Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031155
Hyeontaek Oh, Sanghong Ahn, Jinhong Yang, Seokhyun Song, J. Choi
This paper demonstrates service control for IoT gadget platform by using web intent. The difference from legacy device-connected service is that it follows the Web's virtue loose coupling of service components. For loose coupling of these components based on the web technologies, it requires light-weight service logic for limited devices like sensor. To support loose coupling service components, proposed method manipulates Web intent which is a framework for web-based inter-application communication and service discovery. In order to show the web intent based service mashups, a meeting room reservation scenario using Google Calendar is demonstrated.
{"title":"Web intent based service mashups for IoT platform","authors":"Hyeontaek Oh, Sanghong Ahn, Jinhong Yang, Seokhyun Song, J. Choi","doi":"10.1109/GCCE.2014.7031155","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031155","url":null,"abstract":"This paper demonstrates service control for IoT gadget platform by using web intent. The difference from legacy device-connected service is that it follows the Web's virtue loose coupling of service components. For loose coupling of these components based on the web technologies, it requires light-weight service logic for limited devices like sensor. To support loose coupling service components, proposed method manipulates Web intent which is a framework for web-based inter-application communication and service discovery. In order to show the web intent based service mashups, a meeting room reservation scenario using Google Calendar is demonstrated.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031313
Tomoya Kawakami, T. Yoshihisa, M. Tsukamoto
In this paper, we propose a control method of ubiquitous computers using the Rete algorithm in grid topology network. The proposed method distributes and reduces the loads for processing rules and collecting data based on the Rete algorithm. We evaluated the proposed method and confirmed that the proposed method reduces the network traffic as loads.
{"title":"A control method of ubiquitous computers using the Rete algorithm in grid topology network","authors":"Tomoya Kawakami, T. Yoshihisa, M. Tsukamoto","doi":"10.1109/GCCE.2014.7031313","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031313","url":null,"abstract":"In this paper, we propose a control method of ubiquitous computers using the Rete algorithm in grid topology network. The proposed method distributes and reduces the loads for processing rules and collecting data based on the Rete algorithm. We evaluated the proposed method and confirmed that the proposed method reduces the network traffic as loads.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130723224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031087
Ryo Kanaoka, Y. Tobe
Nowadays using smartphones is becoming common, which results in popularity of using short-range wireless communication: Bluetooth, Near Field Communication (NFC), and Wi-Fi Direct. However, we still have a problem to identify the communication partner relying on Media Access Control (MAC) addresses. To deal with this problem, we have been explored using accelerometers built into smartphones. In this paper we propose EriCC-W, a data transfer system using Wi-Fi Direct and Accelerometers. EriCC-W aims at identifying dedicated smart-phones by user's gesture that transformed into time series of three-axis acceleration data and further into frequency spectrum. The obtained frequency spectrum is exchanged between multiple users for connection. This paper describes the design and implementation of EriCC-W.
{"title":"Design of a data transfer system on smartphones using Wi-Fi direct and accelerometers","authors":"Ryo Kanaoka, Y. Tobe","doi":"10.1109/GCCE.2014.7031087","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031087","url":null,"abstract":"Nowadays using smartphones is becoming common, which results in popularity of using short-range wireless communication: Bluetooth, Near Field Communication (NFC), and Wi-Fi Direct. However, we still have a problem to identify the communication partner relying on Media Access Control (MAC) addresses. To deal with this problem, we have been explored using accelerometers built into smartphones. In this paper we propose EriCC-W, a data transfer system using Wi-Fi Direct and Accelerometers. EriCC-W aims at identifying dedicated smart-phones by user's gesture that transformed into time series of three-axis acceleration data and further into frequency spectrum. The obtained frequency spectrum is exchanged between multiple users for connection. This paper describes the design and implementation of EriCC-W.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130818889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031319
H. Aoki, S. Rahok, Akio Tanaka, M. Ishihara
So far, we have worked on developing a navigation method using an environmental magnetic field (a magnetic field that occurs in the environment). A 3-axis magnetic sensor is used to detect the environmental magnetic field, which is known as DC magnetic field, and store it on a database. The mobile robot then navigates by matching the magnetic sensor readings against the database. However, cumulative error of odometer caused by wheel slippage and uneven terrain still remains as a major problem. In this study, we aim to propose an odometer correction method using disturbed environmental magnetic field. The cumulative error that occurs during the navigation can be corrected by matching peaks of the magnetic sensor readings against the peaks of the magnetic field stored on the database.
