EAI Endorsed Transactions on Context-aware Systems and Applications https://publications.eai.eu/index.php/casa <p>EAI Endorsed Transactions on Context-aware Systems and Applications (CASA) is a place for highly original ideas about how context-aware systems are going to shape networked computing systems of the future. Hence, it focuses on rigorous approaches and cutting-edge solutions which break new ground in dealing with the properties of context-awareness.</p> <p> </p> European Alliance for Innovation (EAI) en-US EAI Endorsed Transactions on Context-aware Systems and Applications 2409-0026 <p>This is an open-access article distributed under the terms of the Creative Commons Attribution <a href="https://creativecommons.org/licenses/by/3.0/" target="_blank" rel="noopener">CC BY 3.0</a> license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.</p> An Algorithmic Approach to Adapting Edge-based Devices for Autonomous Robotic Navigation https://publications.eai.eu/index.php/casa/article/view/1535 <p>A recent significant progress has been made in development of intelligent mobile robots that is capable of autonomous navigation using an edge-computing system. This could sense changes in its environment to control its mechanical behavior towards accomplishing preprogrammed motions. Several algorithms were used in developing the robot’s control software. These include the moving average filter, the extended Kalman filter, and the covariance algorithm. Using these algorithms, the robot could learn from its sensors to estimate and control its position, velocity, and the proximity of obstacles along its path, while autonomously navigating to a predetermined location on the earth’s surface. Results show that our algorithmic approach to developing software systems for autonomous robots using edge-computing devices is viable, cost-efficient, and robust. Hence, our work is a proof of concept for the further development of edge-based intelligence and autonomous robots.</p> Mbadiwe S. Benyeogor Kosisochukwu P. Nnoli Oladayo O. Olakanmi Olusegun I. Lawal Eric J. Gratton Sushant Kumar Kenneth A. Akpado Piyal Saha Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-06-21 2022-06-21 8 1 e2 e2 10.4108/eai.5-8-2021.170559 A Fuzzy TOPSIS Based Analysis to Prioritize Enabling Factors for Strategic Information Technology Management https://publications.eai.eu/index.php/casa/article/view/1536 <p>Strategic management of information technology (IT) requires the attention provided to internal and external organizational factors. This paper discusses different enabling factors that allow strategic management of IT, making advances not only for using the approaches independently as well as in using them in a corresponding and adaptive way. A questionnaire-based survey and in-depth discussions were performed with 40 primary stakeholders to assess the relevance of enabling factors. Using available resources-based analysis, enabling factors were defined in four different categories: organizational, business, technological, and operational assessment. Subsequently, these four enabling factors were prioritized using the fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria decision analysis method. Finally, technological assessments were given high priority on the basis of the findings to allow more successful strategic IT management.</p> Raziya Siddiqui Naseem Ahmad Khan Shafeeq Ahmad Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-06-21 2022-06-21 8 1 e3 e3 10.4108/eai.4-4-2022.173782 Analyzing Healthcare Device Security through Fuzzy Rule-based Multi-criteria Model https://publications.eai.eu/index.php/casa/article/view/1537 <p>Managing risk as well as safeguarding electronic health records can be difficult for small medical practises. As a result of their vulnerability to various attacks, Internet of Health Things (IoHT)-based devices require appropriate security. In this paper, fuzzy TOPSIS is used to assess the security characteristics of IoHT-based devices in a medical setting. This technique utilizes a security evaluation of alternative solutions depending on security factors. The results of the presented security evaluation approach demonstrate that the most trustworthy as well as safe alternative among several of the alternative solutions is chosen for the IoHT model. This strategy could be used as a model for future IoHT structures or even other IoT-based domains. To the authors’ knowledge, it is an unique strategy to IoT security evaluation, as well as such MCDM method have not been utilised before for evaluation as well as decision - making process in IoHT security systems.</p> Neetu Yadav Shafeeq Ahmad Naseem Ahmad Khan Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-06-21 2022-06-21 8 1 e4 e4 10.4108/eai.16-5-2022.173978 Automatic Data Clustering using Dynamic Crow Search Algorithm https://publications.eai.eu/index.php/casa/article/view/1538 <p>This work proposes Automatic clustering using Dynamic Crow Search Algorithm, which updates its parameters dynamically. Crow Search is a recently proposed algorithm that imitates the working of crow. Clustering is an essential aspect of data analysis whose significance has increased manifold since the advancements of technology which has led to enormous data generation, which need to be analysed in real-time. Automatic clustering detects optimal cluster numbers and produces sustainable cluster centroids. ACDCSA uses Cluster Validity using Nearest Neighbour as an internal validity measure that acts as a fitness function to find the optimal cluster centres. The present work is compared with some well-known other meta-heuristic search algorithms like PSO, DE, WOA and GWO for the automatic clustering task over seven benchmark clustering datasets. Inter-cluster distance, intra-cluster distance and the optimal cluster number produced are used to assess the performance of ACDCSA.