首页 > 最新文献

2023 International Conference on Electronics, Information, and Communication (ICEIC)最新文献

英文 中文
Multi-view stereo with recurrent neural networks for spatio-temporal consistent depth maps 基于递归神经网络的时空一致深度图多视点立体
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049937
Hosung Son, Suk-ju Kang
Depth estimation methods based on deep learning have been studied to improve depth estimation accuracy. However, obtaining inter-frame consistency in depth maps in video depth estimation remains a challenge. Therefore, we proposed an application methodology for spatio-temporal consistency enhancement in video depth estimation based on convolutional neural networks (CNNs) and recurrent neural networks (RNNs). In other words, the convolutional long-short term memory (ConvLSTM) module was added to the decoder of depth estimation network to enable the use of the information from the previous frames. Additionally, the one-stage learning process was implemented to ensure ease of training. In conclusion, we experimentally show that the proposed method can achieve not only improved accuracy also consistency between depth map frames.
为了提高深度估计的精度,研究了基于深度学习的深度估计方法。然而,在视频深度估计中,如何获得深度图的帧间一致性仍然是一个难题。因此,我们提出了一种基于卷积神经网络(cnn)和递归神经网络(rnn)的视频深度估计时空一致性增强应用方法。换句话说,在深度估计网络的解码器中加入卷积长短期记忆(ConvLSTM)模块,使前一帧的信息能够被使用。此外,还实施了一阶段学习过程,以确保培训的便利性。实验结果表明,该方法不仅提高了深度图的精度,而且提高了深度图帧间的一致性。
{"title":"Multi-view stereo with recurrent neural networks for spatio-temporal consistent depth maps","authors":"Hosung Son, Suk-ju Kang","doi":"10.1109/ICEIC57457.2023.10049937","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049937","url":null,"abstract":"Depth estimation methods based on deep learning have been studied to improve depth estimation accuracy. However, obtaining inter-frame consistency in depth maps in video depth estimation remains a challenge. Therefore, we proposed an application methodology for spatio-temporal consistency enhancement in video depth estimation based on convolutional neural networks (CNNs) and recurrent neural networks (RNNs). In other words, the convolutional long-short term memory (ConvLSTM) module was added to the decoder of depth estimation network to enable the use of the information from the previous frames. Additionally, the one-stage learning process was implemented to ensure ease of training. In conclusion, we experimentally show that the proposed method can achieve not only improved accuracy also consistency between depth map frames.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified framework based on Large-scale Momentum Contrastive learning for Text-Video Retrieval 基于大规模动量对比学习的文本视频检索统一框架
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049967
Eung-Ku Kim, Nahyun Lee, Yoon-Sik Cho
Large-scale vision-language representation learning has shown dramatic advances in image-text retrieval studies. On top of that, it is clear that the CLIP (Contrastive Language-Image Pre-training) [1] has contributed to this field in that it succeeded pre-training on tremendous web multimedia data with leveraging contrastive loss, one of the most competitive loss for multimodal learning. CLIP4CLIP [2] utilized the pre-trained CLIP weight to appeal its performance of learning video representations with textual supervision with additional post-pretraining on Howto100M [3]. However, there is still room for elevation in CLIP4Clip from perspective of contrastive learning - large enough instances of negative samples help to learn better representations, as the batch size in each training batch getting larger, the more chance of the model to be allowed to contrast more semantic representations. In the same queue of this point of view, we propose CwMTVR combining Momentum Contrast (MoCo) [4], cross-modal momentum contrastive learning framework into CLIP4Clip. Experimental results prove that the CwMTVR model achieve competitive results in text-video retrieval on MSVD dataset.
