Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914388
Hyunwoo Kim, S. Jo, Farhan Hussain, Y. Song
DCT is the main performance bottleneck of the HEVC because it has a lot of repeated operations. Performance of the DCT can be improved by executing these repeated operations in parallel. However, memory operations to access the required data limit performance improvements of the parallelization. In this paper, we parallelize the DCT by using the ASIP developed in our previous work and propose an efficient memory data reorganization scheme to achieve further performance improvements of DCT parallelization.
{"title":"Memory data reorganization for performance improvement of HEVC DCT","authors":"Hyunwoo Kim, S. Jo, Farhan Hussain, Y. Song","doi":"10.1109/ELINFOCOM.2014.6914388","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914388","url":null,"abstract":"DCT is the main performance bottleneck of the HEVC because it has a lot of repeated operations. Performance of the DCT can be improved by executing these repeated operations in parallel. However, memory operations to access the required data limit performance improvements of the parallelization. In this paper, we parallelize the DCT by using the ASIP developed in our previous work and propose an efficient memory data reorganization scheme to achieve further performance improvements of DCT parallelization.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914406
J. Choi, S. Nam, S. Cho
In this paper, we investigate a new closed-form expression of the outage probability for selection combining (SC) schemes based on the signal to interference plus noise ratio (SINR). A numerical example shows that our analytical results perfectly match our simulation results.
{"title":"New closed form expression of the outage probability for selection combining based on the SINR","authors":"J. Choi, S. Nam, S. Cho","doi":"10.1109/ELINFOCOM.2014.6914406","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914406","url":null,"abstract":"In this paper, we investigate a new closed-form expression of the outage probability for selection combining (SC) schemes based on the signal to interference plus noise ratio (SINR). A numerical example shows that our analytical results perfectly match our simulation results.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123154760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914396
Han-Soo Seong, Hyuk-Jae Lee
Optical flow estimates an approximated motion of objects, edges or corners. In this paper, a simple realtime Lucas-Kanade optical flow hardware implementation for smart devices is proposed. Comparing to previous works, the proposed implementation requires a less amount of line memories, multipliers and bandwidth while achieving a less computation error and an improved real time throughput.
{"title":"A VLSI design of real-time and scalable Lucas-Kanade optical flow","authors":"Han-Soo Seong, Hyuk-Jae Lee","doi":"10.1109/ELINFOCOM.2014.6914396","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914396","url":null,"abstract":"Optical flow estimates an approximated motion of objects, edges or corners. In this paper, a simple realtime Lucas-Kanade optical flow hardware implementation for smart devices is proposed. Comparing to previous works, the proposed implementation requires a less amount of line memories, multipliers and bandwidth while achieving a less computation error and an improved real time throughput.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914358
B. Jeong, I. Eom
Forged digital images have been increased quickly for malicious purposes with the development of the image-editing software. As a consequence, the image forensics has been necessary to grant the authenticity of digital image. In this paper, we proposed a novel the image manipulation detection in the wavelet domain. We analyze retouching methods and the corresponding feature vectors are extracted. The experiment results show that the proposed method provides very effective performance.
{"title":"Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients","authors":"B. Jeong, I. Eom","doi":"10.1109/ELINFOCOM.2014.6914358","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914358","url":null,"abstract":"Forged digital images have been increased quickly for malicious purposes with the development of the image-editing software. As a consequence, the image forensics has been necessary to grant the authenticity of digital image. In this paper, we proposed a novel the image manipulation detection in the wavelet domain. We analyze retouching methods and the corresponding feature vectors are extracted. The experiment results show that the proposed method provides very effective performance.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"44 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914407
Xuanjun Quan, J. Choi, S. Cho
This paper presents an In-bound/Out-bound detection algorithm of people's movements using an impulse radio ultra-wideband (IR-UWB) radar system. This algorithm is based on a simple threshold crossing (TC) method which has been widely used in UWB field. This algorithm can detect the people who pass through the gate field. It can be used in gate monitoring to count the number of people in a large room.
{"title":"In-bound/Out-bound detection of people's movements using an IR-UWB radar system","authors":"Xuanjun Quan, J. Choi, S. Cho","doi":"10.1109/ELINFOCOM.2014.6914407","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914407","url":null,"abstract":"This paper presents an In-bound/Out-bound detection algorithm of people's movements using an impulse radio ultra-wideband (IR-UWB) radar system. This algorithm is based on a simple threshold crossing (TC) method which has been widely used in UWB field. This algorithm can detect the people who pass through the gate field. It can be used in gate monitoring to count the number of people in a large room.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914394
Chanhyun Park, Miseon Han, Hokyoon Lee, S. Kim
In embedded systems, code size and dynamic instruction count are important performance indicators of power consumption and execution time. However, the use of different compilers may result in large different performance values even if a target machine is the same. So, the compiler selection in the system development is very important. In this paper, we compare the performances of two popular compilers, GCC and LLVM in perspective of the code size and the dynamic instruction count for the EISC embedded processor. Our comparison shows that LLVM is good at optimizing calculation intensive benchmarks, and GCC performs register allocation and jump optimization better. Overall, the GCC compiler shows better performance in most EEMBC benchmarks about 18% on average in terms of dynamic instruction. Also, the compiled code size by GCC is smaller than that of LLVM by 4% on average.
