2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)最新文献

筛选
英文 中文
Real time embedded system IPs protection using chaotic maps 使用混沌映射的实时嵌入式系统ip保护
K. Salah
{"title":"Real time embedded system IPs protection using chaotic maps","authors":"K. Salah","doi":"10.1109/UEMCON.2017.8248987","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248987","url":null,"abstract":"In this paper and for the first time, a novel chaotic maps algorithm is proposed to be used in hardware on-chip security for real-time embedded systems. The aim is to cipher the original program rom by changing the contents and the locations of the original data to ban extracting designs of secure IPs. As we know, many strong ciphers have been applied widely, such as DES, AES and RSA. But most of them cannot be directly used to encrypt real-time embedded systems because their encryption speed is not fast enough and they are computationally intensive. So, in this work we present a fast chaotic-based encryption algorithm which is suitable for real-time embedded systems in terms of performance, area and power efficiency. To illustrate the effectiveness of the proposed algorithm, numerical simulations are presented. Moreover, the proposed chaotic algorithm is implemented using RTL-design. The proposed encryption gives 64 bits of encrypted data per clock cycle. The hardware implementation results give a synthesis clock frequency of 400 MHz and a throughput of 3.2 Gbps while using low area. This makes the proposed algorithm suitable for embedded systems. The RTL implementation results match the Matlab simulation results. The strong structural complexity of our proposed algorithm makes it difficult to predict the key and make it able to resist exhaustive attack, statistical attack and differential attack. All these features show that our proposed algorithm is very suitable for hardware on-chip security for real-time embedded systems. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. Moreover, it is cost-effective solution.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129170371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing the existing noninvasive hemoglobin measurement techniques 分析现有的无创血红蛋白检测技术
M. Hasan, N. Sakib, Richard R. Love, Sheikh Iqbal Ahamed
{"title":"Analyzing the existing noninvasive hemoglobin measurement techniques","authors":"M. Hasan, N. Sakib, Richard R. Love, Sheikh Iqbal Ahamed","doi":"10.1109/UEMCON.2017.8249080","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249080","url":null,"abstract":"To meet the potential research challenges, such as cost, accuracy, and portability, a number of research has been conducted around the world in the domain of noninvasive measurement techniques. In this paper, we explored, analyzed, and critiqued concurrent research approaches that endeavored to meet the research challenges in noninvasive hemoglobin (Hb) measurement. Here, besides the conventional invasive Hb measurement methods, we covered the Hb measurement techniques based on various scientific contribution and advancement. We studied smartphone-image, IR-LED, and spectra-based solutions as well as noninvasive point-of-care (POC) devices. From that insight, in this paper, we delineated the novel smartphone-based approaches to measure hemoglobin level noninvasively that can leverage the computation, portability, and affordability of smartphone devices, and assure the desired accuracy and consistency. Apart from that, this paper describes how these novel proposals can overcome the limitations of the data collection and analysis in the state-of-the-art approaches in this domain.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A new tree target tracking algorithm in WSNs 一种新的WSNs树目标跟踪算法
A. Odeh, Eman Abdelfattah
{"title":"A new tree target tracking algorithm in WSNs","authors":"A. Odeh, Eman Abdelfattah","doi":"10.1109/UEMCON.2017.8249006","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249006","url":null,"abstract":"Wireless sensor networks are becoming increasingly the essential part of the digital world. Target tracking system is a significant part of wireless sensor networks. It has its own advantages and challenges. In this paper, a new Tree-Based target-tracking algorithm is proposed, by employing the minimum traffic rate to reduce the time and energy consumption. The proposed algorithm consists of four phases that create a tree structure from undirected and connected graph. It reduces the communication cost, overcomes message-flooding problem, maximizes the life time for each node to maximize the overall life time of the network.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Home gateway for RF/PON based gigabit Transmission system for cable network 基于射频/PON的千兆有线网络传输系统的家庭网关
Joo-Young Lee, Juho Lee, Sungkwon Park, Jaewon Lee, Eunhee Hyun, Junyoung Jung