大规模视觉语言表征学习在图像-文本检索研究中显示出巨大的进步。除此之外,很明显,CLIP(对比语言图像预训练)[1]对这一领域做出了贡献,因为它成功地利用了对比损失对大量网络多媒体数据进行了预训练,对比损失是多模态学习中最具竞争力的损失之一。CLIP4CLIP[2]利用预训练的CLIP权值,在Howto100M上通过额外的后预训练来提高其在文本监督下学习视频表示的性能[3]。然而,从对比学习的角度来看,CLIP4Clip仍然有提升的空间——足够大的负样本实例有助于学习更好的表示,随着每个训练批的批大小越来越大,模型被允许对比更多语义表示的机会就越大。在这一观点的同一队列中,我们提出了将动量对比(MoCo)[4]、跨模态动量对比学习框架结合到CLIP4Clip中的CwMTVR。实验结果表明,CwMTVR模型在MSVD数据集上取得了较好的文本视频检索效果。
{"title":"A Unified framework based on Large-scale Momentum Contrastive learning for Text-Video Retrieval","authors":"Eung-Ku Kim, Nahyun Lee, Yoon-Sik Cho","doi":"10.1109/ICEIC57457.2023.10049967","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049967","url":null,"abstract":"Large-scale vision-language representation learning has shown dramatic advances in image-text retrieval studies. On top of that, it is clear that the CLIP (Contrastive Language-Image Pre-training) [1] has contributed to this field in that it succeeded pre-training on tremendous web multimedia data with leveraging contrastive loss, one of the most competitive loss for multimodal learning. CLIP4CLIP [2] utilized the pre-trained CLIP weight to appeal its performance of learning video representations with textual supervision with additional post-pretraining on Howto100M [3]. However, there is still room for elevation in CLIP4Clip from perspective of contrastive learning - large enough instances of negative samples help to learn better representations, as the batch size in each training batch getting larger, the more chance of the model to be allowed to contrast more semantic representations. In the same queue of this point of view, we propose CwMTVR combining Momentum Contrast (MoCo) [4], cross-modal momentum contrastive learning framework into CLIP4Clip. Experimental results prove that the CwMTVR model achieve competitive results in text-video retrieval on MSVD dataset.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One-Shot Face Reenactment with 2D Facial Landmark Conditional Normalizing Flow 基于二维面部地标条件归一化流的一次性人脸再现
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049848
Dajin Han, Tae Hyun Kim
Normalizing Flow (NF) has gained growing popularity in various image generation tasks. In this work, we develop a new method that enables the NF to control face generation, which has not been studied yet. To do so, we introduce several loss functions to facilitate stable training and inference while controlling face generation given a facial landmark. In our experiments, we evaluate the performance of the proposed method and show the capability of the NF in controlling the face generation task.
归一化流(NF)在各种图像生成任务中越来越受欢迎。在这项工作中,我们开发了一种新的方法,使NF能够控制人脸生成,这是目前尚未研究的。为此,我们引入了几个损失函数,以促进稳定的训练和推理,同时控制给定面部地标的面部生成。在我们的实验中,我们评估了该方法的性能,并展示了NF在控制人脸生成任务中的能力。
{"title":"One-Shot Face Reenactment with 2D Facial Landmark Conditional Normalizing Flow","authors":"Dajin Han, Tae Hyun Kim","doi":"10.1109/ICEIC57457.2023.10049848","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049848","url":null,"abstract":"Normalizing Flow (NF) has gained growing popularity in various image generation tasks. In this work, we develop a new method that enables the NF to control face generation, which has not been studied yet. To do so, we introduce several loss functions to facilitate stable training and inference while controlling face generation given a facial landmark. In our experiments, we evaluate the performance of the proposed method and show the capability of the NF in controlling the face generation task.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 56-to-110 dB Gain Programmable Gain Amplifier with Second-Order Band Pass Filter for Ultrasonic Sensor Systems 一种56 ~ 110 dB增益可编程增益放大器,带二阶带通滤波器,用于超声波传感器系统
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049884
Junho Kang, Soungchul Park, Suhwan Kim, Jooyeol Rhee
In this paper, we propose a programmable gain amplifier (PGA) for an ultrasonic sensor system that removes DC offset and out-of-band noise through band-pass filtering in automotive applications. The proposed PGA consists of a low-noise amplifier (LNA), a variable gain amplifier (VGA), an RC low-pass filter (LPF), and a voltage buffer. The structure of LNA and VGA is an active band-pass filter (BPF) constructed using an operational transconductance amplifier (OTA) and passive elements. The PGA’s voltage gain and cut-off frequency can be adjusted by controlling the resistor connected to the common-mode voltage, the feedback capacitor, and the OTA compensation capacitor. An AC coupling capacitor is placed at the input stage to eliminate the DC offset and low-frequency noise of the PGA input signal. In addition, by arranging the feedback resistor and the feedback capacitor, the band-pass filtering function is implemented to block out noise at frequencies higher than the signal band. The PGA can adjust the voltage gain with a 6-dB step from 56 dB to 110 dB in the ultrasonic signal band from 30 kHz to 70 kHz. The design is designed in a 0.18-µm CMOS process. The post-layout simulation shows that it consumes a current of 9.7 mA with a 5 V supply voltage.
