Technical Program
Saturday, January 4
Saturday, January 4 8:00 - 8:30
Breakfast
Saturday, January 4 8:30 - 9:00
Opening Ceremony 08:30-09:00, January 4
Greeting - Prof. Wahab Almuhtadi, President, CE Society
Congratulatory Speech - Prof. Toshio Fukuda, President of IEEE
Welcome Remarks - Mr. Stephen Welby, Executive Director, IEEE
Welcome Remarks, Ms. Susan K. Land, Director, IEEE
Welcome Message - Prof. Wen-Chung Kao, General Chair 2020 ICCE
Saturday, January 4 9:00 - 10:00
K1 Keynote: Mr. Russel Harrison (IEEE USA)
Saturday, January 4 10:00 - 11:40
Session 1.1 CSM
- 10:00 Analyzing Running Form with Acceleration Sensor
Recently, motion analysis really helps athletes improve their performance. Since the systems of motion analysis are expensive and expertise in biomechanics or kinematics is necessary, it is difficult for athletes themselves to use them. In this work, we propose a motion analysis system with acceleration sensor. The proposed system is inexpensive since the system consists of inexpensive components. Besides, only two devices for analysis are required by concentrating on analyzing the motions of arm swing and foot strike. Experimental results demonstrate that the proposed system is useful for athletes to analyze running form.
- 10:20 Harnessing Uncertainty in Photoresistor Sensor for True Random Number Generation in IoT Devices
Internet of Things (IoT) has facilitated the connection of many smart devices via internet. Recent cyberattacks have shown that resource constrained IoT nodes are easy prey that lead towards compromising the secrecy of the data and vulnerabilities could be exploited remotely to take control of safety-critical systems. Photoresistor sensors have applications in IoT systems, such as smart street lighting, intelligent cameras, light activated smart consumer electronics, smart home, smart healthcare, etc. Building hardware security primitives, such as True Random Number Generator (TRNG), based on the intrinsic properties of photoresistor would be a novel direction to develop cost-savvy IoT security primitives. Therefore, this paper proposes a TRNG prototype that is devised from uncertainty presents in photoresistor sensors. The proposed TRNG prototype does not require any complex interfacing for preprocessing the weak signal, thereby reducing the unnecessary delay and the recurring hardware cost. The proposed prototype employs the novel approach of additive scrambling that aids to sample sensors at a higher rate. The proposed TRNG has an average random bit generation rate of 8 kbps that is better than the recent work in the literature. The quality of randomness was validated by 15 test batteries of NIST STS test.
- 10:40 Approximate Adder Circuits Using Clocked CMOS Adiabatic Logic (CCAL) for IoT Applications
Approximate arithmetic circuitry refers to a class of arithmetic circuits that achieve power and area efficiency through the intentional introduction of inaccuracies into the output behavior of the circuits. Further, low-power adiabatic computing techniques have been proposed as a method for reducing power dissipation. To demonstrate the potential benefit of hybridizing adiabatic and approximate computing, we selected a group of approximate adders and redesigned them using Clocked CMOS Adiabatic Logic (CCAL).We simulated our novel class of adiabatic approximate adders using a 45nm process and Cadence Spectre. The results of our simulations show that the hybridization of approximate and adiabatic techniques reduces power dissipation by 40-56% at 50 MHz compared to approximate CMOS implementations. We conclude that the hybridization of adiabatic and approximate computing would be an excellent design choice for applications with rigid power and area constraints that also boast a tolerance for noise.
Session 1.2 WNT (1)
- 10:00 Development of In-Building Transmission Device Utilizing DOCSIS Standard and IP Encapsulation Method for 4K/8K Multi-Channel IP Broadcast
Cable television operators are considering the introduction of IP broadcasts that distribute video signals by IP multicast. We have studied 4K・8K multi-channel IP broadcast on the FTTH transmission line. But, it is a issue that the in-building transmission system in an apartment has not been FTTH. Therefore, we have prototyped an in-building transmission device based on the DOCSIS standard, which enables IP communication on a coaxial cable. Then, we confirm 4K・8K multi-channel distribution and evaluate packet loss rate using AL-FEC.
- 10:20 New Demapper for MIMO-LDM in ATSC 3.0
In this paper, we propose a new demapping approach for the multiple-input multiple-output aided layered division multiplexing (MIMO-LDM) system. The new demapping approach demaps the core layer (CL) signal using a part of enhanced layer (EL) signal and processes the other part of EL signal as noise. The new demapping approach has a near optimal performance and acceptable demapping complexity that is independent with the modulation order of EL signal. The simulation results also shows that the new demapper outperforms the original Gaussian approximation (GA) demapper on CL performance at low injection level (IL) and high code rate.
- 10:40 A Proposal of TCP Fairness Control Method for Multiple-Host Concurrent Communications in Wireless Local-Area Network
In the IEEE802.11 WLAN, the TCP throughput unfairness will appear when multiple hosts concurrently communicate with a single access-point (AP). In this paper, we propose a TCP fairness control method using the transmission delay in WLAN. The target throughput is introduced as the equal throughput, which will be dynamically updated with measured throughputs. Then, the delay is controlled by the PI feedback control such that the measured throughput is equal to the target. The effectiveness is confirmed through experiments using our elastic WLAN system testbed, where the hosts have achieved the similar throughputs.
- 11:00 A Study on the Scattered Pilot Pattern of Mobile Reception for an Advanced ISDB-T
We have been conducting research on an advanced digital terrestrial TV broadcasting system (advanced ISDB-T) that can transmit UHDTV content. The advanced ISDB-T can provide both mobile service and fixed service using hierarchical transmission similar to ISDB-T. Furthermore, the transmission capacity is increased by using a large-sized FFT. Although large-sized FFT degrades speed tolerance in mobile reception, the advanced ISDB-T can mitigate this influence by selecting an appropriate scattered pilot (SP) pattern. We analyze the influence of large-size FFT in mobile reception and evaluate the reception performance caused by differences in SP patterns through computer simulation and field experiments.
- 11:20 Topology Construction Protocol for Wireless Power Transfer System with a 2-D Relay Resonator Array
The cost for deploying wireless power transfer (WPT) technology into products still remains high due to the order-made design process. To alleviate the engineering cost to adapt to each use-case, a magnetic resonance coupling based reconfigurable 2-D WPT system was recently proposed. In this system, modules communicate with each other via the Bluetooth Mesh protocol. However, this approach typically suffers from errors due to radio interference. To improve robustness, We proposed a topology construction protocol based on ``in-band'' communication. Through simulations, it was discovered that the topology construction can be executed in 2 seconds for a 30 module configuration.
Session 1.3 IoT (1)
- 10:00 Long-term Operation of Home Appliance Power Monitoring System with Gateway Redundancy
The power sensor driven without a battery using the energy harvesting is developed. The power monitoring system handled in this paper uses the developed home appliance power sensor. However, the power monitoring system does not take measures against hardware failures of gateway. Therefore, home appliances are unable to be monitored when failures occur in the gateway. We propose a method of redundancy. Our proposed method is achieved by communication in which the power sensor does not distinguish the gateway and alive confirmation messages between gateways. We confirmed that failover is executed when a failure occurs.
- 10:20 Designing a Semantic Digital Twin Model for IoT
Today there is exponential growth and convergence in technologies like Internet of Things (IoT), machine learning and other forms of Artificial Intelligence leveraging the way we collect, and analyze data from smart sensors. A Digital Twin (DT) Technology is the creation of the virtual replicas of physical IoT devices that helps to monitor the applications, analyze data collected and predict future behavior and performance of devices. In this paper, we propose a semantic DT based IoT model with support at the edge with container technology to mimic the IoT devices and enhance the interoperability of the heterogeneous IoT devices.
- 10:40 Room-area Adhoc Group Management for Timely Coordination of Voice-enabled Consumer Devices
While more consumer devices become smarter with voice-based natural interfaces, this trend poses such a problem that a user might frequently experience undesirable responses from nearby devices, i.e., seemingly uncoordinated and often redundant responses. In this paper, we present the lightweight adhoc group management leveraging inaudible sound and RF local-connectivity in room area, thereby enabling to efficiently suppress the uncoordinated interactions of devices upon a user's voice command via instant group communication.
- 11:00 Botnet Defense System: Concept and Basic Strategy
This paper proposes a new kind of cybersecurity systems, named Botnet Defense System (BDS), which defends a network system against malicious botnets. The unique feature is that a BDS uses white-hat botnets to fight malicious botnets. The BDS monitors a network system. If detecting malicious botnets, it launches white-hat worms and constructs white-hat botnets in order to destroy the malicious botnets. A basic strategy is also proposed. The primary factor is the secondary infectivity of the white-hat worms. If it is high, the BDS only have to launch a few white-hat worms. Otherwise, it should launch as many white-hat worms as possible. The validity of the strategy was confirmed through simulation with agent-oriented Petri nets.
- 11:20 Temperature Monitoring in Shinkansen Signal and Communication House
This paper introduces a practical problem on railway systems and shows an application of IoT wireless temperature sensors as a solution to the problem. The paper shows the results of monitoring temperatures inside housings storing equipment for Kyushu Shinkansen operation in a Signal and Communication House of Kyushu Railway Company.
Session 1.4 AVS (1)
- 10:00 Technique for Removing Superimposed Patterns on Objects Using a GAN
This paper presents a technique that uses generative adversarial networks (GANs) to remove unnecessary patterns from the captured image of the object. These patterns are superimposed onto B-ch images when an image is captured, for the purpose of acquiring a depth map. They become unnecessary after the depth map has been acquired. Our experiment showed that the patterns can be removed more effectively by using a G-ch image in which the pattern is not superimposed, in addition to a B-ch image. From the results, we demonstrate the effectiveness of the technique that uses GANs
- 10:20 HDR Video System Based on Multi-stage Motion Estimation Using Dual Exposure Camera
In this paper, we provide a new HDR video system using a dual exposure camera. In order to prevent ghost artifacts caused by misalignment of motions, multi-stage convolutional neural network (CNN)-based motion estimation is proposed. In the proposed method, true motions and occlusion maps are estimated and then a HDR video is synthesized with motion compensated images. It provides not only robustness against exposure levels but also flexibility to extend easily search ranges by stacking stages with same CNN coefficients. Experimental results indicate that the proposed method is effective to estimate true motions so that ghost artifacts are eliminated well.
- 10:40 Optimal Sampling for Shape from Focus by Using Gaussian Process Regression
Shape from Focus (SFF) is one of passive optical methods for estimating 3D shape of an object. In SFF, a large number of 2D images with different focus levels are required. The number of images may affect the complexity and the accuracy of the results. In this manuscript, a Gaussian process regression (GPR) method is proposed to get 3D shape from the minimum number of 2D images. The proposed method (SFF.GPR) is applied to fit focus curves, which are obtained by applying one of focus measure operators. Experimental results demonstrate the effectiveness of the proposed method.
- 11:00 Simulation of Noise Performance in an Imaging System with a Pastel-Color Filter Array
It is common in color imaging to use a single-sensor system with a color filter array (CFA), especially a Bayer CFA. We propose a new imaging system with a pastel-color CFA. In this system, the color plane reconstruction is realized with an abstraction of the white-like component from RAW images. In this paper, we evaluate the effect of sensor noise on various imaging systems. In our experiment, the optical color filter and sensor noise are simulated using computer calculations. With these results, it is recognized that the proposed method is less affected by sensor noise.
Saturday, January 4 10:00 - 11:30
Poster Session 1
- Commercial Solutions for Classified (CSfC): Harnessing the Power of Industry
Whether you are the CEO of a Fortune 500 company in Manhattan, the chief administrator of a metropolitan trauma center, or the parents of web savvy teenagers in the heartland, your important information needs protection. When it comes to safeguarding highly sensitive government information, the National Security Agency protects the United States' most critical information and systems against cyber-attacks through hardening and defending the cyber infrastructure. NSA has a proud history of designing and fielding secure cybersecurity solutions. Commercial Solutions for Classified (CSfC) is an extremely important component in NSA's commercial cybersecurity strategy. US national security customers need secure access to data anytime and anywhere. CSfC solutions leverage current commercial technology in accordance with NSA-approved architectures to design solutions for these sensitive missions. This presentation will highlight the many activities involving CSfC while also serving as a foundational introduction for those who are unfamiliar with the initiative. The target audience is everyone interested in learning how they can better protect their sensitive information.
- Key Frame Extraction Algorithm Combining Image Entropy and Perceptual Hashing
A key frame extraction algorithm combining image entropy and perceptual hashing is proposed. Firstly, one frame with the largest image entropy is extracted from every three frames, and a set of candidate frame sequences whose data is one-third of the original frame is obtained. Then, the key frame sequence is determined by using the entropy difference of the candidate frames. Finally, the perceptual hashing algorithm is used to remove redundancy and gets the final key frame sequence. Through the experimental,the extracted key frames can represent the video content more comprehensively and less redundant frames.
- Study on Automatic Defect Report Classification System with Self Attention Visualization
In recent years, software in devices such as smartphones and tablets has become increasingly multifunctional, and the use of OSS has become essential. In software development using large-scale OSS, it is important to report defects to appropriate personnel promptly. In this paper, we propose a method to classifying defect reports into appropriate categories using fine-tuned BERT and visualize self-attention information. In the evaluation, category classification was performed using defect reports of the actual OSS project. The F1 score was 0.87, which indicated that high-accuracy classification was possible. Also, the visualization results show that category-specific words can be extracted.
- Utterance Function for Companion Robot for Humans Watching Television
In this work, we present the development of a companion robot that can provide company to a person watching television. To establish guidelines for developing the utterance function for the robot, we analyze the utterances of pairs of people watching TV together, which were then classified into eight categories. We observe that human-human dialogue while watching TV most often starts with "Disclosures" utterances that express one's own feelings. Moreover, we found that utterances with high response rates could be classified as "Questions," "Edifications," and "Confirmations". Based on the analysis, implemented an utterance function corresponding to "disclosure" related to TV program.
- Accuracy Evaluations of Video Anomaly Detection Using Human Pose Estimation
Surveillance cameras are commonly used for security purpose. However, most of them are used for verification after incidents happen. In this paper, we propose a method for proactive video surveillance system using human pose estimation. Our method estimates anomaly scores of human actions using the video descriptors (human pose and bounding box) extracted by pose estimation and tracking methods. We estimate human poses, apply PCA, estimate GMM parameters, and finally calculate anomaly scores based on the GMM. We evaluate our method and compare with higher-level recognition-based method. Experimental results demonstrate effectiveness of human pose for video anomaly detection.
- Simulations of Wide Bandgap SiC N-N Heterostructure Diode
Heterostructures have become essential constituents of most advanced electronic devices. Heterostructures are of great interest because the motion of charge carriers possibly controlled by modifying energy band profiles of constituent materials. In this paper, we are discussing an upright fabrication structure of Heterojunction device. We have used SILVACO TCAD to demonstrate 2D vertical structure design and simulation of Binary semiconducting material Silicon Carbide (SiC) Heterojunction diode. We have used Silicon Carbide (SiC) and Silicon to form n-n type heterojunction diode. IV characteristics simulation results were conducted over -10V to +10V range.
- A Hardware Friendly Haze Removal Method and Its Implementation
In this paper, we propose a novel hardware friendly image dehazing method to improve the image quality and save the execution time simultaneously. To obtain estimated airlight in real time, we select the local patch with the current densest haze to estimate the airlight. With TDM search strategy and fixed-point guided filter, the gate counts of hardware architecture are greatly reduced. In experiments, our proposed method outperforms other dehazing algorithms in terms of SSIM and CIEDE2000. The hardware architecture trades off dehazing accuracy against throughput, which can obtain high-quality restored images with a high-throughput of 166.67Mpixels/s at 500MHz frequency.
- Weakly Supervised Traffic Sign Detection in Real Time Using Single CNN Architecture for Multiple Purposes
We propose a new traffic-sign detection method based on a weakly-supervised multi-purpose single convolutional neural architecture. The base classification network used is the very light convolutional architecture, MobileNetv2, which is used as a region proposal network and a classification network. The method attained few milliseconds for single image testing and averaged about 55 milliseconds on 800x1300 resolution, while maintaining an acceptable accuracy. This method takes advantage of weak supervision which completely eliminates the time required for dataset annotation. We trained and tested our technique on two datasets: the German Traffic Signs Recognition Benchmark(GTSRB) and the German Traffic Signs Detection Benchmark(GTSDB).
