{"title":"Material Texture Recognition using Ultrasonic Images with Transformer Neural Networks","authors":"Xin Zhang, J. Saniie","doi":"10.1109/EIT51626.2021.9491908","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491908","url":null,"abstract":"Material texture recognition by estimating the grain size has been extensively used for characterization of material structures. Ultrasonic inspection can approximate material grain size nondestructively with advantages of one-sided measurement, high penetration depth and inspection accuracy. In ultrasonic testing, the energy of signal attenuates as ultrasonic signal propagates through the material. This attenuation is due to scattering and absorption, which are functions of the frequency and grain size distribution. Therefore, the attenuation and scattering of ultrasonic echoes can be used to evaluate grain size for microscopic texture. In this paper we propose to use the transformer neural networks to learn grain scattering features for material textures recognition. The transformer neural network utilizes the multi-head attention mechanism to substantially reduce the computation cost. An ultrasonic testbed platform is assembled to acquire the 3D ultrasonic data cube to train the neural networks for texture analysis. The 3D data cube consists of a sequence of 2D ultrasonic C-scan images and is obtained from three different heat-treated steel blocks. Several state-of-the-art machine learning algorithms, the deep Convolutional Neural Networks (CNNs) and Support Vector Machine (SVM) were trained and compared to classify the grain scattering textures of three heat-treated steel blocks. To build a data-efficient automatic system for ultrasonic nondestructive evaluation (NDE) applications, a self-attention based transformer neural networks: Ultrasonic Texture Recognition Vision Transformer: UTRV Transformer, was proposed to classify material textures with high testing accuracy of 96.15%.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visually Impaired Indoor Navigation using YOLO Based Object Recognition, Monocular Depth Estimation and Binaural Sounds","authors":"Sukesh Davanthapuram, Xinrui Yu, J. Saniie","doi":"10.1109/EIT51626.2021.9491913","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491913","url":null,"abstract":"This paper presents the development of a real-time spatial audio generating software to assist visually impaired people in indoor navigation using computer vision techniques and binaural sound generations. Our computer vision techniques utilize YOLO (You Only Look Once) based algorithm to detect objects, monocular depth estimation techniques to derive the depth map from a single captured image, and linear interpolation to obtain the azimuth and elevation angles of the detected objects. Based on the obtained results, binaural sounds are generated by HRTF (Head Related Transfer Function), where the intensity of the generated spatial audio is varied according to the distance of the detected object. Our test results show the real-time generated binaural sounds were able to accurately specify the position of the object in 2D space to avoid collisions and to provide surrounding information for navigating visually impaired people.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Equivalent Circuit Model of a 3D-Printed Conductive Electrifi Transmission Line on a Flexible NinjaFlex Substrate","authors":"H. Wolf, D. Mitra, R. Striker, B. Braaten","doi":"10.1109/EIT51626.2021.9491832","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491832","url":null,"abstract":"Determining the equivalent circuit to model the behavior of a device is a very useful tool in electrical engineering. With new materials becoming available to be used in RF and microwave applications, characterization of devices manufactured with these materials is continually being developed. This paper presents an approach to deriving a unit cell model that can approximate the behavior of an Electrifi based transmission line on a flexible substrate using a 3D printed NjnjaFlex filament. A combination of empirical and theoretical approaches are used here and results are validated via a simulation and a measured prototype.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"35 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125724174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamad Ali Mokhadder, Samar Bayan, Utayba Mohammad
{"title":"An Intelligent Approach to Reverse Engineer CAN Messages in Automotive Systems","authors":"Mohamad Ali Mokhadder, Samar Bayan, Utayba Mohammad","doi":"10.1109/EIT51626.2021.9491907","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491907","url":null,"abstract":"Most of the advanced features in today’s automobiles are performed by Electronic Control Units (ECUs) and an intra-vehicle communication network that allows these ECUs to exchange data. The most dominant intra-vehicle communication protocol is the Controller Area Network (CAN) protocol. The broadcast nature of CAN and the ability to access it through multiple interfaces in a vehicle, introduce an array of attack vectors that make vehicles vulnerable to cyber threats. CAN messages are proprietary to manufacturers, and their IDs and contents are guarded closely for intellectual property and security reasons. In this paper, an Automated