Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398497
H. Horikoshi, Yoshio Nishioka
This paper reviews the new slim NFC antenna integration under the bezel for the metal-covered tablet and all-in-one desktop PC. The conventional NFC antenna of the tablet was embedded under the rear cover because the material of the rear cover of the tablet was ABS plastic which allowed NFC magnetic field to radiate through the rear cover. However, the materials of the rear cover of some tablets and all-in-one desktop PCs were metals such as magnesium or aluminum which did not allow NFC magnetic field to radiate through the rear cover. In order to resolve this issue, the slim NFC antenna was developed and integrated under the bezel of the front screen.
{"title":"Slim NFC antenna integration into metal-covered tablet and all-in-one desktop PC","authors":"H. Horikoshi, Yoshio Nishioka","doi":"10.1109/GCCE.2015.7398497","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398497","url":null,"abstract":"This paper reviews the new slim NFC antenna integration under the bezel for the metal-covered tablet and all-in-one desktop PC. The conventional NFC antenna of the tablet was embedded under the rear cover because the material of the rear cover of the tablet was ABS plastic which allowed NFC magnetic field to radiate through the rear cover. However, the materials of the rear cover of some tablets and all-in-one desktop PCs were metals such as magnesium or aluminum which did not allow NFC magnetic field to radiate through the rear cover. In order to resolve this issue, the slim NFC antenna was developed and integrated under the bezel of the front screen.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new multiband planar antenna for wireless LAN is proposed and examined, compared with the conventional antenna, FML2.4W. From the results, the maximum values of the absolute gain for the proposed antenna are equal to or higher than those for FML2.4W in two frequency bands, from 2.4GHz to 2.5GHz, from 5.2GHz to 5.8GHz.
{"title":"Multiband planar antenna for wireless LAN","authors":"Yoshiki Yui, T. Hiraguri, Kenshiro Kamijo, Koichi Karasawa, Kazuki Ashida, Hidetoshi Nakayama, Toshiro Nakashima, Takahisa Karakama, Tutomu Kaneko","doi":"10.1109/GCCE.2015.7398514","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398514","url":null,"abstract":"A new multiband planar antenna for wireless LAN is proposed and examined, compared with the conventional antenna, FML2.4W. From the results, the maximum values of the absolute gain for the proposed antenna are equal to or higher than those for FML2.4W in two frequency bands, from 2.4GHz to 2.5GHz, from 5.2GHz to 5.8GHz.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126038689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398530
Tsuyoshi Takahashi, Bo Wu, Y. Kageyama, M. Nishida, M. Ishii
Chronological change of temperature on cheeks includes important information to detect an emotion occurrence. To measure the specific region of face skin temperature accurately, we have developed a face detection method from sequential thermal image acquired in 30fps. In this paper, we investigated minimum quantity of learning data that is sufficient to create a high accurate face area detector. The experimental results for five persons showed that high detection rate was obtained when using over 350 images.
{"title":"A study of learning data size for automatic face area detection in sequential thermal images","authors":"Tsuyoshi Takahashi, Bo Wu, Y. Kageyama, M. Nishida, M. Ishii","doi":"10.1109/GCCE.2015.7398530","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398530","url":null,"abstract":"Chronological change of temperature on cheeks includes important information to detect an emotion occurrence. To measure the specific region of face skin temperature accurately, we have developed a face detection method from sequential thermal image acquired in 30fps. In this paper, we investigated minimum quantity of learning data that is sufficient to create a high accurate face area detector. The experimental results for five persons showed that high detection rate was obtained when using over 350 images.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124936950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398734
Kyosuke Kageyama, Kohei Sugiyama, T. Kumaki, T. Fujino
Various crimes can be committed by using camera-equipped mobile device. In particular, spy photo and digital shoplifting are increasing rapidly. No direct countermeasures have been taken against these crimes, so potential victims have to prevent these crimes themselves. To overcome these problems for realizing safe society, this research demonstrates a crime prevention technology called spy photo-prevention System (SPS) that uses an LED visible light beacon to prevent a camera function for taking spy photos. SPS generates several beacons by changing the brightness intensity of an LED illumination. After the camera equipped device receives this beacon, the proposed system forces the camera function to stop automatically. In this paper, we develop a prototype of SPS, which is consisted of transmitter and receiver. The transmitter is based on a commercial LED illumination and generates visible light beacon. The receiver is used in a smartphone camera and has programs to control the camera function for receiving the beacon. The SPS prototype system can realize to prevent from taking spy-photos and give visitors experience of crime prevention effect.