- Implementation of Multi-channel/Multipoint Monitoring System Based on ATSC 3.0 Transmission Method
This paper is concerned with the implementation of a monitoring system for multi-channel/multipoint broadcasting signals transmitted through a terrestrial UHD Headend system based on ATSC 3.0. Implemented monitoring system measures the quality of jitter and delay of stream transmitted from the Headend, monitors additional services such as ESG and subtitles, and performs remote web monitoring function through various smart devices.
- Study on Mistype Correction Support Using Attention in Japanese Input
How to input characters without mistakes is one of very important points for the interface, when we consider usability of electronic devices such as personal computers and smartphones. Therefore, in this paper, we examine whether we can classify mistypes for Japanese input and inform the users how they make mistakes using "Attention" and "LSTM". We made the Neural Network to classify the mistype data and inform how they make mistakes. As a result, the correct answer rate of the Neural Network was 91% and we were able to know where point the Neural Network focus on by putting in "Attention".
- Identifiable People Tracking System Using Wi-Fi Probe Packet
We propose a method for measuring the flow of people using information from smartphones because if it is possible to collect information from smartphones, it is possible to realize a more detailed measurement the flow of people as to what kind of action each person takes. When the experiment by the prototype was done, it could measure to some extent such as time which there are many people or few.
- Design and Implementation of Emergency Alert Gateway Utilizing ATSC 3.0 Terrestrial UHD Broadcasting
In Korea, ATSC 3.0 based terrestrial UHD broadcasting service is on the air and emergency alert service is also being developed. In addition, the Ministry of Science and ICT (MSIT) plans to expand its emergency alert service for public media, such as digital signage, public transportation and public facilities by utilizing terrestrial UHD broadcasting. This paper presents the design and implementation of emergency alert gateway that can provide emergency alerts and disaster information via TV, companion devices and digital signage.
- High-Accuracy Mapping Design Based on Multi-view Images and 3D LiDAR Point Clouds
The Self-driving vehicle is an important issue. One of the biggest advantages of self-driving vehicles is to reduce traffic accidents. The goal of our efforts is to provide more convenient and safe transportation. Therefore, we present a "high-accuracy mapping design based on Multiview images and three-dimensional LiDAR point clouds" in this paper. The proposed system for 3D LiDAR combines color camera and three-dimensional space coordinate corresponding to the two-dimensional space coordinates technology.
- A Novel Architecture of AVS2 Intra Prediction
AVS2 is the latest generation of video coding standard independently developed by China. We propose a parallel hardware structure of ASIC for AVS2 intra prediction encoding. This architecture by analyzing software algorithm, according to the characteristics of the ASIC implementation of parallelization, designs the DC, a planar, horizontal and vertical Angle prediction hardware structure of the parallel processing, and finished the calculation of SATD. After logic synthesis using the SMIC 28nm standard cell library, simulation results show that the proposed architecture of intra prediction for 300MHz, real-time processing 1920x1080@60fps sequence of images, extremely suit for VLSI HD encoder.
- A 0.012Mm2 0.96-mW All-Digital Multiplying Delay-Locked Loop Based Frequency Synthesizer for GPS-L4 Band
This paper presents a low-power fully digital multiplying delay-locked loop (MDLL) based frequency synthesizer for GPS-L4 band. In the proposed MDLL, the supply noise sensitivity and RMS jitters are mitigated by implementing the core logic of frequency-operated digital low-dropout regulator (DLDO) in the main loop. The proposed MDLL in a 40 nm CMOS process exhibits an in-band phase noise of -107 dBc/Hz at 100 kHz offset with < 1ps of RMS jitter while consuming maximum power of 0.96 mW at nominal supply voltage of 1.0 V.
- UL-MU Transmissions in IEEE 802.11Ax Networks
In IEEE 802.11ax networks, multiple uplink wireless-connectivity services are supported by an uplink multi-user multiple-input and multiple-output (MU-MIMO) technique. However, inappropriate multi-user selection for uplink transmissions may degrade the network throughput performance. In this study, we propose a method for uplink multi-user (UL-MU) transmissions in IEEE 802.11ax networks. In the proposed method, stations are clustered on the basis of their transmission times, to efficiently utilize channels for UL-MU transmissions. From the performance evaluation, we demonstrate that the proposed method improves the network throughput performance by improving the channel utilization.
Saturday, January 4 11:40 - 12:00
Lunch
Saturday, January 4 12:00 - 13:00
K2 Keynote: Dr. Masashi Usami (KDDI)
- 12:00 New World Explored by 5G
5G services have already been launched by more than 50 telecom operators in 28 countries in 2019. Four operators in Japan will also be ready for starting 5G commercial services in 1Q/2020. Superior wireless features or 5G; (1) eMBB: enhanced mobile broadband up to 20Gbit/s, (2) URLLC: ultra-reliable and low latency communications less than 1ms, and (3) mMTC: massive machine type communication over 1 million devices/km2, open a door to realize a new world, that we had never experienced before. 'Augment' is a key word for 5G services. In this talk, some examples of 'Augment's will be given; how sports, city walks, and entertainments will be augmented and innovated by 5G technologies will be presented, and the audiences will be experienced such a new world by watching several demonstration videos. In addition to a new real experience for personal services, 5G is also strongly expected to solve variety of social issues, such as autonomous driving, remote control of construction machine, and remote surveillance with 4K/8K video. Low latency feature of 5G is essential for such critical missions. KDDI research inc. has been studying various advanced technologies, which supports the basis of the 5G services. In our optical access technology using the analog transmission technique, we have recently succeeded in a 1024QAM transmission for mobile fronthaul links for the first time. In our post-quantum cryptography technology, breaking several world records in cryptanalysis were reviewed. We have recently proposed the fastest algorithm for fully homomorphic encryption, which might be utilized for privacy-preserving machine learning as a service. Finally, tele-existence as a rather future oriented demonstration was presented, which is a robotic system that expands the presence of human beings. An experience of remote traveling to Ogasawara island 1500 miles away from Tokyo, where the traveler touched a sea turtle with a real sense of touch through an avatar robot, was demonstrated. A new world explored by 5G is widely forecasted. 5G is just in front of us. KDDI implements various initiatives and aims to provide an unlimited world in the coming 5G era.
Saturday, January 4 13:00 - 14:30
Session 1.5 HCI (1)
- 13:00 Design and Implementation of Deep Learning Based Pupil Tracking Technology for Application of Visible-Light Wearable Eye Tracker
In this paper, a deep-learning based pupil tracking technique is developed for application of visible-light wearable eye trackers. By the YOLO based deep learning detection, the proposed pupil tracking method predicts the centers of pupils effectively in the visible-light mode. By testing the pupil tracking performance with the developed inference model, the precision is up to 80%, and the recall is close to 83%. Besides, the average horizontal and vertical pupil tracking errors of the deep-learning based design are only 4 pixels, which are much less than those of the previous ellipse fitting based design at the same visible-light conditions.
- 13:20 The Brightness Challenge for AR Microdisplay
Although the market demand of displays bright enough to allow the diffusion of readable information against a very bright outside world is important, in particular in the cockpit (including avionics and automotive application), existing technologies still do not supply the desired brightness combined with very low power consumption, wide field of view, large eyebox and long lifetime. This paper introduces a new study aiming to develop a high resolution microled microdisplay able to reach 1 Mcd/m².
- 13:40 Construction of Customers' Emotion Model in the Bespoke Tailoring Using Evaluation Grid Method
To realize a recommendation system that combines the benefits of a human recommendation (field experts and salesclerks) and a computer recommendation (recommendation algorithms, such as in e-commerce), we constructed an emotion model that appropriately represents customers' emotions during a recommendation by a human. For a typical scene of a recommendation by a human, we focused on a bespoke scene of tailoring clothes via interaction with a tailor. An interview and evaluation experiment allowed us to construct an emotion model that appropriately expressed the emotions evoked in the recommendation process.
- 14:00 Human Pose Refinement for Reliable Robotic Teleoperation
Three-dimensional human pose estimation can be effectively applied to teleoperation of humanoids, thanks to its intuitive and easy usability. However, the human pose wrongly inferred can cause critical and dangerous situations for robotic operation. In this paper, a reliable human pose estimation method is presented. Initially, 3-D joint positions are inferred by a conventional pose estimation method using stereo images. The joint positions are refined by Kalman filtering followed by median filtering. The motor control value for each joint is smoothed with an IIR filter to perform stable and flexible operations.
Session 1.6 WNT (2)
- 13:00 A Comparative Study of RTL-SDR Dongles from the Perspective of the Final Consumer
Electronic low-cost devices are an important part of the market nowadays, for example, the RTL-SDR dongles. These electronic devices are an option for getting an RF signal on a computer for around $20 USD. However, the manufacturers of RTL-SDR dongles do not provide a complete data sheet for their products, causing uncertainty among the consumers. In this work, we make a comparative study of some RTL-SDR dongles to provide insightful information about the real behavior of these devices. Our results show how some dongles are more sensible for perceiving signals on some bands than others, especially those with metal enclosures.
- 13:20 A Study on Frequency Diversity Using Lower Layer of LDM-BST-OFDM Transmission Scheme
Recently, the next-generation DTTB(Digital Terrestrial Television Broadcasting) for UHDTV(Ultra-High Definition Television) broadcasting is being researched and developed in the world. For the Japanese next-generation DTTB for UHDTV broadcasting, LDM-BST-OFDM(Layered Division Multiplexing - Band Segmented Transmission - Orthogonal Frequency Division Multiplexing) transmission scheme is proposed. In this paper, maximum ratio combining method which is performed after sub-carrier demodulation is proposed for LDM-BST-OFDM transmission scheme. In this paper, the reception characteristics of the proposed scheme is evaluated by computer simulations and the required CNR(Carrier to Noise Ratio) of fixed reception can be improved by the proposed scheme.
- 13:40 Energy Consumption Minimization of Smart Devices for Delay-Constrained Task Processing with Edge Computing
In this paper, an energy consumption minimization scheme that adjusts both the task offloading ratio to MEC server and the CPU operating frequency of smart device based on a Dynamic Voltage and Frequency Scaling (DVFS) technique under application delay constraint is proposed.
- 14:00 Performance Evaluation of Layered Division Multiplexing of Next Generation Digital Terrestrial Television Broadcasting Under ISDB-T
The scheme that combines ISDB-T (Integrated Service Digital Broadcasting - Terrestrial) with LDM (Layered Division Multiplexing) has been proposed as the way to shift to the next-generation DTTB (Digital Terrestrial Television Broadcasting). However, when LDM is applied, the receiver is complicated. In this paper, the performance is evaluated by computer simulations when the receiver was simplified and the modulation of the upper layer was changed. As the results of computer simulations, the receiver can be simplified without deteriorating the performance. The required CNR (Carrier to Noise Ratio) of the lower layer can be improved by the proposed scheme.
- 14:20 UHDTV IP Multicast Distribution Experiments Using MPEG-H MMT
We have conducted IP multicast distribution experiments using MPEG-H MPEG Media Transport in managed CATV networks to promote 4K/8K UHDTV. In this paper, we report an experiment in which we uplinked 4K/8K UHDTV content to an internet exchange through existing dedicated lines and facilities, and then conducted multi-channel distribution simultaneously through commercial fiber to the home (FTTH) lines provided by CATV managed networks. We confirmed that the UHDTV contents could be received by prototype STBs through the FTTH environment. The experimental result shows the possibility of commercializing nationwide simultaneous and multi-channel distribution of UHDTV contents through existing IP network facilities.
Session 1.7 IoT (2)
- 13:00 Automatic Testing Environment for Virtual Network Embedded Systems
Network embedded systems including Internet of Things (IoT) systems oblige developers to conduct frequent tests for various configurations, which require a significant amount of time and money. Moreover, the tests might not be performed due to the impossibility to acquire target devices produced by other factories or manufacturers. We propose a testing environment on a computer composed of target device emulators, and a repository of system configurations and test cases. Therefore, the environment performs tests for various configurations automatically and drastically improves the test efficiency.
- 13:20 Network Approaches to Improving Consumer IoT Security
Internet of Things devices are the largest, fastest growing, longest-lived, and least secure category of Internet hosts. Insecure consumer IoT devices threaten other home devices and distributed denial of service attacks from IoT botnets pose a growing threat to Internet services. We examine threats to, and by, IoT devices and develop a framework to protect consumer IoT devices from compromise and limit the threat they can pose in-turn to other home and Internet hosts. We indicate prioritized steps that ISPs and manufacturers can take to improve home IoT security. Framework components are hosted at https://github.com/CIRALabs
- 13:40 Overhead Evaluation of Bi-directional Data Exchange Between OM2M and LWM2M Using MQTT
Although machine-to-machine (M2M) frameworks, e.g., OneM2M and LWM2M, supports to interwork together, they may only provide uni-directional data convergence, i.e., from LWM2M to OneM2M. This paper studies and investigates the overhead of achieve bi-directional data exchange between two M2M frameworks using MQTT. In most conditions, the synchronization between two M2M frameworks may not add too much extra burden except the resource write procedure.
- 14:00 M2M Device Cooperation Method Using iHAC Hub and Smart Speaker
Smart speakers and compatible IoT devices are emerging. We have developed an iHAC Hub realizes coordinated operation of IoT devices can be controlled by communication protocols. This paper proposes a cooperation method for M2M devices by using iHAC Hub and smart speaker. In the proposed method, we provide a framework for cooperating environment sensing IoT devices and smart speaker compatible IoT devices. The iHAC Hub generates voice commands for controlling IoT devices by using the cloud service and reproduces them toward the smart speaker to realize cooperative control of the smart speaker compatible IoT device based on the environment information.
- 14:20 Efficient and Reliable Data Dissemination over Handover Dynamics in V2I Networks
In this paper, we consider a delay sensitive multimedia data dissemination in V2I network based on Systematic Network Coding (SNC). We propose an algorithm that improves SNC based data transmission by transmitting network coded data at the idle time of packet transmission between handovers. The experiment results using actual traffic data show that the proposed approach can reduce not only the overall decoding error rate but also decoding failure rates.
Session 1.8 AVS (2)
- 13:00 Efficient VVC Intra Coding for 360◦ Video with Residual Weighting and Adaptive Quantization
It is vital that video encoders remove redundant information present in the spherically projected 360◦ video frames. To this end, this paper proposes a novel weighted residual technique and an integrated technique between the proposed weighted residual technique and a state-of-the-art adaptive quantization technique. The proposed methods adapt to the spherical characteristics in order to reduce the magnitude of the redundant information. The tests of the weighted residual technique and the integrated technique with All-Intra configuration using Versatile Video Coding (VVC) test model, produce average bit rate savings between 0.91% and 1.35% with regards to various spherical objective quality metrics.
- 13:20 U-Net-Based Single-Channel Wind Noise Reduction in Outdoor Environments
This paper proposes a wind noise reduction method based on a U-shaped neural network. While the U-Net is developed for image segmentation, it is constructed by using the spectrograms of noisy signals as the input feature, and it is trained to estimate the ideal ratio mask between a pair of noisy and clean signals. The performance of the proposed method is measured in terms of SDR, SIR, and SAR. As a result, it is shown that the proposed method provides a higher average SDR, SIR, and SAR than conventional methods such as MS-based and NMF-based methods under various SNR conditions.
- 13:40 CNN Based Optimal Intra Prediction Mode Estimation in Video Coding
The amount of video data is so large that efficient video compression is required for the storage and transmission. Intra prediction is one of important components in video compression. In this paper, we examine various Convolutional Neural Network (CNN) structures to estimate optimal intra prediction mode as Most Probable Modes (MPMs). Moreover, we investigate several combinations of the MPMs obtained by the CNN and MPMs derived from High Efficiency Video Coding Test Model (HM). From these experimental results, we find that using 6 MPMs from both CNN and HM with moderate number of channels or kernel size is preferred.
- 14:00 Image Fusion-based Tone Mapping Using Gaussian Mixture Model Clustering
This paper presents a novel image fusion-based TM method. We use Gaussian mixture model clustering algorithm to estimate the dark and bright distributions in the luminance histogram of the input HDR image. Then, we generate two LDR images using two locally-adaptive TFs obtained by the components of each distribution. Finally, the output image is produced by the image fusion technique employing a brightness weight and a local contrast weight. The experimental results show that the proposed algorithm achieves high performance compared to state-of-the-art methods in terms of detail preservation and brightness adjustment.
