2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)最新文献

筛选
英文 中文
Robust event trigger generation for post silicon validation 为硅后验证生成健壮的事件触发器
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8307839
Sumit Diware, S. B. Krishna
{"title":"Robust event trigger generation for post silicon validation","authors":"Sumit Diware, S. B. Krishna","doi":"10.1109/ICCE-ASIA.2017.8307839","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307839","url":null,"abstract":"It is extremely difficult to eliminate all the design flaws that may exist in a complex integrated circuit design before fabrication due to limitations of pre-silicon verification methodology. Post-silicon validation has become pivotal in order to fix these design flaws which could not be identified during pre-silicon verification. One of the most effective silicon debug techniques is tracing internal signals during circuit's normal operation and using the gathered information to identify and fix the root cause of the problem. Trace-based technique involves logic analysis that works on the principle of event triggering. Existing trigger generation methods suffer from the false multi-triggering problem due to dependency on exact value of delay provided by internal delay elements and do not give a stable performance against PVT variations. This paper demonstrates a robust technique for generating these triggers which is independent of exact value of delay provided by internal delay elements and immune to false multi-triggering along with a consistent behavior across the PVT variations.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing networked control systems: Modeling attacks and defenses 保护网络控制系统:建模攻击和防御
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309317
J. Jithish, S. Sankaran
{"title":"Securing networked control systems: Modeling attacks and defenses","authors":"J. Jithish, S. Sankaran","doi":"10.1109/ICCE-ASIA.2017.8309317","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309317","url":null,"abstract":"Networked Control Systems (NCS) have emerged as a viable solution to effectively manage critical infrastructures in smart cities and modern industrial settings. The networked architecture of NCS that facilitates the communication between its distributed components makes them vulnerable to cyber attacks. The vulnerabilities in the communication network coupled with safety critical nature of data necessitates the need to develop models to analyze the impact of cyber attacks on system stability and performance. In this work, we develop an analytical model for Denial of Service (DoS) and Deception attacks in NCS. Based on the insights from the model, we propose a mechanism based on symmetric key encryption to secure NCS from such attacks. The comparison of our security mechanism with the standard reference signal demonstrates that our approach is successful in securing the NCS with minimal performance overhead.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A study of load prediction and load flow patterns in an IoT enabled Smart Grid with a dynamic energy market 具有动态能源市场的物联网智能电网中的负荷预测和负荷流模式研究
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309318
Kshama Dwarakanath
{"title":"A study of load prediction and load flow patterns in an IoT enabled Smart Grid with a dynamic energy market","authors":"Kshama Dwarakanath","doi":"10.1109/ICCE-ASIA.2017.8309318","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309318","url":null,"abstract":"Smart Grid and Internet of Things (IoT) are the latest trends respectively in the domains of Power Engineering and Computer Science. The amalgamation of the two presents enormous potential to improve the efficiency, security and reliability of the power grid. In this paper, the authors review existing solutions and propose their ideas, as an improvement over existing techniques to realise the idea of a Smart Grid and a competitive Energy market by application of Mathematical and Statistical tools to analyse and predict load demand as well as agent behaviour in the present scenario.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123100733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An approach towards novel video steganography for consumer electronics 一种用于消费电子产品的新型视频隐写技术
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8307831
M. Sushmitha, H. N. Suresh, J. Manikandan
{"title":"An approach towards novel video steganography for consumer electronics","authors":"M. Sushmitha, H. N. Suresh, J. Manikandan","doi":"10.1109/ICCE-ASIA.2017.8307831","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307831","url":null,"abstract":"Videos have proven themselves to be the best medium to demand consumer attention. This has motivated the sharing of videos on Whatsapp, Facebook and other social media. Consumer electronics such as mobile phones, tablets and laptops are mainly used for video sharing. In this paper, a novel attempt is made to conceal a secret video in a cover video using the concepts of steganography and discrete wavelet transform, thus achieving the best of both worlds. Also, the proposed work is extended towards concealing two secret videos in a single cover video. The performance evaluation of proposed technique is reported in the paper. It is observed that the reconstructed videos have PSNR ranging from 74.30–90.12 dB and the PSNR of stego videos ranges from 68.66–70.80 dB. It is also observed that both, stego videos and reconstructed secret videos are visually indistinguishable from the original video.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Novel OpenVX implementation for heterogeneous multi-core systems 针对异构多核系统的新颖OpenVX实现
