Pub Date : 2021-01-01Epub Date: 2021-03-11DOI: 10.1109/ccnc49032.2021.9369650
Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin, David Schwebel, Ragib Hasan
The safety of distracted pedestrians presents a significant public health challenge in the United States and worldwide. An estimated 6,704 American pedestrians died and over 200,000 pedestrians were injured in traffic crashes in 2018, according to the Centers for Disease Control and Prevention (CDC) [1]. This number is increasing annually and many researchers posit that distraction by smartphones is a primary reason for the increasing number of pedestrian injuries and deaths. One strategy to prevent pedestrian injuries and death is to use intrusive interruptions that warn distracted pedestrians directly on their smartphones. To this end, we developed StreetBit, a Bluetooth beacon-based mobile application that alerts distracted pedestrians with a visual and/or audio interruption when they are distracted by their smartphones and are approaching a potentially-dangerous traffic intersection. In this paper, we present the background, architecture, and operations of the StreetBit Application.
{"title":"StreetBit: A Bluetooth Beacon-based Personal Safety Application for Distracted Pedestrians.","authors":"Raiful Hasan, Mohammad Aminul Hoque, Yasser Karim, Russell Griffin, David Schwebel, Ragib Hasan","doi":"10.1109/ccnc49032.2021.9369650","DOIUrl":"https://doi.org/10.1109/ccnc49032.2021.9369650","url":null,"abstract":"<p><p>The safety of distracted pedestrians presents a significant public health challenge in the United States and worldwide. An estimated 6,704 American pedestrians died and over 200,000 pedestrians were injured in traffic crashes in 2018, according to the Centers for Disease Control and Prevention (CDC) [1]. This number is increasing annually and many researchers posit that distraction by smartphones is a primary reason for the increasing number of pedestrian injuries and deaths. One strategy to prevent pedestrian injuries and death is to use intrusive interruptions that warn distracted pedestrians directly on their smartphones. To this end, we developed <i>StreetBit</i>, a Bluetooth beacon-based mobile application that alerts distracted pedestrians with a visual and/or audio interruption when they are distracted by their smartphones and are approaching a potentially-dangerous traffic intersection. In this paper, we present the background, architecture, and operations of the StreetBit Application.</p>","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"2021 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ccnc49032.2021.9369650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39437176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that has physical access to a device can onboard it onto their network and, potentially, tamper it (e.g., install malware on the device). To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (DLWIoT), featuring a robust and fully automated image watermarking scheme based on deep neural networks. DLWIoT embeds user credentials into carrier images (e.g., QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users. Our experimental results demonstrate the feasibility of DLWIoT, indicating that authorized users can onboard IoT devices with DLWIoT within 2.5-3sec.
{"title":"DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding.","authors":"Spyridon Mastorakis, Xin Zhong, Pei-Chi Huang, Reza Tourani","doi":"10.1109/ccnc49032.2021.9369515","DOIUrl":"https://doi.org/10.1109/ccnc49032.2021.9369515","url":null,"abstract":"<p><p>The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that has physical access to a device can onboard it onto their network and, potentially, tamper it (<i>e.g.</i>, install malware on the device). To address this problem, in this paper, we present a framework, called Deep Learning-based Watermarking for authorized IoT onboarding (<i>DLWIoT</i>), featuring a robust and fully automated image watermarking scheme based on deep neural networks. <i>DLWIoT</i> embeds user credentials into carrier images (<i>e.g.</i>, QR codes printed on IoT devices), thus enables IoT onboarding only by authorized users. Our experimental results demonstrate the feasibility of <i>DLWIoT</i>, indicating that authorized users can onboard IoT devices with <i>DLWIoT</i> within 2.5-3sec.</p>","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"2021 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/ccnc49032.2021.9369515","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39553553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01Epub Date: 2021-03-11DOI: 10.1109/ccnc49032.2021.9369490
Aaron D Likens, Spyridon Mastorakis, Andreas Skiadopoulos, Jenny A Kent, Md Washik Al Azad, Nick Stergiou
Older adults and people suffering from neurodegenerative disease often experience difficulty controlling gait during locomotion, ultimately increasing their risk of falling. To combat these effects, researchers and clinicians have used metronomes as assistive devices to improve movement timing in hopes of reducing their risk of falling. Historically, researchers in this area have relied on metronomes with isochronous interbeat intervals, which may be problematic because normal healthy gait varies considerably from one step to the next. More recently, researchers have advocated the use of irregular metronomes embedded with statistical properties found in healthy populations. In this paper, we explore the effect of both regular and irregular metronomes on many statistical properties of interstride intervals. Furthermore, we investigate how these properties react to mechanical perturbation in the form of a halted treadmill belt while walking. Our results demonstrate that metronomes that are either isochronous or random break down the inherent structure of healthy gait. Metronomes with statistical properties similar to healthy gait seem to preserve those properties, despite a strong mechanical perturbation. We discuss the future development of this work in the context of networked augmented reality metronome devices.
