{"title":"Real time fall detection using infrared cameras and reflective tapes under day/night luminance","authors":"E. Ramanujam, S. Padmavathi","doi":"10.3233/AIS-210605","DOIUrl":"https://doi.org/10.3233/AIS-210605","url":null,"abstract":"Falls are the leading cause of injuries and death in elderly individuals who live alone at home. The core service of assistive living technology is to monitor elders’ activities through wearable devices, ambient sensors, and vision systems. Vision systems are among the best solutions, as their implementation and maintenance costs are the lowest. However, current vision systems are limited in their ability to handle cluttered environments, occlusion, illumination changes throughout the day, and monitoring without illumination. To overcome these issues, this paper proposes a 24/7 monitoring system for elders that uses retroreflective tape fabricated as part of conventional clothing, monitored through low-cost infrared (IR) cameras fixed in the living environment. IR camera records video even when there are changes in illumination or zero luminance. For classification among clutter and occlusion, the tape is considered as a blob instead of a human silhouette; the orientation angle, fitted through ellipse modeling, of the blob in each frame allows classification that detects falls without pretrained data. System performance was tested using subjects in various age groups and “fall” or “non-fall” were detected with 99.01% accuracy.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"12 1","pages":"285-300"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Marufuzzaman, Teresa Tumbraegel, L. F. Rahman, L. Sidek
{"title":"A machine learning approach to predict the activity of smart home inhabitant","authors":"M. Marufuzzaman, Teresa Tumbraegel, L. F. Rahman, L. Sidek","doi":"10.3233/AIS-210604","DOIUrl":"https://doi.org/10.3233/AIS-210604","url":null,"abstract":"A smart home inhabitant performs a unique pattern or sequence of tasks repeatedly. Thus, a machine learning approach will be required to build an intelligent network of home appliances, and the algorithm should respond quickly to execute the decision. This study proposes a decision tree-based machine learning approach for predicting the activities using different appliances such as state, locations and time. A noise filter is employed to remove unwanted data and generate task sequences, and dual state properties of a home appliance are utilized to extract episodes from the sequence. An incremental decision tree approach was taken to reduce execution time. The algorithm was tested using a well-known smart home dataset from MavLab. The experimental results showed that the algorithm successfully extracted 689 predictions and their location at 90% accuracy, and the total execution time was 94 s, which is less than that of existing methods. A hardware prototype was designed using Raspberry Pi 2 B to validate the proposed prediction system. The general-purpose input-output (GPIO) interfaces of Raspberry Pi 2 B were used to communicate with the prototype testbed and showed that the algorithm successfully predicted the next activities.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"41 1","pages":"271-283"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88950299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz
{"title":"Preface to JAISE 13(4)","authors":"V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz","doi":"10.3233/AIS-210603","DOIUrl":"https://doi.org/10.3233/AIS-210603","url":null,"abstract":"Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"68 1","pages":"269-270"},"PeriodicalIF":1.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83188224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrés Muñoz, J. Augusto, V. W. L. Tam, H. Aghajan
{"title":"Preface to JAISE 13(3)","authors":"Andrés Muñoz, J. Augusto, V. W. L. Tam, H. Aghajan","doi":"10.3233/AIS-210596","DOIUrl":"https://doi.org/10.3233/AIS-210596","url":null,"abstract":"Andrés Muñoz a, Juan Carlos Augusto b, Vincent Tam c and Hamid Aghajan d a Polytechnic School, Catholic University of Murcia, Spain b Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK c Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, China d imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"16 1","pages":"181"},"PeriodicalIF":1.7,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90819853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location-aware computing to mobile services recommendation: Theory and practice","authors":"Honghao Gao, Andrés Muñoz, Wenbing Zhao, Yuyu Yin","doi":"10.3233/ais-200588","DOIUrl":"https://doi.org/10.3233/ais-200588","url":null,"abstract":"In recent years, many daily web/app services (e.g. Facebook, Twitter, and Foursquare) generate data and traces that are often transparently annotated with location and contextual information. Many core challenges are involved