Please use PDF express for your final paper. PDF Express can be found here: https://www.pdf-express.org/ Conference ID Code: 42323X
Registration for the conference is open yet. Go to icce.org.
Signed letters of invitation can be created and printed in EDAS

### Program for 2018 IEEE International Conference on Consumer Electronics (ICCE)

Time Break Area N253 N256 N258 N260 N261 N262/N264 (1st Come-1st Serve)

#### Friday, January 12

08:30-09:00             Breakfast
09:00-09:30             ICCE 2018 Inauguration
09:30-10:30             Keynote 1: Smart Healthcare,
Niraj K. Jha, Department of Electrical Engineering,
Princeton University
10:30-11:00 Student Research Forum (SRF) Poster Session / Coffee Break
11:00-12:00   ST06-1: IoT for Healthy Independent Living (HIL) - Session 1 CT01-1: Security and Privacy of CE Hardware and Software Systems (SPC) - Session 1 CT02: Energy Management of CE Hardware and Software Systems (EMC) CT12-1: Smartphone and Mobile Device Technologies (MDT) - Session 1 ST05-1: Architecture-Level Energy, Security, and Reliability Solutions for CE Digital Hardware (ESR) - Session 1
12:00-12:30             Lunch / Award: IEEE Ibuka Award Winner: Linus Torvalds
12:30-13:30             Lunch / Keynote 2: 2020: Life with 50 Billion Connected Devices,
Gary Davis, McAfee, Inc
13:30-14:30   ST06-2: IoT for Healthy Independent Living (HIL) - Session 2 CT01-2: Security and Privacy of CE Hardware and Software Systems (SPC) - Session 2 TT01-1: IEEE Cloud Computing (CCC) - Session 1 CT12-2: Smartphone and Mobile Device Technologies (MDT) - Session 2 ST05-2: Architecture-Level Energy, Security, and Reliability Solutions for CE Digital Hardware (ESR) - Session 2
14:30-16:00   ST07: Drones as Evolved Smart Multi-Sensor Networks (DSN) ST09-1: AR&VR Display and Human Interface Technologies for Automobile (AVA) - Session 1 CT04-1: RF, Wireless, and Network Technologies (WNT) - Session 1 CT12-3: Smartphone and Mobile Device Technologies (MDT) - Session 3 CT10-1: Consumer Healthcare Systems (CHS) - Session 1
16:00-16:30 Poster Session 1 / Coffee Break
16:30-17:30             Panel 1: Cloud Federation Standards
17:30-18:30   ST08: Cybersecurity Beyond Encryption - Systems and Processes for Protection of CE (CSP) ST09-2: AR&VR Display and Human Interface Technologies for Automobile (AVA) - Session 2 CT04-2: RF, Wireless, and Network Technologies (WNT) - Session 2 TT10: Fog Computing and Networking, What's Next? CT10-2: Consumer Healthcare Systems (CHS) - Session 2
19:00-20:30             Welcome Reception (Westgate) 1st Come-1st Serve

#### Saturday, January 13

08:30-09:00             Breakfast
09:00-10:00             Keynote 3: Emerging NUI-based Methods for User Authentication,
Nasir Memon,
Computer Science and Engineering,
New York University
10:00-10:30 Poster Session 2 / Coffee Break
10:30-12:00   TT09: IEEE Brain Data Bank Challenge (IEEE-Brain) ST09-3: AR&VR Display and Human Interface Technologies for Automobile (AVA) - Session 3 CT07-1: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 1 CT07-2: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 2 ST10-1: Artificial Intelligence for Automotive Applications
12:00-13:30             Lunch / Keynote 4: Deep Learning Networks in CE
Petronel Bigioi, FotoNation
13:30-14:45             Panel 2: Energy and Cybersecurity Constraints on Consumer Electronics
14:45-15:30 Poster Session 3
15:30-17:00   TT02-1: IEEE-Sensors: Wearable Sensors for Health and the Environment - Session 1 CT11: Enabling and HCI Technologies (HCI) CT07-3: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 3 ST03: Digital Experience (DEX) ST10-2: Deep Learning for Robotics & Computer Vision Applications
17:00-18:30   TT02-2: IEEE-Sensors: Wearable Sensors for Health and the Environment - Session 2 CT08: Automotive CE Applications (CEA) TT01-2: IEEE Cloud Computing (CCC) - Session 2 CT07-4: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 4 ST10-3: Deep Learning: Applications & Enabling Technologies

#### Sunday, January 14

08:30-09:00             Breakfast
09:00-10:00             Keynote 5: Internet of Things Security: Are We Paranoid Enough?
Swarup Bhunia, Electrical and Computer Engineering,
University of Florida
10:00-10:30             Awards Ceremony: ICCE 2018 and CE Society
10:30-12:00   CT06-1: Entertainment, Gaming, and Virtual and Augmented Reality (EGV) - Session 1 CT13-1: Other Technologies Related with CE (MIS) - Session 1 CT05-1: Internet of Things and Internet of Everywhere (IoT) - Session 1 TT04: IEEE Standards Association (IEEE-SA) CT07-5: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 5
12:00-13:30             Lunch / Keynote 6: Proactive Cyber Security Response by Utilizing Passive Monitoring Technologies,
Koji Nakao,
National Information Communication Technologies (NICT), Japan,
Yokohama National University
13:30-15:00   CT05-3: Internet of Things and Internet of Everywhere (IoT) - Session 3 CT13-2: Other Technologies Related with CE (MIS) - Session 2 CT05-2: Internet of Things and Internet of Everywhere (IoT) - Session 2 TT05: IEEE Future Directions (IEEE-FD) - Immersive Future CT07-6: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 6
15:00-15:30             Fellow Elevation Ceremony
15:30-16:00 Poster Session 4 / Coffee Break
16:00-17:00   CT03: Application-Specific CE for Smart Cities (SMC) CT13-3: Other Technologies Related with CE (MIS) - Session 3 CT05-4: Internet of Things and Internet of Everywhere (IoT) - Session 4 TT06: IEEE CE Society Future Directions (CESoc-FD) CT07-7: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 7
17:00-17:30 Poster Session 5
17:30-18:30   CT06-2: Entertainment, Gaming, and Virtual and Augmented Reality (EGV) - Session 2 CT13-4: Other Technologies Related with CE (MIS) - Session 4 CT07-8: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 8 TT08: IEEE Young Professionals (IEEE-YP) CT09: CE Sensors and MEMS (CSM)

### Friday, January 12 8:30 - 9:00

#### Breakfast

Room: N262/N264 (1st Come-1st Serve)

### Friday, January 12 9:00 - 9:30

#### ICCE 2018 Inauguration

Room: N262/N264 (1st Come-1st Serve)
Chair: Saraju P Mohanty (University of North Texas, USA)

### Friday, January 12 9:30 - 10:30

#### Keynote 1: Smart Healthcare, Niraj K. Jha, Department of Electrical Engineering, Princeton University

Room: N262/N264 (1st Come-1st Serve)
Chair: Saraju P Mohanty (University of North Texas, USA)
9:30 Smart Healthcare
Niraj K Jha (Princeton University, USA)
In this talk, we will explore smart healthcare from two angles: energy-efficient inference on WMSs and use of such sensors in various applications. Energy-efficient inference is made possible on sensor nodes by exploiting sparsity, which is characteristic of a signal that allows us to represent information efficiently. We will look at an approach that enables efficient representations based on sparsity to be utilized throughout a signal processing system, with the aim of reducing the energy and/or resources required for computation, communication, and storage. Such intelligent WMSs can be expected to be an important pillar of smart healthcare. We will then explore the use of WMSs in various applications: energy- and storage-efficient continuous health monitoring, medical diagnosis in the context of a health decision support system, stress detection/alleviation, etc. Finally, we will discuss some of the security issues associated with smart healthcare.

### Friday, January 12 10:30 - 11:00

#### Student Research Forum (SRF) Poster Session / Coffee Break

Room: Break Area
Chairs: Konstantin Glasman (St. Petersburg State University of Film and Television, Russia), Wen-Chung Kao (National Taiwan Normal University, Taiwan)
10:30 A QoE-aware Quality Selection Controller for HTTP Adaptive Streaming
Yu Mizoguchi (Sophia Unversity, Japan); Takumi Kurosaka and Masaki Bandai (Sophia University, Japan)
In this paper, we propose a quality of experience (QoE)-aware quality selection controller for HTTP adaptive streaming. The proposed method improves QoE by using two types of control: insertion of intermediate quality and suppression of quality switching. We implement the proposed method on dynamic adaptive streaming over HTTP (DASH) system and evaluate QoE. We show that the proposed method improves QoE by subjective evaluation using the scale of absolute category rating (ACR) method.
10:33 QoE-aware Quality Selection Method for Adaptive Video Streaming with Scalable Video Coding
Shungo Mori and Masaki Bandai (Sophia University, Japan)
In this paper, we propose a quality of experience (QoE) aware quality-level selection method for adaptive video streaming with scalable video coding (SVC). The proposed method consists of the following two factors: segment groups and a buffer-aware layer selection algorithm. The proposed method uses these two factors to prevent features which degrade QoE performance. We implement the proposed algorithm on a SVC-DASH system and evaluate the QoE performance of the proposed method via subjective evaluations of multiple users. As a result, we show that the proposed method is effective to improve QoE performance.
10:37 Multi-Frame Super Resolution Using Frame Selection and Multiple Fusion for 250 Million Pixel Images
Yinhao Li and Yutaro Iwamoto (Ritsumeikan University, Japan); Katsuhisa Ogawa (Canon Incorporation, Japan); Yen-Wei Chen (Ritsumeikan University, Japan)
In this paper, we originally propose an adaptive frame selection method and a multiple fusion scheme to enhance the quality of 250 million pixel images. This method is quite suitable for commercial use due to accuracy, simplicity and ease of implementation.
10:41 Low-Power Image Stitching Management for Reducing Power Consumption of UAVs for Disaster Management System
Jihyeon Yim (UST-ETRI, Korea); Hyunho Park and Eunjung Kwon (ETRI, Korea); Seonghyun Kim and Yong-Tae Lee (Electronics and Telecommunications Research Institute, Korea)
Recently, unmanned aerial vehicles (UAVs) are used for disaster management system that monitors disasters (e.g., forest fire and landslide) of some areas (e.g., mountains) and responds to disasters. The UAVs of the disaster management system take images and sensor data (e.g., temperature and humidity data) of the areas where the disasters can occur, and then the disaster management system stitches the images of the areas to monitors the areas. This paper proposes the low-power image stitching management (LPISM) that can reduce power consumptions of the UAVs that take images for image stitching in the disaster management system. The disaster management system with the LPISM generates the least number of waypoints for the UAV to take images for image stitching. Therefore, the UAVs can reduce power consumption for taking images, and the UAV can increase the frequency of gathering sensor data for monitoring disasters in detail.
10:45 A Receiver Position Estimation Scheme in Wireless Power Transfer System
Qi Jiang (Shenzhen Institutes of Advanced Technology, P.R. China); Yuannian Qin (Guilin University of Electronic Technology, P.R. China); Yubin Zhao (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, P.R. China); Chengzhong Xu (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, USA); Xiaodong Wang (Columbia University, USA)
The multiple magnetic resonance coils are effective at transmitting wireless power to a single receiver. However, the receiver's location is essential to the transmitter for power transmission efficiency. In this paper, we propose a position estimation scheme for magnetic multiple-input single-output (MISO) wireless power transfer (WPT) system. The MISO WPT system with the fixed frequency at 6.78MHz is applied in this work. We construct an offline training data set as the reference. Then, a KNN algorithm is employed to search the nearest instance with the current measurement. With such location information, the efficiency of wireless power transfer can be enhanced.
10:49 A New Auto-Brightness Control Technology for Transparent Displays
Jeong-Sik Kim (Kyung Hee University, Korea); Seung-Ryeol Kim and Seung-Woo Lee (KyungHee University, Korea)
We propose a new auto-brightness control technology for transparent displays based on a linear relation between the best luminance and an eye illuminance measured near eyes facing the display.
10:52 Hybrid Application Service with Companion Devices Based on T-UHDTV
Nayeon Kim (University of Science and Technology, Korea); Yongseong Cho (Electronics and Telecommunications Research Institute, Korea); Oh Sungheun (DigiCAP Co., Ltd, Korea); Byungjun Bae (Electronics and Telecommunications Research Institute, Korea)
In this paper, we introduce the design and flow scheme for a Hybrid Application Service system, which can provide broadcasting service to the viewer's private device using parsed information via Primary Device receiver. Our proposed system is extended based on Dynamic Linkage Service which is a kind of hybrid broadcasting service.
10:56 New Calibration Method of Plenoptic Camera Using CCD Camera Model
Song Ran Kim (ChungBuk National University, Korea); MinChang Jeong and Hyun-Soo Kang (Chungbuk National University, Korea)
This paper presents a convenient method to estimate the internal parameters of a plenoptic camera by applying a CCD camera calibration method and some formulas to be analytically derived. A microlens based plenoptic camera is effectively same as a virtual camera array placed in regular intervals. For calibration, we employ a homogeneous intrinsic matrix based on the plenoptic camera model. Using various check board patterns, as in a CCD camera calibration, the disparities of pixels, the center positions of the virtual cameras, the baseline between the virtual cameras, and the distance to a point in the scene are extracted in the sub-aperture image domains. We formulate four equations for calibration of the plenoptic camera and then performs a nonlinear optimization technique to find a solution to these equations. To evaluate the estimation performance, we generate an artificial plenoptic image whose internal parameters are definite. Then estimation results are compared with the true parameters. In addition, the reprojection error by the estimated parameters is demonstrated.

### Friday, January 12 11:00 - 12:00

#### CT01-1: Security and Privacy of CE Hardware and Software Systems (SPC) - Session 1

Room: N256
Chairs: Supavadee Aramvith (Chulalongkorn University, Thailand), Mike Borowczak (University of Wyoming, USA)
11:00 Camera-recognizable Visual Cryptography for Printed Documents: Enhancing the User Interface
Wooram Ann (Samsung Electronics, Korea); Taeyoung Lee (Samsung Electronics. Co., Ltd, Korea); Cheulhee Hahm (Samsung Electronics, Korea)
Sensitive information in printed documents are susceptible to security risks. This paper proposes a system that creates an image-based cypher on printed documents and interprets image cyphers for users. Our evaluation results show that the proposed system satisfies important requirements such as security, usability, and performance.
11:20 Secure and Robust User Authentication Using Partial Fingerprint Matching
Geuntae Bae, Hojae Lee, Sunghoon Son, Doha Hwang and Jongseok Kim (Samsung Electronics, Korea)
this paper proposes a robust fingerprint-based authentication algorithm that ensures secure verification even with limited-sized partial fingerprints. It has become increasingly common that a number of recent consumer devices, such as smartphones, employ fingerprint sensors for user authentication. The sensors to be embedded are generally preferred to take up less space for better usability and product design, the sensing areas are therefore limited in size. To supplement the insufficient area, devices often store multiple acquisitions from a single finger in enrollment, later to verify at least any one of them successfully match an acquisition in authentication. Considering the low information entropy of a partial image, the security aspect of small area-based systems is a major concern. On the other hand, unpredictable variability due to finger rotation, grip positions, and skin deformation has a negative impact on biometric performance. This paper proposes a fingerprint matcher or verifier incorporating several efficient algorithms against these concerns on both the performance and security aspects. A method of "segmented area matching" brought an enhanced robustness to the variability, especially to finger rotation. And a method of "feature-weighted block correlation scoring" provided more detailed image discrimination, resulting in improved security. Experimental evaluations with extensive database of partial fingerprint images from more than 100 people, acquired by a small-sized capacitive sensor, demonstrated a significant improvement over the previously suggested algorithms in both aspects.
11:40 Strong Privacy Preserving Authentication Scheme for Unmanned Cars
Sangil Jeon, Jaewon Noh, Jeehyeong Kim and Sunghyun Cho (Hanyang University, Korea)
The vehicular ad hoc network (VANET) has several security issues. Identification requires accurate authentication, but privacy must be kept secretly. In this paper, we propose a strong privacy preserving authentication scheme to solve these problems based on vehicles to infrastructures (V2I) communications. We introduced public key infrastructure (PKI) and message accessing code (MAC) for encryption. We define adversary model in two types external and internal. We demonstrate how our methods are safe for these attackers.

#### CT02: Energy Management of CE Hardware and Software Systems (EMC)

Room: N258
11:00 Real-Time Human Activity-Based Energy Management System Using Model Predictive Control
Chiyang Zhong, Jingfan Sun, Jiahao Xie and Santiago Grijalva (Georgia Institute of Technology, USA); Sakis Meliopoulos (Georgia Tech, USA)
The challenges of energy efficiency and comfort management of intelligent homes and buildings are usually tackled with methods relying on historical data and a large number sensors. In this paper, we propose a real-time human activity-based energy management system (HAEMS), which tracks and processes human movement, and achieves device control based on real-time data with a significantly reduced number of sensors. A human activity detection algorithm and a model predictive control scheme are developed and implemented to optimally manage energy. A multi-objective optimization problem is formulated to minimize electricity cost and control temperature for thermal comfort. The HAEMS is deployed in a scaled-down laboratory setup and the performance is evaluated in an embedded system and hardware environment. Experimental results show that this system is able to optimize both electricity cost and thermal comfort.
11:15 A Pixel-based Complexity Model to Estimate Energy Consumption in Video Decoders
Victor Costa (Instituto de Telecomunicacoes / IPLeiria, Portugal); Pedro A. Amado Assuncao (Instituto de Telecomunicacoes & Politecnico de Leiria, Portugal); Paulo Cordeiro (Esc. Superior de Tecnologia e Gestao & Politecnico de Leiria, Portugal)
The increasing use of HEVC video streams in diverse multimedia applications is driving the need for higher user control and management of energy consumption in battery-powered devices. This paper presents a contribution for the lack of adequate solutions by proposing a pixel-based complexity model that is capable of estimating the energy consumption of an arbitrary software-based HEVC decoder, running on different hardware platforms and devices. In the proposed model, the computational complexity is defined as a linear function of the number of pixels processed by the main decoding functions, using weighting coefficients which represent the average computational effort that each decoding function requires per pixel. The results shows that the cross-correlation of frame-based complexity estimation with energy consumption is greater than 0.86. The energy consumption of video decoding is estimated with the proposed model within an average deviation range of about 6.9%, for different test sequences.
11:30 Bandwidth-Aware DRAM Page Migration for Heterogeneous Mobile Memory Systems
Dongsuk Shin (Sungkyunkwan University & Samsung Electronics, Korea); Jae W. Lee (Seoul National University, Korea)
Bandwidth demands for mobile consumer electronics devices, including smartphones and tablets, have been continuously increasing in recent years. A heterogeneous memory system (HMS) integrating different types of mobile DRAM devices, such as LPDDR4 and WideIO2, is an attractive solution to scale DRAM bandwidth beyond the maximum bandwidth of a single device type. One of the key design challenges in an HMS is how to identify hot (cold) pages and migrate them to the faster (slower) devices at a low cost. This becomes more difficult as more devices like LPDDR4X adopt dynamic voltage and frequency scaling (DVFS) for DRAM I/O to reduce power consumption. At a low I/O voltage and frequency, a significant portion of DRAM bandwidth can be consumed by page migration traffic to slow down user applications. Thus, this paper proposes a novel page migration technique towards bandwidth-aware memory management (BAMM) for an HMS composed of both fast WideIO2 and slow LPDDR4 devices. BAMM periodically measures the bandwidth consumption for the LPDDR4 channel and adjusts both the maximum cap for migration bandwidth and DVFS level to keep the migration overhead low. Our evaluation using a detailed cycle-level simulator demonstrates that BAMM improves the energy efficiency of the memory system by 6.3% on average (and up to 11.6%) with minimal performance overhead over the baseline HMS with no dynamic page migration.
11:45 Non Intrusive Load Identification for Smart Energy Management Systems
Giacomo Chelli (Revolt SRL, Italy); Lucio Ciabattoni (Universita' Politecnica delle Marche, Italy); Jose-Maria Flores-Arias (University of Cordoba, Spain); Gabriele Foresi (Universita' Politecnica delle Marche, Italy); Andrea Monteriù (Università Politecnica delle Marche, Italy); Daniele Proietti Pagnotta (Universita' Politecnica delle Marche, Italy)
In an energy management (EM) perspective, an objective function considering the balance of energy and resources needs to be optimized. To reach the goal, in a residential scenario, a number of tasks (typically appliances) can be managed (e.g. shifted). This paper proposes an unobtrusive cascade classifier approach to autonomously identify the different appliances and their priorities (shiftable, non interruptible, continuous loads) in EM algorithms based on smart plugs measures.

#### CT12-1: Smartphone and Mobile Device Technologies (MDT) - Session 1

Room: N260
11:00 Critical Areas Detection and Vehicle Speed Estimation System Towards Intersection-Related Driving Behavior Analysis
Qianlong Wang, Yongjie Liu, Jingwen Liu, Yanlei Gu and Shunsuke Kamijo (The University of Tokyo, Japan)
A large number of serious traffic accidents occur at intersections due to the unsafe driving behaviors. In this paper, we propose a smartphone-based system to provide important information for driving behavior analysis at intersections. Our proposed system consists of two parts: (1) a deep convolutional neural network based model to detect traffic lights, crosswalks, and stop lines. (2) a Long Short-Term Memory (LSTM) neural network based model to estimate vehicle speed using accelerometer and gyroscope embedded in the smartphone. Important objects detection in traffic scenes and real time vehicle speed estimation are crucial for driving behavior analysis. We performed a thorough evaluation of our system, including analysis of the effectiveness of the proposed algorithm itself and the comparison with other methods as well. Our experiments exhibit the robustness of our system in various traffic scenarios.
11:20 On the Successful Deployment of Community Policing Services the TRILLION Project Case
Charalampos Z Patrikakis (University of West Attica & COmputer Networks & SErvices Research Team (CONSERT), Greece); Dimitris Kogias (Piraeus University of Applied Sciences, Greece); George Loukas, Avgoustinos Filippoupolitis, William Oliff and Syed S Rahman (University of Greenwich, United Kingdom (Great Britain)); Silvio Sorace, Ernesto La Mattina and Elisabeth Quercia (Engineering Ingegneria Informatica SPA, Italy)
The evolution of policing towards the next generation, not only involves confronting new types of crime such as cybercrime, but also the active engagement of citizens in the process of creating a secure environment through the deployment of community policing practices. However, in order to fully exploit the potential of community policing, building of trust between citizens and Law Enforcement Officers is important. In this paper, the authors (all participating in the EU Research project on community policing TRILLION), discuss issues related to the best use of technology, while ensuring societal approval, in the context of deployment of a platform for community policing. Both requirements and corresponding work leading to the actual implementation of a fully operational platform are presented.
11:40 An Efficient Automatic Electrocardiogram Analysis Method Using Smartphones
Xiaomao Fan (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, P.R. China); Qihang Yao, Yunpeng Cai and Ye Li (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, P.R. China)
Long-term electrocardiogram (ECG) is an important diagnostic assistant approach in capturing the intermittent cardiac arrhythmias. The combination of miniaturized Holter and healthcare platforms enable people to have their cardiac arrhythmias monitored at home. The high computational burden created by the synchronized daily schedule of numerous users poses a severe challenge to the healthcare platform. Thus, shifting analysis tasks from healthcare platform to mobile computing devices are considered.However, long-term ECG data processing on smartphone/tablets can't meet the demands of real-time response due to the limited computing capability. In this paper, we developed a novel parallel automatic ECG analysis algorithm using the open computing language (OpenCL) framework. The experimental results show that, comparing to 7.57s of the sequential automatic ECG analysis algorithm, the executing time of the proposed parallel algorithm on 24-hour-long ECG data reduces to 1.45s, which achieves a speedup of 5.22x without reducing analysis accuracy. Furthermore, average power of the parallel algorithm is less than that of the sequential algorithm, resulting in saving about 61% of the battery energy. The problem of limited battery working hours for mobiles devices would be alleviated.