在本文中,我们提出了一种可编程增益放大器(PGA),用于超声波传感器系统,通过带通滤波去除汽车应用中的直流偏移和带外噪声。所提出的PGA由低噪声放大器(LNA)、可变增益放大器(VGA)、RC低通滤波器(LPF)和电压缓冲器组成。LNA和VGA的结构是一个有源带通滤波器(BPF),由一个运算跨导放大器(OTA)和无源元件构成。通过控制连接到共模电压的电阻、反馈电容和OTA补偿电容,可以调节PGA的电压增益和截止频率。在输入级放置交流耦合电容以消除PGA输入信号的直流偏置和低频噪声。此外,通过布置反馈电阻和反馈电容,实现带通滤波功能,以阻断高于信号频带的噪声。在30 kHz到70 kHz的超声波信号频段内,PGA可以以6 dB的步进从56 dB调节到110 dB的电压增益。该设计采用0.18µm CMOS工艺。布局后仿真结果表明,在5v电源电压下,该电路的功耗为9.7 mA。
{"title":"A 56-to-110 dB Gain Programmable Gain Amplifier with Second-Order Band Pass Filter for Ultrasonic Sensor Systems","authors":"Junho Kang, Soungchul Park, Suhwan Kim, Jooyeol Rhee","doi":"10.1109/ICEIC57457.2023.10049884","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049884","url":null,"abstract":"In this paper, we propose a programmable gain amplifier (PGA) for an ultrasonic sensor system that removes DC offset and out-of-band noise through band-pass filtering in automotive applications. The proposed PGA consists of a low-noise amplifier (LNA), a variable gain amplifier (VGA), an RC low-pass filter (LPF), and a voltage buffer. The structure of LNA and VGA is an active band-pass filter (BPF) constructed using an operational transconductance amplifier (OTA) and passive elements. The PGA’s voltage gain and cut-off frequency can be adjusted by controlling the resistor connected to the common-mode voltage, the feedback capacitor, and the OTA compensation capacitor. An AC coupling capacitor is placed at the input stage to eliminate the DC offset and low-frequency noise of the PGA input signal. In addition, by arranging the feedback resistor and the feedback capacitor, the band-pass filtering function is implemented to block out noise at frequencies higher than the signal band. The PGA can adjust the voltage gain with a 6-dB step from 56 dB to 110 dB in the ultrasonic signal band from 30 kHz to 70 kHz. The design is designed in a 0.18-µm CMOS process. The post-layout simulation shows that it consumes a current of 9.7 mA with a 5 V supply voltage.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert 基于触发器的用户警报访问电子邮件来源的网络钓鱼url的阻止机制
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049906
Yong Jin, M. Tomoishi, N. Yamai
Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical cyber threats for a long time. The security facilities in organization networks are suffering from monitoring and analyzing all traffic besides emails which consumes much computing resource. In this paper, we propose a trigger-based blocking mechanism for accessing the email-derived phishing URLs with user alert to protect the end users from phishing attacks. The proposed system practically uses the Domain Name System (DNS) and the Response Policy Zone (RPZ) feature to direct the triggered HTTP(S) access for the email-derived phishing URLs to a particular proxy. Then the HTTP(S) communication can be detected and blocked based on the users’ decisions by alerting them. A prototype for the proposed mechanism has been implemented and the preliminary feature evaluations in a local experimental network have been conducted. The evaluation results confirmed that all the HTTP(S) access for the email-derived phishing URLs was successfully directed to the pre-constructed particular HTTP(S) proxy, then an alert page was showed up to the end users, and the access was passed through or blocked based on the end users’ decisions.