Current-Based Fuzzing System (ACFS) is introduced. ACFS is a lightweight reverse engineering system that identifies CAN messages related to a specific user-vehicle interaction. It monitors and synchronizes variations in the data of CAN messages with current readings drawn from the vehicle’s battery. Then, it passes the current signal through frequency analysis and filtering stage and associate changes in the output signal with the CAN bus traffic. As a result, a small group of candidate messages, related to a specific user-vehicle interaction, e.g., turning headlights on, are identified. The candidate messages are then played back on the vehicle CAN bus to identify the correct and desired message ID and data. This process allows the user to control specific actions in the vehicle without deep knowledge of its internal setup and functionality, simply by accessing the CAN bus. The ACFS system was tested on a 2017 production prototype BreadBoard Vehicle (BBV) and was able to automatically extract many of the messages that control headlights, turn signals, and information cluster.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134413563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dual Approach for Preventing Blackhole Attacks in Vehicular Ad Hoc Networks Using Statistical Techniques and Supervised Machine Learning","authors":"Abiral Acharya, Jared Oluoch","doi":"10.1109/EIT51626.2021.9491885","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491885","url":null,"abstract":"Vehicular Ad Hoc Networks (VANETs) have the potential to improve road safety and reduce traffic congestion by enhancing sharing of messages about road conditions. Communication in VANETs depends upon a Public Key Infrastructure (PKI) that checks for message confidentiality, integrity, and authentication. One challenge that the PKI infrastructure does not eliminate is the possibility of malicious vehicles mounting a Distributed Denial of Service (DDoS) attack. We present a scheme that combines statistical modeling and machine learning techniques to detect and prevent blackhole attacks in a VANET environment.Simulation results demonstrate that on average, our model produces an Area Under The Curve (ROC) and Receiver Operating Characteristics (AUC) score of 96.78% which is much higher than a no skill ROC AUC score and only 3.22% away from an ideal ROC AUC score. Considering all the performance metrics, we show that the Support Vector Machine (SVM) and Gradient Boosting classifier are more accurate and perform consistently better under various circumstances. Both have an accuracy of over 98%, F1-scores of over 95%, and ROC AUC scores of over 97%. Our scheme is robust and accurate as evidenced by its ability to identify and prevent blackhole attacks. Moreover, the scheme is scalable in that addition of vehicles to the network does not compromise its accuracy and robustness.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133232448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Flow for Real-Time Face Mask Detection Using PYNQ System-on-Chip Platform","authors":"Tianyang Fang, Xin Huang, J. Saniie","doi":"10.1109/EIT51626.2021.9491842","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491842","url":null,"abstract":"Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most US states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses Haar cascade classifier (HCC) to find facial features from the camera feed and then utilizes it to detect the mask-wearing status. The detection system runs on a PYNQ-Z2 all-programmable SoC platform, where it will pipeline the camera feed through the FPGA unit and carry out the face mask detection algorithm in the ARM core. Potential delays are analyzed, and efforts are made to reduce them to achieve real-time detection. The experiment result shows that the presented system achieves a real-time 45fps 720p Video output, with a face mask detection response of 0.13s.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Tackling Common Web Application Vulnerabilities Using Secure Design Patterns","authors":"A. Ratnaparkhi, Yi Liu","doi":"10.1109/EIT51626.2021.9491919","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491919","url":null,"abstract":"Many software vulnerabilities originate during the design stage of the software development process. Secure design patterns can address vulnerabilities in the design level. However, few solid research studies have been done on applying secure pat-terns to tackle web application vulnerabilities and the researchers found that the security patterns are harder for developers to use than conventional design patterns. This paper presents an approach for selecting appropriate secure design patterns to tackle web application vulnerabilities. In this pilot study, we focus on two most common web application vulnerabilities: SQL injection (SQLi) and Cross-site scripting (XSS). The paper also uses a case study to demonstrate the implementation of the chosen pattern in redesigning a vulnerable application. The results from the evaluation show that the proposed pattern can effectively address SQLi and XSS vulnerabilities. Although SQLi and XSS are the targeted vulnerabilities in the approach, based on the success of this study, we believe that the approach is promising to be applied more generally.