Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660404
Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim
Security displays will be one of the important technologies of the future. So we were able to find a way during the study of displays using polarization. Emission of circularly polarized (CP) light has attracted great attention for improving device performance. The degree of CP emission is defined by the dissymmetric factor, $(q=2(I_{mathrm{L}}-I_{mathrm{R}})/(I_{mathrm{L}}+I_{mathrm{R}})$, where $I_{mathrm{L}}$ and $I_{mathrm{R}}$ denote the intensities of left-handed and right-handed CP light, respectively. Especially, high degree of CP emission was achieved in a helical configuration of mesogenic luminophore by doping a chiral agent [15] or by rubbing two different surfaces [16]. In this work, we investigate the dissymmetric factor of the intrinsic chiral luminophore as a function of elapsed time after sample fabrication. The fluorene moiety containing chirality was used for an emitting layer (EML) and annealed thermally above its mesogenic temperature after coating on the rubbed alignment layer. The EML constructed the twisted structure without any treatment after cooling down at room temperature. The twisted EML generates the CP light, whose dissymmetric factor is governed by helical twisting power (HTP) and thickness of the EML. Interestingly, the dissymmetric factor (gPL) of the photoluminescence (PL) was gradually degraded according to time elapsed after sample preparation. These degradation behaviors were observed in both rapidly and slowly cooling processes. Such phenomenon is expected to be originated from weaker HTP of the intrinsic chirality than the specific chiral dopant such as S(R)05011 [15]. Restoring process of the dissymmetric factor was also investigated. Therefore, using this phenomenon, it can be applied to military security or various security displays.
{"title":"Security Crypto Display that Information Disappears and Appears According to a Certain Temperature and Time","authors":"Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim","doi":"10.1109/IC-NIDC54101.2021.9660404","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660404","url":null,"abstract":"Security displays will be one of the important technologies of the future. So we were able to find a way during the study of displays using polarization. Emission of circularly polarized (CP) light has attracted great attention for improving device performance. The degree of CP emission is defined by the dissymmetric factor, $(q=2(I_{mathrm{L}}-I_{mathrm{R}})/(I_{mathrm{L}}+I_{mathrm{R}})$, where $I_{mathrm{L}}$ and $I_{mathrm{R}}$ denote the intensities of left-handed and right-handed CP light, respectively. Especially, high degree of CP emission was achieved in a helical configuration of mesogenic luminophore by doping a chiral agent [15] or by rubbing two different surfaces [16]. In this work, we investigate the dissymmetric factor of the intrinsic chiral luminophore as a function of elapsed time after sample fabrication. The fluorene moiety containing chirality was used for an emitting layer (EML) and annealed thermally above its mesogenic temperature after coating on the rubbed alignment layer. The EML constructed the twisted structure without any treatment after cooling down at room temperature. The twisted EML generates the CP light, whose dissymmetric factor is governed by helical twisting power (HTP) and thickness of the EML. Interestingly, the dissymmetric factor (gPL) of the photoluminescence (PL) was gradually degraded according to time elapsed after sample preparation. These degradation behaviors were observed in both rapidly and slowly cooling processes. Such phenomenon is expected to be originated from weaker HTP of the intrinsic chirality than the specific chiral dopant such as S(R)05011 [15]. Restoring process of the dissymmetric factor was also investigated. Therefore, using this phenomenon, it can be applied to military security or various security displays.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid spread of COVID-19, hundreds of millions of people worldwide have been infected. In order to cope with the epidemic, experts from various countries have carried out a lot of research works. Most of these works chose to use the traditional SEIR model, but the traditional model doesn't consider the individual's movement in the city. Based on the transmission characteristics of COVID-19, this paper optimized the traditional SEIR model by combining the in-depth mining and processed multiple data, such as the real epidemic data published by some official organizations, as well as data with certain credibility obtained from reference papers, journals or newspapers. Compared with the traditional SEIR model, the proposed model takes into account the impact of individuals' movement and the division of urban functional areas. The outcomes can play a certain role in the prediction and analysis of the spread of the epidemic in cities with regular individuals' movements and functions of urban areas.