{"title":"Performance comparison of GCC and LLVM on the EISC processor","authors":"Chanhyun Park, Miseon Han, Hokyoon Lee, S. Kim","doi":"10.1109/ELINFOCOM.2014.6914394","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914394","url":null,"abstract":"In embedded systems, code size and dynamic instruction count are important performance indicators of power consumption and execution time. However, the use of different compilers may result in large different performance values even if a target machine is the same. So, the compiler selection in the system development is very important. In this paper, we compare the performances of two popular compilers, GCC and LLVM in perspective of the code size and the dynamic instruction count for the EISC embedded processor. Our comparison shows that LLVM is good at optimizing calculation intensive benchmarks, and GCC performs register allocation and jump optimization better. Overall, the GCC compiler shows better performance in most EEMBC benchmarks about 18% on average in terms of dynamic instruction. Also, the compiled code size by GCC is smaller than that of LLVM by 4% on average.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116009605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914374
Hyungtae Kim, Daehee Kim, J. Paik
This paper presents an automatic region-adaptive focal-length estimation method to correct a fisheye-lens distortion. The proposed method consists of three steps; i) generation of criteria for estimating focal-length, ii) region-adaptive focal-length estimation, and iii) correction of the fisheye lens distortion using the orthographic projection model. Experimental result show that the proposed method provides a lower loss rate than existing methods.
{"title":"Region-based adaptive automatic focal-length estimation method for fisheye-lens distortion correction","authors":"Hyungtae Kim, Daehee Kim, J. Paik","doi":"10.1109/ELINFOCOM.2014.6914374","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914374","url":null,"abstract":"This paper presents an automatic region-adaptive focal-length estimation method to correct a fisheye-lens distortion. The proposed method consists of three steps; i) generation of criteria for estimating focal-length, ii) region-adaptive focal-length estimation, and iii) correction of the fisheye lens distortion using the orthographic projection model. Experimental result show that the proposed method provides a lower loss rate than existing methods.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914452
Thong Li Wah, Swee Leong Kok, Roszaidi bin Ramlan
Conventional vibration energy harvesters are required to function only on sole resonant frequency and to harvest energy on a restricted bandwidth. In this paper, a novel mathematical model of a energy harvester is proposed to confront the problem and to harvest energy in a broader spectrum of frequency. Simulation results show that the proposed model is able to generate broadband energy with suitable optimized parameters. Furthermore, it is observed that by reducing the frequency ratio between cantilever beams, the ripples effect in the energy bandwidth can be reduced.
{"title":"A broadband vibration energy harvesting model for multiple cantilever beams","authors":"Thong Li Wah, Swee Leong Kok, Roszaidi bin Ramlan","doi":"10.1109/ELINFOCOM.2014.6914452","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914452","url":null,"abstract":"Conventional vibration energy harvesters are required to function only on sole resonant frequency and to harvest energy on a restricted bandwidth. In this paper, a novel mathematical model of a energy harvester is proposed to confront the problem and to harvest energy in a broader spectrum of frequency. Simulation results show that the proposed model is able to generate broadband energy with suitable optimized parameters. Furthermore, it is observed that by reducing the frequency ratio between cantilever beams, the ripples effect in the energy bandwidth can be reduced.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914363
Nam Pham Thanh, Xuan Thanh Nguyen, V. Luu, Q. H. Bui, T. Lê
3D video can bring to viewers an exhilarating experience, however, it contains more details compared to 2D video; thus, it demands higher bandwidth to transmit information to the viewers. In order to overcome this hurdle, our paper aims to propose a resolution that helps to detect and track video regions interested by viewers. These video regions may then be coded with higher bitrate than others to preserve the visual quality while the total video bitrate is reduced. Experimental results showed the effectiveness of our method and it can be applied to interactive video coders.
{"title":"Region-of-interest tracking method for video plus depth coding","authors":"Nam Pham Thanh, Xuan Thanh Nguyen, V. Luu, Q. H. Bui, T. Lê","doi":"10.1109/ELINFOCOM.2014.6914363","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914363","url":null,"abstract":"3D video can bring to viewers an exhilarating experience, however, it contains more details compared to 2D video; thus, it demands higher bandwidth to transmit information to the viewers. In order to overcome this hurdle, our paper aims to propose a resolution that helps to detect and track video regions interested by viewers. These video regions may then be coded with higher bitrate than others to preserve the visual quality while the total video bitrate is reduced. Experimental results showed the effectiveness of our method and it can be applied to interactive video coders.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129356189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-02DOI: 10.1109/ELINFOCOM.2014.6914393
Theerayut Boonkird, C. Aswakul
Maritime wireless ad-hoc network is the future of maritime communication. When navigators sail to the sea, they usually go together as a convoy to avoid the problem of natural causes and human factors such as occasionally severe weather conditions and piracy. In essence, the navigators need to communicate with each other in their convoy. To evaluate the system functionality, network simulators are commonly chosen method. However, simulations contain assumptions that are not necessarily justified. In this paper, we show our actual measurement results from the NS3-emulation mode of the point-to-point communication based on the real antenna settings before the future tests in maritime scenarios.
{"title":"Implementation and functionality evaluation of maritime point-to-point communication based on NS-3","authors":"Theerayut Boonkird, C. Aswakul","doi":"10.1109/ELINFOCOM.2014.6914393","DOIUrl":"https://doi.org/10.1109/ELINFOCOM.2014.6914393","url":null,"abstract":"Maritime wireless ad-hoc network is the future of maritime communication. When navigators sail to the sea, they usually go together as a convoy to avoid the problem of natural causes and human factors such as occasionally severe weather conditions and piracy. In essence, the navigators need to communicate with each other in their convoy. To evaluate the system functionality, network simulators are commonly chosen method. However, simulations contain assumptions that are not necessarily justified. In this paper, we show our actual measurement results from the NS3-emulation mode of the point-to-point communication based on the real antenna settings before the future tests in maritime scenarios.","PeriodicalId":360207,"journal":{"name":"2014 International Conference on Electronics, Information and Communications (ICEIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}