- 14:20 Optimal Distortion Minimization for 360º Video Compression with VVC
It is vital that video encoders understand and remove the redundant information present in spherically projected 360ᵒ videos. To this end, this paper formulates a spherically adaptive objective function that incorporates novel adaptive quantization and weighted residual techniques to reduce the magnitude of redundant information while minimizing the distortion. Furthermore, this paper identifies the residual weighting function and the most optimal quantization parameters that are used to encode 360ᵒ videos. The proposed method is tested with test model of Versatile Video Coding (VVC) with All-Intra configurations. The obtained results exhibit an average bit rate saving of 3.18%.
Saturday, January 4 13:00 - 14:00
Young Professionals and Women In Engineering Events
"At the stage - presenting your concepts and results" Dr. Gordana Velikic, RT-RK Institute for Computer-Based Systems, Serbia
Saturday, January 4 15:00 - 16:30
Session 1.10 WNT (3)
- 15:00 A Narrow-Band Dithering Technique in Feedback Channel Quantization for Improving Effect of Adaptive Digital Predistorter
Due to the non-linear behaviour of the power amplifier (PA), the amplification of signals with fluctuating envelopes leads to distortion inevitably. These nonlinear effects can be counteracted by the digital pre-distortion (DPD). In this paper, a method of quantization noise and narrow-band dithering signal for improving feedback signal distortion of the DPD system is presented. Before quantization, the technique of injecting a narrow-band dithering signal to reduce these effects and be filtered by the digital narrow-band filter after analog to digital converter (ADC). Experiment shows this method can be used to obtain more accurate data to effective DPD.
- 15:20 The Implementation of Integrated C2DL Modem for Micro UAV
UAVs were developed for military purposes such as unmanned reconnaissance and surveillance. Due to recent advances in technology, it has been diversified into civilian and special mission products. In the UAV flight control system, a flight control engine, a signal processing engine and a wireless communication modem are installed separately. Such drone electronic modules are inefficient in terms of weight, cost and power consumption. In this paper, we implement SoC for FCS for ultra-lightweight and low power consumption of flight control system and present the results of integrated Command/Control and Down Link modem implementation.
- 15:40 ATSC 3.0 Bootstrap Detection Based on Machine Learning Technique for Fast Detection of Emergency Alert Signal
Bootstrap is the first transmitted signal in ATSC 3.0 transmission frame. The first OFDM symbol of bootstrap signal is identical for all transmission frames, and has repetition patterns in time domain. The first bootstrap symbol is used for time/frequency synchronization and channel estimation. And the last three symbols contain the transmission frame parameters. In this paper, the machine learning-based bootstrap signal detection technique is proposed. For the machine learning technology, deep neural network (DNN) structure is considered. The proposed technique can detect the first bootstrap symbol with highly large time offset.
- 16:00 Design and Analysis of Wireless Power Transfer for Non-Metallic USB Connector
The Non-Metallic Connector (NMC) was introduced several years ago. In this new iteration, the NMC has been redesigned to accomplish data transfer with an optical interface and wireless power transfer with the use of micro-inductors.
- 16:20 Inaudible Transmission System with Selective Dual Frequencies Robust to Noisy Surroundings
This paper proposes an inaudible communication method with high reception ratio which is resistant to ambient noise using selective dual frequency. In addition, the proposed system measures the noise frequency band of the surrounding environment, and can increase the reception rate by selectively using frequencies that do not occur. This communication method enables short-range communication in place of Bluetooth, NFC, and Wi-Fi in the speakers and microphones internal to the smart devices and home appliances. Experiments with selective dual frequency show that the reception ratio is 95% within 7.5 m distance.
Session 1.11 IoT (3)
- 15:00 A Novel Decoding Algorithm of Superposition Modulation for Cooperative IoT System
In this paper, we propose a novel decoding strategy for superposition modulation (SM) for cooperative IoT system. Unlike the conventional method where the SIC (successive interference cancellation) decoding is applied, whose performance degrades when the decoder fails to detect the main signal, we propose a novel decoding algorithm which derive the LLR (log likelihood ratio) directly from the received signal. The new decoding scheme performs well even when the main signal detection fails and outperforms conventional SIC based decoding method by more than 2 dB in the fading environment.
- 15:20 Proposal for Private Address-Type WoT Server Using NTMobile Technology
NTMobile (Network Traversal with Mobility) is our original technology capable of providing the NAT traversal and secure end-to-end communication.this paper proposes a system to set the WoT (Web of Things) server in a private network, and the server is accessed from different private networks by using NTMobile.According to this method, it is possible to construct a secure system preventing server attacks such as DDoS attacks, and also almost all Web programming technologies can be used as they are.We have built the web server in RaspberryPi and set in the private network, and confirmed remote controls via the Internet.
- 15:40 Highly Reliable IoT Data Management Platform Using Blockchain and Transaction Data Analysis
In this study, we propose a new data management platform using blockchain that contributes to provide reliable IoT services by guaranteeing both integrity and authenticity of the real-world data. In the proposed platform, the origin attempts to guarantee authenticity of the data by requesting the near terminals to generate the same types of data. By comparing the data and the update history of the data among the terminals, the proposed platform attempts to verify authenticity of the data because the tendency of the update history of the generator should be almost the same as that of the cooperators.
- 16:00 Secure Data Management in Internet-of-Things Based on Blockchain
This paper proposes an efficient and secure data management system by using the blockchain technology to issue certificates for IoT devices. Certified IoT devices ensure user privacy and data integrity while providing efficient data storage and retrieval through blockchain-based certificate management for IoT. The certificates issued to the IoT devices hold data generated by the device and store it on the blockchain. We evaluate our proposed system on Ethereum to measure transaction cost and speed according to the amount of data stored by issuing and verifying certificates.
- 16:20 Extensions to Middleware Ginga for Integration with IoT Environments
This work proposes a framework for integrating middleware Ginga implementations into Internet of things (IoT) networks, through support to the message queuing telemetry transport (MQTT) protocol. The Ginga's API has been extended and some reference applications were developed, in order to validate the proposed framework.
Session 1.12 AVS (3)
- 15:00 A Highly Directional Loudspeaker for Surround Channel Soundbar Reproduction
It has been shown that a loudspeaker coupled to a long narrow pipe, through which sound is radiated through a series of small spaced apertures can have narrow directivity. This paper describes a process by which this concept is practically applied for use in a soundbar for delivering sound to a listener indirectly by reflection from room surfaces. A model was developed and used to guide the process which revealed various sound quality issues for a basic design. With modifications a successful approach with narrow directional sound of an acceptable quality was found. Its architecture and performance are reported.
- 15:20 Virtual Frames as Long-Term Reference Frames for HEVC Inter-Prediction
High Efficiency Video Coding(HEVC) employs both past or future frames when encoding the current frame in a video sequence. This paper proposes a framework for using virtual reference frames, to achieve increased coding gains in the longterm for repetitive scenes in static camera scenarios.
- 15:40 Limited-Anchor Deep Neural Network for Moving Object Detection
This paper proposes a new method that integrates a deep learning based object detection network into traditional background modeling to detect moving objects. The proposed method allows us to efficiently identify candidates that contain moving objects while only setting a small number of anchors in the moving area of the image through guidance from the traditional background modeling method. This paper overcomes the disadvantages of conventional background modeling methods and conventional deep learning based object detection methods in terms of dynamic backgrounds and objects' motion states.
- 16:00 Parallel Feature Pyramid Network for Image Denoising
Recently, the convolutional neural network (CNN)-based denoising methods adopt single-scale features to separate image structures from the noisy observation. Single-scale features, however, have limitation in covering the full characteristics of image structures at different scales. In this paper, we propose a novel denoising network that makes use of the multi-scale feature pyramid where each feature map represents the characteristics of image structure at different scales. We then combine these multi-scale features to obtain the contextual information and utilize it to effectively generate clear denoised results. Experimental results show that our network achieves superior performance to other conventional methods.
- 16:20 Point Cloud Generation Using Deep Local Features for Augmented and Mixed Reality Contents
Augmented and mixed reality (AR/MR) contents need 3D data in various models to interact with human users. However, creating a 3D model is a complicated and expensive process involving 3D acquisition, 3D reconstruction, and rendering with computer graphics techniques. To solve that problem, we use an autoencoder to extract local information. We then train the latent space in a generative adversarial network (GAN). The GAN takes local context from the latent variable and then generates a point cloud of various robust shapes. Our method can generate a novel 3D model that can significantly save computational load to render AR/MR contents.
Session 1.9 HCI (2)
- 15:00 Collision Avoidance Head-Up Display: Design Considerations for Emergency Services' Vehicles
Emergency Services' (ES) vehicles objective is to attend accident scenes in a fast and safe manner. This task is becoming challenging due to the increasing population, drivers' distraction, emergency cases and subsequent road traffic. Drivers' distraction and low situational awareness could cause major delays to ERS. This paper presents the results of 50 drivers' investigation related to their activities during traffic congestion aiming to inform the design of a prototype Head-Up Display (HUD) which could provide ERS drivers with real-time manoeuvring information and proposed routing options superimposed directly to the vehicle's windscreen, improving ERS drivers' response times and safety.
- 15:20 Long-Duration Waveform Descriptive Grammar for Consumer Electronics Design, Diagnosis, and Validation
This paper describes a multi-timescale waveform descriptive grammar that assists researchers and engineers in syntactically labeling signals and developing test and control signals for consumer electronics design, diagnosis, and validation. The proposed waveform description and synthesis framework can accommodate the working knowledge of electrical and computer engineers engaged in consumer electronics design and validation projects, by offering seamless integrations of the proposed framework into their existing workflows.
- 15:40 A Study on the Improvement of Acoustic Radiation Characteristics of Flat Panel Exciter Speakers
The development of display technology and semiconductor technology enables mass production of large, high-definition OLED panels. Meanwhile, there was previous research to improve the sound quality, and the exciter speaker was attached to the panel, acting as the diaphragm of the dynamic speaker. This provides viewers with the clear, direct sound from the panel, maximizing immersion. However, the strong directivity of OLED panel excitation is also an advantage and a disadvantage. In this study, acoustic emission characteristics were improved by using multi-channel OLED panel speakers.
- 16:00 Iris Region Matching for Visible-Spectrum Gaze Trackers
The iris region matching would the core of the visible-spectrum gaze tracker. The design challenge is much more difficult than the one for the traditional infra-ray gaze tracker due to the imperfection of the eye images. In practical application environments, the iris regions on the eye images may be corrupted by the reflection light, and the matching process is also affected by the eyelids and wrinkles near the eyes. In this paper, we further improve the fitness function used for iris region matching. The experimental results show that the new one can effectively prevent the matching results from being dominated by the wrong textures near the eyes.
Saturday, January 4 15:00 - 17:00
Plenary Panel: IEEE Consumer Technology Standards Activities and Beyond
IEEE Consumer Technology Society is now the top 1 among all the IEEE Societies & Councils in terms of the number of entity-based standards activities. In 2019, we received the IEEE Standards Association Standards Committee Award "for exceptional leadership in entity-based standards development and industry engagement in the area of consumer technology" (we are the only recipient of the award over the last 10 years, and one of the only three recipients in the entire history of the award so far).
IEEE Consumer Technology Society Standards Committee has been proactively soliciting input and participation from the industry, and is well known for providing rapid responses to standardization needs from new industry sectors. We are sponsoring and overseeing many standards and standards projects for emerging technologies: VR/AR/MR/XR, blockchain/cryptocurrency, smart devices/home/lifestyle, digital transformation, consumer healthcare, big data, and IoT. Especially, over two thirds of IEEE's blockchain standards projects are sponsored by the blockchain subcommittee under IEEE Consumer Technology Society Standards Committee, making "blockchain" a proud tag of our Society.
In this session, Dr. Yu Yuan, the Chair of IEEE Consumer Technology Society Standards Committee will give you an overview of our standards activities and standardization programs. Other featured speakers from IEEE Consumer Technology Society, IEEE Standards Association, and the industry will share with you reference cases, latest updates, and newest trends in standards and beyond.
Saturday, January 4 17:00 - 18:30
Session 1.13 HCI (3)
- 17:00 Practical Application of Tour Plan Mining System, Tour Miner -Web Application and Case Study-
In this paper, we developed a tour mining system "Tour Miner" as web application based on the assumption of actual use by applying the methods and results proposed by our research team in the previous research. The web application can select travel records which match individual preferences or interests. We then released our web application to the public at the special exhibition at Yamaguchi Prefectural Museum for 1 month. According to the feedback from 425 users who used our Web Application, the selected travel records matched with their interests, and those travel records were useful in their travel plans preparation.
- 17:20 Wide Angle Multi-Shift Stereo Camera with Monocular Vision
In recent years, following the development of automated driving (AD) and advanced driver assistance systems (ADAS), stereo cameras which are able to measure distance are advancing accordingly by employing wide-angle field of view to detect various objects. At the same time, demand for low cost stereo cameras which can detect far objects also exists. Also, detection distance performance degradation due to low resolution CMOS image sensors and distortion from wide-angle lenses remain as problems when increasing the stereo camera field of view (FOV). In order to solve such problems, we developed a multi-shift stereo camera. In the multi-shift method, the left and right CMOS image sensors are shifted their center with respect to each lens optical axis center. By using this method, far object detection performance can be preserved while obtaining a wider FOV without the use of an expensive image sensor. We also developed a monocular vision detection employing top view image subtraction method, enabling detection of pedestrians and cyclists in the monocular vision region which is created at the outer region of the camera FOV. Furthermore, by using the disparity information from the center region to estimate the camera posture, we can achieve high accuracy for detection and distance measurement at the monocular region.
- 17:40 Eyeball Model Construction with Head Movement Compensation for Gaze Tracking Systems
The gaze tracker has become an important human machine interface, while it remains challenging for the users to move their head randomly. That is, the system performance appears significantly inferior due to the motion of a human head. However, the head movement compensation cannot be simply formulated as an eye detection problem. The minor error of the eye corner detection algorithm leads to an unacceptable result for limbus circle matching since the incorrect eyeball model is adopted. In this paper, we further explore the 3-D eyeball model anchored by the inner eye corner point. The relative location between the eyeball center and the inner eye corner is analyzed. This feature is used to guide the eyeball model construction as well as the limbus circle matching. The experimental results show the proposed approach allows a range of the estimation error for eye detection and the final limbus circle matching performance has been remarkably improved.
- 18:00 Wide Field-of-View and High Visibility 3D CG Technologies for AR HUDs
We have applied various kinds of 3D CG technologies to increase the Field Of View (FOV) and visibility of displayed images for AR HUDs. As a results, we successfully developed impressive 3D CG technologies for HUDs with wide FOV and high visibility
Session 1.14 WNT (4)
- 17:00 Examining Spatial Consistency for Millimeter-Wave Massive MIMO Channel Estimation in 5G-NR
3GPP determined mmWave as the primary technology to achieve a high data rate in 5G-NR. Millimeter-wave channel suffers from high pass loss due to high frequency. As a result, accurate beamforming is required to overcome the high path loss effect leading to a sparse channel. Because of its sparse nature, mmWave channel estimation is challenging. In this paper, we are studying the spatial consistency of the non-stationary mmWave channel using the Correlation Distance Matrix (CDM) for channel estimation. Our observation shows that spatial consistency can be used to decrease channel estimation complexity provided that the update distance kept small.
- 17:20 Linear Interpolation Complex TFI for SP-OFDM
In an orthogonal frequency division multiplexing (OFDM), the pilot signal is utilized for the channel estimation (CE). The scattered pilot (SP) reduces the number of pilot signals. However, the interpolation is required. The linear interpolation (LI) is achieved simply, but many errors are occurred in a multipath fading. The combined complex time frequency interferometry (CTFI) achieves the good CE by averaging the channel impulse response (CIR) of the different time window. However, a large number of pilot signals is required. To solve these problems, in this paper, we propose the CE based on the LI-CTFI for a SP-OFDM.
Session 1.15 IoT (4)
- 17:00 IoT Based Indoor Locating System Using Bluetooth Low Energy (BLE)
This project is aimed to develop an indoor locating system using Bluetooth low energy (BLE) that able to track personal asset in indoor venues, where the GPS signal strength is uncovered. Furthermore, the performance of the system is evaluated in term of signal speed, energy consumption, and sufficient distance of deploying both transmitter and receiver. For the system development, ESP32 Wi-Fi, BLE supported modules, MQTT and React application are used as the front-end and back-end of proposed system. In summary, the indoor locating system is capable of showing the tracking device using a 2D map on the browser.
