首页 > 最新文献

Journal of Ambient Intelligence and Smart Environments最新文献

英文 中文
Real time fall detection using infrared cameras and reflective tapes under day/night luminance 使用红外摄像机和反射带在昼夜亮度下进行实时跌落检测
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-07-21 DOI: 10.3233/AIS-210605
E. Ramanujam, S. Padmavathi
Falls are the leading cause of injuries and death in elderly individuals who live alone at home. The core service of assistive living technology is to monitor elders’ activities through wearable devices, ambient sensors, and vision systems. Vision systems are among the best solutions, as their implementation and maintenance costs are the lowest. However, current vision systems are limited in their ability to handle cluttered environments, occlusion, illumination changes throughout the day, and monitoring without illumination. To overcome these issues, this paper proposes a 24/7 monitoring system for elders that uses retroreflective tape fabricated as part of conventional clothing, monitored through low-cost infrared (IR) cameras fixed in the living environment. IR camera records video even when there are changes in illumination or zero luminance. For classification among clutter and occlusion, the tape is considered as a blob instead of a human silhouette; the orientation angle, fitted through ellipse modeling, of the blob in each frame allows classification that detects falls without pretrained data. System performance was tested using subjects in various age groups and “fall” or “non-fall” were detected with 99.01% accuracy.
跌倒是独居老人受伤和死亡的主要原因。辅助生活技术的核心服务是通过可穿戴设备、环境传感器和视觉系统监测老年人的活动。视觉系统是最好的解决方案之一,因为它们的实施和维护成本最低。然而,目前的视觉系统在处理杂乱环境、遮挡、全天照明变化和无照明监测方面的能力有限。为了克服这些问题,本文提出了一种针对老年人的24/7监控系统,该系统使用作为传统服装一部分的反光胶带,通过固定在生活环境中的低成本红外(IR)摄像机进行监控。红外摄像机即使在光照变化或亮度为零的情况下也能记录视频。对于杂波和遮挡的分类,磁带被认为是一个斑点,而不是一个人的轮廓;通过椭圆建模,每个帧中的斑点的方向角度允许在没有预训练数据的情况下检测跌倒。使用不同年龄组的受试者对系统性能进行测试,检测“跌倒”或“未跌倒”的准确率为99.01%。
{"title":"Real time fall detection using infrared cameras and reflective tapes under day/night luminance","authors":"E. Ramanujam, S. Padmavathi","doi":"10.3233/AIS-210605","DOIUrl":"https://doi.org/10.3233/AIS-210605","url":null,"abstract":"Falls are the leading cause of injuries and death in elderly individuals who live alone at home. The core service of assistive living technology is to monitor elders’ activities through wearable devices, ambient sensors, and vision systems. Vision systems are among the best solutions, as their implementation and maintenance costs are the lowest. However, current vision systems are limited in their ability to handle cluttered environments, occlusion, illumination changes throughout the day, and monitoring without illumination. To overcome these issues, this paper proposes a 24/7 monitoring system for elders that uses retroreflective tape fabricated as part of conventional clothing, monitored through low-cost infrared (IR) cameras fixed in the living environment. IR camera records video even when there are changes in illumination or zero luminance. For classification among clutter and occlusion, the tape is considered as a blob instead of a human silhouette; the orientation angle, fitted through ellipse modeling, of the blob in each frame allows classification that detects falls without pretrained data. System performance was tested using subjects in various age groups and “fall” or “non-fall” were detected with 99.01% accuracy.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"12 1","pages":"285-300"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A machine learning approach to predict the activity of smart home inhabitant 一种预测智能家居居民活动的机器学习方法
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-07-21 DOI: 10.3233/AIS-210604
M. Marufuzzaman, Teresa Tumbraegel, L. F. Rahman, L. Sidek
A smart home inhabitant performs a unique pattern or sequence of tasks repeatedly. Thus, a machine learning approach will be required to build an intelligent network of home appliances, and the algorithm should respond quickly to execute the decision. This study proposes a decision tree-based machine learning approach for predicting the activities using different appliances such as state, locations and time. A noise filter is employed to remove unwanted data and generate task sequences, and dual state properties of a home appliance are utilized to extract episodes from the sequence. An incremental decision tree approach was taken to reduce execution time. The algorithm was tested using a well-known smart home dataset from MavLab. The experimental results showed that the algorithm successfully extracted 689 predictions and their location at 90% accuracy, and the total execution time was 94 s, which is less than that of existing methods. A hardware prototype was designed using Raspberry Pi 2 B to validate the proposed prediction system. The general-purpose input-output (GPIO) interfaces of Raspberry Pi 2 B were used to communicate with the prototype testbed and showed that the algorithm successfully predicted the next activities.