{"title":"Home gateway for RF/PON based gigabit Transmission system for cable network","authors":"Joo-Young Lee, Juho Lee, Sungkwon Park, Jaewon Lee, Eunhee Hyun, Junyoung Jung","doi":"10.1109/UEMCON.2017.8249046","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249046","url":null,"abstract":"To keep up with increasing bandwidth demands, cable network operators are migrating to fiber networks, which promise to deliver Gigabit speeds. However, migration to an all-fiber network infrastructure requires major investment and takes considerable time to complete. New network technologies and the demand to improve the quality of experience (QoE) are driving network operators towards the Ultra-Broadband era. The Ultra-Broadband Cable Network can be implemented in two ways: a coaxial-based access technology and a fiber-based access technology. However, those existing technologies have problems such as problems at extension of up/down stream frequency, cost of upgrading the network. This paper proposes the Home Gateway for RF/PON based gigabit Transmission system in order to provide the 1Gbps internet and the N-Screen to IP devices.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130894014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-power and high-performance 2.4 GHz RF transmitter for biomedical application 用于生物医学应用的低功耗高性能2.4 GHz射频发射机
Ahmed Alzahmi, Nahid Mirzaie, Chung-Ching Lin, Gyung-Su Byun
{"title":"Low-power and high-performance 2.4 GHz RF transmitter for biomedical application","authors":"Ahmed Alzahmi, Nahid Mirzaie, Chung-Ching Lin, Gyung-Su Byun","doi":"10.1109/UEMCON.2017.8249090","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249090","url":null,"abstract":"A high performance and low power 2.4 GHz radio frequency (RF) transmitter for biomedical application is presented. The design utilizes LC voltage control oscillator (VCO), ASK modulator, and an inverse Class-D (D−1) power amplifier (PA). The ASK modulates the carrier signal generated by a low phase noise LC-VCO, then the modulated signal is amplified by the inverse Class-D−1 PA. The proposed RF transmitter achieves −11.14-dBm output power with 3.88% efficiency. It also supports 130-Mb/s data rate and consumes 1.98-mW. The design has been implemented in a 0.13μm CMOS process technology and fully integrated on-chip.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol 利用响应路由协议增强战术传感器网络中的汇聚节点匿名性
Thomas Haakensen, P. Thulasiraman
{"title":"Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocol","authors":"Thomas Haakensen, P. Thulasiraman","doi":"10.1109/UEMCON.2017.8249005","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249005","url":null,"abstract":"Tactical wireless sensor networks (WSNs) are deployed over a region of interest for mission centric operations. The sink node in a tactical WSN is the aggregation point of data processing. Due to its essential role in the network, the sink node is a high priority target for an attacker who wishes to disable a tactical WSN. This paper focuses on the mitigation of sink-node vulnerability in a tactical WSN. Specifically, we study the issue of protecting the sink node through a technique known as k-anonymity. To achieve k-anonymity, we use a specific routing protocol designed to work within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand Next Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified LOADng protocol prevents an attacker from identifying the sink node without adding significant complexity to the regular sensor nodes. We simulate the modified LOADng protocol using a custom-designed simulator in MATLAB. We demonstrate the effectiveness of our protocol and also show some of the performance tradeoffs that come with this method.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security solutions and design scenarios for software defined data centers 软件定义数据中心的安全解决方案和设计方案
Sai Manogna Duttaluri, Bijan Karimi
{"title":"Security solutions and design scenarios for software defined data centers","authors":"Sai Manogna Duttaluri, Bijan Karimi","doi":"10.1109/UEMCON.2017.8249071","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249071","url":null,"abstract":"The purpose of introducing Software Defined Networking in the architecture of data centers is to streamline the management of the network devices. Although this reduces the workload of configuring each network device, it gives rise to new problems in terms of security and design of the data center. In this paper, we will go through each ideal design structure for conventional data centers suggested by Cisco and recommend how to introduce an SDN Controller into each of those scenarios.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated facial expression recognition app development on smart phones using cloud computing 基于云计算的智能手机自动面部表情识别应用开发
Humaid Alshamsi, Veton Këpuska, H. Meng
