J. Ubiquitous Syst. Pervasive Networks最新文献

筛选
英文 中文
Usability Study of a comprehensive table tennis AR-based training system with the focus on players' strokes 以选手击球为重点的基于ar的乒乓球综合训练系统的可用性研究
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2020-10-01 DOI: 10.5383/juspn.13.01.001
Habiba Hegazy, A. Nabil, Mohamed Abdelsalam, M. Hussien, Seif Elmosalamy, Yomna M. I. Hassan, Ayman Atia
{"title":"Usability Study of a comprehensive table tennis AR-based training system with the focus on players' strokes","authors":"Habiba Hegazy, A. Nabil, Mohamed Abdelsalam, M. Hussien, Seif Elmosalamy, Yomna M. I. Hassan, Ayman Atia","doi":"10.5383/juspn.13.01.001","DOIUrl":"https://doi.org/10.5383/juspn.13.01.001","url":null,"abstract":"","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134503744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
iKarate: Karate Kata Aiding System 空手道:空手道辅助系统
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2020-04-01 DOI: 10.5383/juspn.12.02.004
Bassel Emad, O. Atef, Yehya Shams, A. El-Kerdany, Nada Shorim, A. Nabil, Ayman Atia
{"title":"iKarate: Karate Kata Aiding System","authors":"Bassel Emad, O. Atef, Yehya Shams, A. El-Kerdany, Nada Shorim, A. Nabil, Ayman Atia","doi":"10.5383/juspn.12.02.004","DOIUrl":"https://doi.org/10.5383/juspn.12.02.004","url":null,"abstract":"Karate is a martial art that can be performed using hands and feet to deliver and block strikes. Karate Kata moves must be executed in a unique way, many moves are performed incorrectly during training. In this paper, we offer a system that Karate performers, coaches, judges and sporting clubs could use. The system aids the Karate performers by capturing their moves using Kinect v2 sensor, pre-processing these moves and then analyzing these moves using F-DTW. A report is displayed to the performers that is easily understandable, to learn how the mistakes were made, and how to fix it/learn from them. F-DTW was used for proving the concept, and an average accuracy of 93.65% was achieved. This Paper is mainly concerned about the first Karate Kata (Heian Shodan).","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Logistics: Blockchain trends and applications 智能物流:区块链趋势和应用
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2020-03-01 DOI: 10.5383/juspn.12.02.002
Y. Issaoui, Azeddine Khiat, Ayoub Bahnasse, H. Ouajji
{"title":"Smart Logistics: Blockchain trends and applications","authors":"Y. Issaoui, Azeddine Khiat, Ayoub Bahnasse, H. Ouajji","doi":"10.5383/juspn.12.02.002","DOIUrl":"https://doi.org/10.5383/juspn.12.02.002","url":null,"abstract":"The recent increase of new technologies and their involvement into all management processes call into question the smart logistics current models, in which massive amounts of data is collected and controlled. Smart Logistics is considered as fundamental pillar of the 4th industrial revolution 'industry 4.0'. This revolution is based on different concepts including the blockchain technology. Blockchain remains one of the buzzwords in the technological world. So that all sectors are focus on concrete use cases. However, few actors can boast of having devised revolutionary solutions. For good reasons, blockchain technology is still very complex to understand. The purpose of this study is to define the various applications of Blockchain in Smart Logistics, as well as to present concrete examples of these applications. This work was done by classifying the applications according to four clusters: Information, Transport, Finance, and Management, in addition to presenting the applications of each cluster.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Scalable Digital Infrastructure for Sustainable Energy Grid Enabled by Distributed Ledger Technology 分布式账本技术支持的可持续能源网可扩展数字基础设施
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2020-03-01 DOI: 10.5383/juspn.12.02.003
R. Rahmani, Yuhong Li