{"title":"Research of Epidemic Dynamics Model Considering Individual Movements and Urban Areas","authors":"Boxu Pan, Jie Yang, Yu Wang, Zehao Wang, Yuangeng Zhu, Zhiqiang Zhang","doi":"10.1109/IC-NIDC54101.2021.9660546","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660546","url":null,"abstract":"With the rapid spread of COVID-19, hundreds of millions of people worldwide have been infected. In order to cope with the epidemic, experts from various countries have carried out a lot of research works. Most of these works chose to use the traditional SEIR model, but the traditional model doesn't consider the individual's movement in the city. Based on the transmission characteristics of COVID-19, this paper optimized the traditional SEIR model by combining the in-depth mining and processed multiple data, such as the real epidemic data published by some official organizations, as well as data with certain credibility obtained from reference papers, journals or newspapers. Compared with the traditional SEIR model, the proposed model takes into account the impact of individuals' movement and the division of urban functional areas. The outcomes can play a certain role in the prediction and analysis of the spread of the epidemic in cities with regular individuals' movements and functions of urban areas.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660596
T. Tan, Chengyu Cui, Sungkwon Park
According to the basic concept of the In-Robot Network(IRN), an IRN structure that can handle burst data is proposed. According to the existing research on humanoid robots, it can be seen that the current humanoid robots have a high degree of freedom of joints and carry various sensors at the same time to form a huge IRN network. It can be known from existing research that most of the current humanoid robots operate according to preset scenarios and plans. If a special situation occurs, the current IRN structure of a humanoid robot cannot handle a large amount of burst data in a special situation. Therefore, based on the in-vehicle network (IVN) and time-sensitive network (TSN) concepts, an IRN structure that can handle the data generated in the above-mentioned emergencies is proposed in this article. In this IRN structure, the Domain Control Unit (DCU) is used to detect the status of the data stream in each different area to distinguish whether an emergency occurs. Also, according to different emergencies, use different ways to deal with the emergent data. Meanwhile, it is verified by the OMNet++ network simulation tool.
根据机器人内网络(IRN)的基本概念,提出了一种能够处理突发数据的IRN结构。根据现有的仿人机器人研究可以看出,目前的仿人机器人关节自由度高,同时携带各种传感器,形成一个庞大的IRN网络。从现有的研究中可以知道,目前大多数人形机器人都是按照预设的场景和计划进行操作的。如果发生特殊情况,目前仿人机器人的IRN结构无法处理特殊情况下的大量突发数据。因此,本文基于车载网络(IVN)和时间敏感网络(TSN)的概念,提出了一种能够处理上述突发事件中产生的数据的车载网络结构。在这种IRN结构中,DCU (Domain Control Unit)用于检测各个区域的数据流状态,从而判断是否发生紧急情况。同时,根据不同的紧急情况,采用不同的方式处理紧急数据。同时,通过omnet++网络仿真工具进行了验证。
{"title":"The In-Robot Network Structure of Humanoid Robot for Burst Traffic Data Situations","authors":"T. Tan, Chengyu Cui, Sungkwon Park","doi":"10.1109/IC-NIDC54101.2021.9660596","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660596","url":null,"abstract":"According to the basic concept of the In-Robot Network(IRN), an IRN structure that can handle burst data is proposed. According to the existing research on humanoid robots, it can be seen that the current humanoid robots have a high degree of freedom of joints and carry various sensors at the same time to form a huge IRN network. It can be known from existing research that most of the current humanoid robots operate according to preset scenarios and plans. If a special situation occurs, the current IRN structure of a humanoid robot cannot handle a large amount of burst data in a special situation. Therefore, based on the in-vehicle network (IVN) and time-sensitive network (TSN) concepts, an IRN structure that can handle the data generated in the above-mentioned emergencies is proposed in this article. In this IRN structure, the Domain Control Unit (DCU) is used to detect the status of the data stream in each different area to distinguish whether an emergency occurs. Also, according to different emergencies, use different ways to deal with the emergent data. Meanwhile, it is verified by the OMNet++ network simulation tool.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660532
Cong Meng, Heli Zhang, Hong Ji, Xi Li
As a critical technology of network security, key management has attracted attention in mobile edge computing (MEC)-enabled vehicular networks. However, the traditional centralized key management methods are vulnerable to single points of failure. In this case, we propose a distributed key management scheme for MEC-enabled vehicular networks. Within this scheme, we use permissioned blockchain to store the key and present a new transaction format while key registration, update, and revocation are included. Considering the high mobility of the vehicle, we design a lightweight mutual authentication protocol to ensure that the vehicle can access MEC servers quickly and safely. Finally, the simulation results prove that our proposed scheme can achieve a lower authentication delay, less communication overhead, and higher security compared with traditional key management.
{"title":"Mutual Authentication and Distributed Key Management with Permissioned Blockchain in MEC-Enabled Vehicular Networks","authors":"Cong Meng, Heli Zhang, Hong Ji, Xi Li","doi":"10.1109/IC-NIDC54101.2021.9660532","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660532","url":null,"abstract":"As a critical technology of network security, key management has attracted attention in mobile edge computing (MEC)-enabled vehicular networks. However, the traditional centralized key management methods are vulnerable to single points of failure. In this case, we propose a distributed key management scheme for MEC-enabled vehicular networks. Within this scheme, we use permissioned blockchain to store the key and present a new transaction format while key registration, update, and revocation are included. Considering the high mobility of the vehicle, we design a lightweight mutual authentication protocol to ensure that the vehicle can access MEC servers quickly and safely. Finally, the simulation results prove that our proposed scheme can achieve a lower authentication delay, less communication overhead, and higher security compared with traditional key management.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660515
S. An, Mingyu Jang, D. Yoon
In a non-cooperative context, to recover data from the received signal, the receiver must estimate the communication parameters used in the transmitter. In this paper, we propose an algorithm for classifying single-carrier and multi-carrier signals by using convolutional neural network based deep learning and analyze classification performance. Simulation results show that the proposed algorithm outperforms the conventional methods in an additive white Gaussian noise channel and Rician fading channel.
{"title":"Classification of Single- and Multi-carrier Signals Using CNN Based Deep Learning","authors":"S. An, Mingyu Jang, D. Yoon","doi":"10.1109/IC-NIDC54101.2021.9660515","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660515","url":null,"abstract":"In a non-cooperative context, to recover data from the received signal, the receiver must estimate the communication parameters used in the transmitter. In this paper, we propose an algorithm for classifying single-carrier and multi-carrier signals by using convolutional neural network based deep learning and analyze classification performance. Simulation results show that the proposed algorithm outperforms the conventional methods in an additive white Gaussian noise channel and Rician fading channel.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660472
Yingjie Deng, Yu Liu
Integrated terrestrial-satellite networks have the advantages of wide coverage, long communication distance, strong mobile access capability, which form a good complementary relationship with 5G cellular network and have a bright future. However, integrated terrestrial-satellite network is a typical DTN network with time varying topology, in which whole end-to-end paths are hardly to be established. It is significant to design a routing algorithm for the integrated terrestrial-satellite networks. In order to solve the routing problem of satellite network, in this paper, a space-time graph model is first constructed. Inspired by the minimum-cost constrained multipath routing (MCMP) algorithm, a minimum-delay constrained multipath routing (MDMP) algorithm is proposed to minimize routing delay. Furthermore, a tunable minimum-delay-cost constrained multipath routing (TMMP) algorithm is proposed, which considers the optimization of both routing delay and energy cost with linear weighting method. Simulation results prove the effectiveness of MDMP algorithm and TMMP algorithm.
{"title":"A Tunable Routing Algorithm for Integerated Terrestrial-Satellite Networks Based on the Space-Time Graph","authors":"Yingjie Deng, Yu Liu","doi":"10.1109/IC-NIDC54101.2021.9660472","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660472","url":null,"abstract":"Integrated terrestrial-satellite networks have the advantages of wide coverage, long communication distance, strong mobile access capability, which form a good complementary relationship with 5G cellular network and have a bright future. However, integrated terrestrial-satellite network is a typical DTN network with time varying topology, in which whole end-to-end paths are hardly to be established. It is significant to design a routing algorithm for the integrated terrestrial-satellite networks. In order to solve the routing problem of satellite network, in this paper, a space-time graph model is first constructed. Inspired by the minimum-cost constrained multipath routing (MCMP) algorithm, a minimum-delay constrained multipath routing (MDMP) algorithm is proposed to minimize routing delay. Furthermore, a tunable minimum-delay-cost constrained multipath routing (TMMP) algorithm is proposed, which considers the optimization of both routing delay and energy cost with linear weighting method. Simulation results prove the effectiveness of MDMP algorithm and TMMP algorithm.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131435576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660438
Jiangnan Lin, Qiuxin Wu
With the development of the Internet of Things, embedded devices have become increasingly frequent in people's daily use. However, with the influx of a huge amount of heterogeneous embedded devices, its security has become an important issue. To face with such problems, remote attestation is undoubtedly a suitable security technology. Nevertheless, traditional remote attestation is limited to verifying the performance of devices as large and heterogeneous devices enter daily life. Therefore, this paper proposes a many-to-one swarm attestation and recovery scheme. Besides, the reputation mechanism and Merkel tree measurement method are introduced to reduce the attestation and recovery time of the scheme, and greatly reducing the energy consumption.
{"title":"A Security Integrated Attestation Scheme for Embedded Devices","authors":"Jiangnan Lin, Qiuxin Wu","doi":"10.1109/IC-NIDC54101.2021.9660438","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660438","url":null,"abstract":"With the development of the Internet of Things, embedded devices have become increasingly frequent in people's daily use. However, with the influx of a huge amount of heterogeneous embedded devices, its security has become an important issue. To face with such problems, remote attestation is undoubtedly a suitable security technology. Nevertheless, traditional remote attestation is limited to verifying the performance of devices as large and heterogeneous devices enter daily life. Therefore, this paper proposes a many-to-one swarm attestation and recovery scheme. Besides, the reputation mechanism and Merkel tree measurement method are introduced to reduce the attestation and recovery time of the scheme, and greatly reducing the energy consumption.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660520
Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma
As many countries have promulgated laws on the protection of user data privacy, how to legally use user data has become a hot topic. With the emergence of collaborative learning, also known as federated learning, multiple participants can create a common, robust, and secure machine learning model aimed at addressing such critical issues of data sharing as privacy, security, and access, etc. Unfortunately, existing research shows that collaborative learning is not as secure as it claims, and the gradient leakage is still a key problem. To deal with this problem, a collaborative learning solution based on chained secure multi-party computing has been proposed recently. However, there are two security issues in this scheme that remain unsolved. First, if semi-honest users collude, the honest users' gradient also leaks. Second, if one of the users fails, it also cannot guarantee the correctness of the aggregation results. In this paper, we propose a privacy-preserving and verifiable chain collaborative learning scheme to solve this problem. First, we design a gradient encryption method, which can solve the problem of gradient leakage. Second, we create a verifiable method based on homomorphic hash technology. This method can ensure the correctness of users' aggregation results. At the same time, it can also track users who aggregate wrong. Compared with other solutions, our scheme is more efficient.
{"title":"Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation","authors":"Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma","doi":"10.1109/IC-NIDC54101.2021.9660520","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660520","url":null,"abstract":"As many countries have promulgated laws on the protection of user data privacy, how to legally use user data has become a hot topic. With the emergence of collaborative learning, also known as federated learning, multiple participants can create a common, robust, and secure machine learning model aimed at addressing such critical issues of data sharing as privacy, security, and access, etc. Unfortunately, existing research shows that collaborative learning is not as secure as it claims, and the gradient leakage is still a key problem. To deal with this problem, a collaborative learning solution based on chained secure multi-party computing has been proposed recently. However, there are two security issues in this scheme that remain unsolved. First, if semi-honest users collude, the honest users' gradient also leaks. Second, if one of the users fails, it also cannot guarantee the correctness of the aggregation results. In this paper, we propose a privacy-preserving and verifiable chain collaborative learning scheme to solve this problem. First, we design a gradient encryption method, which can solve the problem of gradient leakage. Second, we create a verifiable method based on homomorphic hash technology. This method can ensure the correctness of users' aggregation results. At the same time, it can also track users who aggregate wrong. Compared with other solutions, our scheme is more efficient.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660583
W. Lee, Hyucksung Kwon, Jungwook Choi
In the era of COVID-19, temperature measurement becomes a crucial procedure for protecting public spaces against the virus. Artificial intelligence techniques such as object detection deep neural networks (DNNs) have been adopted to enhance the accuracy of contactless temperature measurement. However, the computation-demanding nature of DNNs, along with the time-consuming fusion of video and thermal camera frames, raises hurdles for the cost-effective deployment of such AI thermometer systems. In this work, we propose a high-speed and cost-effective implementation of an AI thermometer. We develop a thermal face detection network to detect faces for temperature measurement without a video camera. We optimize the proposed network's precision and structure to exploit high-throughput reduced-precision computations available in the embedded AI platforms. The resulting AI thermometer system demonstrates a live temperature measurement with a speed of 160 frames per second.
{"title":"Thermal Face Detection for High-Speed AI Thermometer","authors":"W. Lee, Hyucksung Kwon, Jungwook Choi","doi":"10.1109/IC-NIDC54101.2021.9660583","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660583","url":null,"abstract":"In the era of COVID-19, temperature measurement becomes a crucial procedure for protecting public spaces against the virus. Artificial intelligence techniques such as object detection deep neural networks (DNNs) have been adopted to enhance the accuracy of contactless temperature measurement. However, the computation-demanding nature of DNNs, along with the time-consuming fusion of video and thermal camera frames, raises hurdles for the cost-effective deployment of such AI thermometer systems. In this work, we propose a high-speed and cost-effective implementation of an AI thermometer. We develop a thermal face detection network to detect faces for temperature measurement without a video camera. We optimize the proposed network's precision and structure to exploit high-throughput reduced-precision computations available in the embedded AI platforms. The resulting AI thermometer system demonstrates a live temperature measurement with a speed of 160 frames per second.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"17 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-17DOI: 10.1109/IC-NIDC54101.2021.9660554
Maoran Sun, Fan Zhang, Fábio Duarte
Building age is a key factor for building energy efficiency, valuation of real estate objects and urban planning, while previous research has been limited by the available building age data and efficient ways to estimate building age information. This paper presents an automated workflow for estimating building age from street view images. A building age dataset consisting of street view images that are labeled with the date of construction is created for Amsterdam. We designed a deep convolutional neural network for the estimation of building age and achieved a total accuracy of 81%. This research utilizes publicly available data, street view images, and construction dates of buildings, to perform the estimation of building age with an automated manner.
{"title":"Automatic Building Age Prediction from Street View Images","authors":"Maoran Sun, Fan Zhang, Fábio Duarte","doi":"10.1109/IC-NIDC54101.2021.9660554","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660554","url":null,"abstract":"Building age is a key factor for building energy efficiency, valuation of real estate objects and urban planning, while previous research has been limited by the available building age data and efficient ways to estimate building age information. This paper presents an automated workflow for estimating building age from street view images. A building age dataset consisting of street view images that are labeled with the date of construction is created for Amsterdam. We designed a deep convolutional neural network for the estimation of building age and achieved a total accuracy of 81%. This research utilizes publicly available data, street view images, and construction dates of buildings, to perform the estimation of building age with an automated manner.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}