{"title":"A Bound for Finding Defective Samples in Threshold Group Testing","authors":"Jin-Taek Seong","doi":"10.1109/ICEIC49074.2020.9051150","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051150","url":null,"abstract":"In this paper, we consider a threshold group testing (TGT) problem in which there are two thresholds to determine the output result, i.e., positive or negative. We aim to find a lower bound for decoding defective samples out of a set of a large population. To this end, we use the Fano's inequality theorem in the information theory. We show that for highly successful decoding of smaller defective samples, a group matrix should be designed to be dense. In addition, we conclude that as a gap between two thresholds grows, a group matrix is required to be denser to find defective samples with only a small number of tests.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123138993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park
{"title":"Scrambling Technique of Instruction Power Consumption for Side-Channel Attack Protection","authors":"Dongkyu Lee, Myeongjin Kang, Peter Plesznik, Jeonghun Cho, Daejin Park","doi":"10.1109/ICEIC49074.2020.9051111","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051111","url":null,"abstract":"This paper proposed the technique to protect the embedded devices from the timing analysis attack using a side-channel attack. Embedded devices have the advantage of excellent accessibility. However, because of the excellent accessibility, embedded devices are vulnerable to hardware attacks. In the case of the password matching function, the attacker can see the execution time of the function and infer which digits are matched monitoring the power consumption and using the timing analysis attack. In this paper, we proposed the clock scrambling method to hide the execution time of the instruction. It can help to protect embedded devices from the timing analysis attack by randomizing the execution time of the instruction. Our hardware model costs 2.56 % additional area for clock scrambler, and costs on average 28% in execution time and 27 % additional power consumption for scrambling power pattern.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"View Synthesis Method with Partitioned Image for Angular Super-Resolution","authors":"Dong-Myung Kim, Hyun-Soo Kang, Jae-Won Suh","doi":"10.1109/ICEIC49074.2020.9051166","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051166","url":null,"abstract":"Recently, with the development of deep learning technology, various view synthesis techniques based on deep learning have been proposed. However, as network performance improves and becomes more complex, the memory shortages occur when processing high-resolution images. In this paper, we propose view synthesis method with partitioned image for angular super-resolution. Our method synthesizes high resolution images using limited memory. The proposed algorithm deals with efficient image compositing methods according to various image partition methods, and the experimental results show which method has better performance.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116985089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memristor-based Reconfigurable Circuits: Challenges in Implementation","authors":"N. Dao, Dirk Koch","doi":"10.1109/ICEIC49074.2020.9051174","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051174","url":null,"abstract":"The emergence of memristor technologies has recently received much attention due to their promising features, expecting to be a key driver in the post-CMOS era. With its ultra-low power, higher density capability and non-volatile characteristics, memristor technology is considered as the best candidate to replace SRAM cells or be employed for routing in digital reconfigurable systems. Although memristor-based reconfigurable circuits can offer many advantages over the conventional CMOS designs, limitations in the utilization of memristor technologies such as electroforming or programming structures have not been thoroughly considered and discussed. This work looks into recent trends in exploiting memristor technologies in reconfigurable circuits and then discusses implementation challenges like memristor programming, reliability and operation of memristor-based memory cells for digitally reconfigurable circuits.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinyoung Hwang, Jungmin Lee, Yesol Yun, Sang Hyun Lee, Sung-Hoon Park
{"title":"A unified modeling framework for explaining the electrical resistivity trend of composites with nanostructures","authors":"Jinyoung Hwang, Jungmin Lee, Yesol Yun, Sang Hyun Lee, Sung-Hoon Park","doi":"10.1109/ICEIC49074.2020.9051223","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051223","url":null,"abstract":"Theoretical models for 1-D nanowire networks with particulate fillers are provided to explain how the electrical conductivity increases or decrease with respect to the shape and dimension of the particulate filler. The present research aims at a comprehensive understanding of the size effect of secondary particulate fillers on the electrical conductivity of CNT polymer composites. The change of the resistivity of CNT polymer composites due to the size of particulate fillers could be interpreted via the combination of Voronoi geometry induced from Swiss cheese models and underlying fiber percolation theory. This indicates that there is the transition of phases in excluded-volume effects, i.e., the enhancement in conductivity was measured in cooperation with micro-sized second fillers whereas the decrease in conductivity was observed for nano-sized fillers.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junfeng Hu, Zhao Zhani, Qiwei Huang, Jian Yang, Meihuang Hu, Qiyao Jiang, Yuhao Guo, Quan Pan