{"title":"A Scalable Digital Infrastructure for Sustainable Energy Grid Enabled by Distributed Ledger Technology","authors":"R. Rahmani, Yuhong Li","doi":"10.5383/juspn.12.02.003","DOIUrl":"https://doi.org/10.5383/juspn.12.02.003","url":null,"abstract":"The future of renewable energy transportation and distribution is dynamic and complex, with distributed renewable resources in required distributed control. It is suggested that Distributed Ledger Technology (DLT) is a timely innovation with the potential to facilitate this future. The transition to full renewable energy requires an infrastructure capable of handling intermittent production that has a low marginal cost. This requires a distributed control logic where devices with embedded intelligence coordinate local production, a decentralized energy market where prices are not primarily based on production, and an underlying digital infrastructure to enable both. Simulations and experiments have demonstrated great potential in such a digital infrastructure, but real-life tests have identified scalability as a remaining challenge. In this paper, we propose a DLT-based architecture for the energy grid with the development of existing solution concepts by implementing scalability solutions. To this end, we derive energy market components as a framework for building efficient microgrid. Then, we discuss the microgrid as a case study of such a market according to the required components within energy production, transmission, and distribution; distributed ledger platform operations, IoT device manufacturing,; software development; and research in IoT, edge and cloud computing, and energy systems.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution 大数据中的质量和安全:挑战即机遇,构建强大的综合解决方案
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-11-15 DOI: 10.5383/juspn.12.01.002
Mohamed Talha, Nabil Elmarzouqi, A. A. E. Kalam
{"title":"Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution","authors":"Mohamed Talha, Nabil Elmarzouqi, A. A. E. Kalam","doi":"10.5383/juspn.12.01.002","DOIUrl":"https://doi.org/10.5383/juspn.12.01.002","url":null,"abstract":"Quality and Security are two major issues in Big Data that pose many challenges. High volume, heterogeneity and high speed of data generation and processing are, amongst others, common challenges that must be addressed before setting up any data quality management system or data security system. This document provides an overview of data quality and data security in a Big Data context and highlights the conflicts that may exist during the implementation of these systems. Such a conflict makes the setting up of such systems even more complex and the reflection into new solutions becomes a major prerequisite. In this paper, we consider these challenges to present a global solution to evaluate the quality of data without impacting data security and without it becoming a barrier.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Various Methods for Fraud Transaction Detection in Credit Cards 信用卡欺诈交易检测的各种方法
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-11-15 DOI: 10.5383/juspn.12.01.004
Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole
{"title":"Various Methods for Fraud Transaction Detection in Credit Cards","authors":"Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole","doi":"10.5383/juspn.12.01.004","DOIUrl":"https://doi.org/10.5383/juspn.12.01.004","url":null,"abstract":"Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insight into PDP challenges of data transfer in wireless mobile devices 洞察无线移动设备中数据传输的PDP挑战
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-11-15 DOI: 10.5383/juspn.12.01.003
Tomáš Pikulík, P. Štarchoň
{"title":"Insight into PDP challenges of data transfer in wireless mobile devices","authors":"Tomáš Pikulík, P. Štarchoň","doi":"10.5383/juspn.12.01.003","DOIUrl":"https://doi.org/10.5383/juspn.12.01.003","url":null,"abstract":"Pressure for effectivity of interconnection of personal data with digital accounts eliminates paperbased personal data processing (PDP). The objective of this paper is to reveal weak pots of transfer and PDP in Wi-Fi ready mobile devices. Purpose is to reveal the set of principles for data transfer and storage of personal data in ubiquitous and pervasive network environment. Our scope is to point out the recommendation for organization (data controller) in managing data transfer procedure to prevent incidents and personal data misusage and set preventive action plan for individuals (data subject) to protect their digital accounts. The contribution of our paper is a set of recommendations that sum up principles for secure PDP that should skip individual action of data subject. The paper concludes by arguing that organization (data controller) need to manage PDP requirements and individuals (data subject) could set preventive action to protect their digital accounts. These findings provide a potential mechanism for prevent personal data GDPR compliant methods like pseudonymization and encryption.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132837361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An inexpensive wireless smart camera system for IoT applications based on an ARM Cortex-M7 microcontroller 基于ARM Cortex-M7微控制器的物联网应用廉价无线智能摄像头系统
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-06-10 DOI: 10.5383/JUSPN.11.02.001
Marcel Tresanchez Ribes, Alex Pujol, T. Pallejà, David Martínez, Eduard Clotet, J. Palacín
{"title":"An inexpensive wireless smart camera system for IoT applications based on an ARM Cortex-M7 microcontroller","authors":"Marcel Tresanchez Ribes, Alex Pujol, T. Pallejà, David Martínez, Eduard Clotet, J. Palacín","doi":"10.5383/JUSPN.11.02.001","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.001","url":null,"abstract":"This paper presents a new proposal of a low-cost and low-power wireless smart camera device, designed to be used as an inexpensive smart image acquisition edge node for Internet of Things (IoT). Taking the advantages of the ARM CortexM7 microcontrollers, a high-performance STM32F7 microcontroller is used as a main digital signal processor (DSP) to acquire and transfer images at full rate, keeping the core idle to do real-time image processing. In order to design a very compact, low-cost and low-power wireless image sensor node, the DSP is supported by an embedded 1.3 Mega Pixel CMOS camera sensor and a low consumption 2.4GHz Wi-Fi module. This setup allows a custom build-in image processing algorithm for specific IoT sensing applications or a simply setup as low-cost streaming Motion JPEG (MJPEG) wireless camera node. In this work, both configurations have been tested and analyzed. Results show that the device can acquire and process images simultaneously at a full rate (30 fps) and the MJPEG transmission reaches 7.23 fps with a QVGA resolution.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing Web Service Composition with Graphplan and Fuzzy Control 用Graphplan和模糊控制优化Web服务组合
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-06-10 DOI: 10.5383/JUSPN.11.02.003
Guodong Fan, Ming Zhu, Xiaoliu Cui
{"title":"Optimizing Web Service Composition with Graphplan and Fuzzy Control","authors":"Guodong Fan, Ming Zhu, Xiaoliu Cui","doi":"10.5383/JUSPN.11.02.003","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.003","url":null,"abstract":"With the development of cloud computing, more and more applications are posted online to provide services for users. Since user needs can be complex, an individual service will not able to meet the requirement. Web Service Composition composes multiple web services together to fulfil the complicated user requirement. While searching an optimal composition with both functional and non-functional requirements still is a challenging problem that needs to be addressed. QoS-aware web service composition is an NP-hard problem. To solve this problem, we design a system which combines GraphPlan with Fuzzy Control algorithm. Fuzzy Control is employed to generate overall QoS according to user preferences. In the forward phase of Graphplan, less competitive services are pruned according to the overall QoS. In the backward phase, services are selected according to functional goals and their overall QoS. Furthermore, case study and are performed, and the experimental results show that our approach improves the quality of service composition significantly compared with ordinary and Skyline approach.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Service Level Agreement Compliance for Optical WDM Networks 光WDM网络的绿色服务水平协议遵从性
J. Ubiquitous Syst. Pervasive Networks Pub Date : 2019-06-10 DOI: 10.5383/JUSPN.11.02.002
Yashar Fazili, B. Robertson, W. Phillips
{"title":"Green Service Level Agreement Compliance for Optical WDM Networks","authors":"Yashar Fazili, B. Robertson, W. Phillips","doi":"10.5383/JUSPN.11.02.002","DOIUrl":"https://doi.org/10.5383/JUSPN.11.02.002","url":null,"abstract":"In this paper we consider Green Service Level Agreement (SLA) as a constraint in finding a route for a dynamically received connection request in Wavelength Division Multiplexing (WDM) networks. We show that it is possible to save energy and reduce Greenhouse Gas (GHG) emission while satisfying optical network SLAs. The Integer Linear Programming (ILP) method introduced in this paper has been engineered to be simple and be solved in a timely manner needed for serving a dynamic connection request in control plane of the optical network. The ILP method introduced in this paper for the control plane of Optical WDM networks could also be used for the control plane of Software Defined Networks (SDN) and Software Defined Wide Area Networks.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信