Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614978
M. Richardson, Derek Jacoby, Y. Coady
As Augmented Reality (AR) and Virtual Reality (VR) applications become more mainstream, developers now have a number of design decisions that must be carefully considered before choosing a device for an interactive visualization with big data. Unfortunately, understanding the true affordances and limitations of each device, and how these affect the resultant potential to support visual analytics, is still more of a black art than a science. In this paper, we highlight key design decisions and technical challenges in the context of a case study to port an interactive geospatial visualization from an AR device, the Microsoft Hololens, to a mobile VR device, the Google Daydream. Our results show that careful leveraging of backend cloud services can allow for interactive visualizations of big data to scale well across devices.
{"title":"Retrofitting Realities: Affordances and Limitations in Porting an Interactive Geospatial Visualization from Augmented to Virtual Reality","authors":"M. Richardson, Derek Jacoby, Y. Coady","doi":"10.1109/IEMCON.2018.8614978","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614978","url":null,"abstract":"As Augmented Reality (AR) and Virtual Reality (VR) applications become more mainstream, developers now have a number of design decisions that must be carefully considered before choosing a device for an interactive visualization with big data. Unfortunately, understanding the true affordances and limitations of each device, and how these affect the resultant potential to support visual analytics, is still more of a black art than a science. In this paper, we highlight key design decisions and technical challenges in the context of a case study to port an interactive geospatial visualization from an AR device, the Microsoft Hololens, to a mobile VR device, the Google Daydream. Our results show that careful leveraging of backend cloud services can allow for interactive visualizations of big data to scale well across devices.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614771
Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah
Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.
{"title":"A Voice Controlled E-Commerce Web Application","authors":"Mandeep Singh Kandhari, F. Zulkernine, Haruna Isah","doi":"10.1109/IEMCON.2018.8614771","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614771","url":null,"abstract":"Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615049
Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer
Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.
{"title":"A Formal Optimization Model for 5G Mobile Network Slice Resource Allocation","authors":"Andrea Fendt, C. Mannweiler, L. Schmelz, B. Bauer","doi":"10.1109/IEMCON.2018.8615049","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615049","url":null,"abstract":"Network slicing is one of the key features of 5G mobile networks to cope with the diverging network requirements introduced by new use cases, like the IoT, autonomous driving and the Industry of the Future. Network slices are isolated, virtualized, end-to-end networks optimized for specific use cases. But still they share a common physical network infrastructure. Due to the dynamic life cycle of network slices there is a strong demand on efficient algorithms for mobile end-to-end network slice embedding. In this paper, a mathematical model for solving the offline Network Slice Embedding Problem formalized as a standardized Mixed Integer Linear Program is presented. A latency sensitive objective function guarantees the optimal network utilization as well as minimum latency in the network slice communication.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614929
Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy
This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.
{"title":"Smart Intelligent System for Women and Child Security","authors":"Sunil K Punjabi, Suvarna Chaure, Ujwala Ravale, D. Reddy","doi":"10.1109/IEMCON.2018.8614929","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614929","url":null,"abstract":"This paper surveys about the security system for women and children which allows immediate responses in any harassment in public places, societies etc. Women all over the world are facing unethical physical harassment and Children cannot be left unattended at a social event or outside the home. Our project solves both the problems. A portable device which will have a pressure switch. As soon as an assailant is about to attack the women/child or when they senses any insecurity from a stranger, he/she can then put pressure on the device by squeezing or compressing it. Instantly the pressure sensor senses this pressure and a conventional SMS, with the victim's location will be sent to their parents/guardians cell phone numbers stored in the device while purchasing it, followed by a call. If the call is unanswered for a prolonged time, a call will be redirected to the police and the same message will be sent. The main feature of our system is less response time will be required for helping the victim.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615092
J. A. D. Puerto-Flores, Ramon Parra-Michel, F. Peña-Campos, J. Cortez, E. Romero-Aguirre
Computational complexity and spectral efficiency are key components on the implementation of vehicular communication systems. However, in order to counteract the intercarrier interference (ICI) in orthogonal frequency division multiplexing (OFDM) systems, it's usual to resort receivers with high computational complexity or reduced spectral efficiency. This paper analyzes the inclusion of virtual carriers (V C) as a mean to reduce the ICI and the computational complexity required by the nonlinear ordered successive interference cancellation (OSIC). From the simulation results, it is demonstrated that using VC provides 90% reduction in the computational cost required for executing data detection, as well as a gain of 5 dB compared to conventional OFDM system with linear detection. In addition, the system is tested for different rates of channel coding obtaining results that show VC to be a convenient technique for reducing system complexity with low impact on the system throughput.