- 17:20 SwarmGen: a Framework for Automatic the Generation of Semantic Services in an IoT Network
The growing adoption of Internet of Things technologies leverages the development of complex IoT applications. This situation is particularly visible in the consumer electronics realm, where integrating products from different manufacturers requires considerable effort. An increasing demand for rapid IoT application development arises, as it is time consuming and demands a multiple competences. This work aims to simplify the creation of ready-to-run semantic services from a high-level description. We proposed and implemented an architecture, and successfully tested the results in an existing configuration, with a reduced development effort.
- 17:40 Comparing Response Time of Home IoT Devices with or Without Cloud
we present a quick response time of smart lights in the local control method without cloud. Second, when multiple home IoT devices are used collaboratively like IFTTT or smart speakers, we can still observe the slow response time because of the cloud.For the fast and private control of home IoT trigger-action services, we demonstrate how a local control method accelerates the response time for the camera triggering action service.
- 18:00 Process-Based Anomaly Detection and Analysis for Cyber-Physical System with MQTT Protocol
We proposed a process-based anomaly detection for Cyber-Physical System. We focus on the relationship of the execution order of message passing between the devices in the MQTT network. We performed a `bird's eye' monitoring technique to message passing in the network with process mining. Using a process model called as a process tree, we check the deviations of behavior. CPS is a closed-loop system, we can easily detect the anomaly. However, it is hard to perform forensic analysis. Therefore, we proposed an analysis method which comes as an advantage of this approach.
- 18:20 Empirical Analysis of Containers on Resource Constrained IoT Gateway
Currently there are few studies on performance evaluation of containerized services under constrained resources. To enable efficient service provisioning on IoT gateways, this paper presents the empirical evaluation of Docker Swarm (DS), a container solution, on resource constrained devices such as Raspberry Pi3 boards. We have used multiple open source Intrusion Detection System (IDS) and Deep Learning (DL) based data analytic solutions in our experiments to evaluate creation time, CPU utilization, and memory usage. Our results reveal that creation time and memory usage of service container are critical factors for dynamic provisioning in constrained environments.
Session 1.16 AVS (4)
- 17:00 Development of High-Resolution Virtual Reality System by Projecting to Large Cylindrical Screen
NHK has developed a high-resolution virtual reality (VR) system for highly immersive visual experiences. Eight 4K laser projectors cast 12K×4K-resolution VR images onto a cylindrically shaped screen for 180-degree public viewing. Three-dimensional audio is reproduced using 15 loudspeakers and 2 woofers. We shot images with three synchronized 8K cameras and stitched them together to produce high-resolution VR images. We featured our images using this system at our annual event open to the public, confirming that the system will provide viewers a highly realistic immersion for next-generation television viewing styles.
- 17:20 Fast Light Field Reconstruction Using Convolutional Neural Network to Double Angular Resolution
Light field imaging is the best given the amount of information it provides when compared to conventional photography, it captures angular and spatial information from all directions. Despite that, its limited resolution poses great difficulty in the use of these enormous capabilities. In this paper, we tried to lessen the impact of this drawback by using a deep-learning algorithm. We adopted the idea of dividing the process into disparity estimation and color prediction. Our system was trained to double the angular resolution fast and accurately. Experimental results demonstrate that our system can reconstruct high-quality images faster than the state-of-the-art techniques.
- 17:40 Fast Convergence Algorithm for Adaptive Noise Cancellers with SNR-Based Stepsize Control
This paper proposes a fast convergence algorithm for adaptive noise cancellers with SNR-based stepsize control. SNR-based stepsize control reduces interference by the noise-cancelled signal in adaptation. A second SNR initially controls the stepsize, followed by a first SNR to promote coefficient growth. The numerator of the second SNR is the noise-cancelled signal obtained as the subtraction result different from the primary signal in the conventional algorithm to accelerate initial convergence. Evaluations with clean speech and noise recorded at a busy station demonstrate that the time until SNR switchover is reduced by 91% compared to the conventional algorithm.
- 18:00 Perceptual CTU Level Bit Allocation for AVS2
With developed CTU bit allocation algorithms, the video compression's performance improved significantly. However, without the consideration of the human visual system characteristics, they fail to obtain subjectively optimal results. In order to improve the image's subjective quality, we propose a perception-aware CTU level bit allocation algorithm. A perceptual distortion metric with spatial and temporal masking effects is presented firstly, and the rate-perceptual distortion constraint function is then established to obtain the optimal quantization step for each CTU. Experiments show that the proposed algorithm achieves better subjective quality with negligible affection on rate control on RD17.0 of AVS2.
- 18:20 Metadata Extraction Using DeepLab V3 and Probabilistic Latent Semantic Analysis for Intelligent Visual Surveillance Systems
Recently, surveillance cameras are ubiquitous for both real-time monitoring and recording important moments. Temporarily seamless surveillance using many cameras requires increasing amount of human efforts and enormous size of storage. To solve this problem, we proposed a metadata extraction method for object search and a person re-identification. The proposed metadata extraction method can be applied to a wide range of surveillance systems such as search for missing children in public space and crowd monitoring system.
Roundtable Workshop: Meet Standards Leaders, Join Working Groups, or Propose New Standards Projects
IEEE Consumer Technology Society is now the top 1 among all the IEEE Societies & Councils in terms of the number of entity-based standards activities. In 2019, we received the IEEE Standards Association Standards Committee Award "for exceptional leadership in entity-based standards development and industry engagement in the area of consumer technology" (we are the only recipient of the award over the last 10 years, and one of the only three recipients in the entire history of the award so far).
IEEE Consumer Technology Society Standards Committee has been proactively soliciting input and participation from the industry, and is well known for providing rapid responses to standardization needs from new industry sectors. We are sponsoring and overseeing many standards and standards projects for emerging technologies: VR/AR/MR/XR, blockchain/cryptocurrency, smart devices/home/lifestyle, digital transformation, consumer healthcare, big data, and IoT. Especially, over two thirds of IEEE's blockchain standards projects are sponsored by the blockchain subcommittee under IEEE Consumer Technology Society Standards Committee, making "blockchain" a proud tag of our Society.
This session will be started with an introduction of the IEEE policies and procedures for standards development, presented by Dr. Yu Yuan, the Chair of IEEE Consumer Technology Society Standards Committee. After that, you will have a chance to sit with volunteer and staff leaders from IEEE Consumer Technology Society Standards Committee/Subcommittees/Working Groups and IEEE Standards Association, discuss your interest and needs to join our current Working Groups or propose new standards projects (new PARs), or ask any other questions about IEEE standards.
Saturday, January 4 18:30 - 19:30
Welcome Reception
Sunday, January 5
Sunday, January 5 8:30 - 9:00
Breakfast
Sunday, January 5 9:00 - 12:00
Session 2.3 IEEE Digital Transformation Working Group Kickoff Meeting (Free for ICCE ‘20 attendees. Others must register)
The rapid advances and developments in digital technology and market growth have created the digital transformation that resulted in new and complex challenges in information systems and technology, process automation, cloud computing, robotics, and artificial intelligence. No standards exist for digital transformation. The purpose of this project is to develop definitions and a protocol for digital transformation implementations for applications. This standard provides an architecture and framework for digital transformation development, usage, implementation and interfaces for applications. The architecture and framework addresses scalability, systems and interfaces, security and privacy challenges for digital transformation applications. Stakeholders for the Standard include manufacturers discrete and process, service and solution providers, technology developers, end users. Sectors interested in this standard cover a wide range of industries, including entertainment, gaming, consumer, cloud computing, oil, healthcare, telecommunication and manufacturing.
REGISTRATION:
Free registration at: https://events.vtools.ieee.org/m/211619
AGENDA:
8:30 AM - 9:00 AM
Networking in Meeting Room G (Optional)
9:00 AM - 10:00 AM
- Call to Order (WG Chair)
- Roll Call and Disclosure of Affiliation (WG Chair)
Affiliation FAQs: http://standards.ieee.org/faqs/affiliation.html - Establishment of Working Group Membership (WG Chair)
- Approval of Agenda (WG Chair)
- IEEE Patent & Copyright Policies (WG Chair)
Call for Patents
https://development.standards.ieee.org/myproject/Public/mytools/mob/slideset.pdf Copyright https://standards.ieee.org/ipr/copyright-materials.html - Review of Working Group Policies & Procedures (WG Chair & IEEE SA Program Manager)
- Establishment of Officers (WG Chair)
a. Vice-Chair and
b. Secretary - Overview of Standards Development Process (Vanessa Lalitte, IEEE SA Program Manager)
10:00 AM - 11:00 AM - Technical Presentations and Discussions
10:00 AM - 10:20 AM Presentation of the Project (Lee Stogner, WG Chair)
10:20 AM - 10:40 AM Presentation by Guest Speaker, (...)
10:40 AM - 11:00 AM Presentation by Guest Speaker, (...)
11:00 - 11:10 AM Coffee Break
11:10 AM - 12:00 PM - 11:10 AM - 11:50 AM Brain Storming and Action Plan
- 11:50 AM - 11:58 AM Future Meetings
- 11:58 Am - 12:00 PM Adjourn
CONTACT: Lee Stogner l.stogner@ieee.org
Sunday, January 5 9:00 - 10:00
9:00-10:00
K3 Keynote: Mr. Lee (E Ink)
Sunday, January 5 10:00 - 12:00
Session 2.1 AWD
Best Paper Competition Session
- 10:00 The Required Video Bitrate for 8K 120-Hz Real-time Temporal Scalable Coding
We developed an 8K 119.88-Hz (120-Hz) the high efficiency video coding (HEVC)/H.265 encoder to transmit smoother videos. To ensure backward compatibility with 59.94-Hz (60-Hz) video decoders, the encoder supports temporal scalable coding to partially decode 60-Hz video frames from compressed 120-Hz bit-streams. To evaluate the image quality of our encoder, we conducted subjective evaluation experiments for 8K 60-Hz and 120-Hz videos. From the results, we find that the required bitrate for 8K 120-Hz videos is 85 Mbps.
- 10:20 IMU-based Spectrogram Approach with Deep Convolutional Neural Networks for Gait Classification
This study aimed to figure out users' physical condition through a gait classification and the optimized positions on the human body to attach IMU sensors by using the IMU-based spectrogram approach with deep CNN models. Our experimental results show that a single IMU sensor data can successfully predict the subject groups even without requiring hand-craft extraction and selection of features. The classification accuracy can be much improved by a proper choice of sensor combinations and input layout. This allows us to reduce the number of attached sensors on the human body while achieving very high accuracy on the gait classification.
- 10:40 A Scalable Computer Vision Framework for Mobile Device Auto-Typing
In this paper, we present a computer vision framework that controls robots to auto type in on a mobile device such as an Android phone or an I-pad. The framework consists of three parts: (i) an image undistortion and segmentation algorithm that supports images captured by a top mounted camera or a side mounted camera, (ii) a deep neural network~(DNN) algorithm that can detect the keyboard region and recognize its isolated characters an input image, and (iii) a grid click algorithm to construct data points to compute the image to robot coordinate translation matrix for mobile devices of different sizes.
- 11:00 Voice Conversion Attacks on Speaker De-Identification Schemes
Speaker de-identification can be used to protect the privacy of a speaker. One class of de-identification schemes uses voice conversion techniques to transform utterances of a source speaker into utterances of a target speaker. This paper presents two new generic attacks on such schemes. The attacks have been implemented for Gaussian mixture model-based schemes. Experimental results show that the first new attack achieves success rates that are considerably higher than the rates of existing attacks. The second new attack shows that these rates can be increased further if the attacker has access to an utterance of the target speaker.
- 11:20 Indoor Wireless Localization Using Consumer-Grade 60 GHz Equipment with Machine Learning for Intelligent Material Handling
Wireless indoor localization is critical for autonomous agents in modern and future smart warehouses. Millimeter-wave (mmWave) frequencies have been investigated for high-precision localization in recent years for indoor as well as outdoor positioning. We propose machine learning (ML) techniques over a radio map to estimate the location of an autonomous material handling agent used in warehouses. Based on our experimental results we demonstrate that a Multilayer Perceptron (MLP) based positioning achieves centimeter level accuracy with Root Mean Square Error (RMSE) of 0.84m. The proposed localization technique achieves up to 80% lower positioning error compared to state-of-the-art mmWave wireless localization techniques.
- 11:40 ThuMouse: A Micro-gesture Cursor Input Through mmWave Radar-based Interaction
We present ThuMouse, a novel interaction paradigm aimed to create a gesture-based and touch-free cursor interaction that accurately tracks the motion of fingers in real-time, allowing users to move the cursor using frequency-modulated continuous-wave (FMCW) radar. ThuMouse regressively tracks the position of a finger, which enables finer-grained interaction. This paper presents the gesture sensing pipeline, with regressive tracking through deep neural networks, data augmentation, and computer vision as a training base. This work builds a foundation for designing finer micro-gesture-based interactions, and we report on a proof-of-concept demonstration showing how our system can function as a mouse.
Session 2.2 EGV
- 10:00 User-Selected Object Data Augmentation for 6DOF CNN Localization
Automatic content placement is desired for augmented reality applications. Conventional approaches, such as marker deposition or three-dimensional modeling of all user-selected objects, are time-intensive. We herein propose a framework that is cost-efficient when the same content is superposed on the same multiple objects. The framework consists of steps: 1) scanning a user-selected object with an RGB-D SLAM, 2) cropping the object from the scanned images, and 3) training a convolutional neural network on the cropped images and various backgrounds. Our CNN outputs the absolute position and tilt of a device. An important aspect here is data augmentation.
- 10:20 A VR gun controller with Recoil Adjustability
This paper provides the design and implementation of a VR gun controller with haptic feedback for the HTC Vive with recoil adjustability. The primary focus of this design is to provide realistic haptic feedback for games utilizing projectile launching weapons to improve gaming immersion on a level further than simply audio and visual.
- 10:40 Reciprocal Crowdsourcing: Building Cooperative Game Worlds on Blockchain
Crowdsourcing became increasing popular in recent years, thanks to the explosive growth of online users. However, most crowdsourcing platforms ceased to operate due to the untrustworthy data or lack of motivated participants. The blockchain technologies bring decentralization as the potential solution. This paper introduces reciprocal crowdsourcing, a novel decentralized cooperative crowdsourcing model powered by the blockchain to improve the trustworthy among crowdsourcing participants, who perform transparent collaborative work in the system thereafter. To validate our proposal, we implemented `` Cell Evolution'', a blockchain game, in which the players can build cooperative game worlds on the blockchain with reciprocal crowdsourcing.
- 11:00 Reliable Normal Estimation from Sparse LiDAR Point Clouds
In this paper, we present a reliable vertex normal estimation method from sparse point clouds that improves the accuracy of plane-based frame-to-frame registration. We define a face normal reliability measure. The vertex normals are calculated by weighted averaging adjacent face normals based on the reliability. Through the experiments, it is confirmed that the proposed method produces consistent and reliable vertex normals.
- 11:20 Compensation of a chromatic aberration of a geometric phase lens for realizing a bi-focal integral floating display without a color breaking
A bi-focal geometric phase (GP) lens can be used to improve the depth range of an integral floating display to form switchable depth planes. However, due to a chromatic aberration of a GP lens to form R/G/B sub-images at different locations, a color breaking of floated image can occur. In this paper, we propose a novel method to compensate that chromatic aberration by integrating R/G/B pixels at depths.
Session 2.4 AVS (5)
- 10:00 The Multilayer Perceptron Vector Quantized Variational AutoEncoder for Spectral Envelope Quantization
In this paper, we propose The Multilayer Perceptron Vector Quantized Variational Autoencoder (MLP-VQ-VAE) to manage the flexibility of controlling the number of z-latent vectors to quantize and embed space sizes efficiently. In the experiments, the MLP-VQ-VAE is applied to quantize spectral envelope parameters from the 48 kHz high-quality vocoder named WORLD. The MLP-VQ-VAE reduces the memory sizes of the representation of z-latent or the length of vectors to quantize and embed space size or codebook size, decreases the Log Spectral Distortion, compares the conventional VQ and the VQ-VAE.
- 10:24 An Approximate Versatile Video Coding Fractional Interpolation Hardware
In this paper, approximate Versatile Video Coding (VVC) fractional interpolation filters are proposed. They significantly reduce computational complexity of VVC fractional interpolation with a negligible PSNR loss and bit rate increase. In this paper, an approximate VVC fractional interpolation hardware implementing the proposed approximate filters is designed and implemented. The proposed approximate hardware has less area and up to 40% less power consumption than exact VVC fractional interpolation hardware. Therefore, it can be used in consumer electronics products that require low power VVC encoder hardware.
