Habiba Hegazy, A. Nabil, Mohamed Abdelsalam, M. Hussien, Seif Elmosalamy, Yomna M. I. Hassan, Ayman Atia
{"title":"Usability Study of a comprehensive table tennis AR-based training system with the focus on players' strokes","authors":"Habiba Hegazy, A. Nabil, Mohamed Abdelsalam, M. Hussien, Seif Elmosalamy, Yomna M. I. Hassan, Ayman Atia","doi":"10.5383/juspn.13.01.001","DOIUrl":"https://doi.org/10.5383/juspn.13.01.001","url":null,"abstract":"","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bassel Emad, O. Atef, Yehya Shams, A. El-Kerdany, Nada Shorim, A. Nabil, Ayman Atia
{"title":"iKarate: Karate Kata Aiding System","authors":"Bassel Emad, O. Atef, Yehya Shams, A. El-Kerdany, Nada Shorim, A. Nabil, Ayman Atia","doi":"10.5383/juspn.12.02.004","DOIUrl":"https://doi.org/10.5383/juspn.12.02.004","url":null,"abstract":"Karate is a martial art that can be performed using hands and feet to deliver and block strikes. Karate Kata moves must be executed in a unique way, many moves are performed incorrectly during training. In this paper, we offer a system that Karate performers, coaches, judges and sporting clubs could use. The system aids the Karate performers by capturing their moves using Kinect v2 sensor, pre-processing these moves and then analyzing these moves using F-DTW. A report is displayed to the performers that is easily understandable, to learn how the mistakes were made, and how to fix it/learn from them. F-DTW was used for proving the concept, and an average accuracy of 93.65% was achieved. This Paper is mainly concerned about the first Karate Kata (Heian Shodan).","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Issaoui, Azeddine Khiat, Ayoub Bahnasse, H. Ouajji
{"title":"Smart Logistics: Blockchain trends and applications","authors":"Y. Issaoui, Azeddine Khiat, Ayoub Bahnasse, H. Ouajji","doi":"10.5383/juspn.12.02.002","DOIUrl":"https://doi.org/10.5383/juspn.12.02.002","url":null,"abstract":"The recent increase of new technologies and their involvement into all management processes call into question the smart logistics current models, in which massive amounts of data is collected and controlled. Smart Logistics is considered as fundamental pillar of the 4th industrial revolution 'industry 4.0'. This revolution is based on different concepts including the blockchain technology. Blockchain remains one of the buzzwords in the technological world. So that all sectors are focus on concrete use cases. However, few actors can boast of having devised revolutionary solutions. For good reasons, blockchain technology is still very complex to understand. The purpose of this study is to define the various applications of Blockchain in Smart Logistics, as well as to present concrete examples of these applications. This work was done by classifying the applications according to four clusters: Information, Transport, Finance, and Management, in addition to presenting the applications of each cluster.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scalable Digital Infrastructure for Sustainable Energy Grid Enabled by Distributed Ledger Technology","authors":"R. Rahmani, Yuhong Li","doi":"10.5383/juspn.12.02.003","DOIUrl":"https://doi.org/10.5383/juspn.12.02.003","url":null,"abstract":"The future of renewable energy transportation and distribution is dynamic and complex, with distributed renewable resources in required distributed control. It is suggested that Distributed Ledger Technology (DLT) is a timely innovation with the potential to facilitate this future. The transition to full renewable energy requires an infrastructure capable of handling intermittent production that has a low marginal cost. This requires a distributed control logic where devices with embedded intelligence coordinate local production, a decentralized energy market where prices are not primarily based on production, and an underlying digital infrastructure to enable both. Simulations and experiments have demonstrated great potential in such a digital infrastructure, but real-life tests have identified scalability as a remaining challenge. In this paper, we propose a DLT-based architecture for the energy grid with the development of existing solution concepts by implementing scalability solutions. To this end, we derive energy market components as a framework for building efficient microgrid. Then, we discuss the microgrid as a case study of such a market according to the required components within energy production, transmission, and distribution; distributed ledger platform operations, IoT device manufacturing,; software development; and research in IoT, edge and cloud computing, and energy systems.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution","authors":"Mohamed Talha, Nabil Elmarzouqi, A. A. E. Kalam","doi":"10.5383/juspn.12.01.002","DOIUrl":"https://doi.org/10.5383/juspn.12.01.002","url":null,"abstract":"Quality and Security are two major issues in Big Data that pose many challenges. High volume, heterogeneity and high speed of data generation and processing are, amongst others, common challenges that must be addressed before setting up any data quality management system or data security system. This document provides an overview of data quality and data security in a Big Data context and highlights the conflicts that may exist during the implementation of these systems. Such a conflict makes the setting up of such systems even more complex and the reflection into new solutions becomes a major prerequisite. In this paper, we consider these challenges to present a global solution to evaluate the quality of data without impacting data security and without it becoming a barrier.