智能家居用户重复执行一种独特的模式或任务序列。因此,将需要机器学习方法来构建智能家电网络,并且算法应该快速响应以执行决策。本研究提出了一种基于决策树的机器学习方法,用于预测使用不同设备(如状态、位置和时间)的活动。使用噪声滤波器去除不需要的数据并生成任务序列,并利用家电的双状态属性从序列中提取情节。采用增量决策树方法来减少执行时间。该算法使用来自MavLab的知名智能家居数据集进行了测试。实验结果表明,该算法以90%的准确率成功提取了689个预测及其位置,总执行时间为94 s,比现有方法要短。利用树莓派2b设计了一个硬件原型来验证所提出的预测系统。利用树莓派2b的通用输入输出(GPIO)接口与原型测试平台进行通信,结果表明该算法成功地预测了下一步活动。
{"title":"A machine learning approach to predict the activity of smart home inhabitant","authors":"M. Marufuzzaman, Teresa Tumbraegel, L. F. Rahman, L. Sidek","doi":"10.3233/AIS-210604","DOIUrl":"https://doi.org/10.3233/AIS-210604","url":null,"abstract":"A smart home inhabitant performs a unique pattern or sequence of tasks repeatedly. Thus, a machine learning approach will be required to build an intelligent network of home appliances, and the algorithm should respond quickly to execute the decision. This study proposes a decision tree-based machine learning approach for predicting the activities using different appliances such as state, locations and time. A noise filter is employed to remove unwanted data and generate task sequences, and dual state properties of a home appliance are utilized to extract episodes from the sequence. An incremental decision tree approach was taken to reduce execution time. The algorithm was tested using a well-known smart home dataset from MavLab. The experimental results showed that the algorithm successfully extracted 689 predictions and their location at 90% accuracy, and the total execution time was 94 s, which is less than that of existing methods. A hardware prototype was designed using Raspberry Pi 2 B to validate the proposed prediction system. The general-purpose input-output (GPIO) interfaces of Raspberry Pi 2 B were used to communicate with the prototype testbed and showed that the algorithm successfully predicted the next activities.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"41 1","pages":"271-283"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88950299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Preface to JAISE 13(4) 《JAISE 13(4)》序言
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-07-21 DOI: 10.3233/AIS-210603
V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz
Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain
Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c和andrs Muñoz da中国香港大学电气与电子工程系b c, IPI,比利时根特大学电信与信息处理系c c英国米德尔塞克斯大学计算机科学系和智能环境发展研究小组d西班牙穆西亚大学理工学院Católica
{"title":"Preface to JAISE 13(4)","authors":"V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz","doi":"10.3233/AIS-210603","DOIUrl":"https://doi.org/10.3233/AIS-210603","url":null,"abstract":"Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"68 1","pages":"269-270"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83188224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface to JAISE 13(3) 《JAISE 13(3)》序言
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-05-18 DOI: 10.3233/AIS-210596
Andrés Muñoz, J. Augusto, V. W. L. Tam, H. Aghajan
Andrés Muñoz a, Juan Carlos Augusto b, Vincent Tam c and Hamid Aghajan d a Polytechnic School, Catholic University of Murcia, Spain b Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK c Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, China d imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium
andr Muñoz a、Juan Carlos Augusto b、Vincent Tam c及Hamid Aghajan d a西班牙天主教大学穆西亚理工学院b英国米德尔塞克斯大学计算机科学系与智能环境发展研究小组c中国香港大学工程学院电气与电子工程系d c比利时根特大学电信与信息处理系IPI
{"title":"Preface to JAISE 13(3)","authors":"Andrés Muñoz, J. Augusto, V. W. L. Tam, H. Aghajan","doi":"10.3233/AIS-210596","DOIUrl":"https://doi.org/10.3233/AIS-210596","url":null,"abstract":"Andrés Muñoz a, Juan Carlos Augusto b, Vincent Tam c and Hamid Aghajan d a Polytechnic School, Catholic University of Murcia, Spain b Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK c Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, China d imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"16 1","pages":"181"},"PeriodicalIF":1.7,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90819853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location-aware computing to mobile services recommendation: Theory and practice 位置感知计算在移动服务中的推荐:理论与实践