to fully exploit geo-labeled data. The main challenge is to combine ideas and techniques from various research communities, such as recommender systems, data management, geographic information systems, social network analytics, and text mining. We aim to provide a platform to discuss indepth and collecting feedback about challenges, opportunities, novel techniques, and applications. Finally, we have four papers for this special issue. A summary of these papers is outlined below. In the paper entitled “Multi-criteria tensor model consolidating spatial and temporal information for tourism recommendation”, Minsung Hong and Jason J. Jung propose a multi-criteria tensor model combining spatial and temporal information in the recommender systems. Specifically, the five-order tensor model consists of users, items, multiple ratings, spatial and temporal data, which keeps the latent structure of the interrelations between multi-criteria and spatial/temporal information. Experimental results with a TripAdvisor dataset show that the proposed model outperforms other baselines. In the paper entitled “A mobile services recommendation system fuses implicit and explicit user trust relationships”, Pengcheng Luo, Jilin Zhang,","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"344 1","pages":"3-4"},"PeriodicalIF":1.7,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75095144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mobile services recommendation system fuses implicit and explicit user trust relationships","authors":"Pengcheng Luo, Jilin Zhang, Jian Wan, Nailiang Zhao, Zujie Ren, Li Zhou, Jing Shen","doi":"10.3233/AIS-200585","DOIUrl":"https://doi.org/10.3233/AIS-200585","url":null,"abstract":"In recent years, with the development of advanced mobile applications, people’s various daily behavior data, such as geographic location, social information, hobbies, are more easily collected. To process these data, data cross-boundary fusion has become a key technology, and there are some challenges, such as solving the problems of the cross-boundary business integrity, cross-boundary value complementarity and so on. Mobile Services Recommendation requires improved recommendation accuracy. User trust is an effective measure of information similarity between users. Using trust can effectively improve the accuracy of recommendations. The existing methods have low utilization of general trust data, sparseness of trust data, and lack of user trust characteristics. Therefore, a method needs to be proposed to make up for the shortcomings of explicit trust relationships and improve the accuracy of user interest feature completion. In this paper, a recommendation model is proposed to mine the implicit trust relationships from user data and integrate the explicit social information of users. First, the rating prediction model was improved using the traditional Singular Value Decomposition (SVD) model, and the implicit trust relationships were mined from the user’s historical data. Then, they were fused with the explicit social trust relationships to obtain a crossover data fusion model. We tested the model using three different orders of magnitude. We compared the user preference prediction accuracies of two models: one that does not integrate social information and one that integrates social information. The results show that our model improves the user preference prediction accuracy and has higher accuracy for cold start users. On the three data sets, the average error is reduced by 2.29%, 5.44% and 4.42%, suggesting that it is an effective data crossover fusion technology.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"31 1","pages":"21-35"},"PeriodicalIF":1.7,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85232464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz
{"title":"Preface to JAISE 13(2)","authors":"V. W. L. Tam, H. Aghajan, J. Augusto, Andrés Muñoz","doi":"10.3233/AIS-210595","DOIUrl":"https://doi.org/10.3233/AIS-210595","url":null,"abstract":"Vincent Tam a, Hamid Aghajan b, Juan Carlos Augusto c and Andrés Muñoz d a Department of Electrical and Electronic Engineering, The University of Hong Kong, China b imec, IPI, Department of Telecommunications and Information Processing, Gent University, Belgium c Department of Computer Science and Research Group on Development of Intelligent Environments, Middlesex University, UK d Polytechnic School, Universidad Católica de Murcia, Spain","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"13 1","pages":"75-76"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73603132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart contracts for automated control system in Blockchain based smart cities","authors":"N. Pradhan, A. Singh","doi":"10.3233/AIS-210601","DOIUrl":"https://doi.org/10.3233/AIS-210601","url":null,"abstract":"Nowadays, smart applications are increasing day by day to improve the