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Chaotic-based Encryption/Decryption System for Secure Video Transmission","authors":"Xin Huang, David Arnold, Tianyang Fang, J. Saniie","doi":"10.1109/EIT51626.2021.9491868","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491868","url":null,"abstract":"Ultrasonic communication is an alternative communication method of transmitting information through solids. Sending video streams can deliver more information than a single sensor, and video monitoring shows great potential in ultrasonic communication applications. An efficient and secure cryptosystem is needed to protect the sensitive video stream. In this paper, we propose a novel Chaotic-based encryption scheme utilizing 1-D and 2-D iteration models for secure video streaming. This algorithm is based on the Arnold Cat Map and the Logistic Map and has good confusion and diffusion properties. The Arnold Cat Map transforms the dataset into a pseudo-random state over several iterations and is reversible, while the Logistic Map introduces a specific external key to replace and recover the pixels value during encryption and decryption. Both the encryption and decryption processes are presented and formulated in our cryptosystem scenario. The proposed method maintains a good encryption quality, provides key sensitivity and has low correlation between pixels. The results of a secured video frame using separate Chaotic Maps and the novel encryption scheme are compared and discussed. Experiments and analysis demonstrate that the Chaotic-based algorithm is best suited for the ultrasonic video communication system and is resilient to security attacks.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Manufacturing with Digital Twin","authors":"D. Möller, H. Vakilzadian, Weyan Hou","doi":"10.1109/EIT51626.2021.9491874","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491874","url":null,"abstract":"The age of digital transformation will have a significant impact on industry and society. Designing, developing, and manufacturing products is more based on the influence of the fourth technological wave with its possibilities through digital transformation. The digital twin is commonly known as a key enabler for digital transformation at all scales – for large and small businesses, for organizations and individuals, globally and locally. The new challenges through digital transformation are seen as an opportunity to achieve higher levels of solutions to handle the different innovative technological methods with regard to quality in production in the manufacturing industry. Due to the complexity of intelligent manufacturing, an advanced and complex tool is required to (i) investigate, (ii) monitor, and (iii) simulate the intelligent manufacturing processes in real-time. The tool to achieve this goal is the digital twin, which works in parallel to sense, monitor, and control manufacturing devices and cyber-physical production systems across the manufacturing plant network infrastructure. The digital twin performs real-time optimization and evaluates the metrics of the execution of the intelligent manufacturing system. This paper introduces intelligent manufacturing and the digital twin as key enablers for the digital transformation in intelligent manufacturing.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Size Efficient Key-Value Type Context Sharing in Mobile Edge Computing","authors":"Samuel Sungmin Cho, Myoungkyu Song","doi":"10.1109/EIT51626.2021.9491881","DOIUrl":"https://doi.org/10.1109/EIT51626.2021.9491881","url":null,"abstract":"Mobile Edge Computing (MEC) aims to extend the edge of cloud computing networks in remote servers. MEC promises advantages such as fast response time and balancing processing load because MEC devices can process the information between the user devices and cloud servers intelligently and dynamically depending on the situation. An increasing number of Internet of Things (IoT) devices share information with cloud servers. MEC can address issues arising from situations where billions of IoT devices share information with other devices, MEC, and cloud servers. In this case, a load balancing model and architecture are needed for better storage and communication bandwidth control to avoid problems such as data congestion among MEC servers. Considering that the Key-value type context is one of the most popular representations for IoT information sharing, a new approach to address the communication load imbalance in MEC is needed. This paper proposes a novel model and architecture to share key-value type context among mobile devices, cloud servers, and MEC servers. We use probabilistic data structures, Bloomier Filters, to reduce the key-value type information footprint. The data quality degradation caused by false positives can be controlled and eliminated with a particular type of Bloomier filter and a common dictionary shared by devices and servers. We analyze our approach to show the proposed model’s performance, architecture, and algorithm, demonstrating that we can reduce the footprint size to represent the key-value type context information with zero or practically zero data degradation.","PeriodicalId":162816,"journal":{"name":"2021 IEEE International Conference on Electro Information Technology (EIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}