Lenin Mendoza, R. Bastidas, Valeryia Perez, Jaime Huaytalla, Deyby Huamanchahua
{"title":"Design of a Therapeutic Crane with Rehabilitation Monitoring for Patients with Reduced Mobility","authors":"Lenin Mendoza, R. Bastidas, Valeryia Perez, Jaime Huaytalla, Deyby Huamanchahua","doi":"10.1109/UEMCON53757.2021.9666643","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666643","url":null,"abstract":"The present investigation has designed a therapeutic crane that helps patients who have lower body problems. As an alternative to the lack of equipment for physical rehabilitation, which leads to the reincorporation of people with reduced mobility to their activities of daily life, the objective proposed to solve the problem is the design and construction of a therapeutic crane with a system to monitor the rehabilitation process. The design and the solution were carried out based on the needs presented by the clinical areas in the implementation of rehabilitation technology that facilitates and promotes a better therapeutic process for patients. In addition, this therapeutic crane has functional duality, it is used for gait training with the support of the bodyweight that allows walking upright; as well as helping patients with cognitive impairment in the standing process; also, it has two vertical curved rails that help support the feet with hand restraints and offers a safe and functional environment, lifting a maximum weight of 180 kg of mass and a height of up to 1.95 m. The solution focuses on the construction of a square tube structure that forms an arch, has a handrail for holding the patient offering firmness and stability; providing the security of a device of reliability and easy handling; since it only requires an operator to monitor the process and an accessible environment for commissioning.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Yousef, Ayman Atia, Amira Youssef, Noha A. Saad Eldien, A. Hamdy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy
{"title":"Automatic Identification of Student’s Cognitive Style from Online Laboratory Experimentation using Machine Learning Techniques","authors":"A. Yousef, Ayman Atia, Amira Youssef, Noha A. Saad Eldien, A. Hamdy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy","doi":"10.1109/UEMCON53757.2021.9666516","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666516","url":null,"abstract":"Online learning has emerged as powerful learning methods for the transformation from traditional education to open learning through smart learning platforms due to Covid-19 pandemic. Despite its effectiveness, many studies have indicated the necessity of linking online learning methods with the cognitive learning styles of students. The level of students always improves if the teaching methods and educational interventions are appropriate to the cognitive style of each student individually. Currently, psychological measures are used to assess students’ cognitive styles, but about the application in virtual environment, the matter becomes complicated. The main goal of this study is to provide an efficient solution based on machine learning techniques to automatically identify the students’ cognitive styles by analyzing their mouse interaction behaviors while carrying out online laboratory experiments. This will help in the design of an effective online laboratory experimentation system that is able to individualize the experiment instructions and feedback according to the identified cognitive style of each student. The results reveal that the KNN and SVM classifiers have a good accuracy in predicting most cognitive learning styles. In comparison to KNN, the enlarged studies ensemble the KNN, linear regression, neural network, and SVM reveal a 13% increase in overall total RMS error. We believe that this finding will enable educators and policy makers to predict distinct cognitive types in the assessment of students when they interact with online experiments. We believe that integrating deep learning algorithms with a greater emphasis on mouse location traces will improve the accuracy of our classifiers’ predictions.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harish Anantharajah, K. Harika, Andrew Jayasinghe, Michal Aibin
{"title":"COVID-19 Contact Tracing Using BLE and RFID for Data Protection and Integrity","authors":"Harish Anantharajah, K. Harika, Andrew Jayasinghe, Michal Aibin","doi":"10.1109/UEMCON53757.2021.9666565","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666565","url":null,"abstract":"Responding to the rapid spread of the COVID-19 virus, the need for contact tracing and self-isolation has become the focus of many health experts and governments as being the primary option for containing the spread of the disease. The utilization of the smartphone has been the focus of many efforts by creating mobile applications that harness the potential of GPS and BLE technologies to make contact tracing as efficient and effective as possible. The prevailing issue with this system is the concern of privacy and data protection of app users. In order to address this problem, through this paper, we are suggesting the use of passive RFID technology similar to that of most public transit systems. This system contains a client-held RFID card and a receiver, and a server that processes the data. Through this paper, we hope to present an alternative, less invasive system that will help governments and health officials prevent the spread of COVID-19 in their communities.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"98 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Riyo Hayat Khan, Dibyo Fabian Dofadar, Md. Golam Rabiul Alam
