EAI Endorsed Transactions on Context-aware Systems and Applications 2022-11-09T08:32:00+00:00 EAI Publications Department Open Journal Systems <p>EAI Endorsed Transactions on Context-aware Systems and Applications (CASA) is a place for highly original ideas about how context-aware systems are going to shape networked computing systems of the future. Hence, it focuses on rigorous approaches and cutting-edge solutions which break new ground in dealing with the properties of context-awareness.</p> <p> </p> An Algorithmic Approach to Adapting Edge-based Devices for Autonomous Robotic Navigation 2022-06-21T08:35:57+00:00 Mbadiwe S. Benyeogor Kosisochukwu P. Nnoli Oladayo O. Olakanmi Olusegun I. Lawal Eric J. Gratton Sushant Kumar Kenneth A. Akpado Piyal Saha <p>A recent significant progress has been made in development of intelligent mobile robots that is capable of autonomous navigation using an edge-computing system. This could sense changes in its environment to control its mechanical behavior towards accomplishing preprogrammed motions. Several algorithms were used in developing the robot’s control software. These include the moving average filter, the extended Kalman filter, and the covariance algorithm. Using these algorithms, the robot could learn from its sensors to estimate and control its position, velocity, and the proximity of obstacles along its path, while autonomously navigating to a predetermined location on the earth’s surface. Results show that our algorithmic approach to developing software systems for autonomous robots using edge-computing devices is viable, cost-efficient, and robust. Hence, our work is a proof of concept for the further development of edge-based intelligence and autonomous robots.</p> 2022-06-21T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications A Fuzzy TOPSIS Based Analysis to Prioritize Enabling Factors for Strategic Information Technology Management 2022-06-21T08:48:16+00:00 Raziya Siddiqui Naseem Ahmad Khan Shafeeq Ahmad <p>Strategic management of information technology (IT) requires the attention provided to internal and external organizational factors. This paper discusses different enabling factors that allow strategic management of IT, making advances not only for using the approaches independently as well as in using them in a corresponding and adaptive way. A questionnaire-based survey and in-depth discussions were performed with 40 primary stakeholders to assess the relevance of enabling factors. Using available resources-based analysis, enabling factors were defined in four different categories: organizational, business, technological, and operational assessment. Subsequently, these four enabling factors were prioritized using the fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria decision analysis method. Finally, technological assessments were given high priority on the basis of the findings to allow more successful strategic IT management.</p> 2022-06-21T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Analyzing Healthcare Device Security through Fuzzy Rule-based Multi-criteria Model 2022-06-21T08:58:46+00:00 Neetu Yadav Shafeeq Ahmad Naseem Ahmad Khan <p>Managing risk as well as safeguarding electronic health records can be difficult for small medical practises. As a result of their vulnerability to various attacks, Internet of Health Things (IoHT)-based devices require appropriate security. In this paper, fuzzy TOPSIS is used to assess the security characteristics of IoHT-based devices in a medical setting. This technique utilizes a security evaluation of alternative solutions depending on security factors. The results of the presented security evaluation approach demonstrate that the most trustworthy as well as safe alternative among several of the alternative solutions is chosen for the IoHT model. This strategy could be used as a model for future IoHT structures or even other IoT-based domains. To the authors’ knowledge, it is an unique strategy to IoT security evaluation, as well as such MCDM method have not been utilised before for evaluation as well as decision - making process in IoHT security systems.</p> 2022-06-21T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Automatic Data Clustering using Dynamic Crow Search Algorithm 2022-06-21T09:04:35+00:00 Rajesh Ranjan Jitender Kumar Chhabra <p>This work proposes Automatic clustering using Dynamic Crow Search Algorithm, which updates its parameters dynamically. Crow Search is a recently proposed algorithm that imitates the working of crow. Clustering is an essential aspect of data analysis whose significance has increased manifold since the advancements of technology which has led to enormous data generation, which need to be analysed in real-time. Automatic clustering detects optimal cluster numbers and produces sustainable cluster centroids. ACDCSA uses Cluster Validity using Nearest Neighbour as an internal validity measure that acts as a fitness function to find the optimal cluster centres. The present work is compared with some well-known other meta-heuristic search algorithms like PSO, DE, WOA and GWO for the automatic clustering task over seven benchmark clustering datasets. Inter-cluster distance, intra-cluster distance and the optimal cluster number produced are used to assess the performance of ACDCSA.