{"title":"Development of LED illumination-based spy photo-prevention system","authors":"Kyosuke Kageyama, Kohei Sugiyama, T. Kumaki, T. Fujino","doi":"10.1109/GCCE.2015.7398734","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398734","url":null,"abstract":"Various crimes can be committed by using camera-equipped mobile device. In particular, spy photo and digital shoplifting are increasing rapidly. No direct countermeasures have been taken against these crimes, so potential victims have to prevent these crimes themselves. To overcome these problems for realizing safe society, this research demonstrates a crime prevention technology called spy photo-prevention System (SPS) that uses an LED visible light beacon to prevent a camera function for taking spy photos. SPS generates several beacons by changing the brightness intensity of an LED illumination. After the camera equipped device receives this beacon, the proposed system forces the camera function to stop automatically. In this paper, we develop a prototype of SPS, which is consisted of transmitter and receiver. The transmitter is based on a commercial LED illumination and generates visible light beacon. The receiver is used in a smartphone camera and has programs to control the camera function for receiving the beacon. The SPS prototype system can realize to prevent from taking spy-photos and give visitors experience of crime prevention effect.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398645
Joji Yamada, K. Kondo
In this paper, we compared a number of frame synchronization methods for audio watermarks. M-sequence was embedded into the phase of the host signal for synchronization. We compared the detection accuracy of the Cross-power Spectrum Phase Analysis (CSPA) and the Smoothed Coherence Transform (SCT) method for additive noise. The CSPA showed higher detection rates by about 30% when 5-point smoothing was applied to the correlation. We plan to test other deterioration including analog channels using the CSPA.
{"title":"Comparison of synchronization methods for robust audio watermarks","authors":"Joji Yamada, K. Kondo","doi":"10.1109/GCCE.2015.7398645","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398645","url":null,"abstract":"In this paper, we compared a number of frame synchronization methods for audio watermarks. M-sequence was embedded into the phase of the host signal for synchronization. We compared the detection accuracy of the Cross-power Spectrum Phase Analysis (CSPA) and the Smoothed Coherence Transform (SCT) method for additive noise. The CSPA showed higher detection rates by about 30% when 5-point smoothing was applied to the correlation. We plan to test other deterioration including analog channels using the CSPA.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132682193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398542
Tana, N. Funabiki, N. Ishihara, W. Kao
To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to study the Java grammar and fundamental programming by filling blank elements that are composed of reserved words, identifiers, and control symbols in a high-quality code. During the last semester, we assigned 121 problems with 1,552 questions to 46 students taking our Java programming course. In this paper, we analyze correlations of problem solving results of students to their final programming results.
{"title":"Correlation analysis of fill-in-blank problem solutions to final programming results in Java programming course","authors":"Tana, N. Funabiki, N. Ishihara, W. Kao","doi":"10.1109/GCCE.2015.7398542","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398542","url":null,"abstract":"To assist Java programming educations, we have developed a Web-based Java Programming Learning Assistant System (JPLAS). JPLAS provides fill-in-blank problems to study the Java grammar and fundamental programming by filling blank elements that are composed of reserved words, identifiers, and control symbols in a high-quality code. During the last semester, we assigned 121 problems with 1,552 questions to 46 students taking our Java programming course. In this paper, we analyze correlations of problem solving results of students to their final programming results.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133440732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398739
S. Markon
We describe in some detail the technique of using a simplified model of a complex discrete dynamic system, in our case an elevator group control system, as a benchmark for control and optimization studies. The simplified system is constructed in a way that balances between two conflicting requirements: it retains the most important dynamical characteristics of the target system; but at the same time it allows exact solution by algorithmic methods. As a concrete example, we show the derivation of the "S-ring" model from a formal model of elevator group supervisory control, describe the solution process, and illustrate using the exact solution to benchmark some optimization methods. We also describe one variant, the "S-lane" model, and show its solution, as an example of extending the technique to related other problems.