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-20 DOI: 10.3233/ais-200588
Honghao Gao, Andrés Muñoz, Wenbing Zhao, Yuyu Yin
In recent years, many daily web/app services (e.g. Facebook, Twitter, and Foursquare) generate data and traces that are often transparently annotated with location and contextual information. Many core challenges are involved to fully exploit geo-labeled data. The main challenge is to combine ideas and techniques from various research communities, such as recommender systems, data management, geographic information systems, social network analytics, and text mining. We aim to provide a platform to discuss indepth and collecting feedback about challenges, opportunities, novel techniques, and applications. Finally, we have four papers for this special issue. A summary of these papers is outlined below. In the paper entitled “Multi-criteria tensor model consolidating spatial and temporal information for tourism recommendation”, Minsung Hong and Jason J. Jung propose a multi-criteria tensor model combining spatial and temporal information in the recommender systems. Specifically, the five-order tensor model consists of users, items, multiple ratings, spatial and temporal data, which keeps the latent structure of the interrelations between multi-criteria and spatial/temporal information. Experimental results with a TripAdvisor dataset show that the proposed model outperforms other baselines. In the paper entitled “A mobile services recommendation system fuses implicit and explicit user trust relationships”, Pengcheng Luo, Jilin Zhang,
近年来,许多日常网络/应用程序服务(如Facebook, Twitter和Foursquare)生成的数据和痕迹通常带有位置和上下文信息的透明注释。充分利用地理标记数据涉及许多核心挑战。主要的挑战是结合来自不同研究团体的想法和技术,如推荐系统、数据管理、地理信息系统、社会网络分析和文本挖掘。我们的目标是提供一个平台来深入讨论和收集关于挑战、机遇、新技术和应用的反馈。最后,我们这期特刊有四篇论文。下面概述了这些论文的摘要。Minsung Hong和Jason J. Jung在《旅游推荐的时空信息整合多准则张量模型》一文中提出了一种结合时空信息的推荐系统多准则张量模型。具体而言,五阶张量模型由用户、项目、多重评分、时空数据组成,保留了多准则与时空信息之间相互关系的潜在结构。TripAdvisor数据集的实验结果表明,该模型优于其他基线。罗鹏程、张吉林在论文《融合隐式和显式用户信任关系的移动服务推荐系统》中,
{"title":"Location-aware computing to mobile services recommendation: Theory and practice","authors":"Honghao Gao, Andrés Muñoz, Wenbing Zhao, Yuyu Yin","doi":"10.3233/ais-200588","DOIUrl":"https://doi.org/10.3233/ais-200588","url":null,"abstract":"In recent years, many daily web/app services (e.g. Facebook, Twitter, and Foursquare) generate data and traces that are often transparently annotated with location and contextual information. Many core challenges are involved to fully exploit geo-labeled data. The main challenge is to combine ideas and techniques from various research communities, such as recommender systems, data management, geographic information systems, social network analytics, and text mining. We aim to provide a platform to discuss indepth and collecting feedback about challenges, opportunities, novel techniques, and applications. Finally, we have four papers for this special issue. A summary of these papers is outlined below. In the paper entitled “Multi-criteria tensor model consolidating spatial and temporal information for tourism recommendation”, Minsung Hong and Jason J. Jung propose a multi-criteria tensor model combining spatial and temporal information in the recommender systems. Specifically, the five-order tensor model consists of users, items, multiple ratings, spatial and temporal data, which keeps the latent structure of the interrelations between multi-criteria and spatial/temporal information. Experimental results with a TripAdvisor dataset show that the proposed model outperforms other baselines. In the paper entitled “A mobile services recommendation system fuses implicit and explicit user trust relationships”, Pengcheng Luo, Jilin Zhang,","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"344 1","pages":"3-4"},"PeriodicalIF":1.7,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75095144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mobile services recommendation system fuses implicit and explicit user trust relationships 移动服务推荐系统融合了隐式和显式用户信任关系