{"title":"Explainable Customer Segmentation Using K-means Clustering","authors":"Riyo Hayat Khan, Dibyo Fabian Dofadar, Md. Golam Rabiul Alam","doi":"10.1109/uemcon53757.2021.9666609","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666609","url":null,"abstract":"Explainable AI has gained popularity in recent years, but the application of it in unsupervised learning is still a few. In this research, explainability was integrated with clustering, an unsupervised method. Customer segmentation is one of the most important aspects in the competitive business world. The most common approach for customer segmentation is clustering, however, assignments of the clusters often can be hard to interpret. To make the cluster assignments more interpretable, a decision tree based explainability was implemented for customer segmentation in this research for small and large datasets. Using the Elbow Method and Silhouette Score, an optimal number of clusters were found, then ExKMC algorithm was implemented for both datasets.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System for CAN Bus In-Vehicle Network based on Machine Learning Algorithms","authors":"Asma Alfardus, D. Rawat","doi":"10.1109/uemcon53757.2021.9666745","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666745","url":null,"abstract":"The advent of automotive industry has an increasing market demand pertaining to installation of intelligent transportation facilities in modern vehicles. Now more comfortable and safer travelling experience is one best trait of these vehicles. Moreover, it has opened new gates to advancement in automotive sector. Modern vehicles are connected to advance systems and technologies using various communication protocols. Amongst numerous communication protocols, one widely used protocol is the controller area network (CAN) bus which serves as a central medium for in-vehicle communications. However, the communication in these vehicles may impose greater threats and may ultimately compromise the security by breaching the system. Various attacks on CAN bus may compromise the confidentiality, integrity and availability of vehicular data through intrusions which may endanger the physical safety of vehicle and passengers. In this paper, a novel machine learning based approach is used to devise an Intrusion Detection System for the CAN bus network. The proposed system is scalable and adaptable to a diverse set of emerging attacks on autonomous vehicles. Results witnessed the accuracy of 100% of our proposed system in detecting and safeguarding threats against multiple impersonation and denial of service attacks as well as 99% accuracy of fuzzy attacks.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Wireless Mesh Security to Minimize Privacy and Security Breach","authors":"Krishna D Jadhav, S. Balaji","doi":"10.1109/uemcon53757.2021.9666593","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666593","url":null,"abstract":"Due to its minimal price and expandable wireless open system interconnection options for the coming years, wireless mesh networking is appealing, developing, and novel medium of speech, which is why it is becoming a somewhat widely used communication field. In all network types, one of the essential factors for prevalent and trustworthy communication is cybersecurity. The IEEE 802.11 working gathering has created various correspondence guidelines. Yet, they are by and by focusing on the 802.11s standard because of its dynamic setup and geography learning abilities. Information, voice, and directions are steered between hubs employing remote lattice organising. WMNs incidentally give nearby 802.11g admittance to customers and connection neighbours utilising 802.11a \"backhaul,\" but this isn’t generally the situation because of changing requirements, for example, top information rate and inclusion range. The small cross-sectional organisation emerged as a fundamental innovation to enable broadband system management in large regions. It benefits specialised organisations by reducing the cost of sending networks and end customers by providing ubiquitous Internet access anywhere, anytime. Given the idea of wireless mesh networking and the lack of integrated organisational technology, small grid networks are powerless against malicious attacks. In the meantime, the limit of multi-radio multi-channel correspondence, the need for heterogeneous organisation coordination, and the interest for multi-bounce remote equality often render conventional security strategies ineffectual or challenging to carry out. Thus, wireless mesh networking presents new issues that require more viable and relevant arrangements. WMNs have piqued the curiosity of both scholastics and industry because of their promising future. Numerous testbeds are built for research purposes, and business items for veritable WMNs are accessible. Anyway, a few concerns should be cleared up before they can very well become widespread. For example, the accessible MAC and routing conventions are not customisable; the throughput drops impressively with an increasing number of hubs or bounces in WMNs. Because of the weakness of WMNs against various malicious attacks, the security and protection of correspondence is a serious concern. For example, enemies can sniff long-distance correspondence to obtain sensitive data. Attackers can carry out DoS attacks and control the substance of the information sent through compromised hubs, thereby endangering the company’s secret, accessibility authenticity, and integrity. WMNs, like compact Impromptu Organisations (MANETs), share a typical medium, no traffic aggregate point, and incredible topography. Due to these restrictions, normal safety frameworks in wired