{"title":"A solvable simplified model for elevator group control studies","authors":"S. Markon","doi":"10.1109/GCCE.2015.7398739","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398739","url":null,"abstract":"We describe in some detail the technique of using a simplified model of a complex discrete dynamic system, in our case an elevator group control system, as a benchmark for control and optimization studies. The simplified system is constructed in a way that balances between two conflicting requirements: it retains the most important dynamical characteristics of the target system; but at the same time it allows exact solution by algorithmic methods. As a concrete example, we show the derivation of the \"S-ring\" model from a formal model of elevator group supervisory control, describe the solution process, and illustrate using the exact solution to benchmark some optimization methods. We also describe one variant, the \"S-lane\" model, and show its solution, as an example of extending the technique to related other problems.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133629592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398541
Shinya Mochiduki, Hideaki Takahira, M. Yamada
We assumed that both viewing distance and position would be affected by the distribution of when a person viewed a high-definition image from a short distance. We measured subjects' gaze movements as they viewed an image from two viewing distances 0.75H (51cm; H is the display height), and 1.5H (102cm), as well as from three viewing positions (center, right and left). Results revealed that while there was little difference in the location of mean gazing point, it tended to gather around the display center at every viewing distance and viewing location. This tendency was indicated by the amount of head rotation, 0.75H. Although this was larger than 1.5H, when we analyzed head movement components against gaze movement components, the difference was small. It was suggested that eye movement alone resolved the enlargement of visual field caused by short-distance viewing.
{"title":"Analysis of head movement when viewing a wide-viewing-angle display","authors":"Shinya Mochiduki, Hideaki Takahira, M. Yamada","doi":"10.1109/GCCE.2015.7398541","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398541","url":null,"abstract":"We assumed that both viewing distance and position would be affected by the distribution of when a person viewed a high-definition image from a short distance. We measured subjects' gaze movements as they viewed an image from two viewing distances 0.75H (51cm; H is the display height), and 1.5H (102cm), as well as from three viewing positions (center, right and left). Results revealed that while there was little difference in the location of mean gazing point, it tended to gather around the display center at every viewing distance and viewing location. This tendency was indicated by the amount of head rotation, 0.75H. Although this was larger than 1.5H, when we analyzed head movement components against gaze movement components, the difference was small. It was suggested that eye movement alone resolved the enlargement of visual field caused by short-distance viewing.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398741
Soojin Park, Jaeseung Song
A recent trend in Internet of Things (IoT) is to connect billions of ordinary objects to the Internet and allows these objects to exchange data for smarter services. As smartphones have widely spread in the world and generate various data, it will represent a large portion of heterogeneous interconnected IoT devices. This trend influence users to perceive that the usability of the smartphone mobile application represents the usability of the general IoT service. This article introduces a novel IoT middleware framework to improve the usability of a mobile application, and thereby improve the usability of the IoT service provided through the mobile application. The core idea of our self-adaptive IoT middleware framework is to monitor and analyze application user's behavior, identify symptoms reducing application usability, and autonomously improve the application's interface for users without any intervention from the application developer. The effectiveness of the proposed framework is shown through case studies comparing several different mobile applications from a same business domain.
{"title":"Self-adaptive middleware framework for Internet of Things","authors":"Soojin Park, Jaeseung Song","doi":"10.1109/GCCE.2015.7398741","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398741","url":null,"abstract":"A recent trend in Internet of Things (IoT) is to connect billions of ordinary objects to the Internet and allows these objects to exchange data for smarter services. As smartphones have widely spread in the world and generate various data, it will represent a large portion of heterogeneous interconnected IoT devices. This trend influence users to perceive that the usability of the smartphone mobile application represents the usability of the general IoT service. This article introduces a novel IoT middleware framework to improve the usability of a mobile application, and thereby improve the usability of the IoT service provided through the mobile application. The core idea of our self-adaptive IoT middleware framework is to monitor and analyze application user's behavior, identify symptoms reducing application usability, and autonomously improve the application's interface for users without any intervention from the application developer. The effectiveness of the proposed framework is shown through case studies comparing several different mobile applications from a same business domain.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/GCCE.2015.7398641
Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato
Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level, and threat level.
{"title":"Dynamic risk evaluation model as a security field","authors":"Masahiko Shimazu, Atsushi Kanai, Shigeki Tanimoto, Hiroyuki Sato","doi":"10.1109/GCCE.2015.7398641","DOIUrl":"https://doi.org/10.1109/GCCE.2015.7398641","url":null,"abstract":"Generally, high security information management leads to high confidentiality. However, high confidentiality causes low availability. Therefore, we think availability can be increased by choosing the appropriate security level depending on the changing risk. Thus, this paper proposes a risk evaluation model in which risk is quantitatively evaluated using the value of information, protection level, and threat level.","PeriodicalId":363743,"journal":{"name":"2015 IEEE 4th Global Conference on Consumer Electronics (GCCE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133045914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}