{"title":"Irregular Metronomes as Assistive Devices to Promote Healthy Gait Patterns.","authors":"Aaron D Likens, Spyridon Mastorakis, Andreas Skiadopoulos, Jenny A Kent, Md Washik Al Azad, Nick Stergiou","doi":"10.1109/ccnc49032.2021.9369490","DOIUrl":"10.1109/ccnc49032.2021.9369490","url":null,"abstract":"<p><p>Older adults and people suffering from neurodegenerative disease often experience difficulty controlling gait during locomotion, ultimately increasing their risk of falling. To combat these effects, researchers and clinicians have used metronomes as assistive devices to improve movement timing in hopes of reducing their risk of falling. Historically, researchers in this area have relied on metronomes with isochronous interbeat intervals, which may be problematic because normal healthy gait varies considerably from one step to the next. More recently, researchers have advocated the use of irregular metronomes embedded with statistical properties found in healthy populations. In this paper, we explore the effect of both regular and irregular metronomes on many statistical properties of interstride intervals. Furthermore, we investigate how these properties react to mechanical perturbation in the form of a halted treadmill belt while walking. Our results demonstrate that metronomes that are either isochronous or random break down the inherent structure of healthy gait. Metronomes with statistical properties similar to healthy gait seem to preserve those properties, despite a strong mechanical perturbation. We discuss the future development of this work in the context of networked augmented reality metronome devices.</p>","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"2021 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8340876/pdf/nihms-1693207.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39301448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-20DOI: 10.1007/978-3-030-67720-6_55
Xiaomao Chen, Jiakun Li, Yuanfa Ji
{"title":"Correction to: Land Cover Classification and Accuracy Evaluation Based on Object-Oriented Spatial Features of GF-2","authors":"Xiaomao Chen, Jiakun Li, Yuanfa Ji","doi":"10.1007/978-3-030-67720-6_55","DOIUrl":"https://doi.org/10.1007/978-3-030-67720-6_55","url":null,"abstract":"","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73566645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-41114-5
O. Akan, Honghao Gao, Z. Feng, Jun-Jie Yu, Jun Wu
{"title":"Communications and Networking: 14th EAI International Conference, ChinaCom 2019, Shanghai, China, November 29 – December 1, 2019, Proceedings, Part I","authors":"O. Akan, Honghao Gao, Z. Feng, Jun-Jie Yu, Jun Wu","doi":"10.1007/978-3-030-41114-5","DOIUrl":"https://doi.org/10.1007/978-3-030-41114-5","url":null,"abstract":"","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76810150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1007/978-3-030-41117-6
Huan Meng, Hongqing Liu, Yi Zhou, Zhen Luo
{"title":"Communications and Networking: 14th EAI International Conference, ChinaCom 2019, Shanghai, China, November 29 – December 1, 2019, Proceedings, Part II","authors":"Huan Meng, Hongqing Liu, Yi Zhou, Zhen Luo","doi":"10.1007/978-3-030-41117-6","DOIUrl":"https://doi.org/10.1007/978-3-030-41117-6","url":null,"abstract":"","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89359691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651854
Hamza Ben Ammar, Y. H. Aoul, Soraya Ait Chellouche
{"title":"Efficiently allocating distributed caching resources in future smart networks","authors":"Hamza Ben Ammar, Y. H. Aoul, Soraya Ait Chellouche","doi":"10.1109/CCNC.2019.8651854","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651854","url":null,"abstract":"","PeriodicalId":93293,"journal":{"name":"IEEE Consumer Communications and Networking Conference. IEEE Consumer Communications and Networking Conference","volume":"32 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86589565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}