{"title":"Evaluation of OFDM Systems With Virtual Carriers Over V2V Channels","authors":"J. A. D. Puerto-Flores, Ramon Parra-Michel, F. Peña-Campos, J. Cortez, E. Romero-Aguirre","doi":"10.1109/IEMCON.2018.8615092","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615092","url":null,"abstract":"Computational complexity and spectral efficiency are key components on the implementation of vehicular communication systems. However, in order to counteract the intercarrier interference (ICI) in orthogonal frequency division multiplexing (OFDM) systems, it's usual to resort receivers with high computational complexity or reduced spectral efficiency. This paper analyzes the inclusion of virtual carriers (V C) as a mean to reduce the ICI and the computational complexity required by the nonlinear ordered successive interference cancellation (OSIC). From the simulation results, it is demonstrated that using VC provides 90% reduction in the computational cost required for executing data detection, as well as a gain of 5 dB compared to conventional OFDM system with linear detection. In addition, the system is tested for different rates of channel coding obtaining results that show VC to be a convenient technique for reducing system complexity with low impact on the system throughput.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614869
H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji
This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.
{"title":"Fast Prediction of Equivalent Model of Installed Patch Antenna Radiation Pattern","authors":"H. Monday, J. Li, Mordecai F. Raji, G. Nneji, Ifeanyi D. Dike, Richard I. Nneji","doi":"10.1109/IEMCON.2018.8614869","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614869","url":null,"abstract":"This paper proposes an efficient equivalent model of patch antenna for the fast prediction of its installed radiation pattern. More CPU time and memory cost are required for accurate prediction of installed radiation pattern of patch antenna on different platforms. However, a fast and efficient prediction can save CPU time and memory cost when constructing an equivalent model of patch antenna that can reproduce a similar radiation pattern to that of the patch antenna. A code is developed to determine the electric field of a magnetic dipole based on Green function derivation. The result of the radiation pattern for the far-field and near-field are computed and validated with the result using commercial software tool (FEKO). The magnetic dipole is used to construct the equivalent model of patch antenna based on the radiation mechanism to predict its installed radiation pattern. The numbers of design parameters needed to be optimized are reduced to only two parameters which are the spacing distance between the dipoles in the x- and y-directions. The height of the dipole is kept at a fixed value above the same ground plane as that of the patch antenna. This makes it more computational efficient by reducing the CPU time and memory cost. After the equivalent model is optimized with FEKO optimization tool, it is further installed on a platform to compute the installed radiation pattern. The simulation results show that the proposed equivalent model based on a magnetic dipole with only two design parameters can obtain a fast prediction of installed radiation pattern of patch antenna when mounted on a platform. The equivalent model does not require detailed geometry and material information of the patch antenna.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614791
Nikunj Parekh, Swathi Kurunji, Alan Beck
Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.
{"title":"Monitoring Resources of Machine Learning Engine In Microservices Architecture","authors":"Nikunj Parekh, Swathi Kurunji, Alan Beck","doi":"10.1109/IEMCON.2018.8614791","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614791","url":null,"abstract":"Microservices architecture facilitates building distributed scalable software products, usually deployed in a cloud environment. Monitoring microservices deployed in a Kubernetes orchestrated distributed advanced analytics machine learning engines is at the heart of many cloud resource management solutions. In addition, measuring resource utilization at more granular level such as per query or sub-query basis in an MPP Machine Learning Engine (MLE) is key to resource planning and is also the focus of our work. In this paper we propose two mechanisms to measure resource utilization in Teradata Machine Learning Engine (MLE). First mechanism is the Cluster Resource Monitoring (CRM). CRM is a high-level resource measuring mechanism for IT administrators and analytics users to visualize, plot, generates alerts and perform live and historical-analytics on overall cluster usage statistics. Second mechanism is the Query Resource Monitoring (QRM). QRM enables IT administrators and MLE users to measure compute resource utilization per individual query and its sub-queries. When query takes long time, QRM provides insights. This is useful to identify expensive phases within a query that tax certain resources more and skew the work distribution. We show the results of proposed mechanisms and highlight use-cases.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615085
Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim
In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)
{"title":"Vehicle Counting Quantitative Comparison Using Background Subtraction, Viola Jones and Deep Learning Methods","authors":"Benny Hardjono, H. Tjahyadi, M. G. Rhizma, A. E. Widjaja, Roberto Kondorura, Andrew M. Halim","doi":"10.1109/IEMCON.2018.8615085","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615085","url":null,"abstract":"In this paper, vehicle counting is investigated using various machine methods on four datasets. Vehicle counting is needed to complete the data required for short term predictions using highway traffic model, which is in turn, applicable for road design and usage planning. The goal of this research is to show that automatic car counting using machine methods, can be obtained from utilizing existing CCTV image data or from better cameras. Then by applying quantitative evaluation, F1 and precision scores are obtained, so that a few recommendations can be given. Through numerous simulations, F1 scores ranging from 0.32 to 0.75 have been successfully obtained for one low resolution dataset, using Background Subtraction and Viola Jones methods, on existing CCTV data. It has been found also that Viola Jones method can improve F1 score, by about 39% to 56%, over Back Subtraction method. Furthermore, the use of Deep Learning especially YOLO has provided good results, with F1 scores ranging from 0.94 to 1 and its precision ranges from 97.37% to 100% involving three datasets of higher resolution. (Abstract)","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The assisted technological device proposed in this paper is based on Internet of Things (IoT). Internet of things is anticipated to bridge the gap between all physical forms through a basic database in the future. Hence, using this advanced yet simple technology creates a platform, open to improvements in future. The basic functionality of the headset is for the visually impaired people who cannot perceive the upcoming obstacles. The headset not only detects the upcoming obstacle but also processes the distance between the source and the obstacle. The headset is capable in detecting approaching steps or any region of higher altitude and thereby warning the user. We also use new emerging technologies like Image Processing and Video Processing. We use Image Processing for identifying the type of obstacle and Video Processing for finding out the relative velocity. Initially, we have discussed about the working of the basic components of the headset and the process in which they work together. Finally, we have discussed about the prospects this research may contribute to society in the near future. We use different devices like the Raspberry Pi 3, ultrasonic sensors and earpiece. The device we have visualized is quite portable. Neither is it too heavy or too large in size. The model we have envisioned is far from perfect. There are still inputs and modifications which we need to do in the future, to make it completely functional. What we have presented in this paper is just a prototype, a rough sketch of the device we want to make, a device which we believe will make the people's lives a bit easier. We hope that in the future, our research forms the base for several other researches which target to help those in need.