#### ST05-1: Architecture-Level Energy, Security, and Reliability Solutions for CE Digital Hardware (ESR) - Session 1

Room: N261
Chair: Anirban Sengupta (Indian Institute of Technology Indore, India)
11:00 Multi-Phase Watermark for IP Core Protection
Anirban Sengupta and Dipanjan Roy (Indian Institute of Technology Indore, India)
Embedding a strong watermark is sufficient to prove IP core ownership during conflict resolution process. However, watermark embedded at lower levels of abstraction may incur design overhead and complexity. Further, watermark embedded at lower level of design does not help to protect a reusable IP core generated during architectural synthesis (at higher abstraction level). This paper presents a low overhead multi-phase watermark implanted during architectural synthesis that is more robust and tamper tolerant than existing single phase watermarks at higher abstraction level.
11:20 Reusable Intellectual Property Core Protection for Both Buyer and Seller
Anirban Sengupta and Dipanjan Roy (Indian Institute of Technology Indore, India)
This paper presents a methodology for IP core protection of CE devices from both buyer's and seller's perspective. In the presented methodology, buyer fingerprint is embedded along seller watermark during architectural synthesis phase of IP core design. The buyer fingerprint is inserted during scheduling phase while seller watermark is implanted during register allocation phase of architectural synthesis process. The presented approach provides a robust mechanisms of IP core protection for both buyer and seller at zero area overhead, 1.1 \% latency overhead and 0.95 \% design cost overhead compared to a similar approach (that provides only protection to IP seller).
11:40 RelBat: A Reliable Battery System Towards the Realization of Sustainable Electronics
Obinna Okpokwasili and Saraju P Mohanty (University of North Texas, USA); Elias Kougianos (Universtiy of North Texas, USA); Venkata Yanambaka (University of North Texas, USA)
This paper presents a battery simulation flow and system to help design engineers to simulate battery arrays, demonstrate their characteristics, their modes of operation and the results of their implementation. As an example application, a reliable battery is presented which consists of battery cells, a cell switching circuit, a battery cell array manager and a system safety manager. This is useful for managing the existing energy infrastructure in an efficient and smart manner such that batteries last for a longer time. A RelBat system is built on a management system which performs its management activities by protecting the battery from operating outside its safe operating area, monitoring its state, calculating data, reporting the data and controlling its environment (modifying the temperature). Related work has focused on a battery model system which adapts to the current profile of the device, while this research focuses on the deployment of smarter batteries to self-manage lifetime.

#### ST06-1: IoT for Healthy Independent Living (HIL) - Session 1

Room: N253
Chair: Himanshu Thapliyal (University of Kentucky, USA)
11:00 Smart-Log: An Automated, Predictive Nutrition Monitoring System for Infants Through IoT
Prabha Sundaravadivel (University of North Texas, USA); Kavya Kesavan (University of Texas Arlington, USA); Lokeshwar Kesavan (Independent Researcher, USA); Saraju P Mohanty (University of North Texas, USA); Elias Kougianos (Universtiy of North Texas, USA); Madhavi Ganapathiraju (University of Pittsburgh, USA)
Malnutrition is a condition where the body deprives of important nutrients required to maintain healthy tissues and organ function. Maintaining the right balance in the food intake is very important especially in infants where tremendous growth occurs. Unlinke adults, infants require someone's assistance in their food intake. In the present world, where most of the infants are being sent to Day-care, an automated food monitoring system helps in keeping track of their food intake. In this paper an automated food monitoring system with predictions to help a balanced meal is proposed. This sensor system consists of a piezo based sensor board which can help in analyzing the weight of each meal and a smart phone camera to obtain Nutrition Facts of the ingredients.
11:20 Smart-Walk: An Intelligent Physiological Monitoring System for Smart Families
Prabha Sundaravadivel and Saraju P Mohanty (University of North Texas, USA); Elias Kougianos (Universtiy of North Texas, USA); Venkata Yanambaka (University of North Texas, USA); Madhavi Ganapathiraju (University of Pittsburgh, USA)
individuals. Understanding the lifestyle of family and kin can help in improving quality of their life. Wearables for activity tracking and wrist-worn devices have been an ever-growing Industrial sector. But with multiple functionalities embarked in a small device, the accuracy and power consumption can be compromised. This paper proposes a piezo-electric based accelerometer sensor design framework which helps in tracking the physical activities of family and friends. The accuracy of the human activity algorithm is analyzed by the various parameters analyzed through the sensor output. This proposed framework was validated using TIMSP432, Educational BoosterPack and \matlab and the learning parameters were modeled using WEKA. The feature based human activity monitoring algorithm gives 97.9\% efficiency in worst case.
11:40 IoT Based Indoor Location Detection System for Smart Home Environment
Rajdeep Nath (University of Kentucky, USA); Rajnish Bajpai (Synopsys Inc, USA); Himanshu Thapliyal (University of Kentucky, USA)
Smart home environment is expected to meet the requirements, essentially for the aging population, to support the concept of "aging in place", to provide reliable care and to ensure safety and proper diagnosis by keeping track of daily living, medical condition of the resident and providing feedback to the caregiver. In order to meet these requirements, smart home of today should support a number of functionalities. One such functionality of a smart home environment is the location detection. In this work, we propose a voice based location detection system which can be integrated in a smart home environment. Our location detection system uses Amazon Echo as the voice interface and HC-SR04 ultrasonic sensor to detect location of specific patients. The proposed location detection will be suitable for large scale application where we may need to keep track of multiple patients. Moreover, the inclusion of voice enabled feature to this system will reduce the burden of learning curve of new technologies on family and caregivers thereby improving the quality of life.

### Friday, January 12 12:00 - 12:30

#### Lunch / Award: IEEE Ibuka Award Winner: Linus Torvalds

Room: N262/N264 (1st Come-1st Serve)
Chair: Saraju P Mohanty (University of North Texas, USA)

### Friday, January 12 12:30 - 13:30

#### Lunch / Keynote 2: 2020: Life with 50 Billion Connected Devices, Gary Davis, McAfee, Inc

Room: N262/N264 (1st Come-1st Serve)
Chair: Saraju P Mohanty (University of North Texas, USA)
12:30 2020 Life with 50 Billion Connected Devices
Gary Davis (McAfee, Inc., USA)

### Friday, January 12 13:30 - 14:30

#### CT01-2: Security and Privacy of CE Hardware and Software Systems (SPC) - Session 2

Room: N256
Chair: Mike Borowczak (University of Wyoming, USA)
13:30 Constructing Universal Secure and Private Data Networks Across Consumer Systems
Christopher Whittington (CROSSPORT NETWORK SOLUTIONS, Canada); Edward Cady and Daniel Ratchen (CROSSPORT NETWORK SOLUTIONS Inc., Canada); Yunus Ibrahim Dawji (CROSSPORT NETWORK SOLUTIONS, Canada & Lund University, Sweden)
Software Constructed Push-Pull data network architectures employing multiple bridged peripheral links can be used to create an Ultra-Fast, Ultra-Secure, Private and Low Power data network capable of connecting nearly any system across multiple connection mediums. Bridging standard USB 3.0 technologies, we demonstrate a universally secure and scalable switchable data platform offering the highest level of data privacy, security and performance. Further supporting heterogeneous connections across different protocols, data may flow easily across the entirety of available consumer electronics systems with unparalleled security, privacy and transfer speed.
13:50 A Hardware-Trojan Classification Method Utilizing Boundary Net Structures
Kento Hasegawa, Masao Yanagisawa and Nozomu Togawa (Waseda University, Japan)
Recently, cybersecurity has become serious concern for us. In this paper, we propose a hardware-Trojan classification method utilizing boundary net structures. To begin with, we use a machine-learning-based hardware-Trojan detection method and classify the nets in a given netlist into a set of normal nets and that of Trojan nets. Based on the classification, we investigate the nets around the boundary between normal nets and Trojan nets and extract the features of the nets identified to be normal nets or Trojan nets mistakenly. Finally, using the classification results of machine-learning-based hardware-Trojan detection and the extracted features of the boundary nets, we classify the nets in a given netlist into a set of normal nets and that of Trojan nets again. The experimental results demonstrate that our method outperforms an existing machine-learning-based hardware-Trojan detection method in terms of true positive rate.
14:10 A CAPTCHA-like Implicit Authentication Model for Smart TV Based on Machine Learning Algorithms
Jinhyun Kim (Samsung Electronics Co., Ltd., Korea); Gihoon Park (Samsung Electronics co., Ltd., Korea); JaeOok Kwon (Samsung Electronics, Korea); Eun-Ae Cho (Samsung Electronics co., Ltd., Korea)
Recently, IoT (Internet of Things) environment centered on Smart TV has been developed exponentially in order to provide a convenient and connected life experience to users. But this environment is vulnerable to a hacking attempt, as each of the devices is exposed to the hacker. To deal with trade-off between security and convenience, this paper proposes an implicit authentication method based on users' TV viewing history. A machine learning model is trained on the server with face set, and it is operated on the client TV after deployment. When compared to previous authentication methods, our model has an advantage in user convenience, and it is robust in terms of security as it updates the model regularly.

#### CT12-2: Smartphone and Mobile Device Technologies (MDT) - Session 2

Room: N260
Chair: Aldo Morales (Penn State Harrisburg, USA)
13:30 Utilization of Two Microphones for Real-Time Low-Latency Audio Smartphone Apps
Abhishek Sehgal and Nasser Kehtarnavaz (University of Texas at Dallas, USA)
This paper presents an approach to overcome the limitation imposed by existing smartphone operating systems in using two microphones of smartphones at the same time for real-time low-latency audio apps that require the use of two microphones. This approach involves the use of an external dual-microphone and the processing steps needed to access audio signals from both of the external microphones at the same time. The developed approach is then applied to two example audio applications consisting of noise classification and noise reduction. It is shown that these dual-microphone apps lead to improved noise classification and noise reduction accuracy compared to the apps using a single microphone.
13:50 Image Placement Order Optimization for Mobile Commerce
Yeongnam Chae, Daniel L Crane, Bjorn Stenger and Soh Masuko (Rakuten Institute of Technology, Japan)
With the increase in popularity of mobile commerce, the placement order of images on mobile displays is an important factor to attract and retain customers' attention. In this paper, we propose a novel method to optimize the placement of item images based upon the relative attractiveness of each image to the customer. To judge this, the proposed method estimates the leave rate of the customer at each image for each ordering using a model based on unsupervised hierarchical clustering. This allows estimating the expected leave rate for different image placements, solving an optimization problem to obtain the best ordering. The model is evaluated using a dataset collected from Rakuten Ichiba, the largest e-commerce site in Japan.
14:10 Saving Power Consumption of Smartphones in the Screen-off State with Disabling the Wi-Fi
Tsubasa Murakami, Shun Kurihara and Shoki Fukuda (Kogakuin University Graduate School, Japan); Masato Oguchi (Ochanomizu University, Japan); Saneyasu Yamaguchi (Kogakuin University, Japan)
Smartphone OSs have a function with which applications can be invoked without users' operation. These invocations heavily consume battery. Temporal disabling network device is a promising methods for decreasing power consumption in the screen-off state. Disabling decreases power consumption, but processes of disabling and enabling the device consume power. In our work, we focus on a method for reducing power consumption in the state by repeating to disable and enable the network device and propose methods for estimating Break-Even Time (BET). We them evaluate the methods and show that the method can correctly estimate BET.

#### ST05-2: Architecture-Level Energy, Security, and Reliability Solutions for CE Digital Hardware (ESR) - Session 2

Room: N261
Chair: Anirban Sengupta (Indian Institute of Technology Indore, India)
13:30 Facial Biohashing Based User-Device Physical Unclonable Function for Bring Your Own Device Security
Yue Zheng and Yuan Cao (Nanyang Techological University, Singapore); Chip-Hong Chang (Nanyang Technological University, Singapore)
Bring your own device (BYOD) is gaining popularity. Using multifarious personal devices in the workplace to perform work-related tasks brings new challenges to trust and privacy management. Existing authentication schemes usually target at user or device separately, while the BYOD system needs to ensure that only the authorized user with the trusted devices can be given access. This paper presents a novel biohashing based user-device physical unclonable function (UD PUF) to provide a bipartite authentication of both user and device for the BYOD system. Biometric features are extracted as user identity while PUF endows the device with an inseparable and unclonable fingerprint". Biohashing acts as an intermediary between these two incoherent macroscopic biometric and microscopic silicon entropy sources for security enhancement. The concept is demonstrated using a 64x64 image sensor PUF simulated in 180 nm 3.3 V CMOS technology, and the ORL and yale databases of faces. Our preliminary experimental results showed that a genuine (user, device, challenge) combination exhibits a very low equal error rate of 0.032, and tampering of any elements of the tuple will cause the hamming distance between the "live" and enrolled templates to have nearly random distribution.
13:45 Study of Hardware Trojans Based Security Vulnerabilities in Cyber Physical Systems
Karthikeyan Lingasubramanian, Ranveer Kumar and Nagendra Babu Gunti (University of Alabama at Birmingham, USA); Tommy Morris (University of Alabama at Huntsville, USA)
The dependability of Cyber Physical Systems (CPS) solely lies in the secure and reliable functionality of their backbone, the computing platform. Security of this platform is not only threatened by the vulnerabilities in the software peripherals, but also by the vulnerabilities in the hardware internals. Such threats can arise from malicious modifications to the integrated circuits (IC) based computing hardware, which can disable the system, leak information or produce malfunctions. Such modifications to computing hardware are made possible by the globalization of the IC industry, where a computing chip can be manufactured anywhere in the world. In the complex computing environment of CPS such modifications can be stealthier and undetectable. Under such circumstances, design of these malicious modifications, and eventually their detection, will be tied to the functionality and operation of the CPS. So it is imperative to address such threats by incorporating security awareness in the computing hardware design in a comprehensive manner taking the entire system into consideration. In this paper, we present a study in the influence of hardware Trojans on closed-loop systems, which form the basis of CPS, and establish threat models. Using these models, we perform a case study on a critical CPS application, gas pipeline based SCADA system. Through this process, we establish a completely virtual simulation platform along with a hardware-in-the-loop based simulation platform for implementation and testing.
14:00 Re-envisioning Digital Architectures Connecting CE Hardware for Security, Reliability and Low Energy
Christopher Whittington (CROSSPORT NETWORK SOLUTIONS, Canada); Edward Cady and Daniel Ratchen (CROSSPORT NETWORK SOLUTIONS Inc., Canada); Yunus Ibrahim Dawji (CROSSPORT NETWORK SOLUTIONS, Canada & Lund University, Sweden)
Push-Pull data network architectures employing multiple bridged peripheral links can be used to create an Ultra-Fast, Ultra-Secure, Private and Low Power data network capable of connecting nearly any system. Initially implemented using standard USB technologies, crossPORT demonstrates a universally secure and scalable switched data platform offering the highest level of data privacy, security and performance. A "Software Constructed" data network, the presented architecture offers frictionless adoption and price-performance measures that exceed 10X. Further supporting heterogeneous connections across different protocols, data may flow easily across the entirety of available consumer electronics systems with unparalleled security, privacy and transfer speed.
14:15 Energy-Recovery Based Hardware Security Primitives for Low-Power Embedded Devices
Himanshu Thapliyal and S. Dinesh Kumar (University of Kentucky, USA)
Hardware based security vulnerabilities such as side-channel attacks, IC piracy, IC counterfeiting, etc. are major threats for the successful deployment of the embedded computing systems. Further, the embedded computing devices work on a limited power supply (battery operated devices), and therefore have stringent constraints on power consumption. In this paper, we propose Energy Recovery (ER) computing as a novel platform to design low-power hardware security primitives for embedded computing devices. As a case study, we have discussed the design of two important ER-based hardware security primitives: (i) low-power and Differential Power Analysis (DPA) resistant PRESENT cryptographic core, (ii) low-power Physically Unclonable Function (PUF). Through simulations, it is illustrated that the ER computing based hardware security primitives are low-power as compared to the existing approaches. For example, the PRESENT-80 cryptographic algorithm implemented using ER computing consumes 45% less power as compared to its CMOS implementation. Further, ER computing in emerging devices such as FinFET and Tunnel FET to design low-power hardware security primitives is also illustrated.

#### ST06-2: IoT for Healthy Independent Living (HIL) - Session 2

Room: N253
Chair: Himanshu Thapliyal (University of Kentucky, USA)
13:30 An Energy Efficient Epileptic Seizure Detector
Md Abu Sayeed and Saraju P Mohanty (University of North Texas, USA); Elias Kougianos (Universtiy of North Texas, USA); Hitten Zaveri (Yale Univerity, USA)
Epilepsy is one of the most common neurological disorders affecting up to 1\% of the world's population and approximately 2.5 million people in the United States. Seizures in more than 30\% of epilepsy patients are resistant to anti-epileptic drugs. A significant focus of current research efforts is the development of an energy efficient implantable integrated circuit for real-time detection of seizures. In this paper we propose an architecture for an implantable seizure detector using a hypersynchronous signal detection circuit and signal rejection algorithm (SRA). The proposed seizure detector (SD) continuously monitors neural signals for hypersynchronous pulses and extracts the seizure onset signal. If the pulses in an epoch exceed a threshold value, a seizure is declared. The design was validated using \simulink. The signal rejection algorithm (SRA) reduces false detection and minimal circuitry leads to a 12\% reduction of power consumption.
13:50 A Human Activity Recognition-Aware Framework Using Multi-modal Sensor Data Fusion
Eunjung Kwon and Hyunho Park (ETRI, Korea); Sungwon Byon (Electronics and Telecommunication Research Insititute, Korea); Eui-Suk Jung (ETRI, Korea); Yong-Tae Lee (Electronics and Telecommunications Research Institute, Korea)
Recent years, with smartphones and other pervasive devices the paradigm of situation-recognition extended to IoT devices in home. Since IoT devices produce data that can help predict accidents or disasters in private or public environments. In IoT devices provided situation, machine learning technologies can help make an insight to what's really meaningful according to service provider's purpose. So, in order to understand several kinds of user's situation within an environment with IoT devices, a novel human activity recognition scheme is required to manage lots of data for guaranteeing accurate situation in real-time. As the accuracy of analyzing result and the response time of informing a situational corresponding to users are important factors on providing services, we present a human activity recognition framework based on home gateway connected with IoT devices and consumer devices in home for consumer services.
14:10 Project OurPuppet: A System to Support People with Dementia and Their Caregiving Relatives at Home*
Edwin Naroska (University of Applied Sciences Niederrhein, Germany); Sebastian Schmitz and Tobias Bolten (Niederrhein University of Applied Sciences, Germany); Chih-Wei Lee (National Taiwan University of Science and Technology, Taiwan); Ping-Chen Tsai (National Taiwan University, Taiwan); Shanq-Jang Ruan (National Taiwan University of Science and Technology, Taiwan)
This paper discusses the current state of project "OurPuppet" which is a system to support elderly people suffering from dementia. In contrast to other system, OurPuppet not only focus on the patient but also on relatives who are taking care of the elderly. Taking care for people with dementia is a high burden for caregiving relatives. If the caregiving relatives aren't present, many dependent persons show a high insecurity. In turn, this limits the freedom of caregiving persons and hence leads to an emotional burden or even to an isolation of the caregiving relatives. In the Project OurPuppet we are developing a sensor based interactive puppet. The puppet is supposed to support the caregiving relatives, relieve the burden from them and create new free spaces for their own social life. It acts as a companion for the dependent people as well as a communication interface between the caregiving relatives and them. To this end, the puppet is equipped with suitable sensors to detect and monitor the emotional condition of the depending person and provide the caregiving relatives with the necessary information. The puppet can also show emotional expressions in order to provide human like interaction capabilities. The puppet can intervene in situation where the dependent person needs assistance e.g. it can remind them that their caregiving relatives come back soon. This shall prevent isolation and decrease emotional burden of the caregiving relatives. Finally it will improve the situation for the dependent people as well.

#### TT01-1: IEEE Cloud Computing (CCC) - Session 1

Room: N258
Chairs: Bingwei Liu (Aetna Inc., USA), Vinayak Tanksale (Ball State University, USA)
13:30 Secure Customer Data over Cloud Forensic Reconstruction
Jayachander Surbiryala and Chunming Rong (University of Stavanger, Norway)
Cloud computing has been evolving over the last couple of years. Adoption of the cloud services for usage in real time has been increasing ever since in the era of Big Data and Internet of Things (IoT). Adoption of Cloud is evident and can not be stopped by the individuals and small organizations. It offers many features, at low or reduced cost and provides the great potential. Cloud computing provides that extra support to move applications from the traditional local systems to cloud service provider's storage locations. But there are many security aspects which need to be considered while moving to Cloud, which are yet be solved to be completely secure in the Cloud. In this paper, we look into new security issue in the Cloud forensics point of view. Can we secure the data over cloud forensic reconstruction of the private data once that customer has done with the services and taken out their private data? The main focus of this paper is to look for an alternative ways to protect the data in Cloud.
13:42 Privacy-Preserving Context-Aware Friend Discovery Based on Mobile Sensing
Gaoqiang Zhuo (Binghamton University & Aetna Inc., USA); Huihui Yang (Norwegian University of Science and Technology, Norway)
With the advancement of smart phones, wearable devices and communication technologies, it becomes very convenient to obtain various types of data through mobile sensing, where data can be sensed via embedded sensors, stored, processed, and transmitted to anywhere. Mobile sensing has been studied extensively in both academy and industry, and has been applied in many novel applications in the past few years, such as environment and traffic monitoring and mobile health. In this work, we propose a new application scenario called context-aware friend discovery based on mobile sensing, where contextual attributes such as location, weather and temperature are utilized to enhance the existing friend discovery schemes. However, data privacy becomes a major concern for consumers to accept this application. To address this issue, we further propose a privacy-preserving context-aware friend discovery scheme, where a user's sensitive data is well protected. Security analysis shows the correctness and privacy guarantee of the proposed scheme.
13:54 A Hybrid Cloud and Fog Architecture for Vehicle Behavior Understanding
Bichen Zheng (State University New York at Binghamton & OwnerIQ, Inc, USA); Ning Chen (Binghamton University, USA)
As the unprecedentedly rapid development of urbanization nowadays, it becomes more and more significant to build a comprehensive understanding of our urban elements. However, being an important part of our cities, vehicle behavior learning is still a big challenge in Smart Cities since the existing computing platforms are not able to achieve the goal that vehicle behavior can be learned in real-time with high accuracy. In this paper, we propose a hybrid computing platform for urban vehicle behavior analysis in which Cloud Computing is utilized for knowledge base construction with long-term and large scale trajectory datasets and Fog Computing is used for behavior analysis at the edge of network. Furthermore, case based reasoning (CBR) is adopted for understanding the behaviors given new vehicle trajectories at the Fog layer. The experimental results prove the feasibility of our proposed computing platform and vehicle behaviors can be analyzed in real-time with high accuracy.
14:06 A Scalable Purchase Intention Prediction System Using Extreme Gradient Boosting Machines with Browsing Content Entropy
Bichen Zheng (State University New York at Binghamton & OwnerIQ, Inc, USA); Bingwei Liu (IEEE Cloud Computing, USA)
14:18 Wait Analysis of Virtual Machines Using Host Kernel Tracing
Hani Nemati (Polytechnique Montreal, Canada); Genevieve Bastien (École Polytechnique de Montréal, Canada); Michel R. Dagenais (Ecole Polytechnique de Montreal, Canada)
An agent-less method to understand virtual ma- chines (VMs) behavior its evolution during the VM life-cycle is an essential task for IaaS provider. It allows the IaaS provider to better scale the VMs resources by properly allocating the physical resources. On the other hand, because of privacy, security, ease of deployment and execution overhead issues, the method presented limits its data collection to the physical host level, without internal access to the VMs. We propose a host-based, precise method to recover wait states for the virtual CPUs (vCPUs) of a given VM. The Wait Analysis Algorithm (W2A) computes the state of vCPUs through the host kernel trace. The state of vCPUs is displayed in an interactive trace viewer (TraceCompass) for further inspection. Our proposed VM trace analysis algorithm has been open-sourced for further enhancements and to the benefit of other developers. Our new technique is being evaluated with representative workloads, generated by different benchmarking tools. These approaches are based on host hypervisor tracing, which brings a lower overhead (around 0.03%) as compared to other approaches.

