{"title":"Personal Authentication and Hand Motion Recognition based on Wrist EMG Analysis by a Convolutional Neural Network","authors":"Ryohei Shioji, S. Ito, Momoyo Ito, M. Fukumi","doi":"10.1109/IOTAIS.2018.8600826","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600826","url":null,"abstract":"Recent years, EMG has attracted much attention as a tool of human interface. In hand motion recognition and personal authentication using wrist EMG, we have obtained good results. However, there has been no way to establish them at the same time. Therefore, in this paper we measure EMG by attaching dry type sensors to wrist, and carry out hand motion recognition and personal authentication. The conventional method used EMG of movement Japanese Janken. We use a multi-input and multi-output model of a Convolutional Neural Network (CNN). The average accuracy of hand motion recognition is 94.5%. The average accuracy of personal authentication is 94.6%. In the conventional method, personal authentication was classified into two classes. However, we carry out multi-class classification in the proposed method. In feature extraction, we obtain 128×8 input data from the measuring unit. Then, a filter size of the convolution layers is 3×3. CNN does not contain pooling layers in this paper. In the proposed method, the average accuracy of hand motion recognition is 94.6%. The average accuracy of personal authentication is 95.0%.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mochizuki, K. Imamura, K. Mori, Y. Matsuda, T. Matsumura
{"title":"Ultra-low-latency Video Coding Method for Autonomous Vehicles and Virtual Reality Devices","authors":"S. Mochizuki, K. Imamura, K. Mori, Y. Matsuda, T. Matsumura","doi":"10.1109/IOTAIS.2018.8600851","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600851","url":null,"abstract":"Applications such as autonomous driving and virtual reality (VR) require low-latency transfer of high definition (HD) video. The proposed ultra-low-latency video coding method, which adopts line-based processing, has 0.44μs latency at minimum for Full-HD video. With multiple line-based image-prediction methods, image-adaptive quantization, and optimized entropy coding, the proposed method achieves compression to 39.0% data size and image quality of 45.4dB. The proposed basic algorithm and the optional 1D-DCT mode achieve compression to 33% and 20%, respectively, without significant visual degradation. These results are comparable to those for H.264 Intra despite one-thousandth ultra-low-latency of the proposed method. With the proposed video coding, the autonomous vehicles and VR devices can transfer HD video using 20% of the bandwidth of the source video without significant latency or visual degradation.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121650206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for optimizing manufacturing machines with IoT","authors":"Emir Cuk, Valentina Chaparro","doi":"10.1109/IOTAIS.2018.8600907","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600907","url":null,"abstract":"The goal of industry 4.0 is to use all the information that can be extracted from a supply chain to continuously optimize all aspects of its operation. The data acquisition is still a big challenge and the first step of the fourth industrial revolution. Getting data from software is much easier than getting data out of hardware like manufacturing machines. Especially if the Programmable Logic Controller (PLC) data is either poorly documented or not designed for these requirements. Therefore, we created a methodology to track the most common movement of a machine, which is the linear motion. The solution is an IoT-device: a small, wireless, and low cost sensor, designed to provide data about linear motions within a machine in real-time. We designed a static generic model and a method for machine optimization with data acquisition results comparable to results in other approaches. By implementing the methodology to a real industrial scenario, the results enable us to prove our hypothesis. The IoT-device data was as good as the PLC data and even closer to real-time. Our methodology also shows a higher potential to automate the data analysis.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Centralized Management of Robot Swarms to Decentralized Scheduling","authors":"Daniel Graff, R. Karnapke","doi":"10.1109/IOTAIS.2018.8600917","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600917","url":null,"abstract":"Future IoT systems might be comprised of hundreds or even thousands of nodes. Managing all of these nodes should be done automatically, as individual programming is tedious and error prone. For this reason, we introduced the swarm scheduler in previous work. It receives a specification of the job to be done, and schedules it on the best candidate robot. While this scheduler works fine for a limited number of nodes, it is based on a centralized approach and will not scale well when the number of nodes reaches hundreds or even thousands. In this paper we discuss the advantages and disadvantages of the centralized approach and present two different decentralized versions we are currently investigating as well as some preliminary results.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Device Fingerprint using Deep Learning","authors":"Sandhya Aneja, Nagender Aneja, Md. Shohidul Islam","doi":"10.1109/IOTAIS.2018.8600824","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600824","url":null,"abstract":"Device Fingerprinting (DFP) is the identification of a device without using its network or other assigned identities including IP address, Medium Access Control (MAC) address, or International Mobile Equipment Identity (IMEI) number. DFP identifies a device using information from the packets which the device uses to communicate over the network. Packets are received at a router and processed to extract the information. In this paper, we worked on the DFP using Inter Arrival Time (IAT). IAT is the time interval between the two consecutive packets received. This has been observed that the IAT is unique for a device because of different hardware and the software used for the device. The existing work on the DFP uses the statistical techniques to analyze the IAT and to further generate the information using which a device can be identified uniquely. This work presents a novel idea of DFP by plotting graphs of IAT for packets with each graph plotting 100 IATs and subsequently processing the resulting graphs for the identification of the device. This approach improves the efficiency to identify a device DFP due to achieved benchmark of the deep learning libraries in the image processing. We configured Raspberry Pi to work as a router and installed our packet sniffer application on the Raspberry Pi. The packet sniffer application captured the packet information from the connected devices in a log file. We connected two Apple devices iPad4 and iPhone 7 Plus to the router and created IAT graphs for these two devices. We used Convolution Neural Network (CNN) to identify the devices and observed the accuracy of 86.7%.