2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

筛选
英文 中文
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching 基于直方图均衡化和去相关拉伸的高安全性结构彩色QR码鲁棒数据检索
Mahssa Abdolahi, Hao Jiang, B. Kaminska
{"title":"Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching","authors":"Mahssa Abdolahi, Hao Jiang, B. Kaminska","doi":"10.1109/UEMCON47517.2019.8993032","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993032","url":null,"abstract":"In this work, robust readout of the data (232 English characters) stored in high-security structural colour QR codes, was achieved by using multiple image processing techniques, specifically, histogram equalization and decorrelation stretching. The decoded structural colour QR codes are generic diffractive RGB-pixelated periodic nanocones selectively activated by laser exposure to obtain the particular design of interest. The samples were imaged according to the criteria determined by the diffraction grating equation for the lighting and viewing angles given the red, green, and blue periodicities of the grating. However, illumination variations all through the samples, cross-module and cross-channel interference effects result in acquiring images with dissimilar lighting conditions which cannot be directly retrieved by the decoding script and need significant preprocessing. According to the intensity plots, even if the intensity values are very close (above ~200) at some typical regions of the images with different lighting conditions, their inconsistencies (below ~100) at the pixels of one representative region may lead to the requirement for using different methods for recovering the data from all red, green, and blue channels. In many cases, a successful data readout could be achieved by downscaling the images to ~300-pixel dimensions (along with bilinear interpolation resampling), histogram equalization (HE), linear spatial low-pass mean filtering, and gamma function, each used either independently or with other complementary processes. The majority of images, however, could be fully decoded using decorrelation stretching (DS) either as a standalone or combinational process for obtaining a more distinctive colour definition.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116927006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm 在雾到云范式中使用机器学习进行性能预测的架构模式
Souvik Sengupta, Jordi García, X. Masip-Bruin, Andrés Prieto-González
{"title":"An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm","authors":"Souvik Sengupta, Jordi García, X. Masip-Bruin, Andrés Prieto-González","doi":"10.1109/UEMCON47517.2019.8992939","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992939","url":null,"abstract":"The Fog-to-Cloud (F2C) paradigm is emerging to both provide higher functional efficiency for latency-sensitive services and also help modern computing systems to be more intelligent. As it is still in its infancy, the biggest challenge for this domain is to build a proper resource allocation technique as part of an efficient resource management module. The diversified and distributed nature of that paradigm creates some additional hurdles for choosing the appropriate resources for executing some tasks. Significantly, efficient resource consumption estimation and performance forecasting are core issues in the design and development of a proper and smart resource management mechanism for F2C systems. Considering this fact, in this paper, we aim at designing an architectural framework for a prediction-based resource management mechanism for F2C systems. The performance prediction is based on supervised machine learning technology. The proposal has been evaluated and validated by predicting the performance and resources usage of F2C resources through several tests. Primarily, we have run an image recognition application on different F2C resources and collected performance-related information and resource consumption information. Then, by adopting the multivariate regression methodology, we perform some standard machine learning techniques to predict the performance and estimate the resource consumption of the F2C resources. Finally, to justify the effectiveness of our proposal, we calculated the value of a cost function between estimated values and the real measured values.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"608 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Based Smart Security and Home Automation System 基于物联网的智能安全和家庭自动化系统
Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag
{"title":"IoT Based Smart Security and Home Automation System","authors":"Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag","doi":"10.1109/UEMCON47517.2019.8992994","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992994","url":null,"abstract":"Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by preferring this-system over the similar kinds of existing systems is that the alerts and the status sent by the WI-FI connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the electrical appliances inside the home can be controlled and managed.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack PDF幻影:利用PDF攻击攻击学术会议的论文提交过程
Dat Tran, Chetan Jaiswal
{"title":"PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack","authors":"Dat Tran, Chetan Jaiswal","doi":"10.1109/UEMCON47517.2019.8992996","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992996","url":null,"abstract":"First launched nearly three decades ago, PDF, which stands for Portable Document Format, has become one of the most common formats for text documents. Nowadays, PDF is widely used by individuals, companies, and organizations. At most notable academic conferences, including IEEEs, papers are required to be submitted in PDF format. Along with its increasing popularity in recent times, PDF has been a target for many attacks, some of which are called content-masking attacks. Content-masking attacks are based on the idea of causing underlying text, which is extracted by text-mining softwares and read by machines, to be displayed differently to humans. Inspired by the same idea but is designed and implemented differently, our proposed attack is against the paper submission process at large academic conferences, which consists of two subprocesses: plagiarism detection and automatic assignment of reviewers to papers. Our attack overcomes many weaknesses of previous attacks. In addition, we introduce a method to avoid content masking attacks against the automatic reviewers' assignment process by preventing attackers from getting true topic information from PDF documents.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Study of Detectability of RFID System With Varying Atmospheric Conditions 不同大气条件下RFID系统可探测性的性能研究
Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik
{"title":"Performance Study of Detectability of RFID System With Varying Atmospheric Conditions","authors":"Shilpa Choudhary, Hemant Purohit, Amit Sehgal, A. Kaushik","doi":"10.1109/UEMCON47517.2019.8993107","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993107","url":null,"abstract":"Now a days Radio Frequency Identification (RFID) system has established itself as reliable solution for number of applications like health monitoring system, toll collection at toll plaza, natural habitat monitoring etc. In RFID system data can be stored in tag, which can be read by the RFID reader. But one major issue with this technology is that its detectability may get affected with varying atmospheric conditions like temperature, humidity, presence of soil (in case defense purpose). So now days the prime focus of researcher is to study the effect of varying atmospheric conditions on propagation of Electromagnetic wave to predict the behavior of RFID system. This paper provides the behavioral pattern of RFID system if it is being used in varying atmospheric conditions. We considered arid atmospheric condition for the study on low frequency RFID system. Effects of two parameters on read range (maximum distance between RFID transmitter and receiver) of RFID system were observed i.e. varying temperature and soil layer thickness between transmitter and receiver.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scaling Blockchains to Support Electronic Health Records for Hospital Systems 扩展区块链以支持医院系统的电子健康记录
