frequency, cost of upgrading the network. This paper proposes the Home Gateway for RF/PON based gigabit Transmission system in order to provide the 1Gbps internet and the N-Screen to IP devices.
为了跟上不断增长的带宽需求,有线网络运营商正在向光纤网络迁移,光纤网络承诺提供千兆速度。但是,迁移到全光纤网络基础设施需要大量投资,并且需要相当长的时间才能完成。新的网络技术和提高体验质量的需求正在推动网络运营商走向超宽带时代。超宽带有线网络有两种实现方式:基于同轴的接入技术和基于光纤的接入技术。但是,现有的技术存在上下行频率扩展、网络升级成本等问题。本文提出了一种基于射频/PON的千兆传输系统的家庭网关,目的是为IP设备提供1Gbps的互联网和N-Screen。
{"title":"Home gateway for RF/PON based gigabit Transmission system for cable network","authors":"Joo-Young Lee, Juho Lee, Sungkwon Park, Jaewon Lee, Eunhee Hyun, Junyoung Jung","doi":"10.1109/UEMCON.2017.8249046","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249046","url":null,"abstract":"To keep up with increasing bandwidth demands, cable network operators are migrating to fiber networks, which promise to deliver Gigabit speeds. However, migration to an all-fiber network infrastructure requires major investment and takes considerable time to complete. New network technologies and the demand to improve the quality of experience (QoE) are driving network operators towards the Ultra-Broadband era. The Ultra-Broadband Cable Network can be implemented in two ways: a coaxial-based access technology and a fiber-based access technology. However, those existing technologies have problems such as problems at extension of up/down stream frequency, cost of upgrading the network. This paper proposes the Home Gateway for RF/PON based gigabit Transmission system in order to provide the 1Gbps internet and the N-Screen to IP devices.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-power and high-performance 2.4 GHz RF transmitter for biomedical application 用于生物医学应用的低功耗高性能2.4 GHz射频发射机
Ahmed Alzahmi, Nahid Mirzaie, Chung-Ching Lin, Gyung-Su Byun
A high performance and low power 2.4 GHz radio frequency (RF) transmitter for biomedical application is presented. The design utilizes LC voltage control oscillator (VCO), ASK modulator, and an inverse Class-D (D−1) power amplifier (PA). The ASK modulates the carrier signal generated by a low phase noise LC-VCO, then the modulated signal is amplified by the inverse Class-D−1 PA. The proposed RF transmitter achieves −11.14-dBm output power with 3.88% efficiency. It also supports 130-Mb/s data rate and consumes 1.98-mW. The design has been implemented in a 0.13μm CMOS process technology and fully integrated on-chip.
介绍了一种高性能、低功耗的2.4 GHz生物医学射频发射机。该设计采用LC电压控制振荡器(VCO)、ASK调制器和逆D类(D−1)功率放大器(PA)。ASK对低相位噪声LC-VCO产生的载波信号进行调制,然后将调制后的信号通过逆d - 1类PA进行放大。该射频发射机的输出功率为- 11.14 dbm,效率为3.88%。它还支持130 mb /s的数据速率,功耗为1.98 mw。该设计采用0.13μm CMOS工艺技术,并完全集成在片上。
{"title":"Low-power and high-performance 2.4 GHz RF transmitter for biomedical application","authors":"Ahmed Alzahmi, Nahid Mirzaie, Chung-Ching Lin, Gyung-Su Byun","doi":"10.1109/UEMCON.2017.8249090","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249090","url":null,"abstract":"A high performance and low power 2.4 GHz radio frequency (RF) transmitter for biomedical application is presented. The design utilizes LC voltage control oscillator (VCO), ASK modulator, and an inverse Class-D (D−1) power amplifier (PA). The ASK modulates the carrier signal generated by a low phase noise LC-VCO, then the modulated signal is amplified by the inverse Class-D−1 PA. The proposed RF transmitter achieves −11.14-dBm output power with 3.88% efficiency. It also supports 130-Mb/s data rate and consumes 1.98-mW. The design has been implemented in a 0.13μm CMOS process technology and fully integrated on-chip.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol 利用响应路由协议增强战术传感器网络中的汇聚节点匿名性
Thomas Haakensen, P. Thulasiraman
Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.
