{"title":"Development of a motion controlled robotic arm","authors":"Jean Jiang, Alex McCoy, Eric Lee, Li Tan","doi":"10.1109/UEMCON.2017.8248998","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248998","url":null,"abstract":"In this paper, an inexpensive, a lightweight and easily controlled robotic arm with human interface is developed. The developed robotic arm is fully functional and accurately reacts to the movements from the user. The human user wears 2 accelerometers on his/her arm. These accelerometers relay both position and speed vector information to the robotic arm. The user also wears a glove that controls the flex sensor which gives readings to the claw. The robotic arm is on a fully mobile base that moves the arm from location to location in any given room. The research methodology and design are introduced before the robot system is realized and tested. Finally, conclusions are given and future improvements are discussed.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reevaluating the effectiveness of visual cues for website security","authors":"Neha A. Rana, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249042","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249042","url":null,"abstract":"Certificate authorities (CAs) are responsible for providing security for the online world. Anytime an individual enters personal information on a website, there are possibilities of interception by a hacker to reveal this data. For this purpose, security has been implemented on websites to protect data from being stolen. Not all websites are secured, but those that do, display some sort of notification indicating that a trusted CA has confirmed its legitimacy through digital signatures and validation. These visual indicators are meant to raise awareness, and in turn, allow the user to make an educated decision to proceed or seize in their next move. This paper investigates the studies conducted on visual cues. The goal is to find out how often Internet users actually look at these security indicators and how useful they actually consider them to be. This paper also attempts to explore if notifications are being ignored and if so, is it intentional and why, or do they go unnoticed due to the lack of knowledge. While researching this topic, it was found that there are other tools such as add-ons available to enhance security notifications but the valued impact was not significant. The focus of this paper is to determine if people find these visual cues to be ambiguous or a nuisance and over time discontinue using them, or do they go unnoticed all together? The conclusions made from researching this area of security is to resolve user behavior speculations and standardize visual cues with a teachable component.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards human-powered IoT: Optimizing harvested power from human daily motion","authors":"Q. Ju, Hongsheng Li, Ying Zhang","doi":"10.1109/UEMCON.2017.8249025","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249025","url":null,"abstract":"Human kinetic energy is considered to be a promising green energy source to enable human-powered Internet of Things (IoT), as constrained lifetime has become a bottleneck problem for IoT devices. However, the scarce energy collected by human motion severely restricts the operation of human-powered IoT and stresses the need for an optimized inertial harvester to provide more energy from human daily activities. In this paper, we investigate the feasibility and efficiency of using a single frequency inertial energy harvester, which is optimized based on a typical one-day motion of a human subject, to harvest kinetic energy from multiple-day activities of the same human subject. To facilitate this investigation, we propose a novel optimization framework to maximize the harvested power from human daily motion using a single-frequency energy harvester. By analyzing the frequency characteristics of human daily motion and the inertial harvester model, the optimal inertial harvester parameters are determined to maximize power generation from a typical one-day motion, and are used to harvest power from the same human subject's motion of other days. The real world human motion dataset is used for evaluation. The results demonstrate that the propose method can maximize power generated from one-day motion. Furthermore, the optimal harvester parameters determined by one-day trace can also achieve near-optimal harvested power from other days.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy issues affecting cloud-based IP camera","authors":"Jimmy Liranzo, T. Hayajneh","doi":"10.1109/UEMCON.2017.8249043","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249043","url":null,"abstract":"Consumers have overwhelmingly adopted the use of Internet of Things (IoT) inside their homes, these devices are connected to the internet sending and receiving data 24/7, a security breach or privacy exposure from one of these devices could lead to more nightmares than horror movies. These have lead us to review the current capabilities of Cloud-Based IP Cameras, its existing security and privacy issues affecting these devices. We present an analysis of the main privacy and security concerns currently affecting thousands of consumers IP Cameras globally, the uncertainty of not knowing what happens to your data when is stored in the Cloud and propose set of recommendations to help protect consumer's IoT devices in the intimacy of their home. Stop those nightmares before they happen because there is no peace of mind knowing an unknown person may be watching your children baby monitor and tracking all your movement inside your home. Although there are still challenges to address, is better to be an educated consumer who knows and understand the risk of these devices and take measures to prevent unwanted exposure.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majdi M. Ababneh, M. Jasim, Kavyashree Puttananjegowda, Samuel Perez, S. Afroz, Sylvia W. Thomas, Y. Tan