{"title":"Automated facial expression recognition app development on smart phones using cloud computing","authors":"Humaid Alshamsi, Veton Këpuska, H. Meng","doi":"10.1109/UEMCON.2017.8249000","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249000","url":null,"abstract":"Automated human emotion detection is a topic of significant interest in the field of computer vision. Over the past decade, much emphasis has been on using facial expression recognition (FER) to extract emotion from facial expressions. In this paper, the proposed system presents a novel method of facial recognition based on the cloud model, in combination with the traditional facial expression system. The process of predicting emotions from facial expression images contains several stages. The first stage of this system is the pre-processing stage, which is applied by detecting the face in images and then resizing the images. The second stage involves extracting features from facial expression images using Facial Landmarks and Center of Gravity (COG) feature extraction algorithms, which generate the training and testing datasets that contain the expressions of Anger, Disgust, Fear, Happiness, Neutrality, Sadness, and Surprise. Support Vector Machine (SVM) classifiers are then used for the classification stage in order to predict the emotion. In addition, a Confusion Matrix (CM) technique is used to evaluate the performance of these classifiers. The proposed system is tested on CK+, JAFFE, and KDEF databases. However, the proposed system achieved a prediction rate of 96.3% when Facial Landmarks and the Center of Gravity (COG)+SVM method are used.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient automated technique for epilepsy seizure detection using EEG signals 一种利用脑电图信号进行癫痫发作检测的高效自动化技术
Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy
{"title":"An efficient automated technique for epilepsy seizure detection using EEG signals","authors":"Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, K. Elleithy","doi":"10.1109/UEMCON.2017.8248991","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8248991","url":null,"abstract":"Epilepsy is a neurological disorder characterized by epileptic seizures. Epileptic seizure can be analyzed through the normal and abnormal activity of the brain. This abnormal activity can be observed only through the use of an efficient algorithm. The process of an efficient algorithm always uses signal processing in which an epileptic signal can be considered as an input signal. This paper introduces a technique to detect epileptic signal and to compare the characteristics of the brain signals at different stages. Our algorithm is based on signal processing techniques to detect epilepsy in the EEG signal. The signal processing starts with sampling the signal at 178.6 Hz so that the signal operating frequency follows oversampling criteria. The sampled signal is given to the designed filter so that the unwanted noise can be removed and the signal is ready to be decomposed. Then, the signal is decomposed at five different signal levels so that its frequency spectrum is reduced to less than 200 Hz using different wavelet filters at each level. In the feature extraction, we have used signal features rather than statistical features so that we can still rely on time domain and frequency domain features for an EEG signal. These features are classified using Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANN) to detect the epilepsy in the EEG signal. The results were demonstrated for different sets of brain signal that show the normal behavior of the brain signals and epileptic behavior of the signal with seizure. A comparison of our work with the present traditional methodologies proves that our algorithm is more efficient in detecting epilepsy.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Eldercare robotics revolution-explaining robotics for eldercare 老年护理机器人革命——解释老年护理机器人
N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder
{"title":"Eldercare robotics revolution-explaining robotics for eldercare","authors":"N. DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder","doi":"10.1109/UEMCON.2017.8249030","DOIUrl":"https://doi.org/10.1109/UEMCON.2017.8249030","url":null,"abstract":"This paper examines the issue of providing appropriate and attentive care to an elderly population that is increasing. Using a TurtleBot 2 and a NAO robot, experiments were developed to test a number of ways in which robots might be used to improve the health and safety of an elderly person within his/her own home. A number of simulations were run in the lab in order to generate insight regarding the viability of implementing these robots in a real world setting. The tasks that the robots attempted addressed the following goals: remind an elderly person that it is time to take medication; determine if no motion has been detected in the home for n hours, locate the elderly person, and contact emergency services if necessary; and guide the elderly person out of his home in case of fire/emergency.","PeriodicalId":403890,"journal":{"name":"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信