### Friday, January 12 14:30 - 16:00

#### CT04-1: RF, Wireless, and Network Technologies (WNT) - Session 1

Room: N258
Chairs: Karthikeyan Lingasubramanian (University of Alabama at Birmingham, USA), Cristian Perra (University of Cagliari, Italy)
14:30 Field Experiment of Hybrid Video Delivery Using Next-Generation Terrestrial Broadcasting and a Cellular Network
Yuki Kawamura and Kazuhiro Otsuki (NHK Science &amp; Technology Research Laboratories, Tokyo, Japan)
The utilization of hybrid video delivery is important requirements for next-generation terrestrial broadcasting. This is especially true for mobile reception because the mobility of the user changes the receiving condition. We implement a hybrid video delivery system using terrestrial broadcasting and a cellular network to maintain user experience.
14:52 Spectral Efficiency Gains Through the Use of FBMC/OQAM for DOCSIS Systems
Florian Jackisch (Technische Universität Braunschweig, Germany)
DOCSIS provides internet access via HFC networks. With the latest version DOCSIS 3.1, the Physical Layer changed from SC-QAM to OFDM. Recent activities in the 5G development investigated other modulation schemes beyond OFDM. One candidate was FBMC, often used in combination with OQAM. FBMC promises fewer out-of-band emissions and no overhead due to the Cyclic Prefix. This paper introduces simulations that compare the FBMC/OQAM system to the DOCSIS 3.1 downstream in terms of robustness and spectral efficiency. Simulations show that the FBMC/OQAM system can improve the spectral efficiency by 10 % while providing similar robustness for HFC network channels.
15:15 Constructing Universal Secure Multi-Medium Data Networks Across Consumer Systems
Christopher Whittington, Edward Cady and Daniel Ratchen (CROSSPORT NETWORK SOLUTIONS, Canada); Yunus Ibrahim Dawji (CROSSPORT NETWORK SOLUTIONS, Canada & Lund University, Sweden)
A novel Push-Pull data network architecture is hereto presented, employing multiple bridged peripheral links to create an ultra-fast, ultra-secure, private and low power data network to connect nearly any system. Bridging standard USB 3.0 technologies, we demonstrate a universally secure, ultra-low power and scalable switchable data platform offering the highest level of data privacy, security and performance. Delivering up to 12 times the throughput speeds of existing USB 3.0 data transfer cables, the presented solution builds on the reliability of universal peripheral communications links using proven ports, protocols and low-power components. A "Software Constructed" ad-hoc circuit network, the presented digital architecture delivers frictionless adoption and exceptional price-performance measures connecting both existing and future systems.
15:37 Performance Evaluation of Dual-Polarized MIMO Ultra-Multilevel OFDM Using NU-QAM Under Mobile Reception
Hiroaki Otsubo, Akira Nakamura and Makoto Itami (Tokyo University of Science, Japan)
The combination of dual-polarized MIMO and ultra-multilevel OFDM is considered in the next-generation digital terrestrial broadcasting. Also, the use of Non-Uniform QAM(NU-QAM) as a new sub-carrier modulation scheme has been proposed. In the mobile reception of OFDM signal, inter-carrier interference(ICI) is generated by Doppler-spread. MIMO-ICI canceller using iterative detection can improve the reception characteristics with complexity reduction. In this paper, the reception characteristics are evaluated for dual-polarized MIMO ultra-multilevel OFDM using NU-QAM under mobile reception.

#### CT10-1: Consumer Healthcare Systems (CHS) - Session 1

Room: N261
Chairs: Stefan Mozar (Dynexsys Pty Ltd, Sydney & Guangdong University of Technology, Australia), Charalampos Z Patrikakis (University of West Attica & COmputer Networks & SErvices Research Team (CONSERT), Greece)
14:30 Monitoring System for a Single Aged Person on the Basis of Electricity Use- Heatstroke-Prevention System -
Yukio Nakano (Kanto Gakuin University, Japan); Takashi Nose, Kazutaka Hotta and Hideki Kawarai (Kansai Electric Power Co., Inc., Japan); Tsuyoshi Ueno (Central Research Institute of Electric Power Industry, Japan)
In order to develop monitoring systems for single aged persons by grasping their usage of electricity, especially by using smart meters prevailing recently, we are hatching out several algorithms to infer whether residents are living ordinary lives or not. This paper mentions a method to prevent heatstroke inside a home as one of the algorithms. The system estimates an on-off condition of an air-conditioner in the home by using data provided by the smart meter. If the outdoor air temperature is severely high and the air-conditioner is inferred not being turned on, the system will raise an alarm.
14:48 Design of the Intuitive Touch Screen and the Camera Control of a Remote Video Conference System
Y. W. Bai and Fu-Hua Kao (Fu Jen Catholic University, Taiwan)
To provide a more convenient operation, this design uses a popular Tablet PC touch screen function, an intuitive touch positioning algorithm (ITPA), and a video conference system based on the Session Initiation Protocol (SIP). By utilizing this design the M.D. can easily access the remote camera control of the remote video conference system in order to examine the different parts of the patient's body.
15:06 A Real-Time Sleeping Position Recognition System Using IMU Sensor Motion Data
Odongo Steven Eyobu (Kyungpook National University & Makerere University, Korea); Youngwoo Kim (Kyungpook National University, Daegu, Korea); Daewoong Cha and Dong Seog Han (Kyungpook National University, Korea)
The emergence of wearable miniature inertial measurement unit (IMU) sensors is a powerful enabler for lying motion data extraction. In this study, an IMU sensor is used for capturing 3D motion data. A spectrogram based algorithm for feature extraction from the motion data is proposed and implemented. Using the generated spectrogram based features, the long term short memory (LSTM) recurrent neural network (RNN) model is used for recognition of sleeping positions. The test results show that an accuracy of 99.09% can be achieved in a supervised learning mode. A real-time feature extraction and recognition system is developed to implement the proposed algorithm.
15:24 Improving Mobility and Autonomy of Disabled Users via Cooperation of Assistive Robots
Gabriele Foresi (Universita' Politecnica delle Marche, Italy); Alessandro Freddi, Andrea Monteriù and Davide Ortenzi (Università Politecnica delle Marche, Italy); Daniele Proietti Pagnotta (Universita' Politecnica delle Marche, Italy)
Robotic assistance for disabled users and/or for elderly people represents at the same time an active research area and a growing market, which will lead to commercial technological solutions in a near future. Cooperation of existing assistive technologies thus represents an important step towards the development of such solutions. In this paper, we face the problem of cooperation between a smart wheelchair and one or more robotic workstations: the wheelchair can navigate autonomously and permits to choose the point to move to or the object to interact with, while the robotic workstation can interact with one or more objects within its workspace and with the user on the wheelchair. The hardware/software architecture is here presented, together with some preliminary results.
15:42 Force and Activity Monitoring System for Scoliosis Patients Wearing Back Braces
Omar Iftikhar (University of Michigan-Dearborn, USA); Omid Dehzangi (West Virginia University, USA); Bhavani Anantapur Bache (University of Michigan-Dearborn, USA); Jeffrey Wensman and Ying Li (University of Michigan, USA)
Monitoring the effectiveness of brace treatment of scoliosis is an ongoing challenge that many physicians face today. Scoliosis is a medical condition which occurs in adolescents, where an individual's spine develops curvature. To successfully monitor compliance with brace treatment, a wearable multi-modal sensor solution is embedded into the patient's brace. The custom-designed hardware consists of a sensor board, a force sensor, an accelerometer and a gyroscope. The force sensor collects the force being exerted on the patient's back, while the accelerometer and gyroscope generate cues to determine the patient's activities and lifestyle. In this paper, we propose a novel embedded ubiquitous system to identify patient activities and evaluate the effectiveness of the brace treatment pervasively. Data is collected through the sensors and stored in a SD memory for longitudinal analysis. Our experimental results on real patients demonstrated that we achieved an overall accuracy of a 100% for activity detection in a semi-supervised experimental setup. It was also observed that the duration of brace wear increased from 20% to 80% in 4 weeks.

#### CT12-3: Smartphone and Mobile Device Technologies (MDT) - Session 3

Room: N260
Chairs: Acm Fong (University of Glasgow, Singapore), Kousik Ramasubramaniam Sankar (Larsen & Toubro Technological Services (LTTS), India)
14:30 ANN-based Stride Detection Using Smartphones for Pedestrian Dead Reckoning
Youngwoo Kim (Kyungpook National University, Daegu, Korea); Odongo Steven Eyobu (Kyungpook National University & Makerere University, Korea); Dong Seog Han (Kyungpook National University, Korea)
Position awareness is a very important issue for internet of thing (IoT) applications using smartphones. Pedestrian dead reckoning (PDR) is one of the methods used to estimate a user's indoor position. The accuracy of a stride detection is very important to guarantee the estimation accuracy of the user location. This paper proposes an algorithm to detect the stride using acceleration spectrogram feature by utilizing the accelerometer in a smartphone. An artificial neural network (ANN) technology is applied to detect the stride. The proposed algorithm has an accuracy of 97.7% for stride detection.
15:00 Lazy TRIM: Optimizing the Journaling Overhead Caused by TRIM Commands on Ext4 File System
Kitae Lee (Sungkyunkwan University & Samsung Electronics, Korea); Dong Hyun Kang (Sungkyunkwan University, Korea); Daeho Jeong (Samsung Electronics, Korea); Young Ik Eom (Sungkyunkwan University, Korea)
We propose a novel scheme, called lazy TRIM to reduce journaling overhead caused by the TRIM command.
15:30 Smartphone Based Lifelog with Meaningful Place Detection
Dailin Li, Yanlei Gu and Shunsuke Kamijo (The University of Tokyo, Japan)
With the advancement of electronic techniques, current smartphones can record location information with the help of WIFI signal, base station signal and Global Positioning System (GPS) receivers embedded in them. A smartphone can record where we go and where we stay. However, all the locations are recorded using latitude and longitude, which make it hard for users to have an intuitive feelings of these data. In this paper, we propose a way to find places where users stay for a while to perform some activities with the location data tracked by smartphone, and use a cascade classifier to infer users' different activities in different places. With places and related activities, we can build a lifelog for smartphone users.

#### ST07: Drones as Evolved Smart Multi-Sensor Networks (DSN)

Room: N253
Chair: Stelios Timotheou (University of Cyprus, Cyprus)
14:30 Optimized Vision-Directed Deployment of UAVs for Rapid Traffic Monitoring
Christos Kyrkou, Stelios Timotheou and Panayiotis Kolios (University of Cyprus, Cyprus); Theocharis G. Theocharides (University of Cyprus & KIOS Research and Innovation Center of Excellence, Cyprus); Christos Panayiotou (University of Cyprus, Cyprus)
Traffic monitoring through conventional sensor can be expensive, whereas using UAVs can be both cost-efficient and more flexible. In this paper, we a framework for rapid deployment of UAV-based systems for traffic monitoring. The framework considers a computer vision pipeline for vehicle density estimation, as well as the characteristics of the urban area with the goal of determining a-priori the optimal locations for a UAV in order to monitor an area, thus facilitating fast deployment. Using the city of Nicosia as a benchmark we show that our approach can find the optimal location for the placement of UAVs.
14:52 Drones as Collaborative Sensors for Image Recognition
Peter A Zientara (The Pennsylvania State University, USA); Jinhang Choi, Jack Sampson and Vijaykrishnan Narayanan (Pennsylvania State University, USA)
Distributed sensor networks have the ability for more data collection and advanced tasks such as object recognition and tracking than a singular sensor. However, these sensor networks are often limited in their ability to coordinate either by their requirement to be connected to a central system or by their fixed position and static nature. Drones or unmanned aerial vehicles (UAVs) provide a unique opportunity in multi-sensor networks. Although drones are usually limited by their available power due to battery capacity, recent advances in technology and algorithms provide drones with more available computational power. In addition to computability augmentation in drone mobility, decentralized coordination enables drones to create the next generation of distributed multi-sensor networks. In this paper, we explore combination of the existing image processing and object recognition techniques in the perspective of collaborative drones, which can improve the robustness of image recognition tasks.
15:15 Physiological Characterization of Need for Assistance in Rescue Missions with Drones
Fabio Dell'Agnola (Swiss Federal Institute of Technology Lausanne (EPFL), Switzerland); Leila Cammoun and David Atienza (EPFL, Switzerland)
The use of drones is recently gaining particular interest in the field of search and rescue. However, particular skills are still required to actively operate in a mission without crashing the drone. This limits heir effective and efficient employment in real missions. Thus, to assist the rescuers operating in stressful conditions, there is a need to detect an increase of workload that could compromise the outcome of the mission. In this work a simulator is designed and used to induce different levels of cognitive workload related to search and rescue missions. Physiological signals are recorded and features are extracted from them to estimate cognitive workloads. The NASA Task Load Index is used as subjective self-report workload reference. Then, performance is recorded to objectively evaluate the execution of the tasks. Finally, the analysis of variance (ANOVA) is used to verify intra- and inter-subject variability. Results show statistical decrease of the mean normal-to-normal (NN) interval with an increase of cognitive workload. Moreover, it is observed a decrease of performance while an increase of cognitive workload exists. This information can be used to detect the need for assistance.
15:37 Base Station Positioning for Industrial Wireless Sensor
Reza Abrishambaf and Mert Bal (Miami University, USA)
Wireless Sensor Networks (WSN) have increasingly been employed in a wide range of industrial applications mainly for monitoring, quality control and diagnosis of the industrial equipment and machines. In such industrial applications, one of the most challenging problem is to determine an optimal positions for mounting the wireless sensor nodes for the highest quality in signal reception. It is typically assumed that the sensor nodes used for monitoring the industrial machines are deployed on fixed locations adjacent to the machines, finding the position of the base station is an important problem that requires attention. In most cases, due to the harsh conditions of the industrial environment, it is necessary to utilize more than one base stations to improve the signal quality, which makes the problem more complicated. In this paper, we focus on the problem of estimating the number and optimal position for wireless base stations in an industrial application of WSNs. We present a k-means clustering based method for estimating not only the optimal position, but also the optimal number of the base stations. The simulation result illustrate that increasing the number of the base station to some extend will enhance the communication link quality in industrial environments where there is a huge effect of fading and shadowing

#### ST09-1: AR&VR Display and Human Interface Technologies for Automobile (AVA) - Session 1

Room: N256
Chair: Haruhiko Okumura (Toshiba Corp. R & D Center, Japan)

Opening Address: H. Okumura (Toshiba, Japan)

14:30 Automotive Displays from Direct View to AR Head-Up
Karlheinz Blankenbach (Pforzheim University & Display Lab, Germany)
Advanced displays enable new multimodal interactions for automotive use like (semi-) autonomous driving ranging from direct view to AR head-up displays. This paper presents selected challenges and solution for future automotive applications.
14:52 Human Interface Based on an Interaction Between Driver's Capability and Task Demands
Toshihisa Sato (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
This paper describes human interface design methods for in-vehicle systems. Task-Capability Interface model suggests a concept of safe driving based on an interaction between driver's capability and task demands. Drivers proceed the driving task safely when their capability (that was influenced mainly by their physical and cognitive conditions) exceeds the task demands (that are changed by the road traffic conditions and their driving operations). The paper focuses on an estimation method of the task demands and interface design factors for the estimated visual demand. Finally, we propose human interface of the automated driving systems based on the Task-Capability Interface model.
15:15 Proposal of Next-Generation HMI Utilizing Context and Personality Theories
Takanobu Matsuura (Nihon University, Japan); Keita Sato (DENSO Corporation, Japan)
The relationship between humans and cars is changing; cars are increasingly working autonomously instead of being operated by humans. However, humans tend to experience anxiety, annoyance, overconfidence or distrust when machines act against human expectations. Therefore, Human-Machine Interface (HMI) needs to evolve from a design aiming at automotive control to a logical design that intends to bring about cognitive-behavioral changes to meet human expectations. In this presentation, we propose 'Next-Generation HMI' that utilizes context and personality theories for understanding human expectations and prompting changes in human behavior.
15:37 Verification of HMI for an Automated Driving System by Using a Driving Simulator
Hidekazu Nishimura (Keio University, Japan)
Automated vehicles with automation level of 3 will be launched by 2020 from automotive companies. This paper introduces our activity to design and verify human-machine interface (HMI) to safely realize the driving delegation between the driver and the ADS. The system model of ADS designed is utilized to build a driving simulator to be used for HMI verification.