- 10:48 SSIM Assisted Pseudo-sequence-based Prediction Structure for Light Field Video Compression
This paper proposes a novel Structural Similarity Index (SSIM) assisted pseudo-sequence-based (PSB) coding order and prediction structure for improved compression and random-access efficiency for light field videos (LFV). The experimental analysis compares the performance of the proposed method against two recent PSB LFV compression methods in terms of PSNR gain. The results demonstrate the proposed technique yields improved bitrate and better random-access to views compared to existing methods.
- 11:12 3DVPS: A 3D Point Cloud-Based Visual Positioning System
Visual positioning is a critical function in applications such as navigation and extended reality experiences. Recently, deep learning technologies, especially classification, had been implemented on the positioning task. However, to acquire a comprehensive positioning dataset and produce a high-performance neural network model is challenging. In this article, we propose to solve the issue by projecting training images from auto-generated 3D point cloud maps. By utilizing branch convolutional neural network (B-CNN) model, the "Zoom-in" equivalent property results in favorable positioning accuracy and successful real-time implementation.
- 11:36 Two-Phase Instance Segmentation for Whiteleg Shrimp Larvae Counting
Whiteleg shrimp accounts for the highest proportion in the shrimp export of Vietnam. Yet, in hatcheries, shrimp larvae quantity is still estimated manually. Several approaches were proposed to address this issue but overlapping problem reduced accuracy significantly. In this paper, this problem is addressed by implementing two-phase Mask R-CNN based instance segmentation to segment shrimp larvae for counting purpose. Compared to one-phase Mask R-CNN, the accuracy of counting by applying two-phase Mask R-CNN increased by a maximum margin of 16.1%. Our model had remarkable results, with accuracy ranging from 92.2% to 95.4% for moderate overlapping images.
Poster Session 2
- Development of Data Acquisition System for Collecting and Processing Data
The big data collected from IoT (Internet of Things) devices and equipment has difficulty sending to the cloud server due to the finite resources. To get over this limitation, edge computing is suggested. In this paper, we propose the data acquisition device (DAQ), integrating collecting and computing functions, programmed to conduct the target works such as sending message to the other DAQ device and receiving data from the several kind of PLC(Programmable Logic Controller). DAQ communicates with gateway using LoRa or WiFi connectivity.
- Pre-Activated 3D CNN and Feature Pyramid Network for Traffic Accident Detection
In this paper, we present a novel traffic accident detection method using a spatio-temporal three-dimensional (3D) convolutional neural network. The proposed method consists of pre-activation ResNet and feature pyramid network (FPN) structure. To reduce computational load with preserving the detection accuracy, we propose interval input method. Experimental results show that the proposed network outperforms existing methods in the sense of both accuracy and recall measures.
- A Stress Detection System Based on Multimedia Input Peripherals
In this paper a Stress Detection System based on Machine Learning Algorithms (MLAs), keyboard and mouse data is presented. The development of this system is composed by three steps. Firstly, each user performs some tasks while a web application framework collects data from keyboard and mouse. At the end of each task, he/she communicates the stress level in order to create the stress class. Secondly, from collected data, features extraction and features selection procedures through a Neighborhood Component Analysis (NCA) are implemented. Lastly, three MLAs, trained with features as input and stress classes as output, are implemented to detect stress.
- Monitoring System for Detecting Decrease of Living Motivation Based on Change in Activities of Daily Living
The one of initial symptom of dementia is "Decrease of Living Motivation". In this study, the authors developed a system based on internet of things platform for monitoring activities of daily living for elderly people and verified three hypotheses on a relationship between decrease of living motivation and change in activities of daily living. We made experiment with one subject for 10 weeks to monitor activities of daily living and conducted a questionnaire to measure subject's living motivation. From this result, we consider that the decrease of living motivation can be detected by monitoring the change in going out time.
- Easy-Assist: An Intelligent Haptic-based Affective Framework for Assisted Living
The proposed research aims to help older people maintain their emotional well-being. This research is focused on developing a wearable affective framework, which can help in detecting the emotions of the user in addition to monitoring their physiological signals. The proposed framework is validated using a fall detection algorithm deployed in a custom-built watch wearable, and an emotion detection framework. A dataset of 21700 samples acquired using the proposed framework yielded a maximum efficiency of 97.25 %, 96 %, and 94 %, in classifying the state and emotion classes into Alert, Active and Normal classes respectively, using multi-class SVM model.
- iMED-Tour: An IoT-based Privacy-assured Framework for Medical Services in Smart Tourism
Tourism is one of the key revenue generators in communities worldwide. In the present day, traveling has become a lot easier with all the information available through the Internet. However, there are still challenges in identifying the right medical resources while traveling to a new city for the first time. In this research, we propose a privacy-assured framework that can help travelers reach the medical services on their trip on-time during the emergency. Through this research, we have developed a cost-effective tour wearable, We-Tour, that can notify the user if they need to visit a hospital service as required.
- Energy Storage System Management Method Based on Deep Learning for Energy-efficient Smart Home
With increasing energy problems, energy management becomes more important around the world. As Smart Home Technology is applied to the home, many methods of reducing energy consumption are being studied. We focused on the Energy Storage System in the home for efficient energy management. It is important to efficiently manage the Energy Storage System. Therefore, we propose the Energy Storage System Management Method based on Deep Learning for energy-efficient Smart Home.
- Intelligent Management System with Energy Data Block in Smart City
Smart City offers a variety of services. Among the various services, energy services play a role in balancing urban energy consumption and supply. However, as energy prosumers emerge, two problems arise. The fluctuation of the energy market can be greatly disturbed, and the forecast of energy demand due to large fluctuation becomes impossible. In this paper, energy data blocks reflecting the energy data elements are created in real time to make stable energy market. In addition, energy data blocks stored in real-time enable forecasting of urban energy demand.
- Artificial Intelligence-Based Energy Data Monitoring and Management System in Smart Energy City
As the fourth industrial revolution and information and communication technology base are growing and the Internet of Things is distributed, a newly set goal is to use the energy of various industries efficiently. This paper is a study to solve the energy consumption problem and to use it efficiently. Specifically, sensors store energy usage in the cloud in real time, analyzing energy efficiency and showing the user. It also provides intelligent services for people to use energy more effectively than traditional methods. This process prevents and monitors energy consumption that is not efficient in real life by mobile and computer.
- Calibration-free Localization for Mobile Robots Using an External Stereo Camera
We propose a calibration-free method for localizing mobile robots using a stereo camera installed on the ceiling. We use both optical images and depth data obtained from the stereo camera to localize the robots. This method achieves 2.3 mm precision at the center of the field of view and 30 mm near the edge when the stereo camera is installed on an approximately 3.2-meter high ceiling. We also show experimentally that it is possible to perform automatic control of a mobile robot based on the location information measured by the proposed method.
- Individual Status Recognition System Assisted by UAV in Post-Disaster
When natural disasters occur, there is a possibility of having many injured people in the disaster area. In this study, we proposed a recognition system of individual status to help rescue teams. Employing Unmanned Aerial Vehicles (UAVs) system after disaster occurrence gives many advantages. This study aims to classify whether an individual status is standing, sitting, or lying on the ground by using supervised machine learning. Experiments revealed that the system is able to recognize all three types of individual status with an accuracy of 95.6%.
- A Methodology for Self-diagnosis and Behavior Correction in Digital Television Receivers: Initial Concept
Digital television (DTV) receivers also suffer from software and hardware errors, which result in malfunction in user premises. This work tackles this problem and proposes a self-diagnosis and behavior correction methodology, which has the potential to keep DTV receivers working, under such errors or wrong configuration data.
- A Constant Voltage Design for Inductive Power Transfer System with Multiple Loads
Compensation circuit design has been extensively studied in literatures to achieve constant voltage for single load in inductive power transfer (IPT) systems. In this work, we propose secondary-side compensation circuit for IPT system which can obtain load-independent constant voltages for multiple loads. This topology can be beneficial to applications that require difference voltages for multiple loads. In this paper, as a primitive investigation, we demonstrate how to design compensation circuit to achieve constant voltages for two loads. Simulation and experiment results are provided to confirm effectiveness of the proposed scheme.
- Resilient and Efficient Blockchain Consensus Protocol for Internet-of-Things
The rapid advance of Blockchain has been used for the Internet-of-Things to provide reliable distributed infrastructure and applications without a centralized authority. This paper aims to create a new consensus protocol that can be efficiently and resiliently used for the Internet-of-Things based on the Practical Byzantine Fault Tolerance algorithm (PBFT), which is critical for IoT scalability and reliability. This paper analyzes the current implementation of PBFT consensus protocol and proposes a new secure approach for achieving consensus by adding the properties of random hash generation and threshold comparison in order to defend against DoS attacks.
- Proposal of Interactive Home System Using Computer Graphics (CG) Characters
In this paper, we propose a voice interactive home system using CG characters that can freely change its appearance according to the user's request. Specifically, when a human sensor detects a person, the CG character begins talking to increase the chance of conversation with the user. The system can also remotely operate various home appliances in the house with ECHONET-Lite through the CG character by voice dialogue, and also provide life information provision service such as weather and time. In this study, we considered a spoken dialogue system that is easier to talk to than a humanoid type.
Sunday, January 5 12:00 - 12:30
Lunch (Welcome Address - Prof. Hyesook Lim, President of IEIE 12:00-12:10 )
Sunday, January 5 12:30 - 13:30
K4 Keynote: Ms. Pam Snively (TELUS)
Sunday, January 5 14:00 - 15:30
IoT Applications & New Development - Part 1
Sunday, January 5 16:00 - 17:30
Session 2.5 SPC (1)
- 16:00 Design Considerations of a Cryptographic Module for Distributed Energy Resources
To protect critical infrastructure on digital networks, appropriate security controls need to be placed using either purpose-built cybersecurity technologies or embedded security controls in command and control center protocols. Few vendors offer devices that use cryptography to secure the communications power systems communications. There is a need to research and develop a suitable cryptographic module that is capable of mitigating the risk of unforeseeable threats, specifically to DERs and bulk power systems. This paper presents research to improve the security of an electric grid that employs millions of DERs with the goal of securing DER communications
- 16:20 SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication
Currently, the most commonly used scheme for identity authentication on the Internet is based on asymmetric cryptography and the use of a centralized model. Centralized model needs a Certificate Authority (CA) as a trusted third party and a trust chain of CA. However, CA-based PKI is weak in the single point of failure and certificate transparency. Our system, called SS-DPKI, propose public and decentralized PKI system model. We describe a detailed scheme as well as application to use decentralized PKI based secure communication. Our proposal prevents storage overhead on the data size of transactions and provide reasonable certificate verification time.
- 16:40 A Binary Counter Based on Stacking and Sorting
Binary counters are widely used as essential building blocks for varieties of circuit operations, especially for fast multipliers. In this paper, a 7:3 counter design is proposed, which uses 3- and 4-bit stacker to shift the "1" from one side to the other and then finds the "1" in the specified position by accurate sorting. Compared with previous designs, this counter reduces the number of XOR gates and curtails the critical path.
- 17:00 Embedded Systems Authentication and Encryption Using Strong PUF Modeling
Consumer electronics and embedded systems must ensure trusted authentication and secure communications. Communication session encryption keys are negotiated in a key agreement protocol enabled by a public key/private key pair for authentication. However, embedded systems are limited in their capability to implement public key encryption and client-side authentication. In this paper, we introduce an authentication and session key generation mechanism using Physical Unclonable Functions (PUFs) that extract randomness from device physical characteristics. The method uses PUF models to help with key exchange and creates periodically refreshable. The approach mitigates tampering attacks as no key is stored on device.
Session 2.6 EMC
- 16:00 Smart Home Energy Management System with Optimal Source Selection in a Real-Time Pricing Environment
The paper presents a smart home energy management system (HEMS) with an optimal source selection algorithm. The proposed system comprising of two input sources, a PV-battery duo source and the main electricity grid, takes into consideration the electricity price information, user load profile, irradiance profile and, the battery power information. The smart HEMS ensures the right energy mix by optimizing the power consumption from the local resources and the main grid in order to improve efficiency and reduce the overall cost of the system. Hardware implementation of the proposed HEMS was successfully tested on a small-scale prototype in the laboratory.
- 16:20 A Methodology to Enable Electric Boiler as a Storage for Residential Energy Management
In an Energy Management (EM) scenario, photovoltaic (PV) generation systems could lead to an important cost-saving and "shiftable loads" (e.g., dishwasher, washing machine, cooker hood) play an important role. Among all "shiftable loads", electric boiler has considerable importance since it can be considered as a thermal storage. In this perspective, it is crucial to know the typical usage patterns and the state of charge of this appliance. In this paper, a methodology to identify the electric boiler usage patterns and to estimate its state of charge is presented.
- 16:40 Performance-efficient CPU Resource Management Algorithm on Heterogeneous Multi-Processor
The biggest difference of mobile devices over AC powered is that their power budget is very limited. That is, the CPU resource management solution for mobile devices makes a greater contribution to product quality. Their main algorithm was to choose the minimum energy or the best-fit performance to accommodate a given job. However, in real world, performance and energy are essential to each other and cannot be treated in these independent and consecutive referencing methods. In this document, we would like to give you new ideas for how to consider performance efficiency in CPU resource management solution.
- 17:00 Building Energy Management Technology Considering Usual Power Consumption Pattern and Prediction Uncertainty
This paper proposes a building energy management model considering prediction errors in load consumption and renewable energy generation. Demand side management has a problem because consumers has difficulty to control power consumption due to the lack of consideration of actual use environment. Therefore, we propose penalty factor to minimize the gap between scheduling power and usual power usage patterns. Since the prediction error causes difficulty in power operation, this paper proposes energy storage system operation method based on reserve portion. The simulation results show the electricity rate of the building is reduced by more than 21% per month.
- 17:20 A New LDPC Code Decoding Method: Expanding the Scope of Ising Machines
Low-density parity-check (LDPC) code decoding have never been converted into a quadratic unconstrained binary optimization (QUBO) problem. Thus, a new method is created: one that converts the LDPC code to a QUBO problem, inputs the QUBO problem into Ising machines (computers based on the Ising model that are designed to solve the QUBO problem), obtains the QUBO solution and converts it to a LDPC solution. In formulating this method, one expands the currently scope of studies involving Ising machines, helping current and future researchers unlock its full range of capabilities and possibilities.
- 17:40 Benefits of Low-Power Improvements at Circuit Level on Specific FPGA Architectures
The rising demand of computing power in mobile applications leads to the question how suitable FPGAs might be for usage in environments with limited energy resources. One of the most important benefits of FPGAs is their ability for reconfiguration and therefore adding a certain degree of flexibility in the field. In this paper, different, low-power optimized blocks are integrated into a partial slice and investigated upon the related static power consumption. Key components like LUTs, D-FFs, IO units and basic combinational circuitry are subject to power reduction and depict the baseline for further improvements in terms of extended battery runtime.
Panel on Smart Healthcare and Session 2.7 EPH (1)
This session will have an integrated panel on smart healthcare followed by technical presentations. The panelists are (1) Todd Haim, National institute of Health, USA, (2) Bob Frankston (IEEE Consumer Electronics Society, USA, (3) Saraju Mohanty, University of North Texas, USA, and (4) Himanshu Thapliyal, University of Kentucky, USA
- 16:00 Panel on Smart Healthcare
This session will have an integrated panel on smart healthcare followed by technical presentations.
- 16:40 i-RISE: An IoT-based Semi-Immersive Affective Monitoring Framework for Anxiety Disorders
The increasing trend of using wearable sensors for monitoring various physiological signals has helped researchers to advance the research in the development and application of wearable computing systems. The emotional well-being of a person is as important as an active lifestyle to maintain a healthier balanced life. Affective computing, also known as artificial emotional intelligence, can recognize, interpret and simulate human emotions. In this research, we propose a cost-effective semi-immersive affective monitoring system that can help in analyzing emotion features for monitoring anxiety disorders by monitoring physiological signals of the user and aid in emotion elicitation through a semi-immersive environment.
- 17:00 iDDS: An Edge-Device in IoMT for Automatic Seizure Control Using On-Time Drug Delivery
In this paper, an internet of medical things (IoMT) based unified drug delivery system (iDDS) has been proposed for automatic seizure detection and control. iDDS has mainly two units: seizure detection unit and drug delivery unit. Seizure detection is performed in real time using statistical feature extraction and deep neural network (DNN) classifier. Once a detection is complete, the drug is injected into the target area using piezoelectric actuated valveless double reservoir micropump. iDDS presents an unique piezoelectric actuated double-reservoir based drug delivery system for fault-tolerance as well as better drug control.
