Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800478
Y. Ikezaki, Y. Nozaki, M. Yoshikawa
The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter PUF is reported to be attacked by forcing them to learn the delay model. Almost all of previous studies used SVM for the learning. This study proposes a new attack method using a deep learning technique. Experiments prove the validity of the proposed method.
{"title":"Deep learning attack for physical unclonable function","authors":"Y. Ikezaki, Y. Nozaki, M. Yoshikawa","doi":"10.1109/GCCE.2016.7800478","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800478","url":null,"abstract":"The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter PUF is reported to be attacked by forcing them to learn the delay model. Almost all of previous studies used SVM for the learning. This study proposes a new attack method using a deep learning technique. Experiments prove the validity of the proposed method.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114900817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800311
Xin-Yu Shih, H. Chou, Yue-Qu Liu
FFT is a crucial and necessary design entity lor any current communication applications, especially for OFDM systems. As compared with conventional design approach, which can support only one-radix processing kernel of single-path delay feedback (SDF) FFT, we propose a reconfigurable processing kernel design for multiple-radix types of SDF FFT. In implementation, this kernel hardware engine is reconfigurable to deal with different computing stages and radix-types, such as 3-stage radix-2, 2-stage radix-3, and 1-stage radix-5 SDF FFT systems. Under TSMC 90nm CMOS technology, the kernel design with input/output wordlength of 16 bits only occupies 0.3068 mm2, saving 33.99% of area with respect to the summation of 3 individual single modes. Also, it only provides 13% hardware overhead as compared to pure radix-5 only processing kernel.
{"title":"Reconfigurable VLSI design of processing kernel for multiple-radix single-path delay feedback FFT systems","authors":"Xin-Yu Shih, H. Chou, Yue-Qu Liu","doi":"10.1109/GCCE.2016.7800311","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800311","url":null,"abstract":"FFT is a crucial and necessary design entity lor any current communication applications, especially for OFDM systems. As compared with conventional design approach, which can support only one-radix processing kernel of single-path delay feedback (SDF) FFT, we propose a reconfigurable processing kernel design for multiple-radix types of SDF FFT. In implementation, this kernel hardware engine is reconfigurable to deal with different computing stages and radix-types, such as 3-stage radix-2, 2-stage radix-3, and 1-stage radix-5 SDF FFT systems. Under TSMC 90nm CMOS technology, the kernel design with input/output wordlength of 16 bits only occupies 0.3068 mm2, saving 33.99% of area with respect to the summation of 3 individual single modes. Also, it only provides 13% hardware overhead as compared to pure radix-5 only processing kernel.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131247286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800409
Kota Hayashi, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita
In recent years, wireless local area networks (WLANs) have attracted attention for use as communication infrastructure that is robust against the effects of a disaster. Telephone lines cannot be used because of congestion accompanying rapidly increased demand after a disaster. Because WLANs can be used in such cases, WLAN is effective for infrastructure during times of disaster. An important difficulty is dead spots, which occur from a breakdown of access points (APs) after a calamity in the event of a disaster. Inside of a dead spot, we cannot make contact with the exterior. Therefore, such spots are extremely dangerous. One solution is the establishment of a new Wireless Communication Path (WCP) from adjoining AP with a radio relay machine. For this study, we propose a disaster-robust system that establishes a WCP quickly without human power using a robot with agent technology.
{"title":"Robot utilization method using agent technology for establishment of wireless communication path in event of disaster","authors":"Kota Hayashi, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita","doi":"10.1109/GCCE.2016.7800409","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800409","url":null,"abstract":"In recent years, wireless local area networks (WLANs) have attracted attention for use as communication infrastructure that is robust against the effects of a disaster. Telephone lines cannot be used because of congestion accompanying rapidly increased demand after a disaster. Because WLANs can be used in such cases, WLAN is effective for infrastructure during times of disaster. An important difficulty is dead spots, which occur from a breakdown of access points (APs) after a calamity in the event of a disaster. Inside of a dead spot, we cannot make contact with the exterior. Therefore, such spots are extremely dangerous. One solution is the establishment of a new Wireless Communication Path (WCP) from adjoining AP with a radio relay machine. For this study, we propose a disaster-robust system that establishes a WCP quickly without human power using a robot with agent technology.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128402028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800401
M. Iwaki, Shun Nakayama
Domestic sound recognition is an important ability for our daily lives. Although we can recognize sounds as they arrive, conventional automatic sound/speech recognition systems cannot behave in a similar manner. This paper proposes a domestic sound recognition method that can incrementally take sound streams into consideration during the progress of time. This is useful for advancing human-machine interfaces, especially for hearing disabled persons.
{"title":"A sound recognition method with incrementally taking sound stream into consideration","authors":"M. Iwaki, Shun Nakayama","doi":"10.1109/GCCE.2016.7800401","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800401","url":null,"abstract":"Domestic sound recognition is an important ability for our daily lives. Although we can recognize sounds as they arrive, conventional automatic sound/speech recognition systems cannot behave in a similar manner. This paper proposes a domestic sound recognition method that can incrementally take sound streams into consideration during the progress of time. This is useful for advancing human-machine interfaces, especially for hearing disabled persons.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800491
Wenshan Tang, Zhaolong Gou, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi
In this paper, we tackled a problem: Given a security specification and its implementation, does the implementation satisfy the security specification? We first formalized the problem in terms of Petri nets. Next, we gave a polynomial time procedure to solve the problem based on Petri nets' analysis technique. Then we illustrated the procedure with an example to show the effectiveness.