### Friday, January 12 16:00 - 16:30

#### Poster Session 1 / Coffee Break

Room: Break Area
Chairs: Konstantin Glasman (St. Petersburg State University of Film and Television, Russia), Fabrizio Lamberti (Politecnico di Torino, Italy)
16:00 Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud
Veeru Talreja, Terry Ferrett and Matthew Valenti (West Virginia University, USA); Arun Ross (Michigan State University, USA)
Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying identity. This authentication provides security and privacy for the hardware or the software systems. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs recognition operations in the cloud, while relying on simple and ubiquitous end-user devices such as smart-phones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their recognition algorithms to the cloud. When a biometric authentication request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and end-users. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission.
Yongcheol Yang, Jiyoung Moon, Kiuhae Jung and Jeik Kim (Samsung Electronics, Korea)
This article describes Tizen TV's new features on downloadable trusted application supports. It allows developers to write, build, debug their trusted applications on top of Tizen TV's REE(rich execution environment) and TEE(trusted execution environment). To make premium contents distribution more secure, Tizen TV also provides DRM Intrinsic TA(trusted application) to support joining secure media pipeline. Without security risks, service providers can take advantage of this downloadable TA development as well as the DRM Intrinsic TA on interoperability with their existing protection systems, and Tizen TV products don't need to upgrade the firmware for adding trusted applications any more.
16:03 PRNU-based Source Identification for Network Video Surveillance System
Sai Chung Law (The Hong Kong Polytechnic University, Hong Kong); Bonnie Law (Hong Kong Polytechnic University, Hong Kong)
Photo response non-uniformity (PRNU) noise is instrumental for camera source identification in image forensics. The paper proposes a signal-based detection system using PRNU for source identification in video surveillance systems. The effects of different aspects such as video resolutions, frame types and environmental conditions on the accuracy and reliability of the system have been tested. Our results show that the signal-based approach is effective to verify the video source.
16:04 Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application
YongSung Jeon (Electronics and Telecommunications Research Institute, Korea); Hong-Il Ju and Seungyong Yoon (ETRI, Korea)
LPWAN is expected to be used in various IoT applications such as smart parking, environment monitoring, etc. This paper introduces a method of processing LoRaWAN protocol which is one of LPWAN using Secure Element. If important information such as keys are stored in a General purpose MCU which is used frequently by IoT device, keys can be easily leaked by hacking. Therefore, this paper proposes a method to safely store keys and to process LoRaWAN protocol more securely based on Secure Element. In this paper, security functions such as data encryption and message signing are handled by the Secure Element. Therefore, the keys required to perform these functions are also managed within the Secure Element. And, this paper also proposes efficient integrity verification method of the executable of the main MCU based on Secure Element.
16:06 White List-based Ransomware Real-time Detection and Prevention for User Device Protection
DaeYoub Kim (University of Suwon, Korea); Geun-Yeong Choi (Suwon Univ, Korea); Jihoon Lee (Sangmyung University, Korea)
A ransomware encrypts valuable user/system files in victims, and then asks for a ransom to release a decryption key. So far, ransomware countermeasures are very similar to existing malware countermeasures which use patch services to distribute malware information. However, such approaches cannot prevent attacks of new/variant ransomwares. To detect/control ransomwares, this paper proposes to apply an access control scheme to the file operation procedure of the operating system on user's device. Since the proposed scheme does not use the patch of a ransomware information published by a trust party, it can prevent both new and variant ransomwares in real time.
16:07 Effect of Hardware Trojans on the Performance of a Coded Communication System
Karthi Balasubramanian (Amrita Vishwa Vidyapeetham & Amrita School of Engineering, Coimbatore, India); Karthikeyan Lingasubramanian (University of Alabama at Birmingham, USA); Yamuna B (Amrita Vishwa Vidyapeetham, India); Aravind Radhakrishnan and Kesavaraman Rengarajan (Amrita Vishwa Vidyapeetham, Amrita University, India)
Pernicious Trojan circuits inserted during the design or fabrication phases of an integrated circuit may cause undesirable effects in the designed system. In the case of communication systems, incorrect decoding of the received information is an issue that may lead to serious consequences. In this paper, we study the performance degradation of a coded communication system, due to the presence of hardware Trojans in the decoding unit. It can be seen that the Trojans have negligible effect at low SNRs while there is a statistically significant increase in the bit error rate (p < 0.01) at higher SNRs. At high SNRs, we expect the BER to tend towards zero, but it is observed that even with the Trojan being activated only once during the entire duration of the transmission, there is a constant bit error rate of the order of 0.0001.
16:09 Using NFC Tags and Smartphones to Design a Reliable Mechanism to Pick a Child Up from School
Y. W. Bai, Chi-Ning Fu and Jen-Hung Yang (Fu Jen Catholic University, Taiwan)
When school is over, parents picking up their child can be disoriented. This design provides a convenient mechanism to identify either the parents or any authorized person who can pick up their child. This design uses the smartphone NFC function and NFC tags to identify the authorized individual. This design provides a simple user interface to manage the school class table of children who are to be picked up. When either the parents or the authorized persons want to pick up their child, the teacher's smartphone scans the parents' or authorized individual's NFC tag and verifies the NFC tag with this table of children who are to be picked up within a short time.
16:10 Efficient and Secure Device Clustering for Networked Home Domains
DaeYoub Kim (University of Suwon, Korea); Jihoon Lee (Sangmyung University, Korea)
Virtual private community (VPC) architecture efficiently and securely creates personal domains to share content only in the networked domains without external authentication/proxy systems. For that, a secure device clustering method consisting of a device identification and membership management system is required. However, existing certificate chain based association (CCA) scheme for VPC, one of device clustering schemes, has two unsolved problems. First, since it does not verify who is an original creator of a VPC domain, it makes VPC vulnerable to spoofing attacks. Second, it does not consider how to restrain revoked members from accessing VPC domains, which causes malicious users to illegally access VPC domains. Hence, to solve such problems, this paper proposes a member list chain and reputation based association (MLC-RbA) scheme, and then evaluates the performance/security of MLC-RbA to prove that MLC-RbA provides better reliability
16:12 Malware Propagation Effects on SCADA System and Smart Power Grid
Tafseer Akhtar (Wireless Communications Laboratory, University of Patras, Greece); Brij Gupta (National Institute of Technology Kurukshetra, India); Shingo Yamaguchi (Yamaguchi University, Japan)
Critical infrastructures have suffered from different kind of cyber attacks over the years. Many of these attacks are performed using malwares by exploiting the vulnerabilities of these resources. Smart power grid is one of the major victim which suffered from these attacks and its SCADA system are frequently targeted. In this paper we describe our proposed framework to analyze smart power grid, while its SCADA system is under attack by malware. Malware propagation and its effects on SCADA system is the focal point of our analysis. OMNeT++ simulator and openDSS is used for developing and analyzing the simulated smart power grid environment.
16:13 DDefender: Android Application Threat Detection Using Static and Dynamic Analysis
Hani Alshahrani (Oakland University, USA); Harrison M Mansour (University of Alabama at Birmingham, USA); Seaver Thorn (East Carolina University, USA); Ali Alshehri, Abdulrahman Alzahrani and Huirong Fu (Oakland University, USA)
Android is the most widespread mobile operating system in the world. Due to its popularity, malware has been increasing every year steadily, which causes lots of problems to users, such as using the device's resources and transmitting private information without user's awareness. As malware has increased, anti-malware solutions have as well. Current anti-malware solutions often have very serious limitations and malware is becoming more apt to take advantage of them. In this paper, we present DDefender, a user-friendly application that detects Android malicious applications on device. DDefender is a comprehensive solution that utilizes static and dynamic analysis techniques to extract features from the user's device, then applies deep learning algorithm to detect malicious applications. At first, we use dynamic analysis to extract system calls, system information, network traffics, and requested permissions of an inspected application. Then we use static analysis to extract significant features from the inspected application such as application's components. By utilizing neural network and a large feature set of 1007 features, we evaluated our system with 4208 applications (2104 benign applications and 2104 malicious applications) and we achieved up to 95\% accuracy.
16:15 Real-time Eye Tracking for Password Authentication
Mehrube Mehrubeoglu and Vuong Nguyen (Texas A&M University-Corpus Christi, USA)
Personal identification numbers (PINs) are widely used for user authentication and security. Password authentication using PINs requires users to physically input the PIN, which could be vulnerable to password cracking via shoulder surfing or thermal tracking. PIN authentication with hands-off gaze-based PIN entry techniques, on the other hand, leaves no physical footprints behind and therefore offer a more secure password entry option. Gaze-based authentication refers to finding the eye location across sequential image frames, and tracking eye center over time. This paper presents an application for real-time gaze-based PIN entry and eye tracking for PIN identification using a smart camera. Captured data is processed to determine the digits gazed by the user and their order.
16:16 Energy-Aware Core Switching for big.LITTLE Multicore Mobile Platform
Yeomin Nam and Moonju Park (Incheon National University, Korea)
This paper addresses the problem of the core selection in heterogeneous multicore processors with big.LITTLE architecture used for mobile platforms. It is shown that core switching for less energy consumption must consider both core frequency and utilization.
16:18 Load Monitoring Effects and Characteristics of DC Home
Jinwook Lee and Sung-Yong Son (Gachon University, Korea); Eunsung Oh (Hanseo University, Korea); Tae Hoon Kim and Ju Yong Kim (KEPCO, Korea)
Recently most of the appliances are using DC power system internally, and DC based home has been proposed pursuing energy efficiency. The load monitoring is important for home electric energy management to identify energy consuming status. However, conventional approaches have been based on AC power systems. In this work, the effects of load monitoring at DC home are studies. Based on the data measured through a DC home power distribution testbed, the characteristics of DC home are discussed. The results show the effectiveness of load monitoring in DC home environments.
16:19 An Automatic Temperature Control for Induction Cooktops to Reduce Energy Consumption
Induction cooktops are very used as an efficient alternative to traditional cooking systems such as gas hobs. Even if the energy efficiency of induction cooktops is twice as much as the traditional gas burners, the differences in terms of the energy price can limit the diffusion and marketing of induction cooktops. Recent eco-normative are regulating the energy consumption of this kind of household appliances sold in different countries. This paper proposes an automatic temperature control to reduce the energy consumption for induction cooktops. As test case, the water boiling test was used to simulate and validate the proposed approach.
16:21 Infrared-Camera-based Metamer Marker for Use in Dark Environments
Kanghoon Lee, Chanran Kim and Jong-Il Park (Hanyang University, Korea)
We propose an invisible metamer marker that can be used in low illumination environments. The proposed marker is not visible to the eye as the color of the background is similar. In our system, the marker and the background image look differently appeared in the infrared camera image by using different printers for each region. The proposed method is able to produce uniform quality unlike existing invisible markers. Based on these metamerism features in infrared band, markers can be successfully used even in low light and dark environments and the commercial applicability is high.
16:22 A Practical Digital Door Lock for Smart Home
Yu Yuan-Chih (National Taipei University of Technology;Chinese Culture University, Taiwan)
Digital door lock plays an important role on the smart home system, not only for door guardian but also for family member incoming/outgoing awareness. However, most of the current digital door locks still keep the mechanical keyhole with digital interface to fulfill the traditional habit of key usage and consequently results in the doubt of redundant interface design. For this phenomenon, we discuss the design of digital lock and propose a mechanism to keep the traditional key usage with the digital interface. Moreover, We develop a smart-lock centered service model and create the possibility of service orchestration with the smart home system. We believe that the proposed digital door lock can survival in the power failure and provide more creative living experience.
16:24 Research on Testing Method of Heterogeneous Software Based on CDD Model
Cao Yan Yuan (Southwest University, P.R. China)
The complicated heterogeneous software that is featured by systems such as: E-commerce, E-government affairs, enterprise informatization, has developed at a rapid rate. In order to guarantee the quality of heterogeneous software, it is an urgent issue to research the testing method that is suited for its features. The software test based on model can generate test case according to software behavior model and structure model, effectively improve test efficiency. This article, based on the analysis of the feature of heterogeneous software, proposes test model of heterogeneous software—CCD (Component Collaboration Diagram) model, by constructing Components Specification Framework, and CCD to model the interactive relations between heterogeneous components. We put forward the testing method of heterogeneous software system.
16:25 Sparse Audio Inpainting with Variational Bayesian Inference
Giannis Chantas and Spiros Nikolopoulos (ITI-CERTH, Greece); Ioannis Kompatsiaris (Centre for Research and Technology Hellas, Greece)
Audio inpainting is defined as the process of restoring the damaged segments of an audio signal, based on the known signal values and prior information about the signal. In this paper, we formulate the problem in a Bayesian framework and adopt an efficient sparsity inducing Student's-t prior distribution, assumed for the discrete cosine transform coefficients, applied on the signal. We also propose a variational Bayesian algorithm for inpainting, that performs approximate, though tractable, inference. Lastly, experiments demonstrate the efficiency of the proposed methodology when used for declipping audio signals, by comparing with the state-of-the-art.
16:27 Gaussian Process Regression for Single-channel Speech Separation
Nguyen Le and Sih-Huei Chen (National Central University, Taiwan); Tzu-Chiang Tai (Providence University, Taiwan); Jia-Ching Wang (National Central University, Taiwan)
Gaussian process (GP) is a flexible kernel-based learning method which has found widespread application in signal processing. In this paper, a supervised method is proposed for handling single-channel speech separation (SCSS) problem. In this work, we focus on modeling a nonlinear mapping between mixed and clean speeches based on GP regression, in which reconstructed audio signal is estimated by the predictive mean of GP model. The nonlinear conjugate gradient method was utilized to perform the hyper-parameter optimization. An experiment on a subset of TIMIT speech dataset is carried out to confirm the validity of the proposed approach.
16:28 A Novel Secure Simple Bluetooth Pairing Using Physical Vibration
Young-Jae Min (SENTOUS Co., Ltd., Korea); Byungjin Hwang and Youngsun Han (Kyungil University, Korea)
We propose a novel secure simple Bluetooth pairing technology using physical vibration communication. We describe the modulation and demodulation of the vibration communication and propose a new Bluetooth secure simple pairing. Also, we confirmed the data rate of the vibration communication to be up to about 40 bps on a smartphone.

### Friday, January 12 16:30 - 17:30

#### Panel 1: Cloud Federation Standards

Room: N262/N264 (1st Come-1st Serve)
Chair: Stephen L Diamond (VMware, Inc. & VMware, Inc., USA)

Panelist: (1) Robert Bohn, NIST, Cloud Computing Program Manager, Advanced Networking Technologies Division, Information Technology Laboratory (ITL) (2) Donald R Deutsch, Oracle, Vice President, Chief Standards Officer (3) Joel Fleck, CA Technologies, Principal, Industry Standards and Open Source, Office of the CTO (4) John Messina, National Institute of Standards and Technology (NIST), Supervisory Computer Scientist

16:30 Cloud Federation Standards
Stephen L Diamond (VMware, Inc. & VMware, Inc., USA)

### Friday, January 12 17:30 - 18:30

#### CT04-2: RF, Wireless, and Network Technologies (WNT) - Session 2

Room: N258
Chairs: Uma Choppali (Eastfield College, USA), Angelo Perkusich (Federal University of Campina Grande, Brazil)
17:30 A Study on Class A Impulsive Noise Cancellation and Channel Estimation Under Rayleigh Fading Environment
Keisuke Ogura, Akira Nakamura and Makoto Itami (Tokyo University of Science, Japan)
OFDM is used in many applications that require high-speed communication. However, in OFDM under impulsive noise, the reception characteristics are strongly deteriorated by impulsive noise because impulsive noise has short time duration and very large magnitude. Therefore, it is necessary to reduce the influence of impulsive noise. In the compensation of impulsive noise, the channel condition is estimated by using pilot symbols. In this paper, the reception characteristics are improved under impulsive noise by the proposed scheme using scattered pilot symbols.
17:50 A Novel Design of UHF RFID Passive Tag Antenna Targeting Smart Cards Limited Area
Mahreen Riaz, Grzegorz Rymar, Mohammad Ghavami and Sandra Dudley (London South Bank University, United Kingdom (Great Britain))
The aim of this paper is to design an Ultra High Frequency (UHF) Radio Frequency Identification (RFID) passive tag antenna to fit in limited space of smart cards, such as bankcards, along with contactless payment facility and Europay, MasterCard and Visa (EMV) chip. In this paper, UHF tag antenna is designed using Monza R6 chip specifications from Impinj manufacturers while focusing on high performance and read ranges of up 12 meters with very small sized antenna dimensions of 17:9 47:30 mm2 . Performance is analysed in terms of gain, read ranges and power reflection coefficients. UHF tag antenna is designed using aluminium on Polyethylene Terephthalate (PET) substrate. The proposed design aims to meet objectives of low cost and small size while maintaining high performance.
18:10 Application Level Network Virtualization Using Selective Connection
Injung Hwang and Dongkun Shin (Sungkyunkwan University, Korea)
Since Internet-of-Things (IoT) devices transfer several types of data such as sensor values, images, and videos, multiple heterogeneous network interfaces are required to handle different types of data communications. To utilize the multiple network interfaces efficiently, the handover technique is important. However, the current network systems cannot transfer data during the handover operation between heterogenous network interfaces. In addition, the application programmer must implement the handover operation. In this paper, we propose a novel network virtualization technique called selective connection, with which an application-oblivious seamless switching between heterogeneous network interfaces is possible depending on the data type.

#### CT10-2: Consumer Healthcare Systems (CHS) - Session 2

Room: N261
Chairs: Dong Seog Han (Kyungpook National University, Korea), Shingo Yamaguchi (Yamaguchi University, Japan)
17:30 Prediction of the Time to Pregnancy by Kernel Density Estimation on Lifestyle Questionnaire
Shunsuke Nakamura (University of Tokyo, Japan); Toshihiko Yamasaki (The University of Tokyo, Japan); Kiyoharu Aizawa (University of Tokyo, Japan); Yusuke Ishikawa (FamiOne, Inc., Japan)
We presents a personalized method to estimate the time to pregnancy (TTP) for a natural conception by using kernel density estimation and k-nearest neighbor. Using this method, we can provide suggestions and a TTP estimation to guide decisions on which methods and actioins are suitable for those willing to conceive. In addition, we developed a user-friendly GUI system that can show the probability of the TTP and provide feedback through tips without requiring user expertise.
17:50 Training Environment for Electric Powered Wheelchairs Using Teleoperation Through a Head Mounted Display
Yuri Motta Lopes Rodrigues Silva (IFAM - Federal Institute of Amazonas, Brazil); Walter Charles Sousa Seiffert Simões (UFAM - Universidade Federal do Amazonas, Brazil); Mauro Ricardo da S Teófilo (Samsung Research Institute & Amazonas Federal University, Brazil); Eduardo Lazaro Martins Naves (Federal University of Uberlandia, Brazil); Vicente F. Lucena, Jr. (Federal University of Amazonas, Brazil)
Virtual wheelchair training environments have been implemented by different authors. However, they have not accurately represented the physical world behavior. Therefore this proposal consists of creating a training environment based on teleoperation, in which the user will remotely conduct a wheelchair receiving a real-time video feedback through an HMD.
18:10 Deep Learning for Automated Classification of Calcaneus Bone Fracture on CT Images
Yoga Prananta (Taiwan National Central University, Taiwan); Kuan-Chung Wang (National Central University, Taiwan); Tzu-Chiang Tai (Providence University, Taiwan); Jia-Ching Wang, Irwansyah Idram and Jiing-Yih Lai (National Central University, Taiwan)
Calcaneus, also called as heel bone, is the largest tarsal bone that forms the rear part of the foot. Cuboid bone articulates with its anterior and superior sides together with talus bone. Calcaneus is known to be the most fracture prone tarsal bone. Patient data can be stored in several kinds of imaging format, e.g. Computer Tomography (CT) data. It is a sequence of 2-D images that construct 3-D images. CT images contain a lot of medical information, such as fracture information in each slice of 2-D images that may not be accurate using visual inspection and need computer-assisted in solving this problem. This study proposed a new method to classify the fracture in calcaneus bone CT images. Convolutional Neural Network was applied in the classification step to see the better result between two methods. We classify into two classes (fracture and non-fracture) from three views that are coronal, transversal, and sagittal views.

#### ST08: Cybersecurity Beyond Encryption - Systems and Processes for Protection of CE (CSP)

Room: N253
Chair: Mike Borowczak (University of Wyoming, USA)
17:30 S-CHIRP: Secure Communication for Heterogeneous IoTs with Round-Robin Protection
Mike Borowczak (University of Wyoming, USA); George Purdy (University of Cincinnati, USA)
This work introduces CHIRP - an algorithm for communication between ultra-portable heterogeneous IoT devices with a type of round-robin protection mechanism. This algorithm is presented both in its basic form as well as in a secured form in order to secure and maintain trust boundaries and communication within specific groups of heterogeneous devices. The specific target application scenarios includes resource constrained environments where a co-located swarm of devices (adversarial in mission or objective) is also present. CHIRP, and its secured version (S-CHIRP), enables complete peer-to-peer communication of a n-agent network of devices in as few as n-rounds. In addition to the n-round cycle length, the proposed communication mechanism has the following major properties: nodes communication is entirely decentralized, communication is resilient to the loss of nodes, and finally communication is resilient to the (re)-entry of nodes. Theoretical models show that even the secure implementation of this mechanism is capable of scaling to IoT swarms in the million device range with memory constraints in the <10 MB range.
17:45 Portable Tor Router: Easily Enabling Web Privacy for Consumers
Mike Borowczak, Adrian Barberis, Wyatt Emery and Danny Radosevich (University of Wyoming, USA)

#### TT01-2: IEEE Cloud Computing (CCC) - Session 2

Room: N258
Chair: Bingwei Liu (Aetna Inc., USA)
17:00 A Comparison of Amazon Web Services and Microsoft Azure Cloud Platforms for High Performance Computing
Charlotte Kotas, Thomas Naughton and Neena Imam (Oak Ridge National Laboratory, USA)
Advances in commercial cloud computing motivate the necessity to continually evaluate the cloud's performance on a variety of applications. This work looks at compute oriented instances from Amazon Web Services and Microsoft Azure cloud platforms and evaluates them with several high performance computing benchmarks, including HPCC and HPCG. These benchmarks illustrate that the most cost competitive solution depends on the application to be run.
17:18 CMD: A Convincing Mechanism for MITM Detection in SDN
Kai Zhang and Xiaofeng Qiu (Beijing University of Posts and Telecommunications, P.R. China)
There are many security problems in network environment. Among them, man-in-the-middle (MITM) attack, as a typical network attack, greatly threatens the communication of network and damages victims. Until now, solutions to reduce the MITM attacks still have many limits. In this paper, we proposed a proactive detection mechanism CMD to detect MITM attacks in SDN network. The topology and connection characteristics of network traffic are utilized by CMD, without the analysis of packet contents. Through the theoretical analysis and experimental verification, CMD shows good time and accuracy performance.
17:36 Light-weight Accountable Privacy Preserving (LAPP) Protocol to Determine Dishonest Role of TPA in Cloud Auditing
Mohamed Ben Haj Frej, Julius Dichter and Navarun Gupta (University of Bridgeport, USA)
Cloud computing is surfacing as the next disruptive utility paradigm. It provides large storage capabilities, the development environment for application developers through virtual machines. It is also the home of software and databases that are accessible, on-demand. As security is the main constraint holding companies to fully engage into cloud, third party auditors (TPA) are becoming more and more common in cloud computing implementations. Of course, involving auditors comes with its own issues such as trust and processing overhead. To achieve productive auditing, we need to (1) accomplish efficient auditing without requesting the data location, nor introducing processing overhead to the cloud client; (2) avoid involving new security vulnerabilities during the auditing process. In this paper, we introduce a novel method allowing to detect a dishonest TPA: the Light-weight Accountable Privacy Preserving (LAPP) Protocol. This protocol determines the malicious behavior of the TPA. To validate the effectiveness of the proposed protocol, simulation experiments have been conducted, using the GreenCloud simulator. Based on our simulation results, we confirm that our proposed protocol provides better outcomes as compared to the other known contending protocols in terms of reliability, communication cost, and the auditing time per task by a fraction of the invalid responses.
17:54 A Containerized Media Cloud for Video Transcoding Service
Yu Dong (Shanghai Jiao Tong Unviersity, P.R. China); Xusheng Zhang, Yanan Zhao and Li Song (Shanghai Jiao Tong University, P.R. China)
Videos transmitted on the Internet need multiple versions due to the variety of needs from users. Video providers need to transcode an original video into different formats, with different bitrates and resolutions to satisfy those needs. To meet such demands, we design and implement a novel lightweight containerized media cloud for video transcoding service in this paper. We show the high efficiency, robustness, scalability and portability of our system.
18:12 Efficient Cloud Tracing: From Very High Level to Very Low Level
Yves Junior bationo, Naser Ezzati and Michel R. Dagenais (Ecole Polytechnique de Montreal, Canada)
With the increase of cloud infrastructure complexity, the origin of service deterioration is difficult to detect because issues may occur at the different layer of the system. We propose a multi-layer tracing approach to gather all the relevant information needed for a full workflow analysis. The idea is to collect trace events from all the cloud nodes to follow users' requests from the cloud interface to their execution on the hardware. Our approach involves tracing OpenStack's interfaces, the virtualization layer, and the host kernel space to perform analysis and show abnormal tasks and the main causes of latency or failures in the system. Experimental results about virtual machines live migration confirm that we are able to analyse services efficiency by locating platforms' weakest links.

#### TT02-2: IEEE-Sensors: Wearable Sensors for Health and the Environment - Session 2

Room: N253
Chair: Casey Boutwell (North Carolina State University (NCSU), USA)

(1) Invited Talk, Dave Wang, Striiv Inc. (2) Invited Talk, Ryan Kraudal, Valencell Inc. (3) Invited Talk, Natalie Wisniewski, Profusa Inc.

17:00 A Band-Pass IR Light Photodetector for Wearable Intelligent Glasses in a Drowsiness-Fatigue-Detection System
Liang-Bi Chen, Wan-Jung Chang, Wei-Wen Hu, Chun-Kai Wang, Da-Huei Lee and Yu-Zung Chiou (Southern Taiwan University of Science and Technology, Taiwan)
This paper proposes a band-pass infrared (IR) light photodetector, which is applied to our developed wearable intelligent glasses in a drowsiness-fatigue-detection (DFD) system. The proposed band-pass IR photodetector is designed to detect IR light in the wavelength range from about 810 to 890nm. The benefits of the proposed band-pass infrared photodetector are to provide higher SNR, decrease the ambient environmental light image to a minimum, and effectively enhance detection accuracy. As a result, the recognition algorithm is easier to be implemented and mounted on the light-weight version wearable intelligent glasses with high detection accurate rate.
17:15 Smart Belt for Recommending Food Items Based on the Stomach Dynamics
Manjunath Ramachandra (INDIA, India)
Majority of the people treat food habits, the intake quantity and the body status as independent things leading to health issues. Although devices are available in the market today that tell the calorific value and other attributes of the food and body status of the person such as hunger separately, there is no mechanism to tell how long a certain food stuff takes for digestion and how much of it should be consumed. It is person specific and changes dynamically. In this paper, an ultrasound sensor is embedded in the waist belt to estimate these parameters

### Sunday, January 14 8:30 - 9:00

#### Breakfast

Room: N262/N264 (1st Come-1st Serve)

### Sunday, January 14 9:00 - 10:00

#### Keynote 5: Internet of Things Security: Are We Paranoid Enough? Swarup Bhunia, Electrical and Computer Engineering, University of Florida

Room: N262/N264 (1st Come-1st Serve)
Chair: Anirban Sengupta (Indian Institute of Technology Indore, India)
9:00 Internet of Things Security: Are We Paranoid Enough?
Swarup Bhunia (UFL, USA)
Security has become a critical design challenge for modern electronic hardware. With the emergence of the Internet of Things (IoT) regime that promises exciting new applications from smart cities to connected autonomous vehicles, security has come to the forefront of the system design process. Recent discoveries and reports on numerous security attacks on microchips and circuits violate the well-regarded concept of hardware trust anchors. It has prompted system designers to develop wide array of design-for-security and test/validation solutions to achieve high security assurance for electronic hardware. At the same time, emerging security issues and countermeasures have also led to interesting interplay between security, verification, and interoperability. Verification of hardware for security and trust at different levels of abstraction is rapidly becoming an integral part of the system design flow. The global economic trend that promotes outsourcing of design and fabrication process to untrusted facilities coupled with the prevalent practice of system on chip design using untrusted 3rd party IPs, has given rise to the critical need of trust verification of IPs, system-on-chip design, and fabricated chips. The talk will also cover spectrum of security challenges for IoTs and describe emerging solutions in creating secure trustworthy hardware that can enable IoT security for the mass.