{"title":"Odometer correction method using disturbed environmental magnetic field","authors":"H. Aoki, S. Rahok, Akio Tanaka, M. Ishihara","doi":"10.1109/GCCE.2014.7031319","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031319","url":null,"abstract":"So far, we have worked on developing a navigation method using an environmental magnetic field (a magnetic field that occurs in the environment). A 3-axis magnetic sensor is used to detect the environmental magnetic field, which is known as DC magnetic field, and store it on a database. The mobile robot then navigates by matching the magnetic sensor readings against the database. However, cumulative error of odometer caused by wheel slippage and uneven terrain still remains as a major problem. In this study, we aim to propose an odometer correction method using disturbed environmental magnetic field. The cumulative error that occurs during the navigation can be corrected by matching peaks of the magnetic sensor readings against the peaks of the magnetic field stored on the database.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the embedded devices are very popular, and the smart phone and Tablet PC are the most important consumer electronic products. When programmers design a program on PC, there are a lot of resources can be used to enhance the performance of the program. But the resources on embedded devices are limited. Thus, how to profile and optimize the programs on embedded system becomes an important design issue. In this paper, we design a profiling tool to analyze the memory behaviors of an Android application on the multi-core smartphone. The designer can improve application performance according to the profiled results. The experimental results show that the proposed tool can analyze the memory status of the profiled application.
{"title":"Memory behavior profiler for Android applications","authors":"Kuei-Chung Chang, Chia-Yang Kao, Yi-Shin Chen, Guang-Yu Chen","doi":"10.1109/GCCE.2014.7031343","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031343","url":null,"abstract":"In recent years, the embedded devices are very popular, and the smart phone and Tablet PC are the most important consumer electronic products. When programmers design a program on PC, there are a lot of resources can be used to enhance the performance of the program. But the resources on embedded devices are limited. Thus, how to profile and optimize the programs on embedded system becomes an important design issue. In this paper, we design a profiling tool to analyze the memory behaviors of an Android application on the multi-core smartphone. The designer can improve application performance according to the profiled results. The experimental results show that the proposed tool can analyze the memory status of the profiled application.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031223
Yoshimasa Ishi, Tomoya Kawakami, T. Yoshihisa, Y. Teranishi
Due to the growth of sensor use, such as environmental sensors and street cameras, sensor data stream delivery, the delivering of sensor data through cyclic collection, is attracting considerable attention. Our research team proposed some peer-to-peer streaming methods named LCF, LLF and LLF-H for distributing communication loads when delivering sensor data streams with different data collection cycles. In this paper, we implemented a sensor data stream delivery system with visualization based on the abovementioned technique, using the PIAX (P2P Interactive Agent eXtensions) peer-to-peer framework.
{"title":"An implementation of P2P sensor data streaming system considering the number of hops","authors":"Yoshimasa Ishi, Tomoya Kawakami, T. Yoshihisa, Y. Teranishi","doi":"10.1109/GCCE.2014.7031223","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031223","url":null,"abstract":"Due to the growth of sensor use, such as environmental sensors and street cameras, sensor data stream delivery, the delivering of sensor data through cyclic collection, is attracting considerable attention. Our research team proposed some peer-to-peer streaming methods named LCF, LLF and LLF-H for distributing communication loads when delivering sensor data streams with different data collection cycles. In this paper, we implemented a sensor data stream delivery system with visualization based on the abovementioned technique, using the PIAX (P2P Interactive Agent eXtensions) peer-to-peer framework.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127892721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031324
Kakeru Kusano, Tomoko Izumi, Y. Nakatani
This work aims to support disaster victims, including persons who do not understand local language and tourists, via the provision and collection of information when a disaster occurs. This nonlinguistic system, whereby users are able to understand information and the interface intuitively, has been constructed to convert linguistic information to pictograms and maps. As a result of evaluation, it was demonstrated that multidimensional information is also important for victims to share the information about disaster situation. Multidimensional information indicates scope, for example the condition of transport facilities. In this report, we propose a method to process such multidimensional information in our nonlinguistic approach.