</p> Rajesh Ranjan Jitender Kumar Chhabra Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-06-21 2022-06-21 8 1 e5 e5 10.4108/eai.17-5-2022.173982 Fuzzy Logic Control Design and Implementation with DC-DC Boost Converter https://publications.eai.eu/index.php/casa/article/view/1920 <p>Being an electrical switch, this converter transforms an uncontrolled input DC voltage into a regulated one to get a desired output voltage. The MOSFET works in the circuit boost-converter as an electronic switch that closes and opens several times. The current passing through the inductor determines the modes operation of the boost-converter circuit. We proposed the new fuzzy control circuit (maximum power point (MPP) circuit using Fuzzy Logic Control (FLC) algorithm) was designed after replacing the DC source with a photovoltaic (PV) array and the duty cycle (constant) with the FLC and keeping the circuit components same except for the Pulses Width Modulation (PWM) of frequency 3800 Hz. In the full circuit, they controlled the MPP of the PV array through a boost converter and FLC., the relationship between the power and voltage of the PV array was drawn to access the MPP at fixed constant solar irradiance and temperature. The value of the solar irradiance altered during the day from low (in the morning) to high (with a peak at the noon) before being reduced to very low at the sunset. The proves that the FLC algorithm works efficiently to make the power of the PV cell always at the maximum value (MPP). The stability of the PV cell voltage and its current change also proves that it operates according to the specifications of the P-V and I-V characteristics of the PV cell referred to earlier the output voltage was increased because we used a step-up converter (boost converter with FLC). The achievement system is showed to be efficient and robust in improving solar charging and rectifying capacity.</p> Abdullah J. H. Al Gizi Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-07-12 2022-07-12 8 1 e6 e6 10.4108/eetcasa.v8i24.1920 Gradient Descent Machine Learning with Equivalency Testing for Non-Subject Dependent Applications in Human Activity Recognition https://publications.eai.eu/index.php/casa/article/view/1996 <p>INTRODUCTION: A solution to subject-independent HAR prediction through machine learning classification algorithms using statistical equivalency for comparative analysis between independent groups with non-subject training dependencies.<br>OBJECTIVES: To indicate that the multinomial predictive classification model that was trained and optimized on the one-subject control group is at least partially extensible to multiple independent experiment groups for at least one activity class.<br>METHODS: Gradient boosted machine multinomial classification algorithm is trained on a single individual with the classifier trained on all activity classes as a multinomial classification problem.<br>RESULTS: Levene-Wellek-Welch (LWW) Statistic calculated as 0.021, with a Critical Value for LWW of 0.026, using an alpha of 0.05.<br>CONCLUSION: Confirmed falsifiability that incorporates reproducible methods into the quasi-experiment design applied to the field of machine learning for human activity recognition.</p> T.A. Woolman J.L. Pickard Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-07-15 2022-07-15 8 1 e7 e7 10.4108/eetcasa.v8i24.1996 A Novel Blockchain-Based Model for Blood Donation System https://publications.eai.eu/index.php/casa/article/view/2546 <p class="ICST-abstracttext">In Pakistan, existing blood control systems or blood information management systems are limited in terms of efficient data retrieval of donor to consumer. There is no communication network in place for extra blood in one location to be demanded from a region if blood is limited, resulting in blood wastage. Due to a lack of accessibility and sufficient blood quality testing, blood contaminated with illnesses such as HIV has been used for transfusion in some cases. This study proposes a ledger blood management system to address these challenges. The trail has been represented as a supply-chain management problem following the blood. By trailing the blood stream and donation a single platform for transferring blood and the problem results among blood groups, the proposed system, built on the hyperledger fabric model, adds more traceability toward the blood transfusion process. It also helps to reduce unjustified blood wastage by providing an integrated system for transferring lifeblood and the thing extracts among lifeblood banks. A web app is also designed for accessing the network for simplicity of usage and security is enhanced by implementing block chain hyperfebric ledger system through Key Value System (KVS) system.</p> M.H. Zafar I. Khan A.U. Rehman S. Zafar Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-08-16 2022-08-16 8 1 e8 e8 10.4108/eetcasa.v8i1.2546 Correction to: “A Novel Blockchain-Based Model for Blood Donation System” [EAI Endorsed Context-aware Syst App (2022), vol. 8] https://publications.eai.eu/index.php/casa/article/view/2659 <p style="font-weight: 400;"><strong>This article is a correction on:</strong></p><p style="font-weight: 400;"><strong>Zafar, M., Khan, I., Rehman, A. and Zafar, S. 2022. A Novel Blockchain-Based Model for Blood Donation System.&nbsp;<em>EAI Endorsed Transactions on Context-aware Systems and Applications</em>. 8, 1 (Aug. 2022), e8. DOI:<a href="https://doi.org/10.4108/eetcasa.v8i1.2546" data-saferedirecturl="https://www.google.com/url?q=https://doi.org/10.4108/eetcasa.v8i1.2546&amp;source=gmail&amp;ust=1662022275423000&amp;usg=AOvVaw2b80IUb1iG1SaLPv2bVHMw">https://doi.org/10.4108/eetcasa.v8i1.2546</a></strong></p><p style="font-weight: 400;"><strong>In the above article, Imran Khan was added as an author of the paper when he had no participation in the research process.&nbsp;Imran Khan&nbsp;requested the removal of his name and all the co-authors agreed with this decision.</strong></p> M.H. Zafar A.U. Rehman S. Zafar Copyright (c) 2022 EAI Endorsed Transactions on Context-aware Systems and Applications https://creativecommons.org/licenses/by/3.0/ 2022-09-02 2022-09-02 8 1 e9 e9 10.4108/eetcasa.v8i1.2659