{"title":"Design of a SiC implantable rectenna for wireless in-vivo biomedical devices","authors":"Majdi M. Ababneh, M. Jasim, Kavyashree Puttananjegowda, Samuel Perez, S. Afroz, Sylvia W. Thomas, Y. Tan","doi":"10.1109/UEMCON.2017.8249040","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249040","url":null,"abstract":"Radio frequency energy harvesting methods for wireless applications have been widely investigated, however limited number of these methods have been capable of generating sufficient energy levels, in which can be leveraged as feasible sources for implantable medical devices, in particular implantable rectenna. Such rectennas can provide unlimited energy for the lifespan of implanted devices. This paper presents a fabricated rectenna using the biocompatible material Silicon Carbide (SiC) and a rectifier system including matching network of 47.7% power efficiency. The developed SiC rectenna is intended for wireless biomedical power transmission. This proposed SiC rectenna has the potential to extend the battery life of implantable medical devices.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartwatch-based transcription biometrics","authors":"Francesco Ciuffo, Gary M. Weiss","doi":"10.1109/UEMCON.2017.8249014","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249014","url":null,"abstract":"Handwriting analysis and the identification of people based on individual typing patterns are of great interest in the field of biometrics. The increasing need for user authentication in our modern society has underscored the need for smarter and more automated security protocols. The goal of this research is to explore the feasibility of using relatively inexpensive commercial smartwatches as a reliable platform for transcription-based biometrics. This study demonstrates that it is possible to accurately identify individuals performing transcription tasks (i.e. handwriting sentences, typing on a keyboard, etc.) using only a smartwatch.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban legislation assessment by data analytics with smart city characteristics","authors":"Xu Du, Diane Liporace, A. Varde","doi":"10.1109/UEMCON.2017.8248972","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248972","url":null,"abstract":"Smart cities receive great attention today especially in conjunction with ubiquitous computing. People feel the need to access information about their cities anywhere anytime. They wish to be actively involved with local government bodies for policy decisions affecting urban lifestyle. Accordingly, this paper describes our research on urban policy management. We analyze urban legislation, more specifically, ordinances or local laws. We categorize ordinances based on smart city characteristics they address. This work deploys data warehousing, XML data management and data mining over categorized ordinances. Interesting findings include relative importance of smart city characteristics considering the focus given by urban agencies. This research helps agencies assess their current ordinance policies with decision support for the future. It also provides urban residents at-a-glance information about their cities and policies with analysis. This work has broader impacts of enhancing smart cities and ubiquitous computing by making useful information widely accessible with suitable inferences.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121274210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Herger, Carlos A. Fonseca, Bill Rippon, Mercy Bodarky
{"title":"IBM research cloud evolution & efficiencies","authors":"L. Herger, Carlos A. Fonseca, Bill Rippon, Mercy Bodarky","doi":"10.1109/UEMCON.2017.8249072","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249072","url":null,"abstract":"The rapid growth and demand to promptly provision, scale and delete resources from a self-service cloud portal or an Application Programming Interface (API), has drastically changed how IBM and our industry have brought agility to information technology resources. In this paper, we will discuss the development and evolution of the IBM Research Cloud Integration Solution and provide our analysis and history of cloud deployment and automation readiness.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniques","authors":"David Pasko, Michael Mrazik, K. Elleithy","doi":"10.1109/UEMCON.2017.8248977","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248977","url":null,"abstract":"This paper discusses one of the most troublesome and frustrating issues for mobile devices users, battery life. Once a battery is utilized in a system, battery charging must be incorporated seamlessly so that the workflow of the user is uninterrupted. In today's fast-paced society, people don't have the time to stop what they are doing to charge their mobile devices and wait for them to complete. A secondary known issue concerning batteries is that their effective capacity diminishes over time and use. In turn the process of battery charging would become more frequent and disruptive to the user. The need for an effective means to continually charge the battery through smart energy harvesting techniques will be investigated in the following paper. Utilizing the findings from other articles, we were able to generate easy-to-use formulas to help estimate the power across multiple real-world use cases (running, walking, sleeping, sun, shade, etc.) Testing the formulas across multiple use cases, only two of the cases generated more power in our application than what the system utilized. This excess power would be utilized to keep the battery's charge topped off. In the use cases where we didn't generate enough power, the battery would need to supplement the system.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real time spectrum scanning technique based on compressive sensing for cognitive radio networks","authors":"Fatima Salahdine, Hassan El Ghazi","doi":"10.1109/UEMCON.2017.8249008","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249008","url":null,"abstract":"This paper describes a real time spectrum scanning method using software defined radio (SDR) units to perform and evaluate the wideband spectrum occupancy survey. The proposed method is based on compressive sensing in order to reduce the scanning time as the conventional spectrum scanning requires a great deal of processing time. It consists of performing spectrum scanning on the compressed measurements through the compressive sensing framework. Energy, autocorrelation, and Euclidean distance based sensing techniques were used to perform the spectrum sensing on the compressed signals instead of the entire signals. Also, an SNR estimation technique is used to enhance the scanning performance. The results of the experiments were analyzed and compared in terms of processing time, number of sensed channels, SNR, occupancy, detection rate, and false detection rate. Through analyzing the results, the proposed method is faster than the conventional spectrum scanning.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127100141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}