- 17:20 Validating Physiological Stress Detection Model Using Cortisol as Stress Bio Marker
In this work, we have presented the validation of a stress detection model using cortisol as the stress biomarker. The proposed model uses two physiological signals: Galvanic Skin Response (GSR) and Photoplethysmograph (PPG) to classify stress in two levels. GSR and PPG signals were collected from a total of 13 participants along with their saliva sample during the duration of the the experiment. We have used 10 out of the 13 participants to train our model. Data of remaining 3 participants was used to test the robustness of the model in distinguishing stressed states from non-stressed states. We have achieved an overall accuracy of 92% with the model achieving precision, recall and f1-score of 93%, 99% and 96% respectively in predicting the occurrences of stressful events. Results indicates the promise of the proposed methodology in accurately detecting the presence of stressful events by generalizing the test data coming from different set of population than that of training data. Index Terms-Galvanic Skin Response
Session 2.8 SMC
- 16:00 A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping
For decades, Calligraphy has been a popular artistic activity in Japan, China, and some countries. To assist its self-learning, we have explored the Calligraphy Learning Assistant System using projection mapping. A learner can practice it by following the letter writing video projected on the paper. In this paper, we present a letter portion practice function. Learners may practice weak portions with the video showing the writing by a teacher. Through applications to 12 novice international students, we confirm the effectiveness, where each student has significantly improved the skill.
- 16:20 Edge Camera System Using Deep Learning Method with Model Compression on Embedded Applications
This paper proposes an edge camera system using a compressed deep learning model for enhanced Video surveillance Management System of Smart City that analyzes existing recorded video. The proposed edge camera at the end terminal of the Video surveillance Management System send the analyzed image, information and warning to the central system according to the situation analysis based on the information obtained by compressed deep learning for low memory and real-time operation in embedded system. We tested with edge camera installed in street lamp and confirmed stable operating performance and high recognition rate compared to existing system.
- 16:40 Empower Saving Energy into Smart Homes Using a Gamification Structure by Social Products
The users' behavior in a house impacts the amount of electrical energy consumption in the electrical products of the household; therefore, energy consumption can be optimized by using sense, smart and sustainable products S3 as Social Products (SP) for saving energy in the housing through gamification techniques that can yield behavioral changes. To reduce energy consumption in households, a structure of three steps is proposed for SP that uses a gamification Human Machine Interface in each device to communicate between products and consumer in an SH. Once every social product has its local gamification, a Gamified Smart Home is achieved.
- 17:00 Design of an Intelligent Robotic Vehicle for Agricultural Cyber Physical Systems
For agricultural cyber physical systems (CPS), we propose an intelligent robotic vehicle that uses reconfigurable hardware to implement neural network inference and cryptographic functions for enhancing system performance and adaptivity. We also present a crop growth model and a detection model of pests and diseases to support its decision-making mechanism.
- 17:20 Real-Time Public Transportation Prediction with Machine Learning Algorithms
As part of Intelligent Transportation Systems (ITS) public transportation plays a critical and essential role for the mobility in every modern city. In this paper, we introduce a novel method for the real-time prediction of bus arrival times in the various bus stops over a given itinerary. The proposed approach exploits machine and deep learning algorithms, including optimal least square (OLS) linear regression, support vector regression (SVR) and fully-connected neural networks (FNN). The experimental results obtained show that the FNN approach outperforms, in terms of mean absolute prediction error, both SVR (by 7,62 %) and OLS (for 15,74 %).
- 17:40 Surveillance Swarm: Gathering Resources for Finding Targets in a Distributed Global Network of Smart Devices
Missing people, animals or objects is a common problem. Many tracking systems are based on technologies that are expensive, demands big devices to be carried, or demands often battery charging. Approaches using cameras or RFID systems usually have the problem of requiring to cover the search area with sensors. This work takes advantage of the Internet of Things proposing the Surveillance Swarm, a system for finding targets using the Swarm, which enables opportunistically gather heterogeneous resources of third parties. A use case was deployed and evaluated.
IoT Applications & New Development - Part 2
Sunday, January 5 18:00 - 19:30
Session 2.10 CEA (1)
- 18:00 Cliff-sensor-based Low-level Obstacle Detection for a Wheeled Robot in an Indoor Environment
An uneven ground formed by a low-level obstacle whose height is too low from the ground often stalls a robot's navigation in an indoor environment. Few-centimeter differences between an obstacle and a non-obstacle are difficult to be precisely measured in a constant distance at a mobile robot. In this paper, we let a wheeled mobile robot make physical contact onto an object, and use the cliff sensor(s) to characterize an object at firsthand. While adopting a simplified deep-learning architecture, we suggest rapid and accurate obstacle detection in real-time. We implemented our technique on an embedded robot platform.
- 18:20 Autonomous Driving System Verification Framework with FMI Co-Simulation Based on OMG DDS
With the advent of autonomous driving systems, the system verification has great importance for the safety. Since the engineers usually make highly accurate simulations, they require massive computing resources. In addition, they should develop the trustable test scenarios and the evaluation metrics, which may be difficult and time-consuming issues. In this paper, we propose an autonomous driving system verification framework, which can efficiently support cost-effective simulation by means of FMI/DDS and cloud computing. Some formal assessment methods including quantitative evaluation metrics will be given in order to make easy verification of the features of the autonomous driving systems.
- 18:40 Implementation of CNN-Based Parking Slot Type Classification Using Around View Images
This paper presents a commercial implementation of CNN-based classification of parking slot type using around view images. We constructed an extensive dataset composed of labeled 480,000 images acquired on various environments using around view monitoring camera mounted in commercial vehicles. We subdivided parking slot types into ten categories and finally derive three parking slot types for actual applications. To operate the classifier in real vehicle, we designed CNN model suitable for embedded system and implemented it using GPU. In experiments, the classifier achieves accuracy of 94.15% and processing time of 3.67ms per frame on the NVIDIA Tegra CX embedded system.
- 19:00 Vision-Based Parking Slot Detection Based on End-to-End Semantic Segmentation Training
This work presented an end-to-end training model for parking slot detection in automatic parking systems (APSs), which combined both a line and a point semantic segmentation models based on multi-task learning. The proposed models generate images of entrance line and center points of corners, and are used to determine the coordinates of actual parking slots in the post processing step. The recall, precision and F-measure rate of the proposed method are 92.94%, 99.40% and 96.06%, respectively, which are better than existing state-of-the-art methods with end-to-end training.
- 19:20 A Study on RIR Optical System for Ultra-thin Headlights
The demand for vehicles which conserve energy is increasing. Reducing the weight and power consumption of headlights is also required. Many of the concept cars developed by car manufacturers are designed with thin headlights. In this situation, we have developed the RIR optical system as a new headlight module that can realize ultra-thin body with a lens height of 20 mm and uses less power consumption, 19 W.
Session 2.11 EPH (2)
- 18:00 A Novel Severity Index of Heart Disease from Beat-wise Analysis of ECG Using Simulink Fuzzy Logic for Smart-Health
This paper presents a simulink model-based approach of using fuzzy logic for accurate detection of PVC beats in ECG signals. Clinical diagnostic criteria were used to develop the ECG fuzzy rule set that classified each ECG beat into the two beat-groups: Normal and PVC. A severity index of the PVC was also formulated. The model was tested using ECG signals from the MIT-BIH database (Physionet). The accuracy of the proposed model is 96.6%. The sensitivity and specificity of the model are 95.6% and 96.8%, respectively.
- 18:20 Interaction Among Musical, Cerebral and Autonomous Rhythms
In the present study we determined the coherence among different locations of EEG, heart rate and respiration with envelopes of songs during listening to music. We observed an overall increase in coherence among different locations of EEG. Our results showed that slow tempo song had the largest impact in making all variables synchronized to its envelope profile. Songs with expected similar cognitive effects produced higher synchronizations of the all measured physiological variables with their envelope. These results show the important role of tempo and cognition of songs in synchronizing different physiological variables.
- 18:40 Ordinary-Kriging Based Real-Time Seizure Detection in an Edge Computing Paradigm
To best of the authors' knowledge, this is the first work that uses Kriging for early detection of seizure. There is a need for a more time-sensitive approach to seizure detection. Here, we propose a real time seizure detection model in an edge computing paradigm using signals collected through the electroencephalogram (EEG). The EEG signals were de-noising with the Discrete Wavelet Transform (DWT), and then classified using the ordinary-Kriging method which gives a training accuracy of 99.4% and a perfect sensitivity. The presults show a comparable classification accuracy and a lower mean detection latency of 0.85 sec.
Session 2.12 MDA (1)
- 18:00 MobiExpressNet: A Deep Learning Network for Face Expression Recognition on Smart Phones
Accurate Face Expression Recognition (FER) on a smart phone is useful in many applications which respond to a user's emotional state. We introduce a new lightweight Deep Learning model, MobiExpressNet, for FER. The model relies on depthwise separable convolutions and a fast downsampling approach to keep the model size very small. Our best network model gave an accuracy of 67.96% on the challenging FER2013 dataset which exceeds human accuracy by 2.5%. The MobiExpressNet model size and FLOPs are shown to be over 5 times smaller than the smallest MobileNetV2 model which makes the developed model very attractive for real-time applications.
- 18:20 A Quantitative Analysis of Big Data Clustering Algorithms for Market Segmentation in Hospitality Industry
In this paper, we present a comprehensive literature review of existing big data clustering algorithms and their advantages and disadvantages for various use cases in hospitality industry. We implement the existing big data clustering algorithms and provide a quantitative comparison of the performance of different clustering algorithms for different scenarios. We also present our insights and recommendations regarding the suitability of different big data clustering algorithms for different use cases. These recommendations will be helpful for hoteliers in selecting the appropriate market segmentation clustering algorithm for different clustering datasets to improve the customer experience and maximize the hotel revenue.
- 18:40 Robot Learning from Demonstration Based on Action and Object Recognition
In this paper, we propose a vision-based robot learning from demonstration (LfD) system, which uses action and object recognition. In this system, a robot is developed to learn from human-demonstrated actions. The vision-based robot LfD system employs RGB cameras as sensing devices, and integrates object detection achieved by YOLO deep learning architecture and multi-action recognition carried out by an I3D deep learning network incorporating a proposed statistically fragmented approach to separate the overall demonstration into a few sub-actions. Finally, the corresponding robot moving trajectories are subsequently planned such that the actions can be performed successfully.
- 19:00 Fall Detection Scheme Based on Temperature Distribution with IR Array Sensor
In this paper, we propose a fall detection method using IR array sensors to inform others of fall and enable rapid treatment after the fall.The IR array sensor enables fall detection that is inexpensive, non-violate privacy, and non-requirement for wearing.The fall detection is performed by classifying actions using machine learning.The learning data are a series of data for two seconds of the temperature distribution acquired every 0.1 seconds by the IR array sensors.We compare a plurality of learning algorithms by their accuracies to select an algorithm of machine learning.
- 19:20 An AI Edge Computing Based Wearable Assistive Device for Visually Impaired People Zebra-Crossing Walking
This paper proposes an artificial intelligence (AI) edge computing-based wearable assistive device for assisting zebra-crossing walking of the visually impaired people. The proposed assistive device is composed of a pair of smart glasses, a walking cane, and a waist-mounted box. When the visually impaired pedestrian prepares to cross the zebra-crossing, thus the visually impaired pedestrian will receive the current traffic light signal message. The visually impaired guidance voice service will be provided via Bluetooth (BT). Moreover, when the walking offset occurs on the zebra-crossing, then the visually impaired pedestrian will be reminded through the voice prompt of the earphone.
Session 2.9 SPC (2)
- 18:00 A Reverse Sequence Hash Chain-based Access Control for a Smart Home System
Since a consumer home generally consists of various IoT-devices which are with different capabilities and from different vendors each other, it is difficult to apply centralized high-performance security solutions to their smart home systems. A blockchain system can be alternative but it is needed to improve the high resource problem of the mining process to apply a blockchain to a smart home system. This paper presents a lightweight blockchain which uses a reverse sequence hash chain instead of POW and then applies it to a smart home system.
- 18:20 Area and Power Efficient ECC for Multiple Adjacent Bit Errors in SRAMs
As submicron technology scales, SRAM bitcell density increases on the chip. This results in an increase of soft errors due to radiation induced MBU. The probability of MBUs in the SRAM bitcells in 16nm/7nm technology has increased considerably. There are powerful ECC codes which can correct these soft errors but it comes at the cost of extra parity bits, translating into the SRAM size increase. We are proposing an area efficient ECC(72,64), ECC(39,32) code with no extra parity bit cost which can detect and correct adjacent 2-bit error and detect adjacent 3-bit error.
- 18:40 A Privacy Preserving Blockchain-based Reward Solution for Vehicular Networks
Vehicular networks use a vehicle to infrastructure to improve traffic safety by gathering information from vehicles such as traffic conditions and accidents. This approach is based on the vehicle's location information and the reliability of the data collected from vehicles. At the same time, the voluntary participation of drivers requires privacy protection and compensation for sharing trusted information. In this paper, we propose a blockchain-based decentralized reward solution considering drivers' privacy. The proposed solutions also enable service providers can verify the reliability and integrity of the messages transmitted by legitimate vehicles
- 19:00 Timestamp-based Defense Mechanism Against Replay Attack in Remote Keyless Entry Systems
Proper security protocols should be regarded as a critical requirement in today's society to prevent adversaries from being able to gain access to valuables. Although numerous preventative protocols have been implemented, the attackers adapt and develop new approaches to infiltrate new technologies. The results of these experiments reviled vulnerabilities in the radio frequency communication of cars and garages in remote keyless entry (RKE) systems as well. In this work, we present a timestamp-based solution to enhance the security of existing RKE systems and demonstrate it through a basic prototype implementation.
IoT Applications & New Development - Part 3
Monday, January 6
Monday, January 6 8:30 - 9:00
Breakfast
Monday, January 6 9:00 - 10:00
K5 Keynote: Prof. Seo (Seoul N Univ.)
Monday, January 6 10:00 - 11:40
10:00-11:00 Chapter Meeting
11:00-11:40 Senior Elevation
10:00-11:00 Chapter Meeting 11:00-11:40 Senior Elevation
Session 3.3 SRF
- 10:00 A New Low-Power Technology Based on Human Visual Perception for Binocular Displays
In this paper, a new low-power technology for binocular displays is proposed. This technology includes darkening one eye image for the binocular display. Through a psychophysical experiment, we verify that even if binocular images are darkened to some extent, people cannot distinguish them from the original ones. The proposed technology is more efficient than darkening both eye screens to save power without losing visual quality. And we find out a threshold condition where 17.3% more power can be saved without a negative effect on visual quality.
- 10:20 Color Guided Depth Map Super-Resolution Based on a Deep Self-Learning Approach
RGB-D cameras have been widely used in various applications but the resolution of depth maps is lower than that of an RGB image, which significantly limits the potential applications of depth maps. The challenge with the depth map super resolution for RGB-D cameras is that we do not have high-resolution depth maps for training models. We propose a deep self-learning approach for color-guided depth map super resolution. Experiments demonstrated that the proposed method achieved a reasonable result even with a low-resolution image (internal data) only for training.
- 10:40 A Static2Dynamic GAN Model for Generation of Dynamic Facial Expression Images
Facial expression generation,especially dynamic facial expression generation from a static natural (expressionless) face image, plays an important role in the fields of entertainment,game,and social communication. Several approaches based on machine learning including deep learning techniques have been developed or proposed for facial expression generation. However, most of them are focused on static facial expression generation. In this paper,we propose a static-to-dynamic model (static2dynamic) based on a 3D conditional generative adversarial network. Herein,the dynamic facial expression image is treated as a 3D image. The effectiveness of the proposed method is demonstrated by generating dynamic happy and angry facial expression images.
- 11:00 Deep Learning Method for Content-Based Retrieval of Focal Liver Lesions Using Multiphase Contrast-Enhanced Computer Tomography Images
A content-based image retrieval (CBIR) system can support radiologists in making clinical diagnosis through image analysis. Multiphase contrast-enhanced computer tomography (CT) images are effective in detecting and characterizing focal liver lesions (FLLs). This study proposes a deep learning method for the CBIR of FLLs using multiphase contrast-enhanced CT images. We use deep convolutional neural networks (DCNNs) to extract the temporal-spatial features from multiphase CT images. The effectiveness of the proposed method was demonstrated through experiments with our multiphase FLL CT dataset, which is called as MPCT-FFL dataset. The mean average precision (mAP) was improved from 0.76 to 0.84.