战术无线传感器网络(wsn)部署在一个感兴趣的区域,用于任务中心作战。战术无线传感器网络中的汇聚节点是数据处理的聚合点。由于汇聚节点在网络中的重要作用,对于想要禁用战术WSN的攻击者来说,汇聚节点是一个高优先级的目标。本文主要研究战术无线传感器网络中汇聚节点漏洞的缓解问题。具体来说,我们研究了通过k-匿名技术保护汇聚节点的问题。为了实现k-匿名,我们使用了一种特定的路由协议,设计用于在WSN通信协议的约束下工作,特别是IEEE 802.15.4。我们使用和修改轻量级自组织按需下一代(LOADng)响应路由协议来实现匿名。这种修改后的LOADng协议可以防止攻击者在不增加常规传感器节点显著复杂性的情况下识别汇聚节点。在MATLAB中使用定制的模拟器对修改后的LOADng协议进行了仿真。我们演示了协议的有效性,并展示了该方法带来的一些性能折衷。
{"title":"Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol","authors":"Thomas Haakensen, P. Thulasiraman","doi":"10.1109/UEMCON.2017.8249005","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249005","url":null,"abstract":"Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security solutions and design scenarios for software defined data centers 软件定义数据中心的安全解决方案和设计方案
Sai Manogna Duttaluri, Bijan Karimi
The purpose of introducing Software Defined Networking in the architecture of data centers is to streamline the management of the network devices. Although this reduces the workload of configuring each network device, it gives rise to new problems in terms of security and design of the data center. In this paper, we will go through each ideal design structure for conventional data centers suggested by Cisco and recommend how to introduce an SDN Controller into each of those scenarios.
在数据中心架构中引入软件定义网络的目的是简化网络设备的管理。虽然这减少了配置每个网络设备的工作量,但也给数据中心的安全性和设计带来了新的问题。在本文中,我们将介绍Cisco建议的传统数据中心的每种理想设计结构,并介绍如何将SDN控制器引入每种场景。
{"title":"Security solutions and design scenarios for software defined data centers","authors":"Sai Manogna Duttaluri, Bijan Karimi","doi":"10.1109/UEMCON.2017.8249071","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249071","url":null,"abstract":"The purpose of introducing Software Defined Networking in the architecture of data centers is to streamline the management of the network devices. Although this reduces the workload of configuring each network device, it gives rise to new problems in terms of security and design of the data center. In this paper, we will go through each ideal design structure for conventional data centers suggested by Cisco and recommend how to introduce an SDN Controller into each of those scenarios.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated facial expression recognition app development on smart phones using cloud computing 基于云计算的智能手机自动面部表情识别应用开发
Humaid Alshamsi, Veton Këpuska, H. Meng
Automated human emotion detection is a topic of significant interest in the field of computer vision. Over the past decade, much emphasis has been on using facial expression recognition (FER) to extract emotion from facial expressions. In this paper, the proposed system presents a novel method of facial recognition based on the cloud model, in combination with the traditional facial expression system. The process of predicting emotions from facial expression images contains several stages. The first stage of this system is the pre-processing stage, which is applied by detecting the face in images and then resizing the images. The second stage involves extracting features from facial expression images using Facial Landmarks and Center of Gravity (COG) feature extraction algorithms, which generate the training and testing datasets that contain the expressions of Anger, Disgust, Fear, Happiness, Neutrality, Sadness, and Surprise. Support Vector Machine (SVM) classifiers are then used for the classification stage in order to predict the emotion. In addition, a Confusion Matrix (CM) technique is used to evaluate the performance of these classifiers. The proposed system is tested on CK+, JAFFE, and KDEF databases. However, the proposed system achieved a prediction rate of 96.3% when Facial Landmarks and the Center of Gravity (COG)+SVM method are used.
人类情感自动检测是计算机视觉领域的一个重要研究课题。在过去的十年中,利用面部表情识别(FER)从面部表情中提取情感得到了很大的重视。本文提出了一种基于云模型的人脸识别方法,结合传统的人脸表情系统。从面部表情图像中预测情绪的过程包含几个阶段。该系统的第一阶段是预处理阶段,即检测图像中的人脸,然后调整图像的大小。第二阶段是使用面部地标和重心(COG)特征提取算法从面部表情图像中提取特征,生成包含愤怒、厌恶、恐惧、快乐、中立、悲伤和惊讶表情的训练和测试数据集。然后在分类阶段使用支持向量机(SVM)分类器来预测情绪。此外,使用混淆矩阵(CM)技术来评估这些分类器的性能。该系统在CK+、JAFFE和KDEF数据库上进行了测试。然而,当使用面部地标和重心(COG)+支持向量机方法时,该系统的预测率达到96.3%。
{"title":"Automated facial expression recognition app development on smart phones using cloud computing","authors":"Humaid Alshamsi, Veton Këpuska, H. Meng","doi":"10.1109/UEMCON.2017.8249000","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249000","url":null,"abstract":"Automated human emotion detection is a topic of significant interest in the field of computer vision. Over the past decade, much emphasis has been on using facial expression recognition (FER) to extract emotion from facial expressions. In this paper, the proposed system presents a novel method of facial recognition based on the cloud model, in combination with the traditional facial expression system. The process of predicting emotions from facial expression images contains several stages. The first stage of this system is the pre-processing stage, which is applied by detecting the face in images and then resizing the images. The second stage involves extracting features from facial expression images using Facial Landmarks and Center of Gravity (COG) feature extraction algorithms, which generate the training and testing datasets that contain the expressions of Anger, Disgust, Fear, Happiness, Neutrality, Sadness, and Surprise. Support Vector Machine (SVM) classifiers are then used for the classification stage in order to predict the emotion. In addition, a Confusion Matrix (CM) technique is used to evaluate the performance of these classifiers. The proposed system is tested on CK+, JAFFE, and KDEF databases. However, the proposed system achieved a prediction rate of 96.3% when Facial Landmarks and the Center of Gravity (COG)+SVM method are used.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient automated technique for epilepsy seizure detection using EEG signals 一种利用脑电图信号进行癫痫发作检测的高效自动化技术
Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy
Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can be considered as an input signal. This paper introduces a technique to detect epileptic signal and to compare the characteristics of the brain signals at different stages. Our algorithm is based on signal processing techniques to detect epilepsy in the EEG signal. The signal processing starts with sampling the signal at 178.6 Hz so that the signal operating frequency follows oversampling criteria. The sampled signal is given to the designed filter so that the unwanted noise can be removed and the signal is ready to be decomposed. Then, the signal is decomposed at five different signal levels so that its frequency spectrum is reduced to less than 200 Hz using different wavelet filters at each level. In the feature extraction, we have used signal features rather than statistical features so that we can still rely on time domain and frequency domain features for an EEG signal. These features are classified using Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANN) to detect the epilepsy in the EEG signal. The results were demonstrated for different sets of brain signal that show the normal behavior of the brain signals and epileptic behavior of the signal with seizure. A comparison of our work with the present traditional methodologies proves that our algorithm is more efficient in detecting epilepsy.