{"title":"An 18-Gb/s $36times 13 -mu mathrm{m}^{2} 3.53-mathrm{mW} 2^{7}-1$ PRBS Generator in 40-nm CMOS","authors":"Junfeng Hu, Zhao Zhani, Qiwei Huang, Jian Yang, Meihuang Hu, Qiyao Jiang, Yuhao Guo, Quan Pan","doi":"10.1109/ICEIC49074.2020.9051329","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051329","url":null,"abstract":"This paper presents an $18 mathrm{Gb}/mathrm{s} 2^{7}-1$ pseudo-random binary sequence (PRBS) generator. In the proposed PRBS, two extended truly-single-phase clock (E-TPSC) logic based DFFs are used to shorten the critical path delay and thus improve the data rate. The rest five DFFs are implemented in TSPC logic to save power consumption. Both E-TSPC and TSPC DFF occupy small area. This PRBS is designed in 40-nm CMOS. The post-layout simulation results show 18-Gb/s data rate, $36times 13-mu mathrm{m}^{2}$ core area, 3.S3-mW dc power, and 0.028-pJ/bit FOM.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based Model for Trustworthy Shared Internet of Things Device Management","authors":"Young-Hoon Park, Kwangman Ko","doi":"10.1109/ICEIC49074.2020.9051011","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051011","url":null,"abstract":"In a sharing economy, the management of shared Internet of Things (IoT) devices is of primary concern. For trustworthy management, accountability regarding the shared devices must be guaranteed. Blockchain, which stores data history securely, could be one solution. This study proposes a blockchain-based model for the management of shared IoT devices. In this model, when a change event occurs in the device, the description is written on the blockchain. With the blockchain, a user or manager can verify the current status of the shared device.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sasithong, Y. M. Myint, Chalita Kriangprapakit, Chalermporn Kertiopas, Irfan Ullah, L. Wuttisittikulkij, T. Loetchaipitak, Kittaphas Chaipirawat, R. Chancharoen, M. Saadi
{"title":"4G Enabled PhoneBot with Cloud based SLAM","authors":"P. Sasithong, Y. M. Myint, Chalita Kriangprapakit, Chalermporn Kertiopas, Irfan Ullah, L. Wuttisittikulkij, T. Loetchaipitak, Kittaphas Chaipirawat, R. Chancharoen, M. Saadi","doi":"10.1109/ICEIC49074.2020.9051151","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051151","url":null,"abstract":"It is expected that robots will be performing variety of tasks in near future which will help easing the burdens from humans. Robots applications are limitless, map generation and locations are no exception to it. In this paper, we have developed a PhoneBot which uses off-the-shelf mobile phone and LidarBot. LidarBot is equipped with internet via available cellular network. PhoneBot has the potential to sense the environment and based on the sensing creates a map for localization. Not only this, PhoneBot can also handle the dynamic environments and updated the maps in the cloud after sometime. Our results show that the PhoneBot can successfully creates a map of an unknown indoor location and can respond to the dynamically changing nature of the maps. Finally, it is important to mention here that the proposed PhoneBot has the least dimensions when compared with other SLAM robots.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSG-CapsGAN: Multi-Scale Gradient Capsule GAN for Face Super Resolution","authors":"Mahdiyar Molahasani, Seok-Bum Ko","doi":"10.1109/ICEIC49074.2020.9051244","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051244","url":null,"abstract":"One of the most useful sub-fields of Super-Resolution (SR) is face SR. Given a Low-Resolution (LR) image of a face, the High-Resolution (HR) counterpart is demanded. However, performing SR task on extremely low resolution images is very challenging due to the image distortion in the HR results. Many deep learning-based SR approaches have intended to solve this issue by using attribute domain information. However, they require more complex data and even additional networks. To simplify this process and yet preserve the precision, a novel Multi-Scale Gradient GAN with Capsule Network as its discriminator is proposed in this paper. MSG-CapsGAN surpassed the state-of-the-art face SR networks in terms of PSNR. This network is a step towards a precise pose invariant SR system.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eunji Cho, Hongjun Lee, Jeyeon Kim, Joongsik Kim, Whoiyul Kim
{"title":"Fully Automatic Pitching Location Analysis System Using High-Speed Cameras","authors":"Eunji Cho, Hongjun Lee, Jeyeon Kim, Joongsik Kim, Whoiyul Kim","doi":"10.1109/ICEIC49074.2020.9051169","DOIUrl":"https://doi.org/10.1109/ICEIC49074.2020.9051169","url":null,"abstract":"In this paper, we propose a ball image saving framework for an automatic baseball pitching location analysis system using high-speed cameras. In the existing system, it is difficult to manually select the frames in which the ball is included from the experimental pitching videos. The proposed automatic framework extracts ball candidate regions by differencing three consecutive frames from the acquired sequence in the buffer. The ball candidate regions are identified as a ball by comparing circularity with a pre-defined threshold value. If the ball exists among the ball candidate regions, the current sequence is saved to storage. Since the system utilizes high-speed cameras, we apply a ball detection method that has low computational cost. Experiments on many images captured by the proposed system demonstrate that the proposed framework and ball detection method can automate the pitching location analysis system.","PeriodicalId":271345,"journal":{"name":"2020 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}