{"title":"Nonlinguistic disaster information sharing system including multidimensional objects: A proposal","authors":"Kakeru Kusano, Tomoko Izumi, Y. Nakatani","doi":"10.1109/GCCE.2014.7031324","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031324","url":null,"abstract":"This work aims to support disaster victims, including persons who do not understand local language and tourists, via the provision and collection of information when a disaster occurs. This nonlinguistic system, whereby users are able to understand information and the interface intuitively, has been constructed to convert linguistic information to pictograms and maps. As a result of evaluation, it was demonstrated that multidimensional information is also important for victims to share the information about disaster situation. Multidimensional information indicates scope, for example the condition of transport facilities. In this report, we propose a method to process such multidimensional information in our nonlinguistic approach.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031259
M. Fujimura, H. Kuroda, K. Imamura
Recent years have witnessed a drastic rise in the number of video and image hosting sites, which provide and distribute image and video content on the Internet. In this context, several digital watermarking techniques have been investigated in order to prevent illegal duplication and distribution of such content. Illegal users in turn attempt to remove digital watermarks from such content, and collusion attacking methods, such as an average value attack, constitute a serious threat to digital watermarks. In previous research, we proposed a mosaic-like reconfiguration scheme for static images to resist average value attacks. The reconfiguration scheme comprises two components: a line clipping part that eliminates seam lines from an original image signal, and a line adding part that adds seam lines to the image signals of the preceding part. In this paper, we adapt this scheme to video signals.
{"title":"Mosaic-like reconfiguration scheme of video for resistance to average value attack","authors":"M. Fujimura, H. Kuroda, K. Imamura","doi":"10.1109/GCCE.2014.7031259","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031259","url":null,"abstract":"Recent years have witnessed a drastic rise in the number of video and image hosting sites, which provide and distribute image and video content on the Internet. In this context, several digital watermarking techniques have been investigated in order to prevent illegal duplication and distribution of such content. Illegal users in turn attempt to remove digital watermarks from such content, and collusion attacking methods, such as an average value attack, constitute a serious threat to digital watermarks. In previous research, we proposed a mosaic-like reconfiguration scheme for static images to resist average value attacks. The reconfiguration scheme comprises two components: a line clipping part that eliminates seam lines from an original image signal, and a line adding part that adds seam lines to the image signals of the preceding part. In this paper, we adapt this scheme to video signals.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031266
R. Suzuki, N. Kobayashi
The paper presents a support device for nursing. Several prototypes of assistive devices for feeding gastrostomy have been proposed to provide appropriate pressure for the pressurized bag. A control method for force detection has been also presented. Effectiveness of the proposed device have verified by nurses at hospitals.
{"title":"Development of assistive devices for feeding gastrostomy","authors":"R. Suzuki, N. Kobayashi","doi":"10.1109/GCCE.2014.7031266","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031266","url":null,"abstract":"The paper presents a support device for nursing. Several prototypes of assistive devices for feeding gastrostomy have been proposed to provide appropriate pressure for the pressurized bag. A control method for force detection has been also presented. Effectiveness of the proposed device have verified by nurses at hospitals.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/GCCE.2014.7031348
N. Ishikawa, Naofumi Yoshida, Naoki Ishibashi
Many standardization activities have been done for controlling and managing home networks and appliances during past ten years. Such activities include UPnP/DLNA, ECHONET and Continua Health Alliance and so on. However, there is no compatibility among those standards. To solve those problems, we have developed overlay networking protocols and device metadata technologies as a solution for controlling and managing heterogeneous home networks and appliances in a consolidated manner. Peer-to-peer Universal Computing Consortium (PUCC) was established in 2005, to deploy our overlay networking protocols and device metadata technologies toward de facto standardization. To verify the feasibility and usefulness of PUCC technologies, we have developed the PUCC middleware platforms, and PUCC applications using them. We explain PUCC overlay networking protocols and device metadata technologies. We also explain the PUCC middleware platforms and some PUCC applications using them.
{"title":"Overlay networking protocols and device metadata for controlling and managing home networks and appliances","authors":"N. Ishikawa, Naofumi Yoshida, Naoki Ishibashi","doi":"10.1109/GCCE.2014.7031348","DOIUrl":"https://doi.org/10.1109/GCCE.2014.7031348","url":null,"abstract":"Many standardization activities have been done for controlling and managing home networks and appliances during past ten years. Such activities include UPnP/DLNA, ECHONET and Continua Health Alliance and so on. However, there is no compatibility among those standards. To solve those problems, we have developed overlay networking protocols and device metadata technologies as a solution for controlling and managing heterogeneous home networks and appliances in a consolidated manner. Peer-to-peer Universal Computing Consortium (PUCC) was established in 2005, to deploy our overlay networking protocols and device metadata technologies toward de facto standardization. To verify the feasibility and usefulness of PUCC technologies, we have developed the PUCC middleware platforms, and PUCC applications using them. We explain PUCC overlay networking protocols and device metadata technologies. We also explain the PUCC middleware platforms and some PUCC applications using them.","PeriodicalId":145771,"journal":{"name":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}