standard of living in smart cities. A modern-day smart city is characterized by the presence of numerous smart Information and Communication Technology (ICT)-enabled services such as automated healthcare, automatic building monitoring, home automation, smart parking, traffic management, data security, among others. Such cities employ multitudes of Internet of Things (IoT) devices to collect and share data between trusted users by means of a centralized intermediary for monitoring and control of the myriad automatic activities. However, a centralized intermediary is plagued by issues such as single point of failure, risk of data loss, man-in-the-middle attack, and so forth. Blockchain-based smart contracts for automated control in smart cities provide a decentralized and secure alternative. In this paper, an Ethereum based system design for decentralized applications in smart cities has been proposed that enables systems to share data without an intermediary between trusted and non-trusted stakeholders using Ethereum based self-executing contracts. Such contracts allow automated multi-step workflows for smart applications. Two use cases, have been considered namely smart healthcare and smart building monitoring, as proof of stake of the proposed Ethereum based contract. The performance of the proposed scheme for these use cases has been presented with Keccack 256 transaction hash, the total number of transactions, gas consumed by each contract. Such an attempt is a worthwhile addition to state of the art as evident from the results presented herein. The modeling simulation and analysis of hashing power shows that for hashing power greater than 55% the probability of double spending attack reaches to 42% maximum. So it is concluded that the probability of double spending increases with the increase of transaction values.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"2 2 1","pages":"253-267"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85586043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing","authors":"T. Srinivas, S. Manivannan","doi":"10.3233/AIS-210591","DOIUrl":"https://doi.org/10.3233/AIS-210591","url":null,"abstract":"In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"69 1","pages":"133-156"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83333010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak Kumar Sharma, M. Devgan, Gaurav Malik, Prashant Dutt, Aarti Goel, Deepak Gupta, F. Al-turjman
{"title":"DDoS prevention architecture using anomaly detection in fog-empowered networks","authors":"Deepak Kumar Sharma, M. Devgan, Gaurav Malik, Prashant Dutt, Aarti Goel, Deepak Gupta, F. Al-turjman","doi":"10.3233/AIS-210600","DOIUrl":"https://doi.org/10.3233/AIS-210600","url":null,"abstract":"The world of computation has shown wide variety of wonders in the past decade with Internet of Things (IoT) being one of the most promising technology. Emergence of IoT brings a lot of good to the technology pool with its capability to provide intelligent services to the users. With ease to use, IoT is backed by a strong Cloud based infrastructure which allows the sensory IoT devices to perform specific functions. Important features of cloud are its reliability and security where the latter must be dealt with proper care. Cloud centric systems are susceptible to Denial of Service (DoS) attacks wherein the cloud server is subjected to an overwhelming number of incoming requests by a malicious device. If the same attack is carried out by a network of devices such as IoT devices then it becomes a Distributed DoS (DDoS) attack. A DDoS attack may render the server useless for a long period of time causing the services to crash due to extensive load. This paper proposes a lightweight, efficient and robust method for DDoS attack by detecting the compromised node connected to the Fog node or edge devices before it reaches the cloud by taking advantage of the Fog layer and prevent it from harming any information recorded or from increasing the unnecessary traffic in a network. The chosen technology stack consists of languages and frameworks which allow proposed approach to works in real time complexity for faster execution and is flexible enough to work on low level systems such as the Fog nodes. The proposed approach uses mathematical models for forecasting data points and therefore does not rely on a computationally heavy approach such as neural networks for predicting the expected values. This approach can be easily modelled into the firmware of the system and can help make cloud services more reliable by cutting off rogue nodes that try to attack the cloud at any given point of time.","PeriodicalId":49316,"journal":{"name":"Journal of Ambient Intelligence and Smart Environments","volume":"52 1","pages":"201-217"},"PeriodicalIF":1.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88243308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}