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication of Aerial Input Numerals by Leap Motion and CNN","authors":"Shun Yamamoto, S. Ito, Momoyo Ito, M. Fukumi","doi":"10.1109/IOTAIS.2018.8600847","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600847","url":null,"abstract":"As information technology has advanced in recent years, services which include personal authentication systems such as ATM are increasing. Current main personal authentication systems include IC cards, passwords, and biometrics authentication such as fingerprint authentication. However, there are several problems in these systems. Therefore, better systems are needed.As such systems, we propose a method to write numerals in the air using the Leap motion and to carry out personal authentication from such aerial handwriting data. We try to authenticate numerals 0 to 9 which are written by three subjects. After applying some pre-processing to inputs, learning and identification are carried out using CNN which is a method of machine learning. As a result, average identification accuracy was 90.3%. From this result, it is suggested that input numerals in the air can be authenticated and there is a possibility to construct a new personal authentication system.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Febriyani S. Fitri, Muhammad Nasrun, C. Setianingsih
{"title":"Sentiment Analysis on the Level of Customer Satisfaction to Data Cellular Services Using the Naive Bayes Classifier Algorithm","authors":"Febriyani S. Fitri, Muhammad Nasrun, C. Setianingsih","doi":"10.1109/IOTAIS.2018.8600870","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600870","url":null,"abstract":"Internet users in Indonesia have increased in recent years. Many product service providers who provide internet access services in accordance with tariff options and their superiority. In this research, sentiment analysis on social media to some service data service operator to see the level of public satisfaction in using data service of telecommunication operator for internet access in Indonesia.In this research is sentiment analysis with several stages, namely the collection of sentiment data using API (Application Programming Interface) which is available on Twitter. The preprocessing stage is then processed to process raw initial data, then perform POS tagging and weighing the word with TF-IDF calculation and perform classification using the Naive Bayes Classifier (NBC) method. This study yields an average value of 94,5% precision rate, 93,3% Recall and 99,09% Accuracy.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KrishiMitr (Farmer’s Friend): Using Machine Learning to Identify Diseases in Plants","authors":"Parul Sharma, Yash Paul Singh Berwal, Wiqas Ghai","doi":"10.1109/IOTAIS.2018.8600898","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600898","url":null,"abstract":"Automatic disease detection using visible symptoms on leaves is becoming more and more important. Here we describe an algorithm, which uses machine learning to detect diseases in a wide variety of plants and diseases. High accuracy (>93%) was obtained with very noisy images, different backgrounds and different disease coverage. The algorithm is able to train itself, which means that the accuracy can increase with usage. It can run on a variety of platforms including smartphones and can thus aid non-expert farmers manage diseases effectively.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122023821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Implementation of Modular Multiplier in Residue Number System","authors":"Yinan Kong, Md. Selim Hossain","doi":"10.1109/IOTAIS.2018.8600881","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600881","url":null,"abstract":"This work presents a description of a highperformance hardware implementation of a Montgomery modular multiplier using a residue number system (RNS). An RNS can be considered as self-defense against simple power analysis (SPA) and differential power analysis (DPA) attacks, and can be used for public-key cryptography, such as the Rivest, Shamir and Adleman (RSA) cryptosystem and elliptic curve cryptosystems (ECC). Various kinds of security are required for Big Data analysis. The proposed RNS-based modular multiplier is suitable for public-key cryptography that can be used for Big Data security. It is implemented on field-programmable gate-array (FPGA) technology and optimized by trying different variants of the Montgomery Algorithm on it. The proposed RNS-based modular multiplication takes only 22 ns on the Xilinx Virtex-II FPGA. In addition, it needs relatively few resources on the FPGA, needing only 68 slices.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Data Download Method for IoT Machines Using LPWAN and General User’s Smartphones","authors":"T. Ogawa, T. Yoshimura, N. Miyaho","doi":"10.1109/IOTAIS.2018.8600862","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600862","url":null,"abstract":"By applying low power wide area network (LPWAN) to communication between a machine and the cloud, it can be anticipated that communication costs and the amount of power consumed by the machine can both be reduced. However, considering the addition of functions to the machine, it is necessary to have a technology able to transfer a large amount of data, which cannot be transferred by LPWAN, to the machine from the cloud at low cost. In this paper, a novel large data download method by Wi-Fi from cloud to machine using the terminals of general users is proposed. In the proposed method, the cloud selects the delivery terminals satisfying the data arrival rate requirement by analyzing the correlation of the movement history between the terminals. It guarantees a data arrival rate with a higher degree of accuracy than the existing DTN and CC-DTN, and at the same time minimizes the number of delivery terminals. In addition, this paper shows an authentication procedure that prevents DoS attacks on LPWAN by a spoofing terminal, which cannot be prevented by existing network authentication technology. Also, we report the effectiveness of the proposed method, which is confirmed by numerical calculation.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}