电子邮件是重要的、不可缺少的互联网服务之一,但与此同时,电子邮件衍生的网络钓鱼url的传播长期以来一直是重要的网络威胁之一。组织网络中的安全设施正面临着对除电子邮件外的所有流量进行监控和分析的问题,这消耗了大量的计算资源。在本文中,我们提出了一种基于触发的阻止机制,用于用户警报访问电子邮件衍生的网络钓鱼url,以保护最终用户免受网络钓鱼攻击。建议的系统实际上使用域名系统(DNS)和响应策略区域(RPZ)功能,将触发的针对电子邮件派生的网络钓鱼url的HTTP(S)访问定向到特定的代理。然后,可以根据用户的决定,通过提醒用户来检测和阻止HTTP(S)通信。已经实现了该机制的原型,并在局部实验网络中进行了初步的特征评估。评估结果证实,所有针对电子邮件派生的网络钓鱼url的HTTP(S)访问都成功定向到预构建的特定HTTP(S)代理,然后向最终用户显示一个警告页面,并根据最终用户的决定通过或阻止访问。
{"title":"Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert","authors":"Yong Jin, M. Tomoishi, N. Yamai","doi":"10.1109/ICEIC57457.2023.10049906","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049906","url":null,"abstract":"Email is one of the important and indispensable Internet services, but in the meanwhile, the spread of emailderived phishing URLs has been one of the critical cyber threats for a long time. The security facilities in organization networks are suffering from monitoring and analyzing all traffic besides emails which consumes much computing resource. In this paper, we propose a trigger-based blocking mechanism for accessing the email-derived phishing URLs with user alert to protect the end users from phishing attacks. The proposed system practically uses the Domain Name System (DNS) and the Response Policy Zone (RPZ) feature to direct the triggered HTTP(S) access for the email-derived phishing URLs to a particular proxy. Then the HTTP(S) communication can be detected and blocked based on the users’ decisions by alerting them. A prototype for the proposed mechanism has been implemented and the preliminary feature evaluations in a local experimental network have been conducted. The evaluation results confirmed that all the HTTP(S) access for the email-derived phishing URLs was successfully directed to the pre-constructed particular HTTP(S) proxy, then an alert page was showed up to the end users, and the access was passed through or blocked based on the end users’ decisions.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127407729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Collection Framework Using a Lightweight Blockchain 使用轻量级区块链的数据收集框架
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049886
Khikmatullo Tulkinbekov, Deok-Hwan Kim
Blockchain protocol has emerged in modern technologies in recent years. Significantly, the data collection frameworks are one of the most demanding fields of blockchain adaptation. However, the traditional approach relies on heavy computations, which require high-computing servers that cannot be affordable by all providers. This paper proposes a reliable and secure data collection technique, BSave, that employs a lightweight blockchain suitable for low-computing devices. BSave stores the data in a key-value database and enables two-way encrypted security on both keys and values. Compared to traditional approaches, the BSave proved its effectiveness in data-intensive environments.