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-20 DOI: 10.3233/AIS-200585
Pengcheng Luo, Jilin Zhang, Jian Wan, Nailiang Zhao, Zujie Ren, Li Zhou, Jing Shen
In recent years, with the development of advanced mobile applications, people’s various daily behavior data, such as geographic location, social information, hobbies, are more easily collected. To process these data, data cross-boundary fusion has become a key technology, and there are some challenges, such as solving the problems of the cross-boundary business integrity, cross-boundary value complementarity and so on. Mobile Services Recommendation requires improved recommendation accuracy. User trust is an effective measure of information similarity between users. Using trust can effectively improve the accuracy of recommendations. The existing methods have low utilization of general trust data, sparseness of trust data, and lack of user trust characteristics. Therefore, a method needs to be proposed to make up for the shortcomings of explicit trust relationships and improve the accuracy of user interest feature completion. In this paper, a recommendation model is proposed to mine the implicit trust relationships from user data and integrate the explicit social information of users. First, the rating prediction model was improved using the traditional Singular Value Decomposition (SVD) model, and the implicit trust relationships were mined from the user’s historical data. Then, they were fused with the explicit social trust relationships to obtain a crossover data fusion model. We tested the model using three different orders of magnitude. We compared the user preference prediction accuracies of two models: one that does not integrate social information and one that integrates social information. The results show that our model improves the user preference prediction accuracy and has higher accuracy for cold start users. On the three data sets, the average error is reduced by 2.29%, 5.44% and 4.42%, suggesting that it is an effective data crossover fusion technology.
近年来,随着先进的移动应用的发展,人们的各种日常行为数据,如地理位置、社交信息、爱好等,更容易被收集。对这些数据进行处理,数据跨界融合成为一项关键技术,解决跨界业务完整性、跨界价值互补等问题也面临着一些挑战。移动服务推荐需要提高推荐的准确性。用户信任是衡量用户间信息相似性的有效手段。使用信任可以有效地提高推荐的准确性。现有方法存在对一般信任数据利用率低、信任数据稀疏、缺乏用户信任特征等问题。因此,需要提出一种方法来弥补显式信任关系的不足,提高用户兴趣特征补全的准确性。本文提出了一种从用户数据中挖掘隐式信任关系并整合用户显式社交信息的推荐模型。首先,利用传统的奇异值分解(SVD)模型对评级预测模型进行改进,从用户历史数据中挖掘隐式信任关系;然后,将其与显性社会信任关系进行融合,得到跨界数据融合模型。我们用三个不同的数量级来测试这个模型。我们比较了两种模型的用户偏好预测精度:一种是不整合社会信息的,另一种是整合社会信息的。结果表明,该模型提高了用户偏好预测精度,对冷启动用户具有较高的预测精度。在三个数据集上,平均误差分别降低了2.29%、5.44%和4.42%,表明该方法是一种有效的数据交叉融合技术。
{"title":"A mobile services recommendation system fuses implicit and explicit user trust relationships","authors":"Pengcheng Luo, Jilin Zhang, Jian Wan, Nailiang Zhao, Zujie Ren, Li Zhou, Jing Shen","doi":"10.3233/AIS-200585","DOIUrl":"https://doi.org/10.3233/AIS-200585","url":null,"abstract":"In recent years, with the development of advanced mobile applications, people’s various daily behavior data, such as geographic location, social information, hobbies, are more easily collected. To process these data, data cross-boundary fusion has become a key technology, and there are some challenges, such as solving the problems of the cross-boundary business integrity, cross-boundary value complementarity and so on. Mobile Services