Alyssa Donawa, I. Orukari, C. Baker
{"title":"Scaling Blockchains to Support Electronic Health Records for Hospital Systems","authors":"Alyssa Donawa, I. Orukari, C. Baker","doi":"10.1109/UEMCON47517.2019.8993101","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993101","url":null,"abstract":"Electronic Health Records (EHRs) have improved many aspects of healthcare and allowed for easier patient management for medical providers. Blockchains have been proposed as a promising solution for supporting Electronic Health Records (EHRs), but have also been linked to scalability concerns about supporting real-world healthcare systems. This paper quantifies the scalability issues and bottlenecks related to current blockchains and puts into perspective the limitations blockchains have with supporting healthcare systems. Particularly we show that well known blockchains such as Bitcoin, Ethereum, and IOTA cannot support transactions of a large scale hospital system such as the University of Kentucky HealthCare system and leave over 7.5M unsealed transactions per day. We then discuss how bottlenecks of blockchains can be relieved with sidechains, enabling well-known blockchains to support even larger hospital systems of over 30M transactions per day. We then introduce the Patient-Healthchain architecture to provide future direction on how scaling blockchains for EHR systems with sidechains can be achieved.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems 一种用于自主微系统无接触编程和三维定位的低功耗光接收器
B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister
{"title":"A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems","authors":"B. Wheeler, Andrew Ng, Brian G. Kilberg, F. Maksimovic, K. Pister","doi":"10.1109/UEMCON47517.2019.8992964","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992964","url":null,"abstract":"Optical receivers for autonomous microsystems provide benefits such as enabling contact-free optical programming and low-power 3D optical localization. A small, low power optical receiver is presented for transferring program data to a micro-controller's SRAM and detecting optical pulses from a lighthouse localization system. An integrated photodiode is combined with an inverter-based amplifier design to generate a digital waveform from optical input. A pulse width modulation scheme is used to allow clock and data recovery (CDR) to operate without any on-chip clock source. The receiver is able to achieve a data rate of 320 kbps for active and standby powers of 1.52 µW and 640 nW, respectively, while occupying 16,900 µm2. This optical receiver can also operate as a lighthouse localization receiver, enabling a completely integrated, low power method of localization for a monolithic integrated system. The successful programming of a lighthouse localization routine onto a monolithic integrated system is demonstrated. Using a commercially available HTC Vive V1 lighthouse base station, this optical receiver was able to provide relative azimuth and elevation data with RMS error of 0.386 degrees and 0.312 degrees, respectively, while consuming only 1 mW of power.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
What is A Robot Swarm: A Definition for Swarming Robotics 什么是机器人群:蜂群机器人的定义
Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela
{"title":"What is A Robot Swarm: A Definition for Swarming Robotics","authors":"Ross D. Arnold, Kevin Carey, Benjamin Abruzzo, C. Korpela","doi":"10.1109/UEMCON47517.2019.8993024","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993024","url":null,"abstract":"The swarm, a type of multi-agent system, has enjoyed a recent surge in popularity within the autonomous robotics field. Despite a variety of theoretical and simulated research work in the area of swarm theory and multi-agent artificial intelligence, the practical use of swarms remains limited. Though many limiting factors lie on the technical front, one limiting factor may be a lack of appreciation for swarm capabilities and applications as opposed to those of conventional robotics. To help address the latter limiting factor, this paper proposes a definition of a swarm in the context of autonomous robotics, describes many real-world problems that can be addressed through use of swarms, and details current applications of swarming robotic systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security 树莓派网状传感器网络用于便携式周边安全
Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
{"title":"A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security","authors":"Cullen D. Johnson, Brian H. Curtin, N. Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews","doi":"10.1109/UEMCON47517.2019.8993000","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993000","url":null,"abstract":"Wireless sensor networks play an important role for perimeter monitoring in remote environments. While commercial wireless sensor networks for providing audio-visual monitoring exist, they are often expensive to deploy. In this paper, we describe and implement a wireless mesh network consisting of inexpensive battery-operated Raspberry Pi nodes. The choice of the Raspberry Pi enables the construction of cost-effective sensor nodes that are extendable and expendable. We conduct a series of test to illustrate the efficacy of our network in a building monitoring use case. Our nodes can be built for as little as 49.00 per node and is capable of node-to-node transmission of up to 50 feet. Custom sleep states enable battery life to last 14 hours on 4 AA batteries. Our results support our thesis that an all-Pi mesh sensor is capable of providing portable perimeter security.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification 基于脑电图的生物识别技术利用图像识别进行患者身份识别
Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke
{"title":"EEG-Based Biometrics Utilizing Image Recognition for Patient Identification","authors":"Hyung-jin Do, Vu Truong, K. George, Bhagyashree Shirke","doi":"10.1109/UEMCON47517.2019.8992962","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992962","url":null,"abstract":"Biometric identification has been applied widely for security purpose in many different fields by using fingerprints, face detection, or voice waves. In medical fields, using patient wristband or patient card for identification may cause the medical records to be mistaken. To overcome these limitations, in this paper, a new method is presented by using electroencephalogram (EEG) signals to classify the patient's identity, hence preventing treating the wrong patient. The system utilizes various hardware and software such as OpenBCI Cyton, EEGlab, MATLAB, and bandpass filter. The main purpose of this research is highlighting the recognition of each EEG signal pattern from each person by capturing the signals from watching a series of images that trigger attentions and memories.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信