### Sunday, January 14 10:00 - 10:30

#### Awards Ceremony: ICCE 2018 and CE Society

Room: N262/N264 (1st Come-1st Serve)
Chairs: Saraju P Mohanty (University of North Texas, USA), Anirban Sengupta (Indian Institute of Technology Indore, India)

### Sunday, January 14 10:30 - 12:00

#### CT05-1: Internet of Things and Internet of Everywhere (IoT) - Session 1

Room: N258
Chairs: Dongmahn Seo (Daegu Catholic University, Korea), Fatemeh Tehranipoor (San Francisco State University, USA)
10:30 RRPhish：Anti-Phishing via Mining Brand Resources Request
Guanggang Geng (China Internet Network Information Center, P.R. China); Zhiwei Yan (CNNIC, P.R. China); Yu Zeng (China Internet Network Information Center, P.R. China); Xiao-Bo Jin (Henan University of Technology, P.R. China)
Although in recent years a variety of anti-phishing studies have been carried out, phishing fraud has become increasingly rampant. Especially with the popularity of electronic banking and mobile payment, phishing attacks have become more profitable. In this context, exploring efficient and practical anti-phishing technology is particularly necessary and urgent. In this paper, by analyzing the resources (CSS, JS, and image files) request characteristics of phishing sites, we propose a new anti-phishing method -- RRPhish, which is applicable to both client and server scenarios. In the client scenario, RRPhish as an enhanced blacklist technology, can detect not only phishes in blacklist, but also emerging phishes. The client-side experiments demonstrate the effectiveness of RRPhish, which is an effective complement to existing anti-phishing methods.
10:48 Support for ECHONET-based Smart Home Environments in the universAAL Ecosystem
Cu Van Pham (Japan Advanced Institute of Science and Technology, Japan); Yuto Lim (Japan Advanced Institute of Science and Technology (JAIST) & School of Information Science, Japan); Yasuo Tan (Japan Advanced Institute of Science and Technology & National Institute of Information and Communications Technology, Japan); Nak Young Chong (Japan Advanced Institute of Science and Technology, Japan)
With the advent of information and communication technology, many Ambient Assisted Living solutions are being proposed to increase the quality of life of elderly people and reduce health and social care costs. Among these AAL solutions, universAAL seems to be the most promising platform for easy and economical development of AAL services. However, in its current state, the platform is incompatible with smart home systems which are based on the ECHONET standard. This paper presents the bridging between the universAAL and ECHONET standards through a technical point of view and thereby enables AAL services for ECHONET-based smart home environments.
11:06 Study of Personal Customized Life Assisting System Consisting of Modular Devices
Shota Kazuno, Koki Nakamura, Makiko Okumura, Yusuke Kumakura and Masao Isshiki (Kanagawa Institute of Technology, Japan)
We developed a personal customized life assisting system consisting of modular devices to give useful information for us when we go out and communicate with people such as family and friends. Personal customized modular connections became possible by using Pogo pins in the connection part of the modules. Experimental results confirmed that our proposed system is useful for outgoing support services.
11:24 Heterogeneous Data Based Danger Detection for Public Safety
Hyunho Park, Eunjung Kwon and Eui-Suk Jung (ETRI, Korea); Hyun-Woo Lee (ETRI(Electronics and Telecommunications Research Institude), Korea); Yong-Tae Lee (Electronics and Telecommunications Research Institute, Korea)
In recent days, public safety service attracts attentions because of increasing crime rates. In this paper, heterogeneous data based danger detection (HDDD) mechanism is proposed for reducing crime rates. The HDDD mechanism is a mechanism for detecting dangerous situations (e.g., homicide and violence) based on heterogeneous data that are data gathered from multiple devices such as closed circuit television (CCTV) cameras, smartphones, and wearable devices. The HDDD enables immediate detection of dangerous situations and then reduces crime rates by responding to the dangerous situations.
11:42 Fuzzy Based Prediction Schema Framework for IoT Based Indoor Environmental Monitoring
Thinagaran Perumal (University Putra Malaysia & IEEE Consumer Electronics Society, Malaysia); Soumya Kanti Datta (EURECOM, France); Chui Yew Leong (University Putra Malaysia, Malaysia); Thinaharan Ramachandran (International University of Malaya Wales, Malaysia); Christian Bonnet (Institut Eurecom, France)
In recent times, rapid introduction of the Internet of Things (IoT) services in smart environment domain has happened. This has introduced heterogeneous device and data types that lack proper mechanism for joint execution of tasks from an application perspective. In this paper, we propose an integrated indoor environmental monitoring system implemented with a novel IoT framework. It is enabled via fuzzy-based rule schema to resolve the heterogeneity of environmental data in smart home environment. The novel aspect of the framework is that it is developed with a modular repository together with decision-making modules. Our experiments prove this approach to be a viable IoT solution for smart home indoor environment.

#### CT06-1: Entertainment, Gaming, and Virtual and Augmented Reality (EGV) - Session 1

Room: N253
Chairs: Shahriar Mirabbasi (University of British Columbia, Canada), Woontack Woo (KAIST, Korea)
10:30 Stereoscopic realtime 360-degree video stitching
Alexander Limonov (Samsung Electronics, Korea); Yu Xiao, Lei Juan, Cao Lei and Jian Yang (Samsung Research Center Beijing, P.R. China)
We present a system for real-time capturing and stitching high-resolution stereoscopic 360-degree video, which is suitable for streaming and viewing by a variety of existing VR devices. Our novel stitching algorithm uses depth proxy to resolve parallax problem and render omnidirectional stereo (ODS) video. Our 2-step camera calibration algorithm for multiple lenses allows finding precise intrinsic and extrinsic parameters, which in turn, allows doing accurate depth estimation and robust and consistent stitching. Both depth estimation and stitching algorithm are optimized for parallel computation on GPU, so we are able to stitch VR video at realtime.
10:45 Content Adaptive Tiling Method Based on User Access Preference for Streaming Panoramic Video
Zhengzhong Tu and Tongyu Zong (Fudan University, P.R. China); Xueliang Xi and Li Ai (China North Industries Group Corporation, P.R. China); Yize Jin (Fudan University, Shanghai, P.R. China); Xiaoyang Zeng (Fudan University, P.R. China); Yibo Fan (State Key Lab of ASIC and System, Fudan University, P.R. China)
Tiled streaming has been proposed for delivering ultra-high resolution videos such as zoomable online lectures or panoramas. However, not much work has been done on finding the best tiling method for streaming panoramic video. This paper proposes an effective tiling algorithm for tiled streaming by using both video content and user access preference history. Experimental results show that the proposed tiling method can save up to 32.4% and 69.8% of average streamed bitrate compared to conventional uniform tiling scheme and simply streaming the entire panorama respectively on equi-rectangular panoramic video.
11:00 Evaluating Accessibility Features Designed for Virtual Reality Context
Mauro Ricardo da S Teófilo (Samsung Research Institute & Amazonas Federal University, Brazil); Vicente F. Lucena, Jr. (Federal University of Amazonas, Brazil); Josiane Nascimento, Taynah Miyagawa and Francimar Maciel (Samsung Research Institute, Brazil)
The current work aims to present the evaluation of the efficiency of the Accessibility features on a Virtual Reality (VR) environment. The objective was to test an open source solution named Gear VRF accessibility, which provides a framework to be used by developers, and has the purpose of adapting Zoom, Inverted Colors, Auto-reading (Screen Reader) and Caption features in a VR environment. Interested to cover all the aspects related to the performance and satisfaction of the accessibility features hypotheses were created to be tested in a controlled environment. Regarding the fact that the solution was embedded into the Samsung Gear VR, all the participants were introduced to this device before testing the accessibility features. The performance and the level of satisfaction observed while the user executed the tasks were combined with users statements and resulted in a set of positive and negative feedbacks to improve the interaction and usage of the solution tested.
11:15 Functional and Computational Requirements for Mobile Augmented Reality Applications
Hyong-Euk Lee (Samsung Advanced Institute of Technology & Samsung Electronics, Korea); Dusik Park (Samsung Advanced Institute of Technology &amp; Samsung Electronics, Korea)
Functional and computational requirements have been dealt in designing mobile AR applications, considering theoretical studies, practical usability and technical constraints. Specifically, knowledge representation and graphical overlay rendering were mainly focused with the corresponding scenarios.
11:30 Panoramic Video Delivery Based on Laplace Compensation and Sphere-Markov Probability Model
Tongyu Zong and Zhengzhong Tu (Fudan University, P.R. China); Li Ai and Xueliang Xi (China North Industries Group Corporation, P.R. China); Yize Jin (Fudan University, Shanghai, P.R. China); Xiaoyang Zeng (Fudan University, P.R. China); Yibo Fan (State Key Lab of ASIC and System, Fudan University, P.R. China)
Virtual Reality (VR) is on the rise nowadays. To save bandwidth and ensure high quality when supplying VR videos, only the tiles overlapped with field of view (FOV) are transmitted in high quality while other tiles in low quality or even not transmitted. However, if a user's viewpoint moves fast, low-quality content will always appear in FOV because of round-trip time (RTT) delay. We propose methods based on Laplace compensation and Sphere-Markov probability to increase high-quality area in FOV. And a strategy is proposed that the former should be exploited over low-RTT networks while the latter over high-RTT networks.
11:45 Enabling Autonomous Navigation in a Commercial Off-The-Shelf Toy Robot for Robotic Gaming
Commercial off-the-shelf (COTS) robots are becoming ever more ubiquitous. Among the most common applications there are toy robots. In order to keep their cost down, these robots are usually equipped with the minimum set of sensors necessary for their basic functioning. Specifically, to add entertainment value, they often feature a video camera and, in most of the games developed so far, players are basically tele-operating them through a smartphone app. The present paper aims to show how to provide existing consumer-grade robots with new capabilities to transform them in more appealing gaming companions. In particular, by considering as a test bench a wheeled, non-holonomic COTS robot whose only accessible sensor is a low-resolution camera, previously unavailable localization and autonomous navigation capabilities are developed for it by exploiting dead reckoning and artificial landmark detection algorithms. These capabilities could then be exploited to create new types of games, which can be played in free-scale unknown environments and feature new forms of interaction. Implementation details of a sorting game in which the robot acts as a referee are reported.

#### CT07-5: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 5

Room: N261
Chairs: Chinthaka Premachandra (Shibaura Institute of Technology, Japan), Akihiko K. Sugiyama (Yahoo Japan Corporation, Japan)
10:30 Feature Based Analysis Friendly Video Coding Scheme for HEVC
Sovann Chen (Chulalongkorn University, Thailand); Htoo Maung Maung (Department of Research and Innovation & Ministry of Education, Myanmar); Supavadee Aramvith (Chulalongkorn University, Thailand)
This paper proposes an algorithm to maintain feature information of compressed video in high efficiency video coding (HEVC), where feature information is defined by SIFT (scale invariant feature transform) detector. Adaptive largest coding unit (LCU) selection is defined to determine LCU into two different groups, important LCU group and non-important LCU group. Moreover, two different bit allocations are generated in rate control to each group based on coding mode selection, Intra or Inter mode, to achieve target bit rate and also guarantee the feature information can be maintained. Experimental results show proposed method can achieve better SIFT similarity than original HEVC encoder from 1% to 10% at the same target bit.
10:45 Bit Allocation and Encoding Parameter Selection for Rate-Controlled Error Resilient HEVC Video Encoding
Gosala Kulupana and Dumidu S. Talagala (University of Surrey, United Kingdom (Great Britain)); Anil Fernando (Center for Communications Research. University of Surrey, United Kingdom (Great Britain)); Hemantha Kodikara Arachchi (Nottingham Trent University, United Kingdom (Great Britain))
Even though the latest video compression techniques such as High Efficiency Video coding (HEVC) have succeeded in significantly alleviating the bandwidth consumption during high resolution video transmission, they have become severely susceptible to transmission errors. Overcoming the resulting temporal impact of the transmission errors on the decoded video requires efficient error resilient schemes that can introduce robustness features to the coded video in order to mitigate the negative impact on the viewer. To this end, this paper proposes a rate-controlled error resilient bit allocation scheme, together with an encoding parameter selection process, to adaptively determine the most robust video coding parameters and the decoder error concealment operations during the encoding itself. Consequently, the proposed method has demonstrated 0.48dB-0.62dB PSNR gain over the state-of-the art methods at the same bit rate.
11:00 Effective Natural Communication Between Human Hand and Mobile Robot Using Raspberry-pi
Prabath Chinthaka (Sabaragamuwa University of Sri Lanka & Sabaragamuwa University of Sri Lanka, Sri Lanka); Chinthaka Premachandra (Shibaura Institute of Technology, Japan); Senaka Amarakeerthi (University of Sri Jayawardanapura, Sri Lanka)
We focus human-robot interaction (HRI) by performing natural communication between human hand and a mobile robot. The Raspberry-pi and Raspberry-pi camera module is installed on the robot. The system is capable to detect hand movement by processing the images from camera and respond according to the hand movements effectively. In addition, we set-up on-board LEDs react according each hand-movement to smoothen mutual communication between the robot and human hand. Through many experiments, we could confirm the effectiveness of the system.
11:15 Camera Orientation Estimation Using Motion Based Vanishing Point Detection for Automatic Driving Assistance System
Youngran Jo, Jinbeum Jang and Joonki Paik (Chung-Ang University, Korea)
This paper presents a camera orientation estimation method based on 3-line RANSAC using motion vector in a driving straight ahead vehicle. The proposed method consists of three steps: i) motion vector and z-axis vanishing point estimation using feature extraction and matching, ii) line detection and classification using 3-line RANSAC algorithm, and iii) camera orientation estimation with vanishing points using classified lines. The experimental result shows proposed method effectively estimate camera orientation parameter. Therefore, the proposed method can be applied in vehicle systems for automatic driving assistance system.
11:30 An HEVC Fractional Interpolation Hardware Using Memory Based Constant Multiplication
Ahmet Can Mert, Ercan Kalali and Ilker Hamzaoglu (Sabanci University, Turkey)
Fractional interpolation is one of the most computationally intensive parts of High Efficiency Video Coding (HEVC) video encoder and decoder. In this paper, an HEVC fractional interpolation hardware using memory based constant multiplication is proposed. The proposed hardware uses memory based constant multiplication technique for implementing multiplication with constant coefficients. The proposed memory based constant multiplication hardware stores pre-computed products of an input pixel with multiple constant coefficients in memory. Several optimizations are proposed to reduce memory size. The proposed HEVC fractional interpolation hardware, in the worst case, can process 35 quad full HD (3840x2160) video frames per second. It has up to 31% less energy consumption than original HEVC fractional interpolation hardware.
11:45 Decoding Complexity-Aware, Rate, Distortion Optimized HEVC Video Encoding
Thanuja Mallikarachchi (Cardiff Metropolitan University, United Kingdom (Great Britain)); Dumidu S. Talagala (University of Surrey, United Kingdom (Great Britain)); Hemantha Kodikara Arachchi (Nottingham Trent University, United Kingdom (Great Britain)); Anil Fernando (Center for Communications Research. University of Surrey, United Kingdom (Great Britain))
Video content adaptation has become a popular application layer approach to reduce the decoding complexity and the associated energy consumption of video playback. In this context, this paper proposes an encoding algorithm to generate less complex HEVC bit streams with minimal impact to the coding efficiency. The experimental results reveal a -17.27 \% average decoding complexity reduction and up to -24.91 \% energy reduction for openHEVC based software decoding with only -0.73 BD-PSNR loss.

#### CT13-1: Other Technologies Related with CE (MIS) - Session 1

Room: N256
Chairs: Wen-Chung Kao (National Taiwan Normal University, Taiwan), Wazir Zada Khan (Jazan University, Saudi Arabia)
10:30 Optimizing Memory Swapping Scheme on the Memory Debugging Platform of CE Devices
Youngho Choi and Dong Hyun Kang (Sungkyunkwan University, Korea); JaeOok Kwon (Samsung Electronics, Korea); Young Ik Eom (Sungkyunkwan University, Korea)
In this paper, we revisit the traditional memory debugging approach for CE Devices, and propose a novel memory debugging platform by modifying both DUMA library and Zram. Especially, we focus on the memory space wasted while detecting the memory error, because most CE devices have limited memory resource. For evaluation, we implemented a prototype of our debugging platform on Linux kernel version 4.8.17 and conducted various experiments with two different workloads. Our experimental results show that our scheme improves the performance of swapping by up to 58 times.
10:48 The Minimal-Effort Write I/O Scheduler for Flash-based Storage Devices
Daekyu Park (Sungkyunkwan University & Samsung Electronics, Korea); Dong Hyun Kang, Seung Min Ahn and Young Ik Eom (Sungkyunkwan University, Korea)
Unfortunately, current I/O stacks in the operating system cause the read-blocked-by-write problem because they try to issue write requests that came from the applications in a burst way. In this paper, we propose a novel I/O scheduler to efficiently mitigate the problem. The key idea of our scheduler is the minimal-effort write that calibrates the number of dispatched requests from the queues of the I/O scheduler. The evaluation results clearly show that our scheme improves overall read latency while guaranteeing the throughput required by the application. In the best case, our scheme reduces average read latency by up to 66% compared to conventional I/O schedulers.
11:06 User-based Resource Scheduling for Multi-user Surface Computing Systems
Hwan Kim, Jonggyu Park and Young Ik Eom (Sungkyunkwan University, Korea)
With technical advances in surface computing, surface computing devices such as tabletops support multi-user environments where multiple users run individual applications at the same time. To provide user-based scheduling and performance isolation among the users in such systems, we propose a new resource scheduling scheme for multi-user surface computing environments. The proposed scheme creates an individual resource group (user group) for each user, and inserts all processes of the user into the user group at the time the processes are created. Since the user group can be isolated from other user groups and the system can allocate resources based on users, not processes, the proposed scheme provides user-based scheduling and performance isolation among the users. In our experiments, the proposed scheme shows 1.56 times and 1.66 times better performance for CPU and I/O benchmarks, respectively, compared to the conventional scheme.
11:24 RFID-Based Scheme for TV Receiver Control in Case of Theft
Allan Amorim, Caio Cruz, José Fernandes, Jeferson Bentes da Costa, XianPan Chen and Rômulo Fabrício, Jr. (TPV Technology, Brazil); Eddie B de Lima Filho (TPV & Universidade Federal do Amazonas - UFAM, Brazil)
Cargo theft is a major problem in consumer electronics logistics chains, due to additional costs regarding security schemes, which try to avoid attempted robbery or track devices, and financial losses, which happen when criminals succeed in stealing goods. Although typical approaches, such as armed escort and electronic decoys, are somehow effective, they normally need additional support from other departments and do not make devices inoperable. The present article address such a problem and proposes an RFID-based methodology for disabling and enabling TV receivers, during transportation and when final destinations are reached, respectively. Real experiments revealed enhancement opportunities, allowed fine tuning, and finally showed its effectiveness, when individual devices are received, unloaded, and enabled, at costumer sites.
11:42 Design of Spectrum Shaping Codes for High-Density Data Storage
Kui Cai (Singapore University of Technology and Design, Singapore); Kees A. Schouhamer Immink (Turing Machines Inc., The Netherlands); Mu Zhang (Huawei Technologies Co., Ltd, P.R. China); Rong Zhao (Singapore University of Technology and Design, Singapore)
We propose a systematic code design method for constructing efficient spectrum shaping k constrained codes for high-density data storage systems. Simulation results demonstrate that the designed codes can achieve significant spectrum shaping effect with only around 1% code rate loss and reasonable computational complexity.

#### TT04: IEEE Standards Association (IEEE-SA)

Room: N260
Chair: Rudi Schubert (IEEE Standards Association, USA)

Panel Speakers:
(1) Melissa Sassi, Microsoft
(2) Maria Palombini, IEEE Standards Association
(3) Rudi Schubert, IEEE Standards Association

10:30 IEEE-SA Industry Connections -- Leading the Intersection of Emerging Technology and Policy
Rudi Schubert (IEEE Standards Association, USA)

### Sunday, January 14 12:00 - 13:30

#### Lunch / Keynote 6: Proactive Cyber Security Response by Utilizing Passive Monitoring Technologies, Koji Nakao, National Information Communication Technologies (NICT), Japan, Yokohama National University

Room: N262/N264 (1st Come-1st Serve)
Chair: Jong-Hyouk Lee (Sangmyung University, Korea)
12:00 Proactive Cyber Security Response by Utilizing Passive Monitoring Technologies
Koji Nakao (NICT, Japan)
Recently, variety of cyber-attacks such as DDoS, Information Leakage, Illegal Access, Spam, Business E-mail Compromise, Phishing, Advanced Persistent Threats (APT), Man-in-the-Middle attacks are frequently recognized even in the consumer's environment. These cyber-attacks are often triggered by "malwares" and have been maliciously evolving and sometimes hidden from our monitoring countermeasures (FW, IDS/IPS). For proactively responding cyber-attacks, utilizing passive monitoring technologies should be reconsidered as possible security supportive solutions. In this talk, after introduction of latest cyber-attacks to share the current cyber threats landscape, passive monitoring technologies such as darknet and honeypot/sandbox will be explained with practical use-cases to accurately observe and monitor ongoing threats (cyber-attacks). The use-cases may include detection of malware-infected IoT devices by means of darknet and honeypot monitoring. Furthermore, detection of cyber-attacks by passive monitoring can be utilized for cyber security proactive response as practical solutions. Finally, future security considerations will be given for utilizing extendible passive monitoring technologies to proactively respond against cyber-attacks under smarter city and connected environments.