Recommendation requires improved recommendation accuracy. User trust is an effective measure of information similarity between users. Using trust can effectively improve the accuracy of recommendations. The existing methods have low utilization of general trust data, sparseness of trust data, and lack of user trust characteristics. Therefore, a method needs to be proposed to make up for the shortcomings of explicit trust relationships and improve the accuracy of user interest feature completion. In this paper, a recommendation model is proposed to mine the implicit trust relationships from user data and integrate the explicit social information of users. First, the rating prediction model was improved using the traditional Singular Value Decomposition (SVD) model, and the implicit trust relationships were mined from the user’s historical data. Then, they were fused with the explicit social trust relationships to obtain a crossover data fusion model. We tested the model using three different orders of magnitude. We compared the user preference prediction accuracies of two models: one that does not integrate social information and one that integrates social information. The results show that our model improves the user preference prediction accuracy and has higher accuracy for cold start users. On the three data sets, the average error is reduced by 2.29%, 5.44% and 4.42%, suggesting that it is an effective data crossover fusion technology.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"31 1","pages":"21-35"},"PeriodicalIF":1.7,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85232464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accuracy analysis of BLE beacon-based localization in smart buildings 智能建筑中基于BLE信标的定位精度分析
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-01 DOI: 10.3233/AIS-210607
R. Ivanov
The majority of services that deliver personalized content in smart buildings require accurate localization of their clients. This article presents an analysis of the localization accuracy using Bluetooth Low Energy (BLE) beacons. The aim is to present an approach to create accurate Indoor Positioning Systems (IPS) using algorithms that can be implemented in real time on platforms with low computing power. Parameters on which the localization accuracy mostly depends are analyzed: localization algorithm, beacons’ density, deployment strategy, and noise in the BLE channels. An adaptive algorithm for pre-processing the signals from the beacons is proposed, which aims to reduce noise in beacon’s data and to capture visitor’s dynamics. The accuracy of five range-based localization algorithms in different use case scenarios is analyzed. Three of these algorithms are specially designed to be less sensitive to noise in radio channels and require little computing power. Experiments conducted in a simulated and real environment show that using proposed algorithms the localization accuracy less than 1 m can be obtained.
在智能建筑中提供个性化内容的大多数服务都需要对其客户进行准确的定位。本文对低功耗蓝牙信标的定位精度进行了分析。目的是提出一种使用算法创建精确的室内定位系统(IPS)的方法,该算法可以在低计算能力的平台上实时实现。分析了定位精度主要依赖的参数:定位算法、信标密度、部署策略、BLE信道噪声。提出了一种自适应的信标信号预处理算法,旨在降低信标数据中的噪声,捕捉游客的动态特征。分析了5种基于距离的定位算法在不同用例场景下的精度。其中三种算法是专门设计的,对无线电信道中的噪声不太敏感,并且需要很少的计算能力。在模拟和真实环境下进行的实验表明,采用该算法可以获得小于1 m的定位精度。