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309323
Kedar Chitnis, Jesse Villarreal, Brijesh Jadav, Mihir Mody, Lucas Weaver, V. Cheng, Kumar Desappan, Anshu Jain, P. Swami
{"title":"Novel OpenVX implementation for heterogeneous multi-core systems","authors":"Kedar Chitnis, Jesse Villarreal, Brijesh Jadav, Mihir Mody, Lucas Weaver, V. Cheng, Kumar Desappan, Anshu Jain, P. Swami","doi":"10.1109/ICCE-ASIA.2017.8309323","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309323","url":null,"abstract":"Heterogeneous multi-core systems (CPU, GPU, HWA, DSP) are becoming the de-facto norm for multiple computer vision applications across automotive, robotics, AR/VR, and industrial machine vision. This creates a need for a software framework which realizes high utilization of computing elements, low latency, real-time operation and ease of use. For specific applications, multiple proprietary solutions are offered to satisfy few of the above requirements. This paper proposes a solution based on the standard OpenVX specification to address heterogeneous systems. It introduces novel techniques of distributed graph execution across heterogeneous cores, data tiling to address diverse memory constraints and easy to use high-level graph description to describe the application. This novel solution is implemented on TI's TDA family of SoC for mono camera vision application with platform code generated from high-level graph description. The profiling confirms real time operation, low latency by reducing host CPU interaction and achieving 99% utilization across heterogeneous cores.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Novel architecture for cloud based next gen vehicle platform — Transition from today to 2025 基于云的新一代汽车平台的新架构——从今天到2025年的过渡
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309326
Pramod Kumar Gurudatt, V. Umesh
{"title":"Novel architecture for cloud based next gen vehicle platform — Transition from today to 2025","authors":"Pramod Kumar Gurudatt, V. Umesh","doi":"10.1109/ICCE-ASIA.2017.8309326","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309326","url":null,"abstract":"The sole idea of the autonomous driving is to reduce the number of accidents which will be caused by human errors. There will be a phase where autonomous vehicles will have to take part with the human driven vehicles. In this phase autonomous vehicle and vehicle drivers must be careful in driving maneuvers, since it is impossible to just have autonomous vehicles on the road while the transition to fully autonomous driving takes place. To make the system more reliable and robust, authors feel that it must be substantially improved and to achieve this 3 methodologies have been proposed. The use cases are derived from the camera placed in the suitable positions of every vehicle. This creates several use cases with different driving behaviors, which truly reflects the conditions which the autonomous car needs to undergo in series. Authors propose several architectures to address the safety related issues. Since, the number of use cases are so random that it becomes practically impossible to manage data, so we propose to have a secured cloud storage. The cloud provides a secure and reliable data management system to the machine learning algorithm computation. The data management till now is effectively done via trained unique use cases. This make a big data which is encapsulation of different unique use cases under different driving conditions. So we conclude that the usage of ML and cloud based data management is the way forward for handling autonomous vehicle reliably. This may not be the complete solution, but nevertheless we are one step closer towards 2025. This concept can be implemented only in co-operation of the OEMs and Public authorities.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130190935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel thermocouple for ultra high temperature applications: Design and computational analysis 一种超高温应用的新型热电偶:设计与计算分析
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8307852
A. Purwar, S. Deep
{"title":"A novel thermocouple for ultra high temperature applications: Design and computational analysis","authors":"A. Purwar, S. Deep","doi":"10.1109/ICCE-ASIA.2017.8307852","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307852","url":null,"abstract":"The development of high temperature sensors for accurately measuring temperature has become critical for structural health monitoring of high temperature structures viz. gas turbines, furnaces and hypersonic space vehicles. Conventional thermocouples have limitations owing to the maximum operational temperature of metallic alloys. In this perspective, it is imperative to explore new material systems which can extend the operational range of thermocouples up to 2500K temperature. Current work investigates a novel thermocouple design which employs Zirconium diboride based ultra-high temperature ceramics for providing protection to metallic thermocouple wires in oxidizing environments in heat flux as high as 2.5MW/m2 for up to 120s duration. The performance evaluation of this novel thermocouple design has been carried using Finite element based computational modelling. This demonstrates that the proposed thermocouple design has good sensitivity of 3V/K in relevant hot environment.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130581284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Flexible and efficient perspective transform engine 灵活高效的视角转换引擎