- 11:20 An RF Distance Sensor Utilizing Harmonic Signal from Rectenna for Power-Controlled Wireless Power Transmission System to Wearable Devices
We propose an RF distance sensor that utilizes the transmission wave itself for the distance measurement between the transmitter and an individual for power level management. The harmonic signal generated by a rectenna is used for the return signal. Since the frequency is different from the transmitted wave, the detector is not saturated by the transmitting wave and can thus be set to high sensitivity. We measured the propagation delay from the transmission timing to received wave for the distance sensing. The time detector by utilizing an equivalent sampling technique suppressed the accuracy of a distance within ± 3 cm.
Session 3.4 MDA (2)
- 10:00 Audience Meter: a Use Case of Deploying Machine Learning Algorithms over 5G Networks with MEC
Audience Meter is an application that estimates the number of attendees in an event throughout the time by applying a state-of-the-art face detection algorithm. In order to detect faces at large distances, high resolution images are required. This makes unfeasible the computation of the algorithm on the device and requires the use of MEC modules from the emerging 5G networks to boost performance. An average boost factor of $10x$ is achieved by using MEC in comparison with CPU devices for high resolution images.
- 10:20 High-Resolution Gaze-Corrected Image Generation Based on Combined Conditional GAN and Residual Dense Network
In a typical smartphone, the camera layout and display are different, rendering the gaze often not front-facing. Although various gaze-correction methods have been proposed for this problem, many of them cannot generate sufficiently natural images. In this paper, we propose a gaze-correction method using a deep-generative model. This model can determine the naturalness of the resulting images and learn to provide natural results. And we use super-resolution techniques to generate images that have a larger size and higher resolution than those generated by conventional methods.
- 10:40 A Detection Confidence-Regulated Path Planning (DCRPP) Algorithm for Improved Small Object Counting in Aerial Images
Computerized object counting shows potential for conservation population estimates as an alternative to manual counting, but remains unsatisfactory for minuscule objects, such as those in UAV-produced images. We improve UAV data collection by using a novel path planner which shifts altitude to maximize deep learning-based object detection confidences from a Faster Region-Convolutional Neural Network, considering energy consumption trade-offs. Using an empirical altitude - confidence relationship, our adaptive path planner ("DCRPP") adjusts UAV altitude based on confidence, yielding better quality data given energy constraints. DCRPP achieves 11.92% greater accuracy compared to fixed-height methods in our conservation-aimed simulation.
- 11:00 Concurrent Video-Based Heart-Rate Measurement from Human Faces for Large Groups of Participants - An Improved CNN Approach
Measuring the heart rate is for arbitrary applications in medicine, sports and psychology. To avoid crucial disadvantages of conservative techniques contact-free measurement techniques were developed recently. The most promising technique is the analysis of humans face video data. While these techniques were developed further they stay overall limited to only one participant simultaneously. As a reason of this a concurrent approach for up to 9 persons using CNNs is proposed and optimized regarded to run time and accuracy.
- 11:20 Network Based Cooperative Deep Learning Methodology for Minimal Latency in IoT and Mobile Video Transmission Environments
Due to the significant burden of deep learning computation, it is well known that the AI technologies are hard to be embedded to the edge devices. In order to alleviate the computational burden imposed to a single device, we propose NCDL (Network based Cooperative Deep Learning) methodology in wireless IoT Video Transmission Environments. In particular, the optimal distribution algorithm for the deep learning task is designed by the factors of the number of assisting nodes and the traffic activity based on numerical analysis.
Monday, January 6 10:00 - 11:30
Poster Session 3
- Test Case Generation Algorithms and Tools for Specifications in Natural Language
Most consumer products are equipped with methods of network communications, and nondeterministic tests, which are originated from random message exchanges, should be carried out. Therefore, the tests consume much time to design and conduct. For reducing labor of designing test cases, algorithms and tools, which help engineers to convert specifications written in a natural language into semi-formal descriptions, and generate test cases as decision tables, are proposed in the paper. We applied the algorithms and the tools to generate test cases and confirmed that the algorithms and tools were succeeded in generating test cases from a document.
- Multi-modal Sensor Module for Outdoor Robots
For autonomous navigation or performing missions, robots need a variety of information. Especially, in order to operate in outdoor environments such as weather conditions, night and daytime, multi-type of sensor data is required. In this paper, we propose a multi-modal sensor module for various sensors. In addition, the sensor data can be usefully calibrated. For example, distance values that are difficult to obtain in RGBD images can be measured using LiDAR data. Therefore, the proposed module is useful in most outdoor environments and can be easily installed in various robots.
- Distracted Walking Accident Prevention by LED Color and Sound of Glasses-type Wearable Devices
Fun'iki Navi is proposed for distracted walking accident prevention, where LED light color and sound of FUN'IKI Ambient Glasses express direction, route deviation, and arrival at the destination in navigation system. To verify effects of casual alert of the proposed Fun'iki Navi, the Fun'iki Navi is compared with the Google Maps navigation in terms of a viewing time of the smartphone or downward direction and subjective assessments. As results, the proposed Fun'iki Navi decrease 97.1% of the viewing time of smartphone or downward direction on average. The proposed method realizes society with few distracted walking accidents.
- Development and Evaluation of Environmental / Growth Observation Sensor Network System for Aquaponics
in this study, a new sensor network system that remotely monitors various environmental information of water (e.g., water temperature, pH, dissolved oxygen) affecting growing conditions of aquaculture and cultivation, and that quantitatively estimates degree of plant/fish growth is proposed.
- A Novel RDO Based on Perceptual Algorithm
For video coding, since the video signal is ultimately received by the human eye, the visual perception of the human eye cannot be ignored. Thus, we proposed a perceptual RDO scheme based on Lagrange multiplier by considering human visual system characteristics. The temporal perceptual features are extracted by considering the temporal perceptual correlations for each coding tree unit. These Lagrange multipliers are adaptively adjusted using these perceptual features. Experiments demonstrate that with SSIM as metric, it can improve the subjective video coding performance. Compared to the HM16.9, it can achieve 5.6% in average bitrate reductions with negligible subjective quality loss.
- Rate SSIM Based Preprocessing for Video Coding
An effectively perceptual preprocessing filter method will reduce the sequence's perceptually insignificant details, which can help to alleviate the video coding's pressure and benefit the coding results. In this paper, a perceptual rate SSIM optimization based preprocessing filter algorithm is presented to achieve better video compression performance. The evaluation results confirm that the proposed video filter algorithm has achieved reliable rate-visual quality improvements with -4.35% and -2.96% BD-Rate performance gain on JM18.3 and HM16.9, respectively. Additionally, the subjective quality comparison results show that our algorithm has reduced significant bits with negligible visual difference.
- An Improved Faster R-CNN Based Food Object Detection and Classification System
The rise in people's consciousness towards their daily eating habits has attracted significant attention from the field of automatic food analysis. Specifying in Japanese daily food items, which may become helpful for almost all people at every age in society. In this paper, we propose a mobile application that can take the picture of the meal of the user as an input, and output the corresponding categories. The system is based on an improved Faster R-CNN including center loss to increase the classification accuracy.
- Power Demand Forcasting System with Reconfigurable User Interface Using Redundant Operation Data
We proposed a power demand forecasting system with a personalization function. A power demand forecasting system is a system that performs power demand prediction by regression analysis. The screen operation behavior varies depending on the target consumer. The personalization for information systems was proposed, we shown the target value by personalization without effect reflected in the actual system confirmation. In this paper we applied a personalization method from business systems to a power demand forecasting system and conducted experiments to confirm the effects. Through experiments, we confirmed the personalized power demand forecasting system provides screen operations to user's usage classification.
- Classroom Roll Caller System Based on MTCNN and FaceNet
For checking out the absentees strictly, efficiently, and safely, we propose a Classroom Roll Caller system on face recognition which includes MTCNN based face detection and FaceNet based face matching. In working process, user should take a group photo by mobile phone and send it to PC. The system supports two manual detection modes, normal mode and hard mode(working in weak light). Then system will return the call roll result in seconds, and there is a manual correction to make the result right. Face library can upgrade automatically in every roll call. Test proves that the system meet our expectation.
- Deep Learning (DL) Based Indirect Measurement for On-board Diagnostics
On-board diagnostics (OBD) is important especially for commercial truck providers. Deep neural networks (DNNs) could create powerful data-driven models for OBD. Two factors could contribute to the improved performance of DNNs for this task: large amount of data by truck makers and enabling more variables as input. In this paper, we introduce the implementation of a data recording system able to record indirect measurements with deep learning (DL) besides CAN message. To let our customers easily access the data, the data are uploaded to cloud in real time and could be easily accessed on a user friendly web page.
- Automatic Reading Analog Gauge with Handheld Device
Digital instruments have a checking tool that can automatically read data, but analog instruments have limitations in collecting data because they are managed directly by the administrator. A lot of research is in progress to obtain data after converting analog data to digital data from analog instruments, but there is a limitation of the environment and cost problem. This paper proposes a system that automatically converts analog data to digital data with portable equipment using image processing algorithms.
- Smart - Steering: An Edge Device to Monitor Blood Alcohol Concentration Using Physiological Signals Through the IoT
This paper proposes a smart ``thing'' which can convert the regular steering to smart steering with the help of the Internet of things. This device works with the touch of the human driver, collects and analyses the physiological data of the person and performs the analysis in a microcontroller. With the help of the analyzed data, the decision of sobriety of the human is made and sent to the car's infotainment as a notification. The blood alcohol prediction is made with an exact level of the concentration present in the human body with an accuracy of approximately 93%.
- Wafer Map Defect Classification with Depthwise Separable Convolutions
In the IC design process, wafer map defect recognition is an import part. Existing tests rely on additional analysis of testing result by engineer to determine the failure. Thus it could take an additional amount of time and cannot make adjustments of the process immediately. In this paper, we proposed a reduced-weight architecture to classify failure type based on depthwise separable convolutions. The entire work is verified by using the real-world wafer map dataset (WM-811K). The accuracy is 96.63% in test set.
- A Distributed Log Management Method Using a Blockchain Scheme
To investigate cyber attacks accurately, we must collect, manage, and maintain log data on devices related to the system. We herein propose a distributed management method for logs using a blockchain scheme. The blockchain scheme has the following two features. One makes managed data tamper resistant. The other makes access to the same data possible with multiple terminals, thereby increasing access availability. A log management method that adapts these features can provide log data that are guaranteed to be complete when needed. This paper presents our evaluation of the feasibility of our method in a prototype.
- MHERP: Multi-hoping Heterogeneity-aware Energy Efficient Routing Protocol for Internet of Things
Modern applications Internet of Things demand efficient routing protocol to exchange huge amount of information among deployed nodes and control station. Many routing protocols have been proposed but it is challenging to achieve both reliability and energy-efficiency. In this paper we proposed Multi-hope Heterogeneity-aware Energy Efficient Routing Protocol (MHERP) which deals with two level heterogeneous cluster formation for Internet of Things (IoT). MHERP adopts cluster formation based on location and residual energy resources indexing. We further extended MHERP to Multi-level MMHERP to accommodate advancement in network heterogeneity level. Our Proposed routing protocols outperform the existing state of the art protocols.
- A Lightweight, Low-Cost Liquid-Metal Personal Cooling System for Prolonged Cooling
We have designed and prototyped a lightweight and low-power active personal cooling system which uses the non-toxic gallium-based liquid-metal, Galinstan, as the coolant. The Galinstan absorbs body heat as it is pumped through tubing attached to a cooling vest and after absorbing the body heat, the warm Galinstan is cooled by passing it through the tubing embedded in cold phase-change material in a cold pack. To the best of authors knowledge, the liquid-metal-active personal cooling system is 1/3rd of the weight, 1/8th of the price, and cools for 4 times longer compared to the current state-of-art active personal cooling systems.
- A Monitoring Framework for Side-Channel Information Leaks
This paper presents the design and evaluation of a side-channel detection and exploitation framework that follows a machine learning based plugin oriented architecture thus allowing side-channel research to be conducted on a wide-variety of side-channel sources.
- H-GAN: Deep Learning Model for Halftoning and Its Reconstruction
Digital halftone deals with transforming a gray scale image into its printable binary version. In this paper, a generative adversarial network-based model is proposed to perform both halftoning and its effective reconstruction. The GAN model is based on the concept of unpaired image to image translation and the model learns both transformations simultaneously. For optimal training, the model is feed with maximal information patch (termed effective patches) and the model architechture is also modified in accordance to this transformation problem. From results, it has been validated that the model performs with consistent accuracy in both cycles.
Monday, January 6 11:40 - 12:00
Lunch
Monday, January 6 12:00 - 13:00
K6 Keynote: Mr. Steve Wozniak (Apple Co-Founder)
Monday, January 6 13:00 - 13:30
Awards Ceremony
Monday, January 6 14:00 - 15:30
Panel: U.S. Launch of NEXTGEN TV (ATSC 3.0) - Brian Markwalter
Madeleine Noland, President, ATSC
John Taylor, LG Electronics, Senior Vice President, Public Affairs and Communications
Luke Fay, Sony, Sr. Mgr. Technology Standards
Dan Schinasi, Samsung Electronics America, Director Product Planning
Monday, January 6 16:00 - 17:30
Session 3.6 MDT (1)
- 16:00 A Novel Method to Reduce Luminance Variation Due to IR-drop in Active Matrix OLED Displays
In this paper, a new compensation method to reduce luminance variation due to IR-drop in active matrix OLED displays is proposed. This paper decomposes the IR-drop into global IR-drop and local IR-drop, and then estimates the amount of them. The proposed method cancels the IR-drop using the estimated IR-drop. In experimental results, the proposed method decreases the maximum difference of luminance due to the local and global IR-drop by 95.2% and 93.96% respectively. In addition, when the global and local IR-drops are occurred simultaneously, the proposed method suppresses the luminance error between the expected and the measured by 99.32%.
- 16:20 Overcoming Bathtub Failure Curve for Dependable Flash Storage Through Exploiting RAID Protection
Flash storage is increasingly used in various fields such as mobile devices, internet of things (IoT) devices, etc. Generally, failure rate of a storage device follows the bathtub curve. Though error rate of flash storage such as SSDs follows the bathtub curve, most of SSDs use the ECC scheme with fixed strength against failures. Hence, we propose Flexible Strength RAID (FS-RAID) scheme that employs RAID configuration and dynamically adjusts its strength against failures according to the typical failure rate of the device lifetime. In addition, we propose a method to greatly improve reliability by combining RAID parity and existing ECC.
- 16:40 Hybrid Curve Rendering Scheme for Mobiles
In this paper, we present an efficient curve rendering method useful in smartphone and mobile device that have dynamic workload changes between CPU and GPU. To do so, we propose a Hybrid scheme that adaptively tessellates a curve into a set of small triangles and sub-curves to render them effectively on GPU. Experimental comparisons show that our scheme not only outperforms other schemes but also reduces the power consumptions. As the result, we can effectively enjoy our scheme in any smartphones and mobile devices regardless of any workload environment.
Session 3.7 DEX
- 16:00 Design and Implementation of an Intelligent Nail Machine with Computer Vision Techniques
Nail painting machine is getting prevailing of consumer device, but a smart technique to automatically define nail printing area becomes necessary. In this study, it proposes a computer vision method to mark the area of nails, which generate the nail image and merges the user selected patterns. The segmented-and merged result is then sent to the nail painting machine for printing.
- 16:20 A Methodology for Upgrading Legacy Middleware Ginga Implementations to Profile Ginga-D
The Brazilian digital television system is migrating its middleware approach from profile Ginga-C to an integrated broadcast-broadband strategy, known as profile Ginga-D. The present work proposes a methodology able to extending current implementations, in a systematic way, with the goal of harmonization maintenance and conformance regarding current standards.
- 16:40 Robotic Assistant for the Teaching in Trauma Accidents Prevention in Children of Initial Age
Each year, different kinds of trauma generate about five million deaths worldwide and an increase in people with disabilities in their most productive years. These problems represent a social and economic impact on families. These accidents occur due to lack of information on prevention. This document details a robotic assistant to support the teaching about trauma accidents to children (3 - 6 years old). The results show that the information provided by the robotic assistant during the teaching process is retained by the children. It provides the child with an alternative way of learning about prevention.