{"title":"Accuracy analysis of BLE beacon-based localization in smart buildings","authors":"R. Ivanov","doi":"10.3233/AIS-210607","DOIUrl":"https://doi.org/10.3233/AIS-210607","url":null,"abstract":"The majority of services that deliver personalized content in smart buildings require accurate localization of their clients. This article presents an analysis of the localization accuracy using Bluetooth Low Energy (BLE) beacons. The aim is to present an approach to create accurate Indoor Positioning Systems (IPS) using algorithms that can be implemented in real time on platforms with low computing power. Parameters on which the localization accuracy mostly depends are analyzed: localization algorithm, beacons’ density, deployment strategy, and noise in the BLE channels. An adaptive algorithm for pre-processing the signals from the beacons is proposed, which aims to reduce noise in beacon’s data and to capture visitor’s dynamics. The accuracy of five range-based localization algorithms in different use case scenarios is analyzed. Three of these algorithms are specially designed to be less sensitive to noise in radio channels and require little computing power. Experiments conducted in a simulated and real environment show that using proposed algorithms the localization accuracy less than 1 m can be obtained.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"12 1","pages":"325-344"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87670872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preface to JAISE 13(2) 《JAISE 13(2)》序言
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-01 DOI: 10.3233/AIS-210595
V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz
Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain
Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c和andrs Muñoz da中国香港大学电气与电子工程系b c, IPI,比利时根特大学电信与信息处理系c c英国米德尔塞克斯大学计算机科学系和智能环境发展研究小组d西班牙穆西亚大学理工学院Católica
{"title":"Preface to JAISE 13(2)","authors":"V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz","doi":"10.3233/AIS-210595","DOIUrl":"https://doi.org/10.3233/AIS-210595","url":null,"abstract":"Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"13 1","pages":"75-76"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73603132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart contracts for automated control system in Blockchain based smart cities 基于区块链的智能城市自动控制系统的智能合约
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-01 DOI: 10.3233/AIS-210601
N. Pradhan, A. Singh
Nowadays, smart applications are increasing day by day to improve the standard of living in smart cities. A modern-day smart city is characterized by the presence of numerous smart Information and Communication Technology (ICT)-enabled services such as automated healthcare, automatic building monitoring, home automation, smart parking, traffic management, data security, among others. Such cities employ multitudes of Internet of Things (IoT) devices to collect and share data between trusted users by means of a centralized intermediary for monitoring and control of the myriad automatic activities. However, a centralized intermediary is plagued by issues such as single point of failure, risk of data loss, man-in-the-middle attack, and so forth. Blockchain-based smart contracts for automated control in smart cities provide a decentralized and secure alternative. In this paper, an Ethereum based system design for decentralized applications in smart cities has been proposed that enables systems to share data without an intermediary between trusted and non-trusted stakeholders using Ethereum based self-executing contracts. Such contracts allow automated multi-step workflows for smart applications. Two use cases, have been considered namely smart healthcare and smart building monitoring, as proof of stake of the proposed Ethereum based contract. The performance of the proposed scheme for these use cases has been presented with Keccack 256 transaction hash, the total number of transactions, gas consumed by each contract. Such an attempt is a worthwhile addition to state of the art as evident from the results presented herein. The modeling simulation and analysis of hashing power shows that for hashing power greater than 55% the probability of double spending attack reaches to 42% maximum. So it is concluded that the probability of double spending increases with the increase of transaction values.