区块链协议是近年来在现代技术中出现的。值得注意的是,数据收集框架是区块链适应最苛刻的领域之一。然而,传统的方法依赖于大量的计算,这需要高计算能力的服务器,而不是所有提供商都负担得起。本文提出了一种可靠且安全的数据收集技术BSave,该技术采用了适合低计算设备的轻量级区块链。BSave将数据存储在键-值数据库中,并对键和值进行双向加密。与传统方法相比,BSave在数据密集型环境中证明了其有效性。
{"title":"Data Collection Framework Using a Lightweight Blockchain","authors":"Khikmatullo Tulkinbekov, Deok-Hwan Kim","doi":"10.1109/ICEIC57457.2023.10049886","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049886","url":null,"abstract":"Blockchain protocol has emerged in modern technologies in recent years. Significantly, the data collection frameworks are one of the most demanding fields of blockchain adaptation. However, the traditional approach relies on heavy computations, which require high-computing servers that cannot be affordable by all providers. This paper proposes a reliable and secure data collection technique, BSave, that employs a lightweight blockchain suitable for low-computing devices. BSave stores the data in a key-value database and enables two-way encrypted security on both keys and values. Compared to traditional approaches, the BSave proved its effectiveness in data-intensive environments.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129114558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acquisition of High-Quality Image by Using Maximum Correntropy Criterion Kalman Filter 基于最大相关熵准则卡尔曼滤波的高质量图像采集
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049878
Hoon-Seok Jang
Reconstructing a 3D shape using one or several images is one of the important factors in implementing a digital twin in the field of smart farm. Shape from Focus (SFF) is a passive method that reconstructs a 3D shape using 2D images having different focus levels. When 2D images are acquired at each step along the optical axis, mechanical vibrations occur. SFF techniques are vulnerable to jitter noise that changes the focus values of 2D images. In this manuscript, a new filtering technique that provides high accuracy and low computational cost for 3D shape recovery is proposed. First, jitter noise is modeled as a Lévy distribution. This assumption makes it possible to show the effectiveness of the proposed filtering technique in the presence of non-Gaussian noise. Second, the focus curves are modeled with a Gaussian function to compare the performance of the proposed filtering technique and the existing filtering techniques. Finally, the maximum correntropy criterion Kalman filter is designed and applied to the modeled focus curves. The experimental results demonstrate the effectiveness of proposed method.
利用一幅或多幅图像重建三维形状是实现智能农场领域数字孪生的重要因素之一。SFF (Shape from Focus)是一种利用不同聚焦水平的二维图像重建三维形状的被动方法。当沿着光轴的每一步获得二维图像时,就会发生机械振动。SFF技术容易受到改变二维图像焦点值的抖动噪声的影响。本文提出了一种高精度、低计算成本的三维形状恢复滤波技术。首先,将抖动噪声建模为lsamvy分布。这个假设使得在存在非高斯噪声的情况下显示所提出的滤波技术的有效性成为可能。其次,用高斯函数对焦点曲线进行建模,比较所提滤波技术与现有滤波技术的性能。最后,设计了最大熵准则卡尔曼滤波器,并将其应用于建模的聚焦曲线。实验结果证明了该方法的有效性。
{"title":"Acquisition of High-Quality Image by Using Maximum Correntropy Criterion Kalman Filter","authors":"Hoon-Seok Jang","doi":"10.1109/ICEIC57457.2023.10049878","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049878","url":null,"abstract":"Reconstructing a 3D shape using one or several images is one of the important factors in implementing a digital twin in the field of smart farm. Shape from Focus (SFF) is a passive method that reconstructs a 3D shape using 2D images having different focus levels. When 2D images are acquired at each step along the optical axis, mechanical vibrations occur. SFF techniques are vulnerable to jitter noise that changes the focus values of 2D images. In this manuscript, a new filtering technique that provides high accuracy and low computational cost for 3D shape recovery is proposed. First, jitter noise is modeled as a Lévy distribution. This assumption makes it possible to show the effectiveness of the proposed filtering technique in the presence of non-Gaussian noise. Second, the focus curves are modeled with a Gaussian function to compare the performance of the proposed filtering technique and the existing filtering techniques. Finally, the maximum correntropy criterion Kalman filter is designed and applied to the modeled focus curves. The experimental results demonstrate the effectiveness of proposed method.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Based Performance Analysis of Narrowband Internet of Things (NB-IoT) for Particulate Matter Monitoring System 基于时间的窄带物联网(NB-IoT)颗粒物监测系统性能分析
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049930
Tanakorn Inthasuth, Poonpong Uarchoojitt, W. Boonsong, Natapon Kaewthong
One quality of a data communication system is supposed to consider the low latency delay time between a data sender and a receiver. Communication delays sometimes occur in a Narrowband Internet of things network (NB-IoT) between the end device (ED) and the cloud platform. The communication problem may be caused by packet loss or congestion in the system. Therefore, this paper measures transmission time between the ED and the cloud platform. The system was designed for the particulate matter 2.5 (PM2.5) monitoring system via the NB-IoT network. The system consists of the NB-IoT-based PM2.5 detector and real-time monitoring by the cloud platform. In the experiment, the test was conducted to document the data collection for 1 hour. The results showed that in the typical case, the transmission time between ED and cloud was an average of 2.01 seconds. However, in case of connection problems, the ED will retransmit until it succeeds, taking a maximum of 28.76 seconds Therefore, when configuring the period, it is necessary to consider transmission to minimize data loss, which is a limitation of communication. Namely, those problems will be solved and improved in future work to get higher performance with a low latency delay time of each round-trip time (RTT) of data communication.
数据通信系统的一个特点应该是考虑数据发送方和接收方之间的低延迟时间。窄带物联网(NB-IoT)中,终端设备(ED)与云平台之间存在通信延迟问题。可能是系统丢包或拥塞导致通信问题。因此,本文测量了ED与云平台之间的传输时间。该系统是针对通过NB-IoT网络的PM2.5监测系统而设计的。该系统由基于nb - iot的PM2.5检测仪和云平台实时监测组成。在实验中,进行测试,记录1小时的数据收集。结果表明,在典型情况下,ED与云之间的传输时间平均为2.01秒。但是当连接出现问题时,ED会重新传输,直到连接成功为止,最长需要28.76秒。因此,在配置周期时,需要考虑传输,尽量减少数据丢失,这是对通信的一种限制。也就是说,这些问题将在未来的工作中得到解决和改进,以获得更高的性能和低时延的数据通信的每次往返时间(RTT)。
{"title":"Time-Based Performance Analysis of Narrowband Internet of Things (NB-IoT) for Particulate Matter Monitoring System","authors":"Tanakorn Inthasuth, Poonpong Uarchoojitt, W. Boonsong, Natapon Kaewthong","doi":"10.1109/ICEIC57457.2023.10049930","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049930","url":null,"abstract":"One quality of a data communication system is supposed to consider the low latency delay time between a data sender and a receiver. Communication delays sometimes occur in a Narrowband Internet of things network (NB-IoT) between the end device (ED) and the cloud platform. The communication problem may be caused by packet loss or congestion in the system. Therefore, this paper measures transmission time between the ED and the cloud platform. The system was designed for the particulate matter 2.5 (PM2.5) monitoring system via the NB-IoT network. The system consists of the NB-IoT-based PM2.5 detector and real-time monitoring by the cloud platform. In the experiment, the test was conducted to document the data collection for 1 hour. The results showed that in the typical case, the transmission time between ED and cloud was an average of 2.01 seconds. However, in case of connection problems, the ED will retransmit until it succeeds, taking a maximum of 28.76 seconds Therefore, when configuring the period, it is necessary to consider transmission to minimize data loss, which is a limitation of communication. Namely, those problems will be solved and improved in future work to get higher performance with a low latency delay time of each round-trip time (RTT) of data communication.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130503296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardware-Software Co-Design of AES-CCM for Bluetooth LE Security 蓝牙LE安全AES-CCM的软硬件协同设计
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049857
Yujin Jeon, Eun-Gyeong Ham, Jaeyun Lim, Ji-Hoon Kim
AES-CCM (Advanced Encryption Standard-Counter with CBC-MAC) is an encryption and decryption method that guarantees the integrity and authenticity of data, commonly used for wireless security systems. The AES Core performs the central functions for encryption and decryption of the AES-CCM, so many studies are being conducted to implement it efficiently. In this paper, to investigate the impact of the hardware-software partitioning of the AES-CCM implementation for Bluetooth LE (Low Energy), we compare the results between the software-only implementation and hardware-software co-design approach where the AES encryption into the hardware and the rest into the software. As a result, a well-balanced co-design implementation of the AES-CCM shows a reduced latency of up to 77.4% compared to the software-only implementation for the Bluetooth LE system.
AES-CCM(带CBC-MAC的高级加密标准计数器)是一种保证数据完整性和真实性的加密和解密方法,通常用于无线安全系统。AES核心是AES- ccm加密和解密的核心功能,为了有效地实现AES核心,人们进行了大量的研究。在本文中,为了研究AES- ccm实现对蓝牙LE(低功耗)的硬件-软件分区的影响,我们比较了纯软件实现和硬件-软件协同设计方法之间的结果,其中AES加密进入硬件,其余部分进入软件。因此,与蓝牙LE系统的纯软件实现相比,一个平衡良好的AES-CCM协同设计实现可以减少高达77.4%的延迟。
{"title":"Hardware-Software Co-Design of AES-CCM for Bluetooth LE Security","authors":"Yujin Jeon, Eun-Gyeong Ham, Jaeyun Lim, Ji-Hoon Kim","doi":"10.1109/ICEIC57457.2023.10049857","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049857","url":null,"abstract":"AES-CCM (Advanced Encryption Standard-Counter with CBC-MAC) is an encryption and decryption method that guarantees the integrity and authenticity of data, commonly used for wireless security systems. The AES Core performs the central functions for encryption and decryption of the AES-CCM, so many studies are being conducted to implement it efficiently. In this paper, to investigate the impact of the hardware-software partitioning of the AES-CCM implementation for Bluetooth LE (Low Energy), we compare the results between the software-only implementation and hardware-software co-design approach where the AES encryption into the hardware and the rest into the software. As a result, a well-balanced co-design implementation of the AES-CCM shows a reduced latency of up to 77.4% compared to the software-only implementation for the Bluetooth LE system.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Few-shot Learning for Medical Image Segmentation 医学图像分割中少镜头学习的研究进展
Pub Date : 2023-02-05 DOI: 10.1109/ICEIC57457.2023.10049899
Yeong-Jun Kim, Donggoo Kang, Yeongheon Mok, Sunkyu Kwon, J. Paik
Deep-learning based approach has solved various medical imaging problems successfully. Since the lack of training data issues caused by patient privacy, the few-shot learning method has been studied widely. However, this issue still afflicts model performance even in few-shot learning methods. To solve this issue, it is important to quickly optimize the initial parameter values using a small amount of data. In addition, to utilize small data effectively, it is important to design the objective function for segmentation suitable for GT (Ground Truth) with few-shots. In this paper, we experiment with various algorithms using the MAML (Model Agnostic Meta-Learning) method. And we propose an optimal few-shot semantic segmentation network. The proposed method uses a gradient descent algorithm and optimizer parameter decomposition method to ensure fast convergence with fewer data. Experimental results show high performance and fast convergence using fewer datasets than conventional methods.
基于深度学习的方法已经成功地解决了各种医学成像问题。由于缺乏训练数据导致的患者隐私问题,少针学习方法得到了广泛的研究。然而,即使在少量的学习方法中,这个问题仍然困扰着模型的性能。为了解决这个问题,使用少量数据快速优化初始参数值是很重要的。此外,为了有效地利用小数据,设计适合少量拍摄的GT (Ground Truth)分割的目标函数是很重要的。在本文中,我们使用MAML(模型不可知论元学习)方法实验了各种算法。提出了一种最优的少镜头语义分割网络。该方法采用梯度下降算法和优化器参数分解方法,以保证在较少的数据下快速收敛。实验结果表明,与传统方法相比,使用更少的数据集具有更高的性能和更快的收敛速度。
{"title":"A Review on Few-shot Learning for Medical Image Segmentation","authors":"Yeong-Jun Kim, Donggoo Kang, Yeongheon Mok, Sunkyu Kwon, J. Paik","doi":"10.1109/ICEIC57457.2023.10049899","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049899","url":null,"abstract":"Deep-learning based approach has solved various medical imaging problems successfully. Since the lack of training data issues caused by patient privacy, the few-shot learning method has been studied widely. However, this issue still afflicts model performance even in few-shot learning methods. To solve this issue, it is important to quickly optimize the initial parameter values using a small amount of data. In addition, to utilize small data effectively, it is important to design the objective function for segmentation suitable for GT (Ground Truth) with few-shots. In this paper, we experiment with various algorithms using the MAML (Model Agnostic Meta-Learning) method. And we propose an optimal few-shot semantic segmentation network. The proposed method uses a gradient descent algorithm and optimizer parameter decomposition method to ensure fast convergence with fewer data. Experimental results show high performance and fast convergence using fewer datasets than conventional methods.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 International Conference on Electronics, Information, and Communication (ICEIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1