associations can’t be quickly applied to WMNs. Also, the techniques utilised in MANETs are not viable with WMNs. This is because of the manner in which WMNs expand MANETs in different ways. Framework cent","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferring Human Activity Using Wearable Sensors","authors":"S. Chawathe","doi":"10.1109/uemcon53757.2021.9666707","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666707","url":null,"abstract":"This paper presents methods that use data from wearable sensors, such as those found in low-cost commodity hardware, to infer the human activity (such as reading or walking) corresponding to the sensor readings. A related task is the identification of individuals based on the same data. The classification accuracy of the methods used in this work is higher than earlier work using the same dataset. Further, a significant reduction in the number of sensor data streams produces only a very small impact on this accuracy, which is a feature of practical significance due to implications for network bandwidth and energy budgets in such systems.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design a Hand Orthosis to Aid Post-Stroke Patients With Hemiplegia","authors":"Jhulino Oroya, D. Oroya, Deyby Huamanchahua","doi":"10.1109/UEMCON53757.2021.9666638","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666638","url":null,"abstract":"Stroke is the third cause of all disabilities for people over 25 years old. Indeed, the percentage of people who suffer from hemiplegia after stroke is higher than 75%. Patients with hemiplegia have considerable difficulty performing activities of daily living, such as feeding or grasping objects. Assistive devices for stroke patients have been developing since a very long time ago; however, some of them are not well accepted by patients because they are not comfortable, wearable, portable, lightweight and useful. This research presents the first version of the design of dynamic orthosis to aid post-stroke patients with hemiplegia to grasp cylindrical and spherical objects. The proposed orthosis was designed by using a cyclic design methodology called Iterative Design which is used for continuous product improvement; moreover, this paper presents a detailed description of the control algorithm and the electromechanical design in which a flexible power transmission element was introduced to perform the opening and closing of the hand. Then, a motion study was performed to determine the range of motion (ROM) of the orthosis. Results show that the orthosis is able to cover 88.8% of the ROM of the metacarpophalangeal (MCP) joint and 72.7% of the ROM of the proximal interphalangeal (PIP) joint. These results indicate that the hand orthosis can assist patients in performing grasping tasks. In addition, the main feature of this orthosis is ergonomic because it was designed using anthropometric measurements of the hand. Other features of the orthosis are lightweight (230 g), portable and easy to use.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Types of Lower-Limb Orthoses for Rehabilitation and Assistance: A Systematic Review","authors":"Deyby Huamanchahua, Jhon Rodrigo Ortiz Zacarias, Joel Asto-Evangelista, Iraiz Lucero Quintanilla Mosquera","doi":"10.1109/UEMCON53757.2021.9666710","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666710","url":null,"abstract":"The movement problems in lower extremities resulting from accidents, paralysis, degenerative diseases, and elderly people with loss of mobility due to muscle weakness have been a problem that has been addressed for a long time, however, robotic devices focused on this type of rehabilitation and assistance have had a slow technological development in this area is necessary an improvement in this type of devices both in their design, control, and performance. To be more productive and accessible to people who require them. The purpose of this article is to present a systematic study of this type of robotic device for lower limb orthoses for rehabilitation and assistance. The objective is to provide the designer and researcher with a matrix for the development of a much more efficient lower limb orthotic robotic device. The procedure that was followed was the collection of data from different specialized search engines that assisted in the collection of information from the different research from the year 2016 to 2021. A selection was made of all the analyzed research where finally only 94 research were selected.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Aware Task Migration Through Ant-Colony Optimization for Multiprocessors","authors":"Dulana Rupanetti, Hassan A. Salamy","doi":"10.1109/uemcon53757.2021.9666584","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666584","url":null,"abstract":"In this work, we introduce a novel strategy to improve the power dissipation of the Multiprocessor System on Chips (MPSoC) through a modified Ant-Colony Optimization (ACO) for task migration. Combined with a First-Fit task allocation heuristic, the ACO algorithm tries to split tasks and migrate them to processors with low task utilization to minimize the overall power consumption of the MPSoC. Finally, the task set, including split tasks, is scheduled through an Early-Deadline-First (EDF) scheduler. This paper describes the implementation and verification of the proposed work, and the results of the experiment attest to the improvements gained over the traditional allocating and scheduling algorithms in the literature.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"5 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113938600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}