{"title":"On verification of implementation of security specification with Petri nets' protocol inheritance","authors":"Wenshan Tang, Zhaolong Gou, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi","doi":"10.1109/GCCE.2016.7800491","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800491","url":null,"abstract":"In this paper, we tackled a problem: Given a security specification and its implementation, does the implementation satisfy the security specification? We first formalized the problem in terms of Petri nets. Next, we gave a polynomial time procedure to solve the problem based on Petri nets' analysis technique. Then we illustrated the procedure with an example to show the effectiveness.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800482
Masayuki Kaneko, Kazuki Arima, Takashi Murakami, M. Isshiki, Hiroshi Sugimura
In this paper, we develop a system to superpose information of cooking onto kitchen counter. The system is controlled by natural actions which is voice, and is assembled by two major modules which a projector and the voice recognition. We describe the whole process, the prototype system and the evaluation.
{"title":"Development of superposing projection system for cooking support","authors":"Masayuki Kaneko, Kazuki Arima, Takashi Murakami, M. Isshiki, Hiroshi Sugimura","doi":"10.1109/GCCE.2016.7800482","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800482","url":null,"abstract":"In this paper, we develop a system to superpose information of cooking onto kitchen counter. The system is controlled by natural actions which is voice, and is assembled by two major modules which a projector and the voice recognition. We describe the whole process, the prototype system and the evaluation.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123948590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800412
Ryota Nishimura, Yutaka Takase, Y. Nakano
In this paper, we describe the development of a spoken dialogue system based on PRINTEPS architecture. This spoken dialogue system is composed of five modules (speech recognition, language understanding, dialogue management, response generation, speech synthesis). In PRINTEPS, when calling the spoken dialogue system, system developers specify the small-scale dialogue goal. The system performs a dialogue with the user in order to obtain necessary information from the user. Dialogue processing rules corresponding to the dialogue goal is prepared in advance. The advantage of PRINTEPS-based system development is that system developers can build a spoken dialogue system without the knowledge of spoken dialogue system.
{"title":"Development environment of a spoken dialogue system based on PRINTEPS","authors":"Ryota Nishimura, Yutaka Takase, Y. Nakano","doi":"10.1109/GCCE.2016.7800412","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800412","url":null,"abstract":"In this paper, we describe the development of a spoken dialogue system based on PRINTEPS architecture. This spoken dialogue system is composed of five modules (speech recognition, language understanding, dialogue management, response generation, speech synthesis). In PRINTEPS, when calling the spoken dialogue system, system developers specify the small-scale dialogue goal. The system performs a dialogue with the user in order to obtain necessary information from the user. Dialogue processing rules corresponding to the dialogue goal is prepared in advance. The advantage of PRINTEPS-based system development is that system developers can build a spoken dialogue system without the knowledge of spoken dialogue system.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124041148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800519
K. Kimura, Mikio Mori
In this study, we measured the thresholds of bone-conduction hearing via teeth while wearing a mouthpiece with a bone-conductive actuator and ear plugs. It was found that the thresholds of bone-conduction hearing via teeth tend to be better than those of hearing with no ear plugs.
{"title":"Effects of wearing ear plugs in bone-conduction hearing via teeth","authors":"K. Kimura, Mikio Mori","doi":"10.1109/GCCE.2016.7800519","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800519","url":null,"abstract":"In this study, we measured the thresholds of bone-conduction hearing via teeth while wearing a mouthpiece with a bone-conductive actuator and ear plugs. It was found that the thresholds of bone-conduction hearing via teeth tend to be better than those of hearing with no ear plugs.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800531
T. Kajiyama
The image on a digital book cover gives potential buyers not only an impression of the book's contents but also serves as an aid when searching and browsing before and after buying the book. We have developed a method for revising book cover images to reflect readers' impressions. It uses a database of the correspondence between adjectives and colors as extracted from book reviews. This correspondence is used to revise the colors in the original book cover image. Evaluation was done by having 20 participants read 5 target books and give their impressions of the book cover images. The results revealed that the revised images better reflected the reader impressions than the original images.
{"title":"Color conversion of book cover images to reflect reader impressions","authors":"T. Kajiyama","doi":"10.1109/GCCE.2016.7800531","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800531","url":null,"abstract":"The image on a digital book cover gives potential buyers not only an impression of the book's contents but also serves as an aid when searching and browsing before and after buying the book. We have developed a method for revising book cover images to reflect readers' impressions. It uses a database of the correspondence between adjectives and colors as extracted from book reviews. This correspondence is used to revise the colors in the original book cover image. Evaluation was done by having 20 participants read 5 target books and give their impressions of the book cover images. The results revealed that the revised images better reflected the reader impressions than the original images.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/GCCE.2016.7800541
Yang Yu, Z. Jia, Weige Tao, Shiliang Dong
Differential encoded LDPC (DE-LDPC) coded systems with multiple symbol differential detection (MSDD) scheme can avoid good estimation of channel state information and compensate performance degradation of differential detection. In this paper, LDPC codes optimization for the DE-LDPC coded systems with MSDD is studied. Simulation results show that the optimized LDPC codes perform much better than the regular LDPC codes for the DE-LDPC coded systems with MSDD.
{"title":"LDPC codes optimization for differential encoded LDPC coded systems with multiple symbol differential detection","authors":"Yang Yu, Z. Jia, Weige Tao, Shiliang Dong","doi":"10.1109/GCCE.2016.7800541","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800541","url":null,"abstract":"Differential encoded LDPC (DE-LDPC) coded systems with multiple symbol differential detection (MSDD) scheme can avoid good estimation of channel state information and compensate performance degradation of differential detection. In this paper, LDPC codes optimization for the DE-LDPC coded systems with MSDD is studied. Simulation results show that the optimized LDPC codes perform much better than the regular LDPC codes for the DE-LDPC coded systems with MSDD.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116897458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}