</p> 2022-06-21T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Fuzzy Logic Control Design and Implementation with DC-DC Boost Converter 2022-07-12T09:47:18+00:00 Abdullah J. H. Al Gizi <p>Being an electrical switch, this converter transforms an uncontrolled input DC voltage into a regulated one to get a desired output voltage. The MOSFET works in the circuit boost-converter as an electronic switch that closes and opens several times. The current passing through the inductor determines the modes operation of the boost-converter circuit. We proposed the new fuzzy control circuit (maximum power point (MPP) circuit using Fuzzy Logic Control (FLC) algorithm) was designed after replacing the DC source with a photovoltaic (PV) array and the duty cycle (constant) with the FLC and keeping the circuit components same except for the Pulses Width Modulation (PWM) of frequency 3800 Hz. In the full circuit, they controlled the MPP of the PV array through a boost converter and FLC., the relationship between the power and voltage of the PV array was drawn to access the MPP at fixed constant solar irradiance and temperature. The value of the solar irradiance altered during the day from low (in the morning) to high (with a peak at the noon) before being reduced to very low at the sunset. The proves that the FLC algorithm works efficiently to make the power of the PV cell always at the maximum value (MPP). The stability of the PV cell voltage and its current change also proves that it operates according to the specifications of the P-V and I-V characteristics of the PV cell referred to earlier the output voltage was increased because we used a step-up converter (boost converter with FLC). The achievement system is showed to be efficient and robust in improving solar charging and rectifying capacity.</p> 2022-07-12T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Gradient Descent Machine Learning with Equivalency Testing for Non-Subject Dependent Applications in Human Activity Recognition 2022-07-15T09:27:41+00:00 T.A. Woolman J.L. Pickard <p>INTRODUCTION: A solution to subject-independent HAR prediction through machine learning classification algorithms using statistical equivalency for comparative analysis between independent groups with non-subject training dependencies.<br>OBJECTIVES: To indicate that the multinomial predictive classification model that was trained and optimized on the one-subject control group is at least partially extensible to multiple independent experiment groups for at least one activity class.<br>METHODS: Gradient boosted machine multinomial classification algorithm is trained on a single individual with the classifier trained on all activity classes as a multinomial classification problem.<br>RESULTS: Levene-Wellek-Welch (LWW) Statistic calculated as 0.021, with a Critical Value for LWW of 0.026, using an alpha of 0.05.<br>CONCLUSION: Confirmed falsifiability that incorporates reproducible methods into the quasi-experiment design applied to the field of machine learning for human activity recognition.</p> 2022-07-15T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications A Novel Blockchain-Based Model for Blood Donation System 2022-08-16T11:06:25+00:00 M.H. Zafar I. Khan A.U. Rehman S. Zafar <p class="ICST-abstracttext">In Pakistan, existing blood control systems or blood information management systems are limited in terms of efficient data retrieval of donor to consumer. There is no communication network in place for extra blood in one location to be demanded from a region if blood is limited, resulting in blood wastage. Due to a lack of accessibility and sufficient blood quality testing, blood contaminated with illnesses such as HIV has been used for transfusion in some cases. This study proposes a ledger blood management system to address these challenges. The trail has been represented as a supply-chain management problem following the blood. By trailing the blood stream and donation a single platform for transferring blood and the problem results among blood groups, the proposed system, built on the hyperledger fabric model, adds more traceability toward the blood transfusion process. It also helps to reduce unjustified blood wastage by providing an integrated system for transferring lifeblood and the thing extracts among lifeblood banks. A web app is also designed for accessing the network for simplicity of usage and security is enhanced by implementing block chain hyperfebric ledger system through Key Value System (KVS) system.</p> 2022-08-16T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Towards Linguistic Fuzzy Topological Spaces Based on Hedge Algebra 2022-11-09T08:32:00+00:00 Nguyen Van Han Phan Cong Vinh <p>This paper studies on linguistic language which is generated from Hedge algebra. We indicate that the language satisfies properties of topology. Both linguistic topology and topological spaces are also studied in the paper.</p> 2022-11-09T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Steps Towards Modeling and Querying Based on Linguistic Fuzzy Graph Database 2022-09-03T04:10:37+00:00 Nguyen Van Han Phan Cong Vinh <p>In this paper, we introduce a method for computing with words on linguistic fuzzy graph database (LGD). Computation consists of two processes: Modeling and Querying. The former models LGD as a fuzzy graph whose nodes contain linguistic data table and the later queries linguistic data from node’s data tables.</p> 2022-10-12T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications A Gentle Introduction to Cognitive Map Based on Input Output Linguistic Variables 2022-10-19T08:09:21+00:00 Nguyen Van Han Phan Cong Vinh <p>This paper studies on feedback graph model of linguistic variables which is generated from Hedge algebra.<br>We also introduce a visual graphic model for input - output cognitive maps.</p> 2022-10-19T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications Correction to: “A Novel Blockchain-Based Model for Blood Donation System” [EAI Endorsed Context-aware Syst App (2022), vol. 8] 2022-09-02T07:56:47+00:00 M.H. Zafar A.U. Rehman S. Zafar <p style="font-weight: 400;"><strong>This article is a correction on:</strong></p><p style="font-weight: 400;"><strong>Zafar, M., Khan, I., Rehman, A. and Zafar, S. 2022. A Novel Blockchain-Based Model for Blood Donation System.&nbsp;<em>EAI Endorsed Transactions on Context-aware Systems and Applications</em>. 8, 1 (Aug. 2022), e8. DOI:<a href="" data-saferedirecturl=";source=gmail&amp;ust=1662022275423000&amp;usg=AOvVaw2b80IUb1iG1SaLPv2bVHMw"></a></strong></p><p style="font-weight: 400;"><strong>In the above article, Imran Khan was added as an author of the paper when he had no participation in the research process.&nbsp;Imran Khan&nbsp;requested the removal of his name and all the co-authors agreed with this decision.</strong></p> 2022-09-02T00:00:00+00:00 Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications