Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015378
Sorashi Kimura, Tatsuyuki Ueda, D. Iwai, Kosuke Sato
Vergence-accommodation (VA) conflict occurs with conventional stereoscopic projection. The VA conflict may cause user discomfort. In this paper, we propose a method of time-multiplexed projection synchronized with a focal sweep. We created an experimental system consisting of a high-speed projector and focus tunable lens. We verified the operation of the system at three levels of depth. Test subjects suggested the effectiveness of the system.
{"title":"Alleviating Vergence-Accommodation Conflict in Stereoscopic Projection by Time-Multiplexed Projection with Focal Sweep","authors":"Sorashi Kimura, Tatsuyuki Ueda, D. Iwai, Kosuke Sato","doi":"10.1109/GCCE46687.2019.9015378","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015378","url":null,"abstract":"Vergence-accommodation (VA) conflict occurs with conventional stereoscopic projection. The VA conflict may cause user discomfort. In this paper, we propose a method of time-multiplexed projection synchronized with a focal sweep. We created an experimental system consisting of a high-speed projector and focus tunable lens. We verified the operation of the system at three levels of depth. Test subjects suggested the effectiveness of the system.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126786644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High-efficiency video coding (HEVC) is the emerging video coding standard, which provides a coding bit-rate reduction of up to 50% compared to the previous-generation video compression standard, H.264/AVC. A wide variety of video coding applications are applied in mobile devices; they suffer from the limited time-amending transmission bandwidth during data transmission. We present a low-hardware-complexity HEVC ME design that is not only aware of transmission bandwidth changes but capable of acceptable coding performance. In comparison with the HEVC test model (HM-16.6), the introduced HEVC ME scheme with rate-control capability can be realized in VLSI.
{"title":"A Low-Hardware-Complexity Rate Control Scheme for High Efficiency Video Coding","authors":"Jui-Hung Hsieh, Zhe-Yu Guo, Jun-An Cai, Jing-Cheng Syu, Hui-Lan Zhang","doi":"10.1109/GCCE46687.2019.9015593","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015593","url":null,"abstract":"High-efficiency video coding (HEVC) is the emerging video coding standard, which provides a coding bit-rate reduction of up to 50% compared to the previous-generation video compression standard, H.264/AVC. A wide variety of video coding applications are applied in mobile devices; they suffer from the limited time-amending transmission bandwidth during data transmission. We present a low-hardware-complexity HEVC ME design that is not only aware of transmission bandwidth changes but capable of acceptable coding performance. In comparison with the HEVC test model (HM-16.6), the introduced HEVC ME scheme with rate-control capability can be realized in VLSI.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015417
Runqiu Bao, Ren Komatsu, Renato Miyagusuku, Masaki Chino, A. Yamashita, H. Asama
Localization is essential for construction machines navigation. Current construction machines use RTK-GNSS for this purpose. We consider that using on-board cameras with SLAM algorithms to estimate machines' ego-motion and position change would not only be cheaper, but also more robust and widely applicable. To investigate the feasibility of this idea, we installed several consumer cameras on real construction machines and performed experiments at real construction sites. Our experiments show promising results, achieving localization accuracy of about 0.06 meters.
{"title":"Cost-effective and Robust Visual Based Localization with Consumer-level Cameras at Construction Sites","authors":"Runqiu Bao, Ren Komatsu, Renato Miyagusuku, Masaki Chino, A. Yamashita, H. Asama","doi":"10.1109/GCCE46687.2019.9015417","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015417","url":null,"abstract":"Localization is essential for construction machines navigation. Current construction machines use RTK-GNSS for this purpose. We consider that using on-board cameras with SLAM algorithms to estimate machines' ego-motion and position change would not only be cheaper, but also more robust and widely applicable. To investigate the feasibility of this idea, we installed several consumer cameras on real construction machines and performed experiments at real construction sites. Our experiments show promising results, achieving localization accuracy of about 0.06 meters.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015463
Taichi Umeda, Y. Nozaki, M. Yoshikawa
Counterfeit electronic devices cause severe problems. As a countermeasure of the problems, physical unclonable function (PUF), which uses production variations of semiconductor, has attracted attention. However, the threat of modeling analysis, which clones authentication ID of PUF, has been reported. Although, the modeling analysis method using genetic algorithm (GA) was proposed, the scalability of this method has not been evaluated. In order to secure the safety of PUF, it is important to evaluate the flexibility of the modeling analysis method. Therefore, this paper evaluates the scalability and performance of GA based the modeling analysis for ring oscillator (RO) PUF.
{"title":"Scalability and Performance Evaluation of GA Based Modeling Analysis for RO PUF","authors":"Taichi Umeda, Y. Nozaki, M. Yoshikawa","doi":"10.1109/GCCE46687.2019.9015463","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015463","url":null,"abstract":"Counterfeit electronic devices cause severe problems. As a countermeasure of the problems, physical unclonable function (PUF), which uses production variations of semiconductor, has attracted attention. However, the threat of modeling analysis, which clones authentication ID of PUF, has been reported. Although, the modeling analysis method using genetic algorithm (GA) was proposed, the scalability of this method has not been evaluated. In order to secure the safety of PUF, it is important to evaluate the flexibility of the modeling analysis method. Therefore, this paper evaluates the scalability and performance of GA based the modeling analysis for ring oscillator (RO) PUF.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126292801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015284
Y. Ho, Guan-Hao Hou, Meng-Hsuan Wu, Fu-Hsing Chen, P. Sung, Chieh-Hsu Chen, Chih-Lung Lin
This work presents an Ultra-wideband (UWB) indoor positioning system for tracking customer pathway. The position is located by the triangulation method and the Gauss-Newton method is utilized to ameliorate the location accuracy. Experimental results indicate that the Gauss-Newton method decreases the measured positioning errors at different distances. Consequently, this indoor positioning system can provide a high precision positioning performance in tracking customer pathway and determine which commodity is the nearest one to the customers.
{"title":"High-Precision UWB Indoor Positioning System for Customer Pathway Tracking","authors":"Y. Ho, Guan-Hao Hou, Meng-Hsuan Wu, Fu-Hsing Chen, P. Sung, Chieh-Hsu Chen, Chih-Lung Lin","doi":"10.1109/GCCE46687.2019.9015284","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015284","url":null,"abstract":"This work presents an Ultra-wideband (UWB) indoor positioning system for tracking customer pathway. The position is located by the triangulation method and the Gauss-Newton method is utilized to ameliorate the location accuracy. Experimental results indicate that the Gauss-Newton method decreases the measured positioning errors at different distances. Consequently, this indoor positioning system can provide a high precision positioning performance in tracking customer pathway and determine which commodity is the nearest one to the customers.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"1979 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015634
Ryoichi Omori, J. Kishigami
A decentralized auction market using blockchain requires a mechanism to guarantee the quality of products offered by anonymous users. We present a reputation system to quantify the user's credibility and apply it to avoid malicious sellers, thus contributing toward building a healthy market.
{"title":"Incorporating Reputation System in Blockchain-Based Distributed Auctions","authors":"Ryoichi Omori, J. Kishigami","doi":"10.1109/GCCE46687.2019.9015634","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015634","url":null,"abstract":"A decentralized auction market using blockchain requires a mechanism to guarantee the quality of products offered by anonymous users. We present a reputation system to quantify the user's credibility and apply it to avoid malicious sellers, thus contributing toward building a healthy market.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015545
H. Cho, Y. Song
This paper proposes a method to improve the performance of channel coding by using Auto Encoder. The channel coding technique used in this paper is the Golay code. The proposed method is to combine the Golay code with the Auto Encoder. The output from the Auto Encoder is corrected by the Golay code using the syndrome. Auto Encoder use models that increase the number of nodes in the hidden layer, unlike the typical Auto Encoder. If the Auto Encoder and the Golay code are combined, they show better performance than if only the Golay code is used. Therefore, we believe that even if we combine the techniques of different channel coding with the Auto Encoder, we can improve the performance of channel coding.
{"title":"Golay Code Decoder Using Auto Encoder","authors":"H. Cho, Y. Song","doi":"10.1109/GCCE46687.2019.9015545","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015545","url":null,"abstract":"This paper proposes a method to improve the performance of channel coding by using Auto Encoder. The channel coding technique used in this paper is the Golay code. The proposed method is to combine the Golay code with the Auto Encoder. The output from the Auto Encoder is corrected by the Golay code using the syndrome. Auto Encoder use models that increase the number of nodes in the hidden layer, unlike the typical Auto Encoder. If the Auto Encoder and the Golay code are combined, they show better performance than if only the Golay code is used. Therefore, we believe that even if we combine the techniques of different channel coding with the Auto Encoder, we can improve the performance of channel coding.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015443
K. Kageyama, K. Kojima
AE measurements of strawberry plants in greenhouse were examined for the activity monitoring. The electret condenser sensor (ECS) could detect many AE events mainly in daytime at the petiole. Number of daily AE event showed weak correlation with the number of fruits. On the other hand, AEs were also detected at nighttime and occasionally exceeded the number of AE at daytime. Such a AEs at nighttime might reflect the cavitation vulnerability of the plants because AE occurrence ratio of nighttime showed a peak to the number of fruits.
{"title":"AE Measurement of Greenhouse Strawberry Using Electret Sensor for Activity Monitoring","authors":"K. Kageyama, K. Kojima","doi":"10.1109/GCCE46687.2019.9015443","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015443","url":null,"abstract":"AE measurements of strawberry plants in greenhouse were examined for the activity monitoring. The electret condenser sensor (ECS) could detect many AE events mainly in daytime at the petiole. Number of daily AE event showed weak correlation with the number of fruits. On the other hand, AEs were also detected at nighttime and occasionally exceeded the number of AE at daytime. Such a AEs at nighttime might reflect the cavitation vulnerability of the plants because AE occurrence ratio of nighttime showed a peak to the number of fruits.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9014636
Warit Sirichotedumrong, Yuma Kinoshita, H. Kiya
This paper aims to evaluate the safety of a pixel-based image encryption method, which has been proposed to apply images with no visual information to deep neural networks (DNN), in terms of robustness against ciphertext-only attacks (COA). In addition, we propose a novel DNN-based COA that aims to reconstruct the visual information of encrypted images. The effectiveness of the proposed attack is evaluated under two encryption key conditions: same encryption key, and different encryption keys. The results show that the proposed attack can recover the visual information of the encrypted images if images are encrypted under same encryption key. Otherwise, the pixel-based image encryption method has robustness against COA.
{"title":"On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks","authors":"Warit Sirichotedumrong, Yuma Kinoshita, H. Kiya","doi":"10.1109/GCCE46687.2019.9014636","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9014636","url":null,"abstract":"This paper aims to evaluate the safety of a pixel-based image encryption method, which has been proposed to apply images with no visual information to deep neural networks (DNN), in terms of robustness against ciphertext-only attacks (COA). In addition, we propose a novel DNN-based COA that aims to reconstruct the visual information of encrypted images. The effectiveness of the proposed attack is evaluated under two encryption key conditions: same encryption key, and different encryption keys. The results show that the proposed attack can recover the visual information of the encrypted images if images are encrypted under same encryption key. Otherwise, the pixel-based image encryption method has robustness against COA.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116682483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/GCCE46687.2019.9015613
Hiroya Kawai, Koichi Ito, T. Aoki
There are many studies on face recognition, which identifies a person using distinctive features extracted from a face image. One of the problems in face recognition is that the accuracy of face recognition decreases due to environmental changes such as head pose, emotion, illumination, etc. Addressing this problem, soft biometrics, which uses attributes such as age and gender for person authentication, is expected to improve the accuracy of face recognition. This paper proposes a face attribute estimation method using the Convolutional Neural Network (CNN). The CNN architecture of the proposed method, called DendroNet, is automatically designed according to the relationships among attributes. Though experiments using the CelebA dataset, we demonstrate that the proposed method exhibits better performance than conventional methods.
{"title":"Performance Evaluation of Face Attribute Estimation Method Using DendroNet","authors":"Hiroya Kawai, Koichi Ito, T. Aoki","doi":"10.1109/GCCE46687.2019.9015613","DOIUrl":"https://doi.org/10.1109/GCCE46687.2019.9015613","url":null,"abstract":"There are many studies on face recognition, which identifies a person using distinctive features extracted from a face image. One of the problems in face recognition is that the accuracy of face recognition decreases due to environmental changes such as head pose, emotion, illumination, etc. Addressing this problem, soft biometrics, which uses attributes such as age and gender for person authentication, is expected to improve the accuracy of face recognition. This paper proposes a face attribute estimation method using the Convolutional Neural Network (CNN). The CNN architecture of the proposed method, called DendroNet, is automatically designed according to the relationships among attributes. Though experiments using the CelebA dataset, we demonstrate that the proposed method exhibits better performance than conventional methods.","PeriodicalId":303502,"journal":{"name":"2019 IEEE 8th Global Conference on Consumer Electronics (GCCE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}