### Sunday, January 14 13:30 - 15:00

#### CT05-2: Internet of Things and Internet of Everywhere (IoT) - Session 2

Room: N258
Chairs: Wazir Zada Khan (Jazan University, Saudi Arabia), L. Dennis Shapiro (Arzak Corp, USA)
13:30 Low-cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications
Fatemeh Tehranipoor (San Francisco State University, USA); Nima Karimian, Paul A Wortman and John A Chandy (University of Connecticut, USA)
Nowadays, the consumer electronic (CE) market has grown to include smart devices for the Internet of Things. With increased adoption of these smart IoT devices, there is a high demand for safe and secure authentication for the purpose of maintaining effective access control. This paper addresses the concerns of authenticating consumer electronic devices using low-cost methods for implementation within customer healthcare frameworks. Our aim is not only to tackle the security issues related to the malicious behavior of supply chain counterfeit devices but also for establishing a secure architecture platform base for users to authenticate within a consumer electronic network. The proposed low-cost solution implements Physical Unclonable Function (PUF) for device verification and incorporates human behavioral characteristics (Biometrics) for user authorization as a comprehensive codesign method.
13:48 Improved Durability of Soil Humidity Sensor for Agricultural IoT Environments
Young Ju Jeong, KwangEun An and SungWon Lee (Catholic University of Daegu, Korea); Dongmahn Seo (Daegu Catholic University, Korea)
Soil humidity is the most important factor for plant growth. Therefore, the soil humidity sensor is an important part of smart farm application using agricultural IoT environments. Since soil humidity sensors are applied wet underground and the sensor consists of copper, rust eats away the copper surface of sensors. From rusting of sensors, wrong information of soil humidity can be collected on smart farm system based on agricultural IoT Environments. It makes that smart farm is not reliable. In this paper, we propose a new type of soil humidity sensor in order to extend life time.
14:06 On Analysis of Substitutability for System Resilience in IoT System Based on PN2
We focus on a property to deal with system resilience in the Internet of Things system called substitutability. It is important to ensure that production line failure is avoided. Substitutability is a property of a machine or device to operate instead of another machine or device. In this paper, we modeled IoT by PN2 (Petri nets in a Petri net). We formalized substitutability problem and proposed a formal analysis method for the problem. We illustrate the analysis with a substitutable and non-substitutable example of a drone worker in a smart warehouse. The effectiveness is shown as the accuracy to equate the difference of behavior in agent substitutions and to reduce the range of state space analysis of the whole PN2 to only the agent nets.
14:24 On the Cybersecurity of m-Health IoT Systems with LED Bitslice Implementation
AbdelRahman Eldosouky and Walid Saad (Virginia Tech, USA)
The Internet of Things (IoT) will provide a large scale infrastructure that can support a plethora of new networked services. One of the critical services is m-Health IoT which allows monitoring the health status of patients while providing the ability for a rapid response in emergency cases. Connecting healthcare services to the Internet through IoT brings new security threats and vulnerabilities that can jeopardize the patients' private data. In this paper, a novel security framework for m-Health IoT security is proposed using the concept of moving target defense (MTD). MTD allows the m-Health system to dynamically change its keys to increase uncertainty on an attacker and secure the data. In the proposed scheme, the devices update their keys locally to eliminate the risk of revealing the new keys while being shared with the gateway. A practical implementation is proposed based on bitslicing LED, a lightweight encryption cipher, to improve the performance of decrypting multiple packets at the same time. LED bitsliced implementation was tested on ARM Cortex-A53 which was shown to consume half of the processor's instructions compared to the original implementation. The effect of applying MTD on the number of processor's instructions is evaluated and shown to be bounded.
14:42 An IoT-Ready Streaming Manager Device for Classroom Environments in a Smart Campus
Tomas Herrera and Felipe Nunez (Pontificia Universidad Catolica de Chile, Chile)
The Internet of Things is slowly becoming reality. The proliferation of smart devices will take the human-machine relationship to a new level, and the classroom is not the exception. This paper presents the design and implementation of an IoT-ready classroom device for screen streaming based on an inversed VNC approach over TCP/IP on a wireless local area network. Streaming permission is granted following an authentication-authorization scheme to avoid undesired content streaming, thus allowing the operation over a public network. The device communicates to the network by publishing its status to a MQTT broker, which makes it an active thing in an IoT setup.

#### CT05-3: Internet of Things and Internet of Everywhere (IoT) - Session 3

Room: N253
Chairs: Narisa Chu (CWLab International, USA), Fatemeh Tehranipoor (University of Connecticut & NAPW Member, USA)
13:30 Dynamic State-Predictive Control for a Remote Control System with Large Delay Fluctuation
Hiroshi Yoshida (NEC Corporation, Japan); Taichi Kumagai (NEC Corp., Japan); Kozo Satoda (NEC Corporation, Japan)
Under the concept of IoT, various machines are beginning to be controlled remotely through the Internet and wireless IP networks. However, such an IP network brings about large delay fluctuation due to the nature of its packet queue. The delay is called dead time in control theory and makes it difficult to stabilize remote control. In this paper, we propose a novel state-predictive control that compensates for dead time by adjusting the prediction horizon dynamically on the basis of a real-time estimation of the time-varying delay. A simulation using actual delay data shows that the proposed method improves the stability and robustness.
13:52 Knowledge of Things: A Novel Approach to Share Self-Taught Knowledge Between IoT Devices
Ingook Jang (Electronics and Telecommunications Research Institute (ETRI), Korea); Donghun Lee and Jinchul Choi (Electronics and Telecommunications Research Institute, Korea); Young-Sung Son (ETRI, Korea)
The heterogeneity of Internet of Things (IoT) has increased as the number of IoT devices connected to the Internet has grown. This trend increases complexity and inconvenience for the use of various IoT devices. In this paper, we propose a Knowledge of Things (KoT) framework which facilitates sharing of self-taught knowledge between heterogeneous IoT devices which require similar or identical knowledge. The proposed model allows IoT devices to efficiently produce, cumulate, and share their self-taught knowledge with other devices in the vicinity.
14:15 System Architecture for IoT Services with Broadcast Content
Hiromu Ogawa, Masaya Ikeo, Hisayuki Ohmata, Chigusa Yamamura and Hiroshi Fujisawa (NHK (Japan Broadcasting Corporation))
The development of smartphones and IoT devices may increase the touch points of broadcast content. Herein, we consider providing broadcast contents in a new way using a diversity of devices. We propose a system architecture and an application framework based on Hybridcast to communicate the metadata of broadcast content among a TV, a smartphone, and IoT devices. Moreover, we prototype two use cases and indicate that two kind of services are realized with one framework based on our proposed system.
14:37 Versatile Prediction Core for IoT Applications
Toshiaki Uejima, Hiroki Mizosoe, Kunihiko Suzuki and Takashi Yamada (Hitachi Information & Telecommunication Engineering Ltd., Japan)
A novel prediction method for IoT applications is presented. The proposed method estimates both the state and the state change of the tracked targets by processing multidimensional features from numerous external sensors using machine learning. The proposed method achieves longer-term prediction with less computational time than conventional methods.

#### CT07-6: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 6

Room: N261
Chairs: Tanir Ozcelebi (Eindhoven University of Technology, The Netherlands), Akihiko K. Sugiyama (Yahoo Japan Corporation, Japan)
13:30 Robust Photometric Alignment for Asymmetric Camera System
Anirudth Nambirajan (Indian Institute of Technology Madras, India); Bindigan Hariprasanna Pawan Prasad and Anurag Jain (Samsung R&D Institute, India); Venkat R Peddigari (Samsung Electronics & Texas Instruments India Pvt. Ltd., India)
Multiple image sensors have now become the defacto offering from all major mobile phone manufacturers. Their applications vary from improving the image quality to providing new features to the end-users. One of these multi-sensor system is a tele-wide asymmetric camera configuration which is aimed at providing better zoom experience with more crisper images. One such major challenge is accurate photometric alignment which is required to compensate the difference in auto exposure(AE), auto white balance(AWB), and the inherent differences in terms of both intrinsic and extrinsic parameters of the two camera sub-systems. Conventional methods in literature for photometric alignment make several assumptions and are also not very adaptable to different lighting conditions. To the best of our knowledge, accurate photometric alignment intended towards fusion of images from asymmetric tele-wide cameras that works in unconstrained scenarios and at all zoom ratios, is not very well studied. In this paper, we propose a computationally efficient algorithm for brightness and color correction that is suitable for fusion of images from multiple asymmetric cameras. The proposed method is evaluated quantitatively using the RMSE metric and qualitatively.
13:45 Multiple Feature Instance Detection with Density Based Clustering
Onalenna Makhura and John Woods (University of Essex, United Kingdom (Great Britain))
This paper describes an approach to local feature instance detection by treating this as a clustering problem. We use a density based clustering algorithm and a local feature detection algorithm. The paper also provides an approach to validating the results. Confidences are calculated for each cluster using core distances and intra-cluster distances to determine how valid the each cluster is for a particular value of the clustering algorithm parameter for minimum cluster size. We used the statistical values of kurtosis and skewness to validate the choice of minimum cluster size and describe a way of using these values to make an informed choice of the proper value of minimum cluster size.
14:00 Adaptive Noise Canceller with Two SNR Estimates for Stepsize Control
Akihiko K. Sugiyama (Yahoo Japan Corporation, Japan)
This paper proposes an adaptive noise canceller with two SNR estimates for stepsize control. The first SNR, which is a power ratio of the error signal and the adaptive filter output, is used conventionally for stepsize control. The second SNR is newly introduced as a power ratio of the primary and the reference input signals. The coefficient adaptation stepsize is basically controlled by the first SNR. However, in the initial period when a high first SNR prohibits adaptation, the second SNR is used as an approximation to the first SNR. Switching from the second to the first SNR is performed when the latter takes a smaller value than the former. Evaluations with a speech mixture demonstrates that use of the second SNR followed by the first SNR successfully made the sum of squared coefficients approach the true value which represents convergence.
14:15 An Efficient FPGA Implementation of HEVC Intra Prediction
Hasan Azgin, Ahmet Can Mert, Ercan Kalali and Ilker Hamzaoglu (Sabanci University, Turkey)
Intra prediction algorithm used in High Efficiency Video Coding (HEVC) standard has very high computational complexity. In this paper, an efficient FPGA implementation of HEVC intra prediction is proposed for 4x4, 8x8, 16x16 and 32x32 angular prediction modes. In the proposed FPGA implementation, multiplications with constants are implemented using DSP blocks in FPGA. The proposed FPGA implementation, in the worst case, can process 55 Full HD (1920x1080) video frames per second. It has up to 34.68% less energy consumption than the original FPGA implementation of HEVC intra prediction. Therefore, it can be used in portable consumer electronics products that require a real-time HEVC encoder.
14:30 Optimization of HEVC Lambda-domain Rate Control Algorithm for HDR Video
Junaid Mir (University of Surrey & CVSSP, United Kingdom (Great Britain)); Dumidu S. Talagala (University of Surrey, United Kingdom (Great Britain)); Anil Fernando (Center for Communications Research. University of Surrey, United Kingdom (Great Britain))
Rate Control (RC) will play an important role in conceiving high-fidelity HDR video distribution through transmission and broadcast in imminent future. However, as video coding standards, like HEVC, are generally designed and optimized for the LDR content, this can result in an inefficient HDR video compression in the Rate- Distortion (RD) sense. In this paper, the state-of-the-art HEVC Lambda-domain RC algorithm is optimized for HDR video coding by proposing a new Lambda-QP relation after investigating the suitable RD model for HDR content. The updated RC algorithm with proposed relation outperforms the default HEVC RC algorithm achieving averaged PU-PSNR improvements of up to 1.36 dB for HDR video test sequences. Further, performance improvement is also evident from the HDR-VDP-2.2 Q and HDR-VQM based RD performance curves.
14:45 HDR Image from Single LDR Image After Removing Highlight
Partha Pratim Banik, Rappy Saha and Ki-Doo Kim (Kookmin University, Korea)
A low dynamic range (LDR) image that contains highlight does not provide proper information at the highlight area. Besides, all area of the image may not be exposed properly. Removing the highlight and then converting the image to the high dynamic range (HDR) image will increase the quality of the image from visual perception. In this paper, we propose a method for removing the highlight from an LDR image and convert the highlight free image to HDR image by using tone mapping operator (TMO). After detecting highlight area of an image, modified specular free (MSF) image is used to remove highlight part from the LDR image. Then, the highlight free LDR image is converted to HDR image by TMO. Finally, we have measured the quality of our output image to show that output image has better dynamic range than the input image.

#### CT13-2: Other Technologies Related with CE (MIS) - Session 2

Room: N256
Chairs: Shunsuke Kamijo (The University of Tokyo, Japan), Gordana Velikić (RTRK Computer Based Systems LLC, Serbia)
13:30 Robust Bounded-Error Subset Selection
Masoud Alghoniemy (University of Alexandria, Egypt)
We show that the bounded-error subset selection problem can be interpreted as a worst-case robust optimization problem, where the solution vector is robust under worst-case signal perturbations. In particular, the solution to the subset selection problem is robust when the signal under consideration is allowed to take arbitrary values within a fixed-interval uncertainty set. We also show that the robust behavior of the bounded-error subset selection is superior than the well-known methods for solving the subset selection problem (e.g., Basis Pursuit, Orthogonal Matching Pursuit, and the Lasso algorithms)
13:45 Transformer-DARwIn: A Miniature Humanoid for Potential Robot Companion
Jean Chagas Vaz (University of Nevada Las Vegas & Drones and Autonomous System Lab @ UNLV, USA); Paul Oh (University of Nevada, Las Vegas, USA)
Robot companionship has become more popular in past years. However, humanoid gait might be somewhat unstable for these applications. Even with miniature humanoids, falls occur frequently. Thus, wheel attachments have been added onto a miniature humanoid, so it can move faster and with more stability than walking. In addition, with such attachments a robot can switch from walking to rolling when necessary. DARwIn-OP is a humanoid robot that has been used as an experimentation and performance evaluation platform. This paper discusses preliminary work regarding robot companionship applications by using a miniature humanoid capable of fetching different toys based on voice command.
14:00 Direct Canvas: Optimized WebGL Rendering Model
Hyowon Kim, Sunwoo Nam, Joonghun Park and Daehyun Ko (Samsung Electronics, Korea)
WebGL has been introduced as one of the powerful web features for developing 3D content. However, there are still performance issues when compared to the native GL applications. The traditional WebGL rendering requires unnecessary buffers and copies even though when WebGL is the only content in the current web page. This paper presents an optimized rendering model when WebGL is used as dominant content like 3D games. And we will demonstrate its effectiveness with performance data measured on the embedded devices.
14:15 Mitigating Write Interference on SSD in Home Cloud Server
Hyeji Lee, Minho Lee and Young Ik Eom (Sungkyunkwan University, Korea)
Recently, some home appliances such as smart TVs and home gateways adopt virtualization technologies to perform the role of home cloud server and govern all connected devices efficiently. In such virtualized systems, it is important to satisfy the I/O performance SLO (Service Level Objective) of each VM. In this paper, we propose a novel write buffer management scheme for SSDs in home cloud server, which guarantees the SLO of each VM by mitigating write interference problem among the VMs. Experimental results clearly show that our scheme outperforms the conventional write buffer scheme in terms of I/O performance SLO of each VM.
14:30 Smart Coffee Roaster Design with Connected Devices
Yao Xu, Jonathan Shaull, Travis Bavar and Li Tan (Purdue University Northwest, USA)
The paper proposed a smart coffee roaster design with connected devices. The proposed design provides the bean temperature, bean cracks and carbon monoxide monitoring and also allows the operator full control even at a distance from the unit and isolates the operator from potentially harmful side effects such as headache, dizziness, etc. Moreover, the proposed design not only makes the device safer for the patron to use but also paves the way for automating other home appliances like an oven, washer and dryer, etc.
14:45 Mass Production EMC Status Quick Evaluation Through Cloud Computing - A New Option for Electric Product Quality Control
Wei WU (Independent Engineer, Portugal); Yuejia Wu (Engineer, P.R. China)
This paper proposes an innovative methodology for mass production EMC status quick evaluation. The evaluation is carried out in workshop instead of a shielding room, with a digital oscilloscope to acquire product data which is further calculated by Cloud Computing. An application example of the proposed methodology is introduced which not only indicates that product with fail EMC status may be discovered from mass production quickly in low cost, but also unveils there is certain relationship between product quality and EMC status.

#### TT05: IEEE Future Directions (IEEE-FD) - Immersive Future

Room: N260
Chairs: Thomas Coughlin (Coughlin Associates, USA), Kathy Grise (IEEE, USA)
13:30 "Immersive Future" with New and Emerging Innovations and Predictions
Kathy Grise (IEEE, USA)
The session hopes to demonstrate the interplay and intersections among Big Data, Brain, Digital Senses, and Fog Computing. Emphasis will be upon presenting practical applications and its implementations. Invited subject matter expert speakers will comment on current and past implementations, with a focus on predictions of the future and potential implications to the consumer. In particular on aspects of AR, VR, and Mixed Reality.

### Sunday, January 14 15:00 - 15:30

#### Fellow Elevation Ceremony

Room: N262/N264 (1st Come-1st Serve)