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309322
Mihir Mody, Rajshekar Allu, Niraj Nandan, Gang Hua, Hetul Sanghvi, Shashank Dabral, Brijesh Jadav, Sujith Shivalingappa, Jason Jones
{"title":"Flexible and efficient perspective transform engine","authors":"Mihir Mody, Rajshekar Allu, Niraj Nandan, Gang Hua, Hetul Sanghvi, Shashank Dabral, Brijesh Jadav, Sujith Shivalingappa, Jason Jones","doi":"10.1109/ICCE-ASIA.2017.8309322","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309322","url":null,"abstract":"Perspective transform (or Homography) is commonly used in image and computer vision processing, which typically solved using a back mapping algorithm. It is used in multiple use-cases e.g. view point change, fish-eye lens distortion correction, chromatic aberration correction, stereo image pair alignments etc. Prior work in literature addresses individual use-case by selecting data format, interpolation method and block sizes due to constraints of irregular data fetch. In this paper, we propose an area efficient and flexible solution for perspective transform engine to address multiple use-cases with software controlled data format, interpolation method and block size. The proposed solution consists of multiple innovative techniques namely On-The-Fly (OTF) transform, Off-line mesh based Look up Table (LUT) with optional down-sampling, corner pre-fetch and dual interpolation. The proposed solution achieves clock up- to 300 MHz with output pixel throughput of 1 cycle/pixel and 0.21 mm2 of silicon area in 28nm LP-CMOS process node.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132878600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of transformed malwares using permission flow graphs 使用权限流程图检测转换后的恶意软件
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8309324
R. Seth, Rishabh Kaushal
{"title":"Detection of transformed malwares using permission flow graphs","authors":"R. Seth, Rishabh Kaushal","doi":"10.1109/ICCE-ASIA.2017.8309324","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309324","url":null,"abstract":"With growing popularity of Android, it's attack surface has also increased. Prevalence of third party android marketplaces gives attackers an opportunity to plant their malicious apps in the mobile eco-system. To evade signature based detection, attackers often transform their malware, for instance, by introducing code level changes. In this paper we propose a lightweight static Permission Flow Graph (PFG) based approach to detect malware even when they have been transformed (obfuscated). A number of techniques based on behavioral analysis have also been proposed in the past; how-ever our interest lies in leveraging the permission framework alone to detect malware variants and transformations without considering behavioral aspects of a malware. Our proposed approach constructs Permission Flow Graph (PFG) for an Android App. Transformations performed at code level, often result in changing control flow, however, most of the time, the permission flow remains invariant. As a consequences, PFGs of transformed malware and non-transformed malware remain structurally similar as shown in this paper using state-of-the-art graph similarity algorithm. Furthermore, we propose graph based similarity metrics at both edge level and vertex level in order to bring forth the structural similarity of the two PFGs being compared. We validate our proposed methodology through machine learning algorithms. Results prove that our approach is successfully able to group together Android malware and its variants (transformations) together in the same cluster. Further, we demonstrate that our proposed approach is able to detect transformed malware with a detection accuracy of 98.26%, thereby ensuring that malicious Apps can be detected even after transformations.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131324649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependence of hall effect flow sensor frequency on the attached inlet and outlet pipe size 霍尔效应流量传感器频率与所附进出口管道尺寸的关系
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) Pub Date : 2017-10-01 DOI: 10.1109/ICCE-ASIA.2017.8307842
J. Lalnunthari, H. H. Thanga
{"title":"Dependence of hall effect flow sensor frequency on the attached inlet and outlet pipe size","authors":"J. Lalnunthari, H. H. Thanga","doi":"10.1109/ICCE-ASIA.2017.8307842","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307842","url":null,"abstract":"Hall Effect flow sensor YF-S201 is one of the most common, inexpensive, reliable and accurate flow sensor used in many applications for liquid flow rate measurement. The accuracy of the sensor is due to the linear relationship between the sensor pulse frequency and the flowrate. However, there are various factors that could affect the calibration model, one of them being the attached pipe size configuration. The present work investigates how the Hall Effect sensor calibration curve parameters are affected by the externally attached pipe diameters. The result shows that as the attached pipe size become smaller than the internal diameter of the sensor, the slope and intercept of the calibration curve is found to decrease and increase respectively. This means that the slope of 7.5 Hz per liter per minute (calibration factor) as specified by the by manufacturer of YF-S201 Hall Effect flow sensor cannot be used for higher accuracy requirement when the externally attached pipe size is smaller than the sensor internal diameter.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信