{"title":"Assisted Technological Headset using Internet of Things","authors":"Debopama Ghosh, S. Bhattacharya, Arkaprabha Lodh, Poulami Mitra, Debosama Ghosh, Writam Mallik","doi":"10.1109/iemcon.2018.8614841","DOIUrl":"https://doi.org/10.1109/iemcon.2018.8614841","url":null,"abstract":"The assisted technological device proposed in this paper is based on Internet of Things (IoT). Internet of things is anticipated to bridge the gap between all physical forms through a basic database in the future. Hence, using this advanced yet simple technology creates a platform, open to improvements in future. The basic functionality of the headset is for the visually impaired people who cannot perceive the upcoming obstacles. The headset not only detects the upcoming obstacle but also processes the distance between the source and the obstacle. The headset is capable in detecting approaching steps or any region of higher altitude and thereby warning the user. We also use new emerging technologies like Image Processing and Video Processing. We use Image Processing for identifying the type of obstacle and Video Processing for finding out the relative velocity. Initially, we have discussed about the working of the basic components of the headset and the process in which they work together. Finally, we have discussed about the prospects this research may contribute to society in the near future. We use different devices like the Raspberry Pi 3, ultrasonic sensors and earpiece. The device we have visualized is quite portable. Neither is it too heavy or too large in size. The model we have envisioned is far from perfect. There are still inputs and modifications which we need to do in the future, to make it completely functional. What we have presented in this paper is just a prototype, a rough sketch of the device we want to make, a device which we believe will make the people's lives a bit easier. We hope that in the future, our research forms the base for several other researches which target to help those in need.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614964
Hamed Sadat-Mehrizi, Mina Sadat-Mehrizi, E. Zeinali
In this paper a wormhole, adaptive, and fault tolerance routing method for 2-dimensions mesh network-on-chips (NoCs) is presented. This routing algorithm is based on a very low cost fault tolerant routing technique for tolerating multiple broken channels in the on-chip networks. It is an adaptive, deadlock-free, distributed, and congestion-aware routing algorithm which only two virtual channels are engaged for its adaptability and fault tolerance. Load balancing is acquired by using two congestion flags amongst each two adjoining nodes which exhibit the congestion existence in a network's row or column. Besides, different flags in each node may be used to alert the broken channel occurrence in a row or column. Ultimately, the network on chip efficiency, fault-tolerance ability and hardware overhead are computed via suitable simulations. The experimental outcomes validate that the NoCs total throughput and reliability are considerably elevated alongside extremely slight latency overhead in networks with multiple broken links.
{"title":"An Algorithm for Tolerating Multiple Faulty Channels in 2D NoCs","authors":"Hamed Sadat-Mehrizi, Mina Sadat-Mehrizi, E. Zeinali","doi":"10.1109/IEMCON.2018.8614964","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614964","url":null,"abstract":"In this paper a wormhole, adaptive, and fault tolerance routing method for 2-dimensions mesh network-on-chips (NoCs) is presented. This routing algorithm is based on a very low cost fault tolerant routing technique for tolerating multiple broken channels in the on-chip networks. It is an adaptive, deadlock-free, distributed, and congestion-aware routing algorithm which only two virtual channels are engaged for its adaptability and fault tolerance. Load balancing is acquired by using two congestion flags amongst each two adjoining nodes which exhibit the congestion existence in a network's row or column. Besides, different flags in each node may be used to alert the broken channel occurrence in a row or column. Ultimately, the network on chip efficiency, fault-tolerance ability and hardware overhead are computed via suitable simulations. The experimental outcomes validate that the NoCs total throughput and reliability are considerably elevated alongside extremely slight latency overhead in networks with multiple broken links.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}