### Sunday, January 14 15:30 - 16:00

#### Poster Session 4 / Coffee Break

Room: Break Area
Chairs: Konstantin Glasman (St. Petersburg State University of Film and Television, Russia), Fabrizio Lamberti (Politecnico di Torino, Italy)
15:30 Adaptive Remote Control of a Mobile Robot System with Delay Fluctuation
Taichi Kumagai (NEC Corp., Japan); Hiroshi Yoshida and Kozo Satoda (NEC Corporation, Japan)
Since the concept of an Internet of Things (IoT) has become widespread, remote control of IoT devices by long-distance communication through the Internet and wireless networks is gaining much attention. However, best-effort IP networks such as the Internet and wireless IP networks bring about a time delay fluctuation because of cross-traffic and radio interference. The delay fluctuation deteriorates the stability of remotely controlling IoT devices such as mobile robots, which is a major challenge of a long-distance remote control system. In this paper, we construct an experimental environment for long-distance communications using the Internet and a wireless LAN and investigate round trip times (RTTs) on it. Furthermore, we present a novel remote control method for a mobile robot by dynamically adjusting its moving velocity on the basis of a real-time estimation of a network delay. A simulation of the remote control using the obtained RTT data shows that the proposed remote control achieves highly efficient movement of the robot even on a network that has time delay fluctuation.
15:31 Self-Configuration Without Commissioning for Wireless Internet of Things Using Subjective Logic
Tanir Ozcelebi and Johan J. Lukkien (Eindhoven University of Technology, The Netherlands); Bert van Kraaij and Maarten Brock (Van Mierlo Ingenieursbureau BV, The Netherlands)
Internet of Things (IoT) applications need commissioning and configuring of the IoT infrastructure that is comprised of devices called 'Things'. In some cases, e.g. for an intelligent street lighting infrastructure in a city, we are looking at tens of thousands of Things that need to be commissioned and configured. This procedure can take several months, is very costly and error prone. This becomes especially tricky with increased use of wireless communication thanks to deployment that does not require wiring. For IoT applications that employ reasoning based on location, we propose a low-complexity and adaptive method based on computational trust for self-(re)configuration of wireless Things. The proposed method does not require commissioning.
15:33 Measurement and Evaluation of Comfort Levels of Apartments Using IoT Sensors
Yuki Obuchi and Toshihiko Yamasaki (The University of Tokyo, Japan); Kiyoharu Aizawa (University of Tokyo, Japan); Satoshi Toriumi and Mikihisa Hayashi (Future Standard Co., Ltd., Japan)
We developed IoT sensors for the evaluation of the comfort level of real estate building properties. An IoT sensor can measure temperature, humidity, illuminance, and acceleration and can record audio and video. We measured these elements in rooms using the IoT sensors. From this experiment, we succeeded in evaluating the difference in comfort levels of the rooms. For example, we determined quantitatively that an upper-floor room received more sunshine than a lower-floor room despite the fact that the two rooms were in the same building.
15:34 A Study on Development of the Blind Spot Detection System for the IoT-Based Smart Connected Car
Donghwoon Kwon (Texas A&M University-Commerce, USA); Suwoo Park (Rovitek Inc., Korea); SunHee Baek, Ritesh Malaiya and Geumchae Yoon (Texas A&M University-Commerce, USA); Jeong-Tak Ryu (Daegu University, Korea)
The Internet of things (IoT) is an emerging topic in a variety of industry fields such as manufacturing, engineering, automobile, etc. Especially, many automobile companies are competitively introducing a smart-connected car in conjunction with the IoT technology. For instance, some recent vehicles support autonomous driving using cameras and radar-based safety features such as pre-collision prevention system, lane departure alert with a steering assistant function, etc. Based on this example of the IoT-based smart connected car, we actually developed the camera-based blind spot assistance system. The power / serializer board and camera board consisting of a number of sensors, processors, and other hardware components were developed by our own system interface design, and we confirmed that the developed system successfully met quantitative evaluation criteria through testing. Furthermore, we are proposing an idea of object detection in the blind spot based on a deep learning methodology, as well as proposing an embedded system design for transmitting the acquired image data to the server to fulfill the connectivity characteristic.
15:36 Census: Continuous Posture Sensing Chair for Office Workers
Yasuhiro Otoda (Nara Institute Science and Technology, Japan); Teruhiro Mizumoto (Nara Institute of Science and Technology, Japan); Yutaka Arakawa (Nara Institute of Science and Technology & NAIST, Japan); Chihiro Nakajima, Mitsuhiro Kohana and Motohiro Uenishi (Okamura Corporation, Japan); Keiichi Yasumoto (Nara Institute of Science and Technology, Japan)
Continuously undesirable or same sitting position for a long time causes the burden on the waist and shoulders, leads to mental stress, reduces work efficiency. Therefore, it is important to measure their sitting situation, improve the sitting pose, change the posture periodically, and move from the seat. At that time, it is necessary to continuously measure without affecting the work of the office worker. Consequently, we developed a sensing chair called ''Census'' satisfying those conditions. This sensing chair has a function to classify the sitting posture of workers with the accuracy of 80.2%.
15:38 Lightweight Smart Home Security System Using Multiple RSS-based Voting
Teasung Kim, Jeehyeong Kim, Jaewon Noh and Sunghyun Cho (Hanyang University, Korea)
A centralized smart home system can be attacked by hacking the center or camouflaging as a member device. We propose a distributed security system using received signal strength (RSS) based voting. The peripheral devices vote according to whether the RSS is in a pre-calculated range. The validation of a data is conducted by the result of vote. If the peripheral devices approve more than 60%, the data is regarded to be trusted. We have confirmed through actual implementation and experiments against the camouflage attack scenario. As a result, the proposed system blocked the data from a camouflaged device as 100% in the experiments.
15:39 A Smart Middleware to Detect On-Off Trust Attacks in the Internet of Things
Jean Caminha (Federal University of Mato Grosso & Federal University of Campina Grande, Brazil); Angelo Perkusich (Federal University of Campina Grande, Brazil); Mirko Perkusich (UFCG, Brazil)
Security is a key concern in Internet of Things (IoT) designs. In a heterogeneous and complex environment, service providers and service requesters must trust each other. On-off attack is a sophisticated trust threat in which a malicious device can perform good and bad services randomly to avoid being rated as a low trust node. Some countermeasures demands prior level of trust knowing and time to classify a node behavior. In this paper, we introduce a Smart Middleware that automatically assesses the IoT resources trust, evaluating service providers attributes to protect against On-off attacks.
15:41 A Security Evaluation of Popular Internet of Things Protocols for Manufacturers
Daniel Celebucki, Jr, Alan Lin and Scott Graham (Air Force Institute of Technology, USA)
The Internet of Things (IoT) continues to increase in popularity as more "smart" devices are released and sold every year. Three protocols in particular, Zigbee, Z-wave, and Bluetooth Low Energy (BLE) are used for network communication on a significant number of IoT devices. However, devices utilizing each of these three protocols have been compromised due to either implementation failures by the manufacturer or security shortcomings in the protocol itself. This paper identifies the security features and shortcomings of each protocol citing employed attacks for reference. Additionally, it serves to provide recommendations for secure implementation of these protocols.
15:42 Development of Laundry-work Assistance Robot by Using IoT Technology
Kousuke Kanazawa, Shota Kazuno, Yuki Shiozawa, Masao Isshiki and Makiko Okumura (Kanagawa Institute of Technology, Japan)
In this paper, we developed a laundry uptake robot that supports tasks such as "dry" and "take in" for the laundry work which is one of "Instrumental Activities of Daily Living".　This robot has mainly three functions, which protect laundry from sudden rain by using rainfall prediction information and water sensor, automatically take in laundry, and control these operations remotely. Battery charged from a solar panel was used to reduce power consumption. With this robot, we can dry laundry outside without worrying about rain, and we can take in the laundry wherever we are.
15:44 Non-Invasive Real Time Continuous Monitoring of Blood Glucose Smart Sensor Design Based on IoT
Rahul Shandilya (National Institute of Technology Kurukshetra, India); Rajender Kumar Sharma (National Institute of Technology Kurukshetra & National Institute of Technology Kurukshetra, India)
Diabetes, a really serious and progressively common disease, happens once the body cannot able to use insulin properly to transfer glucose to the cells that required for energy. This condition leads to blood glucose levels being unreasonably high or hazardously low, these may cause to serious complications like visual disorder, kidney disease, amputation and vascular disease. Proper precaution should be taken at soonest possible. So, there's a strong requirement of non-invasive type Continuous glucose monitoring system. This paper presents a cost effective, low-power, non-invasive Continuous glucose monitoring system for analysis of blood sugar levels in the body. The system is based on Internet of Things and cloud computing. Internet of Things is the network of internet connected objects which are capable of collecting and exchanging data with the help of embedded sensors. The system is using low cost open source Arduino Uno Board which collects the data coming from sensors unit and transmits the data to the cloud using Wifi shield. The real-time data sent to the cloud can be monitored in the form of labeled data and graphs anytime on blynk app installed on Android or iOS based mobile phones having internet connectivity.
15:46 Five Acts of Consumer Behavior: A Potential Security and Privacy Threat to Internet of Things
Wazir Zada Khan and Mohammed Yehyah Aalsalem (Jazan University, Saudi Arabia); Muhammad Khurram Khan (King Saud University, Saudi Arabia)
The existing security and privacy preserving solutions proposed for IoT-enabled consumer products overlook communal acts of a consumer behavior. They lack support in case when IoT Consumers borrow, rent, gift, resale and retire their IoT-enabled electronic products. In this paper, we attempt to highlight IoT consumer's security and privacy violation through seemingly five different angles. We also speculate that IoT products or devices, even after their End of Life (EOL), i.e. "IoT waste", could become an attractive gateway for cyber criminals to access private information. Consequently, we present some recommendations in this regard.
15:47 Study of Localization Method for Switching Between Low Electricity Consumption and High Precision for a Watching System
Hideyuki Kobayashi (National Institute of Technology, Sendai, Hirose, Japan); Akiko Takahashi (Sendai National College of Technology, Japan); Shinji Chiba, Nahomi M. Fujiki and Yoshihiro Hayakawa (National Institute Technology, Sendai, Hirose, Japan)
We propose a hybrid localization system for watching security. In a usual monitored area, the system localizes provided with high accuracy with relatively high power consumption. However, if there are abnormalities such as someone being taken or wandering, it switches to localization using Bluetooth Low Energy that can operate at low power consumption over a long period of time. As a result of experiments with actual machines, our proposal system estimates a terminal is within 5m became 100%. Moreover, the position was able to be estimated at 84.2% by using the finger print method.
15:49 Economic Incentive Based Solution Against Distributed Denial of Service Attacks for IoT Customers
Vipindev Adat (University of Patras, Greece); Amrita Dahiya (NIT Kurukshetra, India); Brij Gupta (National Institute of Technology Kurukshetra, India)
The market of Internet of Things is increasing at a very high rate. As most of the devices get connected to the internet, the security challenges of these devices are also increasing. With the abundance in the internet connectivity, distributed denial of service attack incidents is many folded in the recent past. The constrained nature of IoT devices makes them the easy target for the attackers. Further, the trade-off between quantitative factors like size, space and response time with a qualitative property like security mechanism, on a manufacturer's point of view, always prefers the quantitative properties and the security mechanisms in most of the IoT-enabled smart devices are minimal. Considering such a scenario, we propose a model to secure the IoT network like a smart home using a secure gateway router. Further, we propose the risk transfer mechanism based on economic incentive based agreement. It can be the most feasible solution in a case if the owner of the network is not always able to ensure the security of the whole network. An already communicated third party will take care of the security in case of any security breach.
15:50 A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Aakanksha Tewari and Brij Gupta (National Institute of Technology Kurukshetra, India)
In spite of being a promising technology which will make our lives a lot easier we cannot be oblivious to the fact IoT is not safe from online threat and attacks. Thus, along with the growth of IoT we also need to work on it's aspects. Taking into account the limited resources that these devices have it is important that the security mechanisms should also be less complex and do not hinder the actual functionality of the device. In this paper, we propose an ECC based lightweight authentication for IoT devices which deploy RFID tags at the physical layer. ECC is a very efficient public key cryptography mechanism as it provides privacy and security with lesser computation overhead. We also present a security and performance analysis to verify the strength of our proposed approach.
15:52 Efficient Management of Precision Agriculture Using Wi Fi Based Sensor Nodes and IoT Services
Lyla B Das (NITC, India); Jithin Krishna (National Institute of Technology, India)
This paper proposes a system for the management of an agricultural environment using Wi-Fi based Wireless Sensor Networks (WSN) and Internet-of-Things (IoT). The system collects data from the environment and soil through the sensor nodes in the network. The collected data is stored on IoT servers and the farmer can monitor and control his farm such as turn on valves, motors etc, receive alerts and notifications updates from anywhere in the world through his farming website and also through social networking sites. What is unique in this paper is the way we have used WiFi and IoT services. We have used the most recent, efficient and low power hardware and software for the realization of our goals. We have also used the services offered by many kinds of IoT service providers to make this work attractive and useful. This is a big change from established agricultural procedures. But it is expected that such innovative technologies when introduced into the farming sector will attract the younger generation into this profession by making it more productive and easy to manage.
15:54 Dynamic Autonomous Frequency Reuse for Uplink Cellular Networks
Mohamed Elwekeil (Faculty of Electronic Engineering, Menoufia University, Egypt); Masoud Alghoniemy (University of Alexandria, Egypt); Osamu Muta (Kyushu University, Japan)
In this paper, a dynamic autonomous frequency reuse approach is adopted for resource allocation in the uplink of cellular networks. It is assumed that each cell is divided into inner and outer regions. The proposed approach is based on minimizing the total uplink interference at every eNB for all users in both inner and outer regions in the network. The main advantage of the proposed scheme is that it adapts itself to the varying wireless channel. Simulation results show that the proposed approach provides better total network uplink throughput and average user uplink bit rate compared to the traditional fractional frequency reuse (FFR) regardless of the User Equipment (UE) transmit power, cell radius and user density within the cell.
15:55 Study on Headphone Hearing Loss Prevention Methods Based on the Melody Structure of Music on Portable Music Player
Daiki Okabe and Yoshihisa Nakatoh (Kyushu Institute of Technology, Japan)
In this paper, we examine the volume control system in an application to prevent the onset of headphone hearing loss due to music listening using a portable music player. First, the possibility that lower the volume to a safe level without be noticed by the user (difference of perceived attenuating level) are evaluated. Based on the above experiments, we examine the melody structure of music by attenuate the volume separately for melody structure (Intro part, Verse, Chorus, Interlude). Finally, we evaluated difference of the perceived attenuating level considering frequency characteristics.
15:57 Single-Channel Speech Dereverberation Based on Block-wise Weighted Prediction Error and Nonnegative Matrix Factorization
Chan Woong Kwak (Gawngju Institute of Science and Technology & Gawngju Institute of Science and Technology, Korea); Kwang Myung Jeon (Gwangju Institute of Science and Technology (GIST), Korea); In Young Park (Gawngju Institute of Science and Technology, Korea); Hong Kook Kim (Gwangju Institute of Science and Technology (GIST), Korea); Jeong Eun Lim and Ji Hyun Park (Hanwha Techwin, Korea)
This paper proposes a speech dereverberation method based on a block-wise weighted prediction error (BWPE) method and nonnegative matrix factorization (NMF). The proposed BWPE method iteratively estimates late reverberation using maximum likelihood (ML) estimation in a block-wise manner. To ensure consistent dereverberation performance over time, a forgetting factor is applied on intermediate estimates. Thus, the recent statistics of the signal are emphasized during the block-wise processing. In addition, the NMF-based source separation meth-od is applied to reduce early reverberation that remains in the signal processed by the proposed BWPE method. The perfor-mance of the proposed method is compared with that of the con-ventional weighted prediction error (WPE) method by measur-ing the Segmental signal-to-noise ratio (SSNR). It is shown from the comparison that the proposed method achieves a higher SSNR than the conventional method. Moreover, the proposed method can be implemented in a real-time audio recording de-vice with an algorithmic delay of 20ms.
15:58 Portable Intelligent Home Service System Based on SSVEP
Ruijie Zhao, Liya Huang, Tian Zhou, Qing Wang, Yu Wang and Wentao Hua (Nanjing University of Posts and Telecommunications, P.R. China)
In this paper, a portable intelligent home service system based on Steady State Visually Evoked Potential(SSVEP) is constructed. This system is directly controlled by the brain, which is very suitable for special environment operations and assistive activities for the disabled. It is combined with intelligent home to meet the needs of the disabled and improve the quality of life of the disabled. Compared with the traditional BCI system, this system has better portability and cost performance. We also analyze the performance comparison between the Canonical Correlation Analysis(CCA) algorithm and the classical Fast-Fourier transform(FFT) algorithm under different sampling time in this paper. The experiment results demonstrate that the system has the characteristics of portable, small volume, low cost and high accuracy.

### Sunday, January 14 16:00 - 17:00

#### CT03: Application-Specific CE for Smart Cities (SMC)

Room: N253
Chair: Toshihiko Yamasaki (The University of Tokyo, Japan)
16:00 Simple Online and Realtime Tracking with Spherical Panoramic Camera
Keng-Chi Liu, Yi-Ting Shen and Liang-Gee Chen (DSP/IC Design Lab., National Taiwan University, Taiwan)
In this paper, a simple yet effective method for online and realtime multi-object tracking (MOT) on 360-degree panoramic videos is proposed. Based on current state-of-the-art tracking-by-detection paradigm, several improvements have been made to overcome the challenges of full field-of-view (FOV) of Spherical Panoramic Camera (SPC). In addition, two datasets are presented for evaluation. It is shown that the proposed method outperforms the baseline by 28.6% and 27.8% in terms of average Multiple Object Tracking Accuracy (MOTA) on each dataset.
16:20 Development of Projection LED Guiding Sign for Dynamic Motion Imaging
Masashige Suwa, Ritsuya Oshima and Reiko Sakata (Mitsubishi Electric Corporation, Japan)
Recently, the flow lines or the lines of action have been getting knotty in railway stations, public establishments and office buildings as the facilities and service outlets operating there are complexly organized and the security control is more enhanced. Although a variety of signs are provided there to guide people and goods, they are considered insufficient presently because it is sometimes difficult to reach intended destinations smoothly. In order to provide a solution to the issue, this paper proposes a projection LED guiding sign that projects guiding signs on the walls and floors.
16:40 Similar Floor Plan Retrieval Featuring Multi-Task Learning of Layout Type Classification and Room Presence Prediction
Yuki Takada and Naoto Inoue (University of Tokyo, Japan); Toshihiko Yamasaki (The University of Tokyo, Japan); Kiyoharu Aizawa (University of Tokyo, Japan)
In this paper, a new framework for real estate property search using a floor plan image as a query is presented. In similar property search, appearance-based similar floor plan image retrieval does not work well because similar properties would have totally different floor plan images. Therefore, we propose a multi-task learning using deep neural networks to solve this problem. In our proposed method, Convolutional Neural Networks (CNNs) are trained to solve the two tasks: one is layout type classification and the other is room presence classification.

#### CT05-4: Internet of Things and Internet of Everywhere (IoT) - Session 4

Room: N258
Chairs: Teruhiro Mizumoto (Nara Institute of Science and Technology, Japan), Moonju Park (Incheon National University, Korea)
16:00 DNSLedger: Decentralized and Distributed Name Resolution for Ubiquitous IoT
Xinan Duan (Computer Network Information Center, P.R. China); Zhiwei Yan (CNNIC, P.R. China); Guanggang Geng (China Internet Network Information Center, P.R. China); Baoping Yan (Computer Network Information Center, P.R. China)
With the popularity of internet of things, object identifier has gradually been taken seriously. As the identification information of the object, object identifier has many similarities with internet domain name. Despite the current domain name system is already mature enough, there are still some fundamental problems. Aiming at altering the centralized domain name management model, we propose a decentralized domain name system-DNSLedger. DNSLedger is a distributed system based on blockchain, which implements the features of common maintenance, node equivalence and so on. This paper will make a brief introduction to DNSLedger and analyze what advantages the proposed model has. To provide a feasibility scheme for the management of object identifier.
16:20 Real-time Speaker Recognition System Using Multi-stream I-Vectors for AI Assistant
Keunseok Cho, Jaeyoung Roh, Youngho Han and Namhoon Kim (Samsung Electronics, Korea); Jaewon Lee (Samsung Electronics Co. Ltd, Korea)
We describe a real-time speaker recognition that works in sync with ASR engine. In order to improve recognition accuracy, we employed multi-stream i-vectors. The proposed multi-stream i-vectors compensate the limited amount of information contained in a single i-vector. Our approach provides superior performance compared with GMM based approach.
16:40 Ensemble Based Real-time Indoor Localization Using Stray WiFi Signal
Vishal Singh, Gorish Aggarwal and Ujwal Bachiraju Venkata Satya (Samsung Research Institute Bangalore, India)
Accurate Indoor localization using minimalist hardware has a huge potential for energy savings and smart homes. Current indoor localization techniques involve deployment of complex array of sensors such as Bluetooth beacons, PIR sensors, etc. However, these sensors are commonly intrusive and require extra hardware which might not be available in most homes especially in underdeveloped countries. In this paper, we present an ensemble based learning technique to detect a real-time room level location inside a home situated in a residential complex. The method only uses existing WiFi infrastructure in the complex. The method uses an ensemble of classifiers on a weighted time averaged RSS signals to detect the user location. The analysis was done on the data collected by authors in a residential setup through a self-developed android application. The home setup included 4 locations (2 Bedrooms, Living Room and Kitchen). The total prediction accuracy achieved was 85.7%. The localization algorithm was reaffirmed on the Dutch Residential Energy dataset (DRED) and is also compared to those obtained using multiple bluetooth beacons used for localization using the DRED dataset. These localization results can be further utilized to impart better intelligence to smart home devices.

#### CT07-7: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 7

Room: N261
Chairs: Masoud Alghoniemy (University of Alexandria, Egypt), Ilker Hamzaoglu (Sabanci University, Turkey)
16:00 User-friendly Inter-Pupillary Distance Calibration Method Using a Single Camera for Autostereoscopic 3D Displays
Hyoseok Hwang (Samsung Advanced Institute of Technology, Korea); Dongwoo Kang (Samsung Advanced Instittue of Technology, Korea)
The accurate inter-pupillary distance (IPD) of a user plays an important role and is a prerequisite for eye-tracking-based autostereoscopic three-dimensional (3D) display systems by calculating the precise 3D eye position of the users. We aimed to develop a robust computer-aided algorithm for each user-specific IPD calibration using a single camera in a user-friendly manner. Our algorithm consists of eye tracking, pattern rendering, user pattern selection, and IPD adjustment according to the selected patterns. Two stereo patterns were designed to clearly show the IPD differences: a 3D stereo registration pattern and a complimentary stereo pattern. We applied this algorithm to 21 users. The reference standard was provided by a commercial pupilometer. The IPD values obtained by the proposed method and the reference standard IPD values were not statistically different (64.9 ± 4.1 mm from the algorithm and 64.2 ± 3.4 mm from the reference standard, p = 6.64) from the students' t-test. A good agreement was observed among the 21 users in using the IPD calibration software with an agreement of 94.8% (kappa 0.89, 95% confidence interval from 0.83 to 0.96, and p < 0.0001). Our algorithm shows promising results in IPD calibration using a single camera in a user-friendly manner.
16:15 Robust, Precise, and Calibration-Free Shape Acquisition with an Off-the-Shelf Camera and Projector
Chunyu Li, Akihiko Torii and Masatoshi Okutomi (Tokyo Institute of Technology, Japan)
Recently, three-dimensional (3D) shape acquisition systems composed of simple commercial devices have received significant attention from both professional and nonprofessional users. In this work, we propose a flexible projector-camera system that can accurately acquire whole shapes of 3D objects without requiring any special calibrations. The proposed system is based on structured-light and Structure-from-Motion (SfM) techniques that use coded patterns as dense discriminative features instead of the local features popularly used in SfM. To this end, recordings of coded patterns are inserted by moving the camera (to capture image data from multiple camera view points) and projection of the patterns by moving the projector. The proposed system can accurately recover even texture-less objects owing to the advantages of both SfM and structured-light. We demonstrate the benefits of this system by several experiments using real data and compare it to current methods.
16:30 Mosaic Block Detection Based on HOG with SVM Classifier and Template Matching
Keiichi Shirasuka (Mitsubishi Electric Corporation, Japan)
Digital video signal is widely used in modern society. There is increasing demand for it to be more secure and highly reliable. Focusing on this, we propose a method of detecting mosaic blocks. Our proposed method combines two algorithms: HOG with SVM classifier and template matching. We also consider characteristics of mosaic blocks other than shape. Experimental results show that our proposed method has high detection performance of mosaic blocks.
16:45 An HEVC Real-time Encoding System with High Quality HDR Color Representations
Daisuke Kobayashi (NTT Media Intelligence Laboratories, NTT Corporation, Japan); Ken Nakamura (NTT Media Intelligence Laboratories & NTT Corporatoin, Japan); Takayuki Onishi (NTT, Japan); Yasuyuki Nakajima and Hiroe Iwasaki (NTT Media Intelligence Laboratories, Japan); Mitsuo Ikeda and Atsushi Shimizu (NTT, Japan)
In recent years 4K video broadcasting and distribution services have spread rapidly and high dynamic range (HDR) technology has been attracting a great deal of attention to make its 4K video services more realistic. We have developed and proposed new coding control methods to improve perceptual quality by reducing degradation of HDR-specific color artifacts. The proposed methods improve the video quality degradation by color difference on average 2.35% in the most degraded frames, while PSNR remains almost same.

#### CT13-3: Other Technologies Related with CE (MIS) - Session 3

Room: N256
Chair: Reza Abrishambaf (Miami University, USA)
16:00 EMI Designs Support System Using Augmented Reality
Yoshitaka Watanabe (Persol AVC Technology Co., Ltd., Japan); Shinya Manabe and Taishiro Tanaka (Kyushu Institute of Technology, Japan); Yasuhito Fukui (AVC Technology Co., Ltd., Japan); Kiyoshi Okuizumi (AVC Technology CO., Ltd, Japan); Jun Nakamura (Shibaura Institute of Technology, Japan); Noriyuki Kushiro (Kyushu Institute of Technology, Japan)
In this paper, we introduce the development of Electromagnetic interference (EMI) designs support system using Augmented Reality (AR). First, we describe the development efficiency improvement effect and the advantages not depending on the Equipment Under Test (EUT) size by using AR technology for the visualization system of the near electromagnetic field noise. Then, we explain the wave source model inverse problem analysis approach, which estimates the radiation mechanism of the unnecessary radiation noise based on the measurement value of the near electromagnetic field noise.
Siya Bao (Waseda Unniversity, Japan); Masao Yanagisawa and Nozomu Togawa (Waseda University, Japan)
This paper proposes a road-illuminance level inference method based on the naive Bayesian analysis. We investigate quantities and types of road lights and landmarks with a large set of roads in real environments and reorganize them into two safety classes, safe or unsafe, with seven road attributes. Then we carry out data learning using three types of datasets according to different groups of the road attributes. Experimental results demonstrate that the proposed method successfully classifies a set of roads with seven attributes into safe ones and unsafe ones with the accuracy of more than 85%, which is superior to other machine-learning based methods and a manual-based method.
16:40 Indoor Localization Using Visible Light Communication and Image Processing
Aswin PK (National Institute of Technology, Calicut, India); Lyla B Das (NITC, India); Shyama P (National Institute of Technology, Calicut, India)
Indoor localization using short-range wireless communication techniques has gained popularity over the Global Positioning System due to the latters limited capability to provide indoor positioning information. This paper reports the implementation of a multi-transmitter visible light communication based indoor localization system that offers a moderate data rate and indoor positioning with sub-meter accuracy. The work includes a prototype of the proposed system with four transmitters and a receiver module mounted on a stationary base. The transmitted data was Manchester encoded, and Binary Amplitude Shift Keying modulated. Multiple access of channel was achieved using Time Division Multiple Access technique. The receiver module used a PIN photodiode to detect the light signal and indoor positioning or localization was implemented using received signal strength technique.

#### TT06: IEEE CE Society Future Directions (CESoc-FD)

Room: N260
Chair: Lee Stogner (IEEE, USA)

Panel Speakers:
(1) Tom Coughlin, IEEE CE Society, tom@tomcoughlin.com
(2) Lee Stogner, IEEE CE Society, l.stogner@ieee.org
(3) Soumya Kanti Datta, Future Tech Lab, India, skd@future-tech-lab.com

16:00 IEEE CE Society Future Directions Session
Soumya Kanti Datta (EURECOM, France); Thomas Coughlin (Coughlin Associates, USA); Lee Stogner (IEEE, USA)
This is a proposal for a session on IEEE CE Society Future Directions Session. The mode of presentations will be oral followed by a question and answer session. This is organized by the FD-IoT team.