- 17:00 Hardware Implementation of DCT/IDCT Sharing for HEVC/MPEG Video Coding
The main proposal of this paper is to design hardware sharing architecture for DCT and IDCT between in MPEG-2 and HEVC.Using the common factor of MPEG-2 and HEVC 8×8 DCT coefficients,a mapping technique suitable for hardware design is proposed.Based on hardware design aware,transform coefficient of MPEG-2 is developed by a basis of 2 and added by the compensation coefficient matrix.The transform coefficient of MPEG-2 and HEVC are verified and can be sharing.We propose a hardware architecture design in FPGA for resource sharing.Its architecture 2D-DCT takes 2424 slice LUTs and the maximum achievable clock frequency for the proposal is 209.732 MHz
Session 3.8 CHS (1)
- 16:00 Stroke Signs Detection System by SNS Agency Robot
This paper proposes a system which implements the Cincinnati Prehospital Stroke Scale (CPSS), the widely used screening method for the initial symptoms of a stroke, in a communication robot. AI on cloud analyses an acquired video through a conversation with the robot in real time and automatically determines the abnormalities. The judgement result is informed to his/her families by SNS. This study implemented two of the three CPSS scales such as "Arms" and "Speech", we confirmed that the system enables to acquire, analyze and notify the information in real time.
- 16:20 Electrolarynx System Using Voice Conversion Based on WaveRNN
Voice is very important in our daily life. However, some people cannot speak because of throat surgery. Electrolarynx (EL) is a way for them to speak again but this voice is flat and noisy like a buzzer. Therefore, we propose a new Electrolarynx system based on WaveRNN. When we use it, the EL voice is converted into a voice close to the natural voice. We assume that this system will be provided as a smartphone application. In the experiment, we evaluated the converted voice by the system and found that naturalness improved.
- 16:40 On-device Successive Subspace Learning Chest X-Ray Screening
With FDA-approved portable x-ray handheld units available, there is a need of on-device classifier. In this work, a small-scale and cost-effective model is implemented on embedded system to demonstrate the successive subspace learning. The embedded system is tested on well-known chest x-ray datasets from Open-I and NIH ChestX-ray14. This paper has two main contributions: (1) A subspace weakly supervised learning x-ray image classification model is developed with better than 90% accuracy. (2) The network is implemented on a small and an affordable single-board computer without any accelerators to form a low-power on-device AI x-ray image classifier.
- 17:00 Infant Monitoring System for Real-Time and Remote Discomfort Detection
Discomfort detection for young infants is essential, since they lack the ability to verbalize their pain and discomfort. In this paper, we propose a novel infant monitoring system, enabling continuous monitoring for infant discomfort detection. The proposed algorithm is robust to arbitrary head rotations, occlusions and face profiles. For this purpose, a Faster R-CNN architecture is first pre-trained with the ImageNet dataset, and then fine-tuned with a training dataset of different infant expressions. The presented system enables reflux disease analysis and remote home monitoring in a more relaxed environment, which is largely preferred by pediatricians and parents.
- 17:20 ECG Beat Classification on Edge Device
With FDA-approved ECG sensor and cloud-based interpretation, researchers are focused on end-to-end training on device. In this work, we present a semi-supervised learning classifier that jointly learns the parameters of a convolutional neural network (CNN) and using support vector machine (SVM) on the resulting features. By applying Saak(Subspace approximation with augmented kernels) Transform, we can update the weights of the network in a single multilayer feed forward step without backpropagation. We trained this CNN with the MIT-BIH arrhythmia database, on Raspberry Pi ARM platform. The resulting ECG beat classifier has 98.94% accuracy and 1.06% misclassification rate.
Session 3.9 MDA (3)
- 16:00 Low-light Image Enhancement Using Dual Convolutional Neural Networks for Vehicular Imaging Systems
This paper presents a low-light image enhancement method using a convolutional neural network (CNN). Given a low-light input image, the proposed method converts RGB color space to CIELAB color space. The luminance and chrominance components are separately enhanced. The luminance channel is enhanced using a CNN to enhance the brightness. On the other hand, the chrominance channels are enhanced using a dilated CNN to reduce the color distortion. Experimental results demonstrate that the proposed method can successfully enhance low-light images of a vehicular imaging system without color distortion.
- 16:20 FPGA-Based Depth Separable Convolution Neural Network
In order to enable convolution neural network (CNN) to be deployed on a Field Programmable Gate Array (FPGA), this study builds a lightweight convolutional neural network that can be separated by a depth to reduce the amount of parameters and computations stored. We replaced the standard convolution operation with a separate convolution operation, and proposed a hardware accelerator architecture that can handle differently sized depth-separable convolution operations, using parallelization to efficiently utilize hardware resources for depth separable convolution.
- 16:40 FBA-AMNET: Foreground-Background Aware Atrous Multiscale Networks for Stereo Disparity Estimation
In this paper, we propose novel networks for stereo disparity estimation. First, deep features are extracted using efficient depthwise-separable convolutions. Next, the stereo matching costs are calculated from the deep features with a novel extended cost volume. Then, rich multiscale contextual information are aggregated with the proposed atrous multiscale network (AMNet). The proposed foreground-background aware network (FBA-AMNET) is trained with an iterative multi-task learning strategy to discriminate between foreground and background objects at multiple scales. The proposed networks advance the state of the art on challenging disparity estimation benchmarks, such as the KITTI 2012, KITTI 2015, and Sceneflow stereo benchmarks.
- 17:00 Electromyogram-based Algorithm Using Bagged Trees for Biometric Person Authentication and Motion Recognition
Using bio-signals, one can calculate motion, can authenticate individuals using fingerprints. These bio-signals are convenient because they can be measured easily, anytime, anywhere. However, there are cases of misuse of bio-signal based technology. To solve this problem, we develop an electromyogram (EMG)-based algorithm that can be used for biometric authentication. The proposed algorithm uses two channels to acquire EMG data, and hand motion recognition and authentication are carried out through signal processing. As a result of dividing 50 data sets into artificial neural networks and applying the ensemble technique, the authentication success rate achieved by the proposed algorithm was 83.8%.
Future Directions - IEEE
Predicting and immersing one with the future is always a challenge and a desire. The IEEE rises to that challenge based upon the work it does on multiple new and emerging technologies through serving as a catalyst for developing new innovations, products and services.
IEEE Future Directions serves as an incubator for these new initiatives. One of its focus areas, Digital Reality serves to explore and enable the coming Digital Transformation through collaboration among technologists, engineers, regulators, practitioners, and ethicists around the world. The Digital Transformation is fueled by advances in technology, such as sensors and actuators, Artificial Intelligence (AI) and Machine Learning (ML), and applications using the copious amounts of continuously generated data. By leveraging these technologies and others developed such as Augmented Reality (AR), Virtual Reality (VR), and Digital Twins, the line between the physical world and the digital world will be increasingly less distinct. Applications are already quickly emerging across the broad fields of education, manufacturing, medicine, entertainment, automotive, enabling the sharing of services, and more.
The session moderated by Kathy Grise, will demonstrate the "intelligent" interplay and intersections among AI, ML, and immersive technologies as they drive the overall Digital Transformation. Emphasis will be upon presenting practical applications and its implementations of interest to consumer electronics.
Speakers include, Samina Husain, Consultant, Nicholas Napp, Xmark Labs, LLC, Rudi Schubert, IEEE Standards, Lee Stogner, Vincula Group.
Monday, January 6 18:00 - 19:30
Session 3.11 MDT (2)
- 18:00 Mobile Application Development for Predictive Notification of Street Events
Location-based Notification System (LNS) is a system that informs the user of events occurring in the street. This research proposes a LNS that predicts a user's path and informs the user only of events around the predicted path, and also develops mobile applications and simulates it with street events.
- 18:20 Stochastic Computing Based AI System for Mobile Devices
In this paper, we present a stochastic computing based AI system for mobile devices. As technology in AI advances, more complex computations are required. In case of mobile devices, it is hard to accommodate the entire computations due to power and area limitation of an embedded system. As a stochastic computing replaces the complex computations into simple computations, the mobile devices are available to include the AI system. In order to verify our design, the embedded AI system including stochastic computing is implemented on an field-programmable gate array (FPGA), and we successfully demonstrated the feasibility of the proposal.
- 18:40 Flash Based SSD Aware Parity Logging for Building Reliable Massive Capacity SSDs
Recently, flash based SSDs employ dozens of flash memory chips to achieve high performance and large capacity. However, employing plenty of flash chips leads to increased failure rate in SSDs. A RAID-like protection is one of the typical techniques to recover from such failures. However, with the advent of massive storage devices, various studies on the design of RAID-like protection techniques are needed.
To this end, in this work we propose a massive SSD-Aware Parity Logging (mSAPL) scheme which protects against n-failures at the same time in a stripe where n is protection strength from user selection.
Session 3.12 CEA (2)
- 18:00 A Trajectory Prediction Method Based on Social Forces, Scene Information and Motion Habit
Foreseeing the positions of the surrounding objects is a critical technique to autonomous vehicles. Referring to the positions predicted by the trajectories, moving vehicles could avoid possible collisions. Many trajectory prediction methods about have been proposed, from traditional handcrafted approaches to Recurrent Neural Network (RNN) models. But there are still exist some problems, such as predicting positions in obstacles, sharp turns that are not socially acceptable. We adopted the concepts of social GAN to propose a new model that take the social forces, scene information and motion direction into account when predicting trajectories.
- 18:20 Proposal for Graphics Sharing in a Mixed Criticality Automotive Digital Cockpit
In this paper, we present the concept of multilayer cross-platform graphics sharing in the automotive digital cockpit. Considering that automobiles today have around 150 ECUs (engine control units), managing all these ECUs is becoming a challenging task. For example, there is a controller (System on Chip - SoC) for every display in an automobile. This SoC is used for content rendering and data processing. The number of ECUs can be lowered by using SoCs with a hypervisor. A hypervisor is a concept that enables us to run two operating systems on one SoC in real-time. The content from both operating systems can be rendered and presented in the same display output. The proposed system consists of one SoC with two operating systems running on a hypervisor. With this proposed solution, we were able to simultaneously render content from both operating systems on one display output. The proposed solution also covers the rendering of media content on display that is hosted on a different operating system and therefore enables mixed criticality where safety-critical information, such as those presented in the cluster, are presented with no interference with the non-critical operations, such as media rendering. We also evaluate safety concerns and system performance when content is rendered simultaneously on both operating systems.
- 18:40 Scalable Approach to Extending Automotive Software Using AUTOSAR Adaptive Stack
The constant expansion of automotive industry has led to a lack of technology and standards in the field that are needed to keep up the pace with automotive requirements. In order to support these new requirements, it is necessary to find a way to integrate new functionalities into existing systems without disruption of the system. The leading automotive industry standard, AUTOSAR, has been expanded with an Adaptive Platform (AA) that offers support for realizing new automotive features. In this paper scalable extension of the software within existing architecture with modules that provide communication with security-critical parts of the system is implemented within AA environment. The scalability in solution provides the flexibility in the development of the future systems. The AUTOSAR foundation ensures preservation of the automotive grade quality within the components.
- 19:00 An Efficient Combination Between Epipolar Geometry and Perspective Transform for Moving Object Detection
An efficient moving object detection (MOD) method for monocular camera with ego-motion is proposed in this paper. In general, There are keypoint-based foreground detection methods that find out outliers using epipolar geometry of two camera coordinate systems in consecutive frames. Determining of regions of moving objects from sparse keypoints is especially challenging. In this paper, we propose an optical flow noise removal and an efficient sparse-to-dense motion probability map. Subtraction method using perspective transform is applied to detect candidate regions of objects. Moving objects are detected by combining subtraction method with the proposed motion probability map.
- 19:20 Trajectory-Aware Playback to Overcome User Experience Challenges for Streaming Media in the Vehicle
New trends in the automotive industry, such as e-mobility and autonomous driving, give birth to challenges of engaging passengers in a vehicle. Once relieved from driving tasks, passengers may take up productive and entertainment-related activities, such as media consumption. It is assumed that by 2030 in-car cabin would mostly resemble a living room, whereas internet connectivity would become one of the most important enablers for new content delivery. Streaming media in such an environment poses a challenge, given that reliability and adequate coverage in 4G and coming 5G networks are mandatory. In this paper, we give a brief analysis of challenges which streaming media would bring to the user experience. We give a proposal of a software stack for a trajectory-aware playback, capable of predicting streaming quality drops and proposing appropriate fallbacks.
Session 3.13 CHS (2)
- 18:00 Multi Bio-Signal Based Algorithm Using EMD and FFT for Stress Analysis
In this study, we propose a stress classification algorithm to determine whether the user is exposed to stress, using Empirical Mode Decomposition and Fast Fourier Transform on multiple bio-signals. Electrocardiogram (ECG) and Photoplethysmogram (PPG) signals were detected from the user's arm for accurate classification of stress. By using the EMD and FFT techniques, the bio-signals in the frequency band were analyzed in various stress levels. As a result of analyzing the stress, it was confirmed that R interval value and mean frequency value when stressed situation were lower values.
- 18:20 Real-time Gait Monitoring System for Consumer Stroke Prediction Service
Gait monitoring is considered as a significant marker of disability, injury, and gait symmetry. The goal of this study is to develop a real-time consumer health monitoring system based on IoT sensors and Machine learning technique in order to detect health abnormalities such as, stroke onset. The proposed consumer stroke prediction system consists of IoT based gait monitoring sensors, real-time vital sign monitoring and machine learning based disease prediction model to predict the disordered gait and the healthy gait. This study will be useful for post-stroke gait coordination for rehabilitation and consumer health monitoring service.
- 18:40 A Consumer Device for Detecting Gastrointestinal Disorders
This paper overviews a new consumer product that allows a consumer to detect gastrointestinal disorders, such as colon cancer and others, using new technology and artificial intelligence techniques. We review the concept, compare to the existing market technologies, and show the significant opportunities for consumer products in this "advise the doctor" space of products.
- 19:00 Development of Mobile Muscle Fatigue Display Based on Muscle Fatigue Scale
This paper describes our developed biofeedback device based on muscle fatigue scale (MFS). At present, Japan faces the issues of population decrease and a super-aging society. Extension of healthy life expectancy and reduction of health disparities are especially the ultimate objectives in Japan. Seniors who want to remain healthy and active must prioritize doing regular physical activities. Under the circumstances, we develop a biofeedback device based on MFS. By using the device, seniors, as well as any other persons who want to do muscle training, can do it suitable for the condition of a muscle.
Session 3.14 MDA(4)
- 18:00 Multi-View Clustering for Fast Intra Mode Decision in HEVC
High Efficiency Video Coding (HEVC) introduced many new coding tools to gain improved coding efficiency. However, it greatly introduces computational cost, and this will give rise to the demand for the fast algorithm that can satisfy the real-time encoding of HEVC encoder for low bandwidth environment. In this paper we introduce and evaluate a novel machine learning based approach that uses multi-view clustering to reduce the complexity of intra-coding algorithm based on the analysis of original texture and its neighborhood.
- 18:20 Lightweight U-Net Based Monaural Speech Source Separation for Edge Computing Device
The lightweight U-Net based monaural speech source separation method is proposed. The proposed method utilizes U-shaped neural networks to segregate speech and interfering noises from noisy audio recording. To reduce size of the networks, the proposed method employs the multi-lane dimensionality reduction module to each convolutional layer. Compared with the conventional U-Net based method, the proposed method achieved almost on-par performance to those of the conventional one while using model footprint of 1.39 MByte, which is only 3.72% of size of the conventional U-Net. Moreover, the proposed method is implemented in off-the-shelf edge computing.
- 18:40 Backward Feature Elimination for Accurate Pathogen Recognition Using Portable Electronic Nose
This paper presents the application of the backward feature elimination technique on an electronic nose (E-nose) to aid the rapid detection of pathogens using Volatile Organic Compounds (VOCs). The timely identification of pathogens is vital to facilitate control of diseases. E-noses are widely used for the identification of VOCs as a non-invasive tool. However, the identification of VOC signatures associated with microbial pathogens using E-nose is currently inefficient for the timely identification of pathogens. Therefore,we proposed an E-nose system integrating the backward feature elimination. Comprehensive experiments of backward feature elimination showed that they improve the classification accuracy.
- 19:00 Machine Learning-as-a-Service for Consumer Electronics Fault Diagnosis: a Comparison Between Matlab and Azure ML
Fault diagnosis is a well-known practice in the industrial, automotive fields, etc. but less used for consumer electronics. This paper analyzes a Cloud service based on a Machine Learning (ML) approach used to provide fault detection capabilities to household appliances equipped with electric motors and compare the results with on premise ML algorithms provided research tools. The purpose of this paper is to perform a preliminary comparison of ML algorithm performances provided by two software, namely Microsoft Azure (cloud solution) and MATLAB (on premise solution), on a study case.