如今,智能应用日益增多,提高了智慧城市的生活水平。现代智慧城市的特点是拥有众多支持信息和通信技术(ICT)的智能服务,如自动医疗保健、自动楼宇监控、家庭自动化、智能停车、交通管理、数据安全等。这些城市采用大量的物联网(IoT)设备,通过集中的中介来收集和共享可信用户之间的数据,以监视和控制无数的自动活动。然而,集中式中介受到诸如单点故障、数据丢失风险、中间人攻击等问题的困扰。基于区块链的智能合约为智能城市的自动控制提供了一种分散和安全的替代方案。在本文中,提出了一种基于以太坊的智能城市分散应用程序的系统设计,该设计使系统能够使用基于以太坊的自动执行合约在可信和非可信利益相关者之间无需中介的情况下共享数据。这种契约允许智能应用程序的自动化多步骤工作流。已经考虑了两个用例,即智能医疗和智能建筑监控,作为拟议的基于以太坊的合同的权益证明。这些用例的拟议方案的性能已经用Keccack 256事务哈希,事务总数,每个合约消耗的gas来表示。从本文提出的结果可以看出,这种尝试是对技术状态的值得补充。对哈希算力的建模仿真和分析表明,当哈希算力大于55%时,双花攻击的概率最大可达42%。由此得出,随着交易金额的增加,双重支付的概率也随之增加。
{"title":"Smart contracts for automated control system in Blockchain based smart cities","authors":"N. Pradhan, A. Singh","doi":"10.3233/AIS-210601","DOIUrl":"https://doi.org/10.3233/AIS-210601","url":null,"abstract":"Nowadays, smart applications are increasing day by day to improve the standard of living in smart cities. A modern-day smart city is characterized by the presence of numerous smart Information and Communication Technology (ICT)-enabled services such as automated healthcare, automatic building monitoring, home automation, smart parking, traffic management, data security, among others. Such cities employ multitudes of Internet of Things (IoT) devices to collect and share data between trusted users by means of a centralized intermediary for monitoring and control of the myriad automatic activities. However, a centralized intermediary is plagued by issues such as single point of failure, risk of data loss, man-in-the-middle attack, and so forth. Blockchain-based smart contracts for automated control in smart cities provide a decentralized and secure alternative. In this paper, an Ethereum based system design for decentralized applications in smart cities has been proposed that enables systems to share data without an intermediary between trusted and non-trusted stakeholders using Ethereum based self-executing contracts. Such contracts allow automated multi-step workflows for smart applications. Two use cases, have been considered namely smart healthcare and smart building monitoring, as proof of stake of the proposed Ethereum based contract. The performance of the proposed scheme for these use cases has been presented with Keccack 256 transaction hash, the total number of transactions, gas consumed by each contract. Such an attempt is a worthwhile addition to state of the art as evident from the results presented herein. The modeling simulation and analysis of hashing power shows that for hashing power greater than 55% the probability of double spending attack reaches to 42% maximum. So it is concluded that the probability of double spending increases with the increase of transaction values.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"2 2 1","pages":"253-267"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85586043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing 医疗行业物联网中的黑洞和选择性转发攻击检测与预防:基于混合元启发式的最短路径路由
IF 1.7 4区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2021-01-01 DOI: 10.3233/AIS-210591
T. Srinivas, S. Manivannan
In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.
在当前的医疗保健场景中,安全是具有更多设备或节点的物联网wsn的主要关注点。物联网基础设施中的攻击或异常检测在医疗物联网领域日益受到困扰。随着物联网基础设施在各省的大量使用,这些基础设施的威胁和攻击也相应增加。针对医疗物联网wsn的黑洞攻击和选择性转发攻击,提出了一种检测和防范的安全机制。本文提出的安全策略分为五个阶段:第一阶段是簇头的选择,第二阶段是生成k-路由路径,第三阶段是防止黑洞攻击的安全性,第四阶段是防止选择性转发攻击的安全性,最后阶段是选择最优最短路由路径。最初,开发了用于查找簇头和发现最佳路由的拓扑。在下一阶段,黑洞攻击被诱饵过程检测和阻止。在检测选择性转发攻击时,通过对发送的报文和接收的报文进行验证。为了提高报文的安全性,部署了基于ECC (Elliptic Curve Cryptography)的哈希函数。本文的主要贡献是将猎鹿优化算法(Deer Hunting Optimization algorithm, DHOA)与蜻蜓算法(DragonFly algorithm, DA)相结合,通过考虑目标模型中的信任、距离、延迟或延迟、丢包率等参数,确定最优最短路径,称为基于蜻蜓的DHOA (D-DHOA)。因此,整个阶段将非常积极地检测和防止医疗保健领域的黑洞和物联网wsn选择性转发这两种基本攻击。
{"title":"Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing","authors":"T. Srinivas, S. Manivannan","doi":"10.3233/AIS-210591","DOIUrl":"https://doi.org/10.3233/AIS-210591","url":null,"abstract":"In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"69 1","pages":"133-156"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83333010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Journal of Ambient Intelligence and Smart Environments
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1