### Sunday, January 14 17:00 - 17:30

#### Poster Session 5

Room: Break Area
Chairs: Konstantin Glasman (St. Petersburg State University of Film and Television, Russia), Fabrizio Lamberti (Politecnico di Torino, Italy)
17:00 A Frequency-shift Readout System with Offset Cancellation OPA for Portable Devices of Marijuana Detection
Chua-Chin Wang, Hao-Chun Huang and Deng-Shian Wang (National Sun Yat-Sen University, Taiwan)
This paper presents a novel frequency-shift readout system with offset cancellation OPA (operational amplifier) for biosensing applications. The chopper technique is used to up-modulate the offset voltage to a higher frequency for noise shaping. A low pass filter is then utilized to filter out the noise caused by offset. A FPW (flexural plate wave) biosensor to sense the THC (Tetrahydrocannabinol), the signature ingredient of marijuana, concentration in urine. The linearity of the proposed system is proved to be 0.959 based on physical experiments where the THC concentration is 0 ~ 160 ng/mL.
17:01 A Prototype Foot-Sole Acetone Analyzer and Its Applicability to Caloric Balance Monitoring
Tatsuya Nakamura (NTT DOCOMO, INC., Japan); Yuki Yamada and Satoshi Hiyama (NTT DOCOMO, Inc., Japan)
The authors of this paper prototype a foot-sole acetone analyzer world first which can measure skin emitted acetone by having the user simply step onto the prototype like a weight scale. Our results revealed that plus or minus of the total caloric balance can be estimated from the amount of emitted foot-sole acetone with 79% accuracy. This result indicates that there is no need to record caloric intake and caloric consumption, and foot-sole acetone measurements by using our prototype could be useful for dieting management at home.
17:03 A Safety Engineering on the Design of Hemodialysis Systems
Consumer electronics systems are being largely used for healthcare. In this context, we are developing an intelligent system for management and monitoring of hemodialysis treatment. However, this kind of system is considered critical because exposes risks to patients and users' lives. For this system, we need to assure that the patients will not to be exposed to risks. Hence, it is necessary to investigate the hazards present in the hemodialysis system that could represent critical risks to the patient. In this work, we identify and classify the hazards of the hemodialysis system as an important step to increase patients' safety.
17:04 Real-Time Cow Action Recognition Based on Motion History Image Feature
Sung-Jin Ahn and Eui-ju Heo (Korea University of Technology and Education, Korea); Dong-Min Ko (KOREATECH, Korea); Kang-Sun Choi (Korea University of Technology and Education, Korea)
In this paper, a cow behavior recognition algorithm is proposed to detect the optimal time of insemination by using the support vector machine (SVM) classifier with motion history image feature information. In the proposed algorithm, area information indicating the amount of movements is extracted from MHI, instead of motion direction which has been widely used for person action recognition. In the experimental results, it is confirmed that the proposed method detects the cow mounting behavior with the detection rate of 74%.
17:06 I-Jack: Wearable System for Collection and Evaluation Physiological Data
Elpidio Junior (Universidade Federal do Amazonas); Lucas Da Cruz (Universidade Federal do Amazonaz); Vandermi Silva and Raimundo Barreto (Universidade Federal do Amazonas, Brazil); Mauro Ricardo da S Teófilo (Samsung Research Institute & Amazonas Federal University, Brazil); Vicente F. Lucena, Jr. (Federal University of Amazonas, Brazil)
This work presents a wearable system for collecting, storing and evaluating the physiological data of physical exercise practitioners. The system was designed from a modified jacket to receive heart rate sensors, temperature, oxygenation and positioning. Physiological data are collected and sent to the cloud and after treatment, it generates charts of the practitioner's accompaniment during their running or walking.The system was tested in real environment and presented significant results for the development of a commercial prototype.
17:08 Smartphone as Unobtrusive Sensor for Real-time Sleep Recognition
Laura Montanini, Nicola Sabino, Susanna Spinsante and Ennio Gambi (Università Politecnica delle Marche, Italy)
Sleep is fundamental to health, performance and well-being. Studies demonstrate that, in some countries, sleep disorders are reaching epidemic levels. For this reason, automatic sleep recognition systems can be helpful, on the one hand, to foster self awareness of own habits and, on the other, to implement environment management policies to encourage sleep. In this context, we propose an unobtrusive smartphone application for real-time sleep recognition which relies on contextual and usage information to infer sleep. We tested selected features using kNearest Neighbors, Decision Tree, Random Forest, and Support Vector Machine classifiers. Experimental results demonstrate the effectiveness of the proposed approach, achieving acceptable results in term of Precision, Recall, and F1-score.
17:09 Multi-Robot Engagement in Special Education: A Preliminary Study in Autism
Vasileios Kaburlasos (Technological Educational Institute of Eastern Macedonia and Thrace, Greece); Christina Dardani (PRAXIS Treatment and Counseling Unit, Greece); Maya Dimitrova (Bulgarian Academy of Sciences, Bulgaria); Angelos Amanatiadis (Democritus University of Thrace, Greece)
An engagement of humanoid (social) robots in special education may raise ethical questions. Hence, the development of useful therapeutic treatments may be hampered. To circumvent the aforementioned problem we propose training a humanoid robot R1 toward copying (i.e., reproducing) the behavior of a child. Then, use another humanoid robot R2 to interact with robot R1 toward developing an effective treatment in special education without raising ethical questions. Experiments here consider children with autism. Preliminary application results have been encouraging.
17:11 Early Detection System of Dementia Based on Home Behaviors and Lifestyle Backgrounds
Keisuke Kimino, Haruka Ishii, Maher Aljehani and Masahiro Inoue (Shibaura Institute of Technology, Japan)
The number of dementia illness has been increasing around the world. Dementia disease can be treated if it has been early detected. In previous work, we have developed an early detection system for dementia. Behaviors in the initial stage of dementia are many and diverse from designated to subjects, therefore, in this study, we collected data from different subjects and also we considered lifestyle backgrounds. Therefore, in this research, we improved the sensor device so as not to be influenced by the environment, and made it possible to accumulate data of persons suffered from dementia that had not been accumulated.
17:12 A Novel Method to Generate a High-Quality Image by Using a Stereo Camera
Seo-Won Ji and Yoon-Jae Yeo (Korea University, Korea); Seok-Jae Kang and Joon-Hyuk Im (Samsung Electronics, Korea); Sung-Jea Ko (Korea University, Korea)
In this paper, we propose a stereo camera system composed of a monochrome camera capturing a high-quality monochrome image and a color camera acquiring color information of a scene. By fusing two images captured from each camera, the proposed stereo camera system generates a high-quality color image. In the proposed method, stereo matching is first performed in which the color image is aligned with the monochrome image. Then, in the aligned color image, inappropriate regions that contain incorrect color information are removed by using the Gaussian mixture model, and regions without any color information are compensated by using the super-pixel algorithm. The resultant image is obtained by transferring the color information of the modified color image to the monochrome image. Experimental results show that the proposed algorithm can produce high-quality color images.
17:14 Asian-style Food Intake Pattern Estimation Based on Convolutional Neural Network
Jinwoo Cho and Ahyoung Choi (Gachon University, Korea)
Monitoring food intake behavior is a great help for people who need to manage or prevent obesity. Many researchers have proposed an automatic food intake monitoring technologies based on an image-based method and an inertial sensor-based method and so on. However, most previous works require additional equipment such as a camera on the table, ear clip type sensor with a microphone. Also, previous researchers have not developed on recognition methods considering various food intake cultures such as eastern and western. In this paper, we develop an algorithm that recognizes various food intake patterns, especially Asian cultures with accelerometer sensor without the need for additional sensors outside. We use three axis accelerometer sensors of a wearable device and apply convolutional neural network (CNN) to recognize various kinds of food intake behaviors such as eating with a spoon, picking food with chopsticks, and drinking water. The proposed model was verified by acquiring data from 8 subjects and showed 72.95% accuracy.
17:16 A Priority Mutex with Bounded Waiting for Interactive Consumer Electronics Systems
Hojung Choi (Sungkyunkwan University & Samsung Electronics Co., Ltd, Korea); Euiseong Seo (Sungkyunkwan University, Korea)
In most operating systems for interactive consumer electronics devices, inter-process communication (IPC) primitives use mutex locks to maintain consistency against concurrent accesses. However, using a real-time mutex (rt_mutex) in the IPC component can cause indefinitely long starvation of low priority processes. Because such starvation is not suitable for soft real-time systems, we propose a novel mutex mechanism that prioritizes the high priority processes while guaranteeing the bounded waiting of low-priority processes. Our evaluation showed that the waiting time of the low priority processes for IPC was restricted up to 68 ms while the response time of the high priority process was similar to rt-mutex's (13 ms).
17:17 Constructing Secure Peer Data Connectivity for Mobile Systems
Christopher Whittington (CROSSPORT NETWORK SOLUTIONS, Canada); Daniel Ratchen and Edward Cady (CROSSPORT NETWORK SOLUTIONS Inc., Canada); Yunus Ibrahim Dawji (CROSSPORT NETWORK SOLUTIONS, Canada & Lund University, Sweden)
Software Constructed Push-Pull data network architectures employ multiple bridged peripheral links to create an ultra-fast, ultra-secure and private data transfer platform. Bridging standard USB 3.0 technologies, we demonstrate a universal and scalable data platform offering the highest level of data privacy, security and performance for mobile systems. Supporting heterogeneous connections across different protocols, data may flow easily across the entirety of available consumer electronics systems with unparalleled speed and flexibility.
17:19 Stability Improvement of an Accelerated Android Operating System for Application Observation
Shoki Fukuda and Shun Kurihara (Kogakuin University Graduate School, Japan); Masato Oguchi (Ochanomizu University, Japan); Saneyasu Yamaguchi (Kogakuin University, Japan)
We focus on Android operating system that is based on Linux kernel and a method for accelerating time flow speed recognized by the processes in the system. The method accelerates the speed by modifying the time managing implementation in the kernel and reduce time to monitor applications' behavior. We discuss the stability and accuracy of the method with high acceleration ratios.
17:20 Complex Activity Recognition System Based on Cascade Classifiers and Wearable Device Data
Lucio Ciabattoni (Universita' Politecnica delle Marche, Italy); Alex De Cesare (Revolt SRL, Italy); Gabriele Foresi (Universita' Politecnica delle Marche, Italy); Andrea Monteriù (Università Politecnica delle Marche, Italy); Daniele Proietti Pagnotta and Luca Romeo (Universita' Politecnica delle Marche, Italy); Luca Spalazzi (Università Politecnica delle Marche, Italy)
This paper proposes a system for recognizing human complex activities by using unobtrusive sensors such as smartphone, smartwatch and bluetooth beacons. The method encapsulates two classification stages. The former is composed of two parallel processes: the Main Activity Detection (MAD) and the Room Detection (RD). The latter implements the Complex Activity Detection (CAD) process by exploiting the outputs of the first stage and the accelerometer data of the smartwatch. The cascade classification approach that combines the room detection with the main/complex activities recognition task constitutes the novelty of the work. Preliminary results demonstrate the reliability of the system in terms of accuracy and macro-F1 score.
17:22 Study of the Smartphone Operation Support System for Visually Impaired People
Taiki Torigoe (Kyushu Institute of Technology, Japan)
In this paper, we propose the smartphone operation support system for visually impaired. It is difficult for visually impaired people to grasp complicated screen configuration of smartphone. Visually impaired people have a problem that the people don't know the operation position of touch panel. Therefore, we created the touch screen application for visually impaired people to get the information easily. As a result, when comparing conventional application and proposed application in three environments "screen display", "screen non-display", and "blindfold", we confirmed a drastic reduction in operation time of proposed method.
17:24 Tone Mapping for Video Gaming Applications
Ahmad Khaldieh and Stelios Ploumis (University of British Columbia, Canada); Mahsa T Pourazad (TELUS Communications Company, Canada); Panos Nasiopoulos and Victor C.M. Leung (University of British Columbia, Canada)
Due to the increasing interest in physical-based rendering in High Dynamic Range (HDR) in game development and the lack of commercial HDR displays, tone mapping the HDR game content to match the capabilities of Standard Dynamic Range (SDR) displays is currently a topic of high importance. In this paper, we propose a global Tone-Mapping Operator (TMO) for video gaming applications which takes advantage of the unique characteristics of the rendered HDR content to reproduce a tone-mapped scene that best matches the appearance of the original HDR scene in terms of preserved global contrast and texture details. This results in a more appealing game and increases players' quality of experience.
17:25 Automatic 3D Face Component Analysis Technique
This paper proposes a technique to perform segmentation for the meaningful regions that part of the face captured by 3D scanners or 3D sensors, automatically. Each part recognition of the scanned face is vital for the 3D applications such as modeling, animation and 3D printing. We transfer the template model labeled with the meaningful part to the scanned face model to find the corresponding part of each meaningful part of the template model. This technique can be used to the several applications such as 3D face modeling, facial animation, virtual facial surgery and 3D printing.
17:27 A Virtual Twinning System for User-Centered Eidetic Human-Object Interaction
Jinchul Choi (Electronics and Telecommunications Research Institute, Korea); Ingook Jang (Electronics and Telecommunications Research Institute (ETRI), Korea); Donghun Lee (Electronics and Telecommunications Research Institute, Korea); Young-Sung Son (ETRI, Korea)
Virtual reality (VR) offers a uniquely experience to interact with imaginary items or features by simulating a user's physical presence in a virtual environment. Recently, VR services that achieve a higher level of realism using advanced VR equipment have been attracting public attention. However, studies for interworking physical devices with digital objects in a virtual environment are still insufficient. In this paper, we propose a virtual twinning system which can provide a user-centered eidetic IoT service in a VR environment by linking physical things to virtual objects.
17:28 GPU-Accelerated High-Resolution Image Stitching with Better Initial Guess
Chia-Ho Lin, Yuhsiang Tsai, Weichung Wang and Liang-Gee Chen (National Taiwan University, Taiwan)
High-resolution image processing is crucial for emerging applications in virtual reality. The trade-off between robustness/accuracy and speed pose a challenge to high-resolution image stitching. This paper accelerates the state-of-the-art image stitching algorithm by using the CUDA toolkit. We also use the mesh coordinates as an initial guess for solving warping function for an additional increase in speed. Experimental results show that our implementation achieves comparable quality to the state-of-the-art work, while our implementation is almost 2x faster on high-resolution images (3264x2448).

### Sunday, January 14 17:30 - 18:30

#### CT06-2: Entertainment, Gaming, and Virtual and Augmented Reality (EGV) - Session 2

Room: N253
Chair: Lee Stogner (IEEE, USA)
17:30 Viability analysis of content preparation configurations to deliver 360VR video via MPEG-DASH technology
César Díaz, Julián Cabrera, Marta Orduna and Lara Muñoz (Universidad Politécnica de Madrid, Spain); Pablo Pérez and Jaime Ruiz (Nokia Bell Labs, Spain); Narciso García (Universidad Politécnica de Madrid, Spain)
We present a viability analysis of a content preparation scheme used to smartly distribute 360VR video using the MPEG-DASH paradigm. Several configurations in which the portion of the scene that is located at the opposite side of the viewport is set to black have been analyzed in terms of bandwidth saving
17:45 Design of False Heart Rate Feedback System for Improving Game Experience
Sayaka Ogawa and Koichi Fujiwara (Kyoto University, Japan); Toshitaka Yamakawa (Kumamoto University, Japan); Erika Abe and Manabu Kano (Kyoto University, Japan)
This work investigated effect of false heart rate (HR) feedback on game experience. Our experimental results indicated that false HR feedback not only prevented from getting tired of the game but also enhanced player's experience. Furthermore, a new game controller that can present HR information audibly and tactually was developed.
18:00 HLS-based 360 VR using Spatial Segmented Adaptive Streaming
Recently, by advances in VR (Virtual Reality) contents and HMD (Head Mounted Display), 360VR video related research and development have been actively progressed. Also, mostly recent VR contents are provided with ultra-high definition, over 4K (UHD) and 8K (SUHD). The transmit efficiency which using the most efficient video compression, H.265, to handle such 360VR videos can be effected due to over-transmitting unseen fields in network streaming service. In this paper, a server and a network load problem can be solved by extracting and utilizing information in user-concentrated FOV (Field of View). Regarding to this concept, we propose the Spatial Segmented Adaptive Streaming (SSAS) method. By transmitting original quality video in a currently concentrated field, while transmitting degraded quality video in other fields, network load can be reduced. However, this selectively transmit method has caused switching quality delay by FOV movement. Therefore, we propose the HLS-based real-time adaptive streaming method through video fields and pre-encoding per quality.
18:15 An Improved Design of A Lighting Switch System with Augmented Reality Technology
Chi-Huang Hung, Yong-Yi Fanjiang, Yi-Shiun Lee and Hsin-Yu Huang (Fu Jen Catholic University, Taiwan)
In the traditional wall-type power switch, there are usually several switches group together, even to six. If there is no note or marker on the switch, the user will be confused because they do not know each switches corresponding to another. In this design, we use the augmented reality technology to reality it. It uses the smart phone, active the built-in camera and according to the special icon on the wall. A virtual and attached switch will pop out, and then the user only presses the icon on-screen to turn on the corresponding switch. Most of the wall-type power switches are used in the lighting system, so in this article that use the on / off light switch as an example.

#### CT07-8: Audio, Music and Video Systems, and Cameras and Acquisition (AVS) - Session 8

Room: N258
Chairs: Narisa Chu (CWLab International, USA), Hyunho Park (ETRI, Korea)
17:30 Scalable Monitoring of End-to-End Delay in Live Video Services
Pablo Pérez (Nokia Bell Labs, Spain); Jaime Ruiz (Alcatel-Lucent, Spain); Alvaro Villegas (Nokia Bell Labs, Spain); Javier López-Poncela (Alcatel-Lucent, Spain)
In this article, we propose a simple method to monitor the end-to-end live lag in a way which is scalable and meaningful for the service providers. The proposal is based on detecting the wall-clock timestamp of the video frames at capture time and inserting it in-band, so that it is available at any point in the network. Live lag can be monitored at any point of the chain, with the same accuracy as the one provided by the clock synchronization mechanism used.
17:45 A Study on DRM Application on High-quality Audio
Jungwon Moon (KAIST University & Samsung Electronics, Korea); Uk Kim (Samsung, Korea)
Due to the rapid increase in the production of portable digital audio devices and the continuous upgrades to internet access speeds, the market for MQS(Mastering Quality Sound) audio is growing rapidly as the format possesses higher audio quality than MP3. Unlike MP3 or CD formats that result in loss of quality and resolution, MQS represents the original audio recording of the singer in the studio with no loss in audio quality, and utilizes lossless audio codecs for compression to maintain the highest quality. While the most commonly used lossless audio codec is FLAC, the compression rate of this codec is not effective, resulting in large file sizes and overhead when conventional DRM is applied. This paper presents a new DRM model that allows for low-quality previews and minimizes battery drain in smartphones. This model has already been implemented on the Android platform, and usability has been evaluated.
18:00 Frame Sequential Video System with Complementary Pastel Color and Its Conversion
Yoshikazu Honma, Naoyuki Awano and Kenji Sugiyama (Seikei University, Japan)
We have proposed the frame sequential system as an alternative method which has one color plane in a frame. In this system, it is not easy in the case of high saturation color images. To avoid this problem, we subtract primary color from white. This format is named "Frame Sequential with Complementary Pastel Color". About the motion estimation, Y similar methods are useful for new planes. Furthermore, the anti-error methods to estimate the motion vectors should be enhanced. Finally, the optimal color matrix and the improvement of the motion estimation are discussed.
18:15 Computational Complexity Reduction of Two-Channel PMWF Using Frequency Averaging Technique
Youngil Kim, Kiwon Seo and Sangbae Jeong (Gyeongsang National University, Korea)
This paper proposes a frequency averaging method to reduce computational complexity for the implementation of a two-channel PMWF (parameterized multichannel Wiener filter) algorithm. Experimental results show that the proposed algorithm can reduce around 40 % of computation compared to the conventional PMWF algorithm while preserving speech quality after the speech enhancement.

#### CT09: CE Sensors and MEMS (CSM)

Room: N261
Chair: Uma Choppali (Eastfield College, USA)
17:30 Reconstruction of Conformal Array Beam Pattern Using Compressive Sensing
Kyung mok Kang, Jinhwan Koh and Seok Bung Han (Gyeongsang National University, Korea)
In this paper, compressive sensing is applied to correct the beam pattern of 3-D conformal array. Compared with the conventional 3-D interpolation technique, it shows excellent characteristics.
18:00 RCS Prediction Using Cauchy Method with Increasing Prediction Frequency
Kyeong eun Seol, Jinhwan Koh and Seok Bung Han (Gyeongsang National University, Korea)
In this paper, we apply the Cauchy method, the LPF, the SVD and the TLS theory using the RCS data in the low frequency band and predict the RCS data in the high frequency band. As the predicted frequency increases, the error between the original data and the predicted data is confirmed.

#### CT13-4: Other Technologies Related with CE (MIS) - Session 4

Room: N256
Chair: Anirban Sengupta (Indian Institute of Technology Indore, India)
17:30 A Novel DC Circuit Breaker Design Using A Magnetically Coupled-Inductor for DC Applications
Ibrahim Almutairy (Western Michigan University & Majmaah University, USA); Johnson Asumadu (Advisor, USA)
Attempting to simplify the steps of converting power into its simplest form, new microgrids will be conceptualized in the DC format. Certain power systems and power conversion components are highly available but, as it applies to DC circuit breakers, various designs are currently in the experimental stage. The most significant drawback of such a system is that interrupting current that is without zero crossing causes a sustained power arc. This paper introduces a novel circuit breaker model for DC, which utilizes a coupled inductor circuit breaker, and a mathematical model of insulated gate bipolar transistor (IGBT) has been developed.
17:45 Lab Automation Drones for Mobile Manipulation in High Throughput Systems
Dongbin Kim and Paul Oh (University of Nevada, Las Vegas, USA)
In this paper, a lab automation drone notional concept is introduced. Here, a robotic limb is attached to a robotic rotorcraft. The limb's gripper allows the unmanned aerial vehicle to dexterously manipulate objects such as micro-arrays and test tubes often used in high throughput systems (HTS). The resulting drone could augment existing HTS operations. The 6 degree-of-freedom (DOF) arm and gripper design are presented. Test-and-evaluation approach and results are also given.
18:00 Detecting Faulty Solar Panels Based on Thermal Image Processing
SungWon Lee and KwangEun An (Catholic University of Daegu, Korea); Byung Don Jeon, Kyoung Yeon Cho and Seung Jae Lee (Hannam Electric CO., LTD, Korea); Dongmahn Seo (Daegu Catholic University, Korea)
We propose a faulty solar panel detecting system based on thermal image processing.
18:15 Solid State Cache Management Scheme for Improving I/O Performance of Hard Disk Drive
Jung Kyu Park (Seoul Women's University, Korea); Yunjung Seo (University of Seoul, USA); Jaeho Kim (Virginia Tech, USA)
In this paper, we propose the Hybrid Unit 2Level-LRU scheme to optimize the slow I/O speed of the HDD. We minimized disk access and increased the cache hit rate by frequently accessing the pages in the SSC. In addition, we minimized disk head movement by maintaining the adjacent pages requested to write in a group when the pages are destaged to the HDD. Depending on the read requests workload, the cache hit ratio can be improved if there are more pages frequently accessed to read than to write. We will describe these techniques and discuss the results of experiments.

#### TT08: IEEE Young Professionals (IEEE-YP)

Room: N260
Chairs: Thomas Coughlin (Coughlin Associates, USA), Shingo Yamaguchi (Yamaguchi University, Japan)
17:30 Flying Animals and the Art of Presentation
Shingo Yamaguchi (Yamaguchi University, Japan)
This is an informative and entertaining session for Young Professionals (Students and higher grade members with short career) This session will start with an expert's giving tips about how to make an impactful presentation. After this talk, several speakers give a short presentation of paper for the 2018 ICCE conference. Their presentation will be judged by the audience who will have an opportunity to express their opinions using flying toy animals!