癫痫是一种以癫痫发作为特征的神经系统疾病。癫痫病发作可以通过大脑的正常和异常活动来分析。这种异常活动只能通过使用有效的算法来观察。一个有效的算法的过程总是使用信号处理,其中癫痫信号可以被视为输入信号。本文介绍了一种检测癫痫信号的技术,并比较了不同阶段脑信号的特征。我们的算法是基于信号处理技术来检测脑电图信号中的癫痫。信号处理以178.6 Hz采样信号开始,使信号工作频率遵循过采样标准。采样后的信号被交给设计好的滤波器,这样就可以去除不需要的噪声,信号就可以被分解了。然后,在五个不同的信号电平上对信号进行分解,在每个电平上使用不同的小波滤波器将其频谱减小到200hz以下。在特征提取中,我们使用了信号特征而不是统计特征,这样我们仍然可以依赖于脑电信号的时域和频域特征。利用支持向量机(SVM)、k近邻(KNN)和人工神经网络(ANN)对这些特征进行分类,检测脑电图信号中的癫痫。结果证明了不同组的大脑信号显示正常行为的大脑信号和癫痫行为的信号与癫痫发作。我们的工作与目前传统方法的比较证明了我们的算法在检测癫痫方面更有效。
{"title":"An efficient automated technique for epilepsy seizure detection using EEG signals","authors":"Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy","doi":"10.1109/UEMCON.2017.8248991","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248991","url":null,"abstract":"Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can be considered as an input signal. This paper introduces a technique to detect epileptic signal and to compare the characteristics of the brain signals at different stages. Our algorithm is based on signal processing techniques to detect epilepsy in the EEG signal. The signal processing starts with sampling the signal at 178.6 Hz so that the signal operating frequency follows oversampling criteria. The sampled signal is given to the designed filter so that the unwanted noise can be removed and the signal is ready to be decomposed. Then, the signal is decomposed at five different signal levels so that its frequency spectrum is reduced to less than 200 Hz using different wavelet filters at each level. In the feature extraction, we have used signal features rather than statistical features so that we can still rely on time domain and frequency domain features for an EEG signal. These features are classified using Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANN) to detect the epilepsy in the EEG signal. The results were demonstrated for different sets of brain signal that show the normal behavior of the brain signals and epileptic behavior of the signal with seizure. A comparison of our work with the present traditional methodologies proves that our algorithm is more efficient in detecting epilepsy.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Eldercare robotics revolution-explaining robotics for eldercare 老年护理机器人革命——解释老年护理机器人
N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder
This paper examines the issue of providing appropriate and attentive care to an elderly population that is increasing. Using a TurtleBot 2 and a NAO robot, experiments were developed to test a number of ways in which robots might be used to improve the health and safety of an elderly person within his/her own home. A number of simulations were run in the lab in order to generate insight regarding the viability of implementing these robots in a real world setting. The tasks that the robots attempted addressed the following goals: remind an elderly person that it is time to take medication; determine if no motion has been detected in the home for n hours, locate the elderly person, and contact emergency services if necessary; and guide the elderly person out of his home in case of fire/emergency.
本文探讨的问题,提供适当的和细心的照顾老年人口,正在增加。使用TurtleBot 2和NAO机器人,开发了实验,以测试机器人可能用于改善老年人在家中的健康和安全的多种方法。为了深入了解这些机器人在现实世界中的可行性,我们在实验室中进行了大量的模拟。机器人尝试的任务有以下几个目标:提醒老年人该吃药了;确定家中是否有n小时未检测到任何活动,确定老人的位置,并在必要时联系紧急服务;在发生火警或紧急情况时,指引长者离开家中。
{"title":"Eldercare robotics revolution-explaining robotics for eldercare","authors":"N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder","doi":"10.1109/UEMCON.2017.8249030","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249030","url":null,"abstract":"This paper examines the issue of providing appropriate and attentive care to an elderly population that is increasing. Using a TurtleBot 2 and a NAO robot, experiments were developed to test a number of ways in which robots might be used to improve the health and safety of an elderly person within his/her own home. A number of simulations were run in the lab in order to generate insight regarding the viability of implementing these robots in a real world setting. The tasks that the robots attempted addressed the following goals: remind an elderly person that it is time to take medication; determine if no motion has been detected in the home for n hours, locate the elderly person, and contact emergency services if necessary; and guide the elderly person out of his home in case of fire/emergency.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1