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Various Methods for Fraud Transaction Detection in Credit Cards","authors":"Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole","doi":"10.5383/juspn.12.01.004","DOIUrl":"https://doi.org/10.5383/juspn.12.01.004","url":null,"abstract":"Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Insight into PDP challenges of data transfer in wireless mobile devices","authors":"Tomáš Pikulík, P. Štarchoň","doi":"10.5383/juspn.12.01.003","DOIUrl":"https://doi.org/10.5383/juspn.12.01.003","url":null,"abstract":"Pressure for effectivity of interconnection of personal data with digital accounts eliminates paperbased personal data processing (PDP). The objective of this paper is to reveal weak pots of transfer and PDP in Wi-Fi ready mobile devices. Purpose is to reveal the set of principles for data transfer and storage of personal data in ubiquitous and pervasive network environment. Our scope is to point out the recommendation for organization (data controller) in managing data transfer procedure to prevent incidents and personal data misusage and set preventive action plan for individuals (data subject) to protect their digital accounts. The contribution of our paper is a set of recommendations that sum up principles for secure PDP that should skip individual action of data subject. The paper concludes by arguing that organization (data controller) need to manage PDP requirements and individuals (data subject) could set preventive action to protect their digital accounts. These findings provide a potential mechanism for prevent personal data GDPR compliant methods like pseudonymization and encryption.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132837361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcel Tresanchez Ribes, Alex Pujol, T. Pallejà, David Martínez, Eduard Clotet, J. Palacín
{"title":"An inexpensive wireless smart camera system for IoT applications based on an ARM Cortex-M7 microcontroller","authors":"Marcel Tresanchez Ribes, Alex Pujol, T. Pallejà, David Martínez, Eduard Clotet, J. Palacín","doi":"10.5383/JUSPN.11.02.001","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.001","url":null,"abstract":"This paper presents a new proposal of a low-cost and low-power wireless smart camera device, designed to be used as an inexpensive smart image acquisition edge node for Internet of Things (IoT). Taking the advantages of the ARM CortexM7 microcontrollers, a high-performance STM32F7 microcontroller is used as a main digital signal processor (DSP) to acquire and transfer images at full rate, keeping the core idle to do real-time image processing. In order to design a very compact, low-cost and low-power wireless image sensor node, the DSP is supported by an embedded 1.3 Mega Pixel CMOS camera sensor and a low consumption 2.4GHz Wi-Fi module. This setup allows a custom build-in image processing algorithm for specific IoT sensing applications or a simply setup as low-cost streaming Motion JPEG (MJPEG) wireless camera node. In this work, both configurations have been tested and analyzed. Results show that the device can acquire and process images simultaneously at a full rate (30 fps) and the MJPEG transmission reaches 7.23 fps with a QVGA resolution.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Web Service Composition with Graphplan and Fuzzy Control","authors":"Guodong Fan, Ming Zhu, Xiaoliu Cui","doi":"10.5383/JUSPN.11.02.003","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.003","url":null,"abstract":"With the development of cloud computing, more and more applications are posted online to provide services for users. Since user needs can be complex, an individual service will not able to meet the requirement. Web Service Composition composes multiple web services together to fulfil the complicated user requirement. While searching an optimal composition with both functional and non-functional requirements still is a challenging problem that needs to be addressed. QoS-aware web service composition is an NP-hard problem. To solve this problem, we design a system which combines GraphPlan with Fuzzy Control algorithm. Fuzzy Control is employed to generate overall QoS according to user preferences. In the forward phase of Graphplan, less competitive services are pruned according to the overall QoS. In the backward phase, services are selected according to functional goals and their overall QoS. Furthermore, case study and are performed, and the experimental results show that our approach improves the quality of service composition significantly compared with ordinary and Skyline approach.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Service Level Agreement Compliance for Optical WDM Networks","authors":"Yashar Fazili, B. Robertson, W. Phillips","doi":"10.5383/JUSPN.11.02.002","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.002","url":null,"abstract":"In this paper we consider Green Service Level Agreement (SLA) as a constraint in finding a route for a dynamically received connection request in Wavelength Division Multiplexing (WDM) networks. We show that it is possible to save energy and reduce Greenhouse Gas (GHG) emission while satisfying optical network SLAs. The Integer Linear Programming (ILP) method introduced in this paper has been engineered to be simple and be solved in a timely manner needed for serving a dynamic connection request in control plane of the optical network. The ILP method introduced in this paper for the control plane of Optical WDM networks could also be used for the control plane of Software Defined Networks (SDN) and Software Defined Wide Area Networks.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}