2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)最新文献

筛选
英文 中文
Personal Authentication and Hand Motion Recognition based on Wrist EMG Analysis by a Convolutional Neural Network 基于腕部肌电图分析的卷积神经网络个人认证与手部动作识别
Ryohei Shioji, S. Ito, Momoyo Ito, M. Fukumi
{"title":"Personal Authentication and Hand Motion Recognition based on Wrist EMG Analysis by a Convolutional Neural Network","authors":"Ryohei Shioji, S. Ito, Momoyo Ito, M. Fukumi","doi":"10.1109/IOTAIS.2018.8600826","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600826","url":null,"abstract":"Recent years, EMG has attracted much attention as a tool of human interface. In hand motion recognition and personal authentication using wrist EMG, we have obtained good results. However, there has been no way to establish them at the same time. Therefore, in this paper we measure EMG by attaching dry type sensors to wrist, and carry out hand motion recognition and personal authentication. The conventional method used EMG of movement Japanese Janken. We use a multi-input and multi-output model of a Convolutional Neural Network (CNN). The average accuracy of hand motion recognition is 94.5%. The average accuracy of personal authentication is 94.6%. In the conventional method, personal authentication was classified into two classes. However, we carry out multi-class classification in the proposed method. In feature extraction, we obtain 128×8 input data from the measuring unit. Then, a filter size of the convolution layers is 3×3. CNN does not contain pooling layers in this paper. In the proposed method, the average accuracy of hand motion recognition is 94.6%. The average accuracy of personal authentication is 95.0%.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126731362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Ultra-low-latency Video Coding Method for Autonomous Vehicles and Virtual Reality Devices 自动驾驶汽车和虚拟现实设备的超低延迟视频编码方法
S. Mochizuki, K. Imamura, K. Mori, Y. Matsuda, T. Matsumura
{"title":"Ultra-low-latency Video Coding Method for Autonomous Vehicles and Virtual Reality Devices","authors":"S. Mochizuki, K. Imamura, K. Mori, Y. Matsuda, T. Matsumura","doi":"10.1109/IOTAIS.2018.8600851","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600851","url":null,"abstract":"Applications such as autonomous driving and virtual reality (VR) require low-latency transfer of high definition (HD) video. The proposed ultra-low-latency video coding method, which adopts line-based processing, has 0.44μs latency at minimum for Full-HD video. With multiple line-based image-prediction methods, image-adaptive quantization, and optimized entropy coding, the proposed method achieves compression to 39.0% data size and image quality of 45.4dB. The proposed basic algorithm and the optional 1D-DCT mode achieve compression to 33% and 20%, respectively, without significant visual degradation. These results are comparable to those for H.264 Intra despite one-thousandth ultra-low-latency of the proposed method. With the proposed video coding, the autonomous vehicles and VR devices can transfer HD video using 20% of the bandwidth of the source video without significant latency or visual degradation.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121650206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methodology for optimizing manufacturing machines with IoT 利用物联网优化制造机器的方法
Emir Cuk, Valentina Chaparro
{"title":"Methodology for optimizing manufacturing machines with IoT","authors":"Emir Cuk, Valentina Chaparro","doi":"10.1109/IOTAIS.2018.8600907","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600907","url":null,"abstract":"The goal of industry 4.0 is to use all the information that can be extracted from a supply chain to continuously optimize all aspects of its operation. The data acquisition is still a big challenge and the first step of the fourth industrial revolution. Getting data from software is much easier than getting data out of hardware like manufacturing machines. Especially if the Programmable Logic Controller (PLC) data is either poorly documented or not designed for these requirements. Therefore, we created a methodology to track the most common movement of a machine, which is the linear motion. The solution is an IoT-device: a small, wireless, and low cost sensor, designed to provide data about linear motions within a machine in real-time. We designed a static generic model and a method for machine optimization with data acquisition results comparable to results in other approaches. By implementing the methodology to a real industrial scenario, the results enable us to prove our hypothesis. The IoT-device data was as good as the PLC data and even closer to real-time. Our methodology also shows a higher potential to automate the data analysis.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From Centralized Management of Robot Swarms to Decentralized Scheduling 从机器人群集中管理到分散调度
Daniel Graff, R. Karnapke
{"title":"From Centralized Management of Robot Swarms to Decentralized Scheduling","authors":"Daniel Graff, R. Karnapke","doi":"10.1109/IOTAIS.2018.8600917","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600917","url":null,"abstract":"Future IoT systems might be comprised of hundreds or even thousands of nodes. Managing all of these nodes should be done automatically, as individual programming is tedious and error prone. For this reason, we introduced the swarm scheduler in previous work. It receives a specification of the job to be done, and schedules it on the best candidate robot. While this scheduler works fine for a limited number of nodes, it is based on a centralized approach and will not scale well when the number of nodes reaches hundreds or even thousands. In this paper we discuss the advantages and disadvantages of the centralized approach and present two different decentralized versions we are currently investigating as well as some preliminary results.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Device Fingerprint using Deep Learning 使用深度学习的物联网设备指纹
Sandhya Aneja, Nagender Aneja, Md. Shohidul Islam
{"title":"IoT Device Fingerprint using Deep Learning","authors":"Sandhya Aneja, Nagender Aneja, Md. Shohidul Islam","doi":"10.1109/IOTAIS.2018.8600824","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600824","url":null,"abstract":"Device Fingerprinting (DFP) is the identification of a device without using its network or other assigned identities including IP address, Medium Access Control (MAC) address, or International Mobile Equipment Identity (IMEI) number. DFP identifies a device using information from the packets which the device uses to communicate over the network. Packets are received at a router and processed to extract the information. In this paper, we worked on the DFP using Inter Arrival Time (IAT). IAT is the time interval between the two consecutive packets received. This has been observed that the IAT is unique for a device because of different hardware and the software used for the device. The existing work on the DFP uses the statistical techniques to analyze the IAT and to further generate the information using which a device can be identified uniquely. This work presents a novel idea of DFP by plotting graphs of IAT for packets with each graph plotting 100 IATs and subsequently processing the resulting graphs for the identification of the device. This approach improves the efficiency to identify a device DFP due to achieved benchmark of the deep learning libraries in the image processing. We configured Raspberry Pi to work as a router and installed our packet sniffer application on the Raspberry Pi. The packet sniffer application captured the packet information from the connected devices in a log file. We connected two Apple devices iPad4 and iPhone 7 Plus to the router and created IAT graphs for these two devices. We used Convolution Neural Network (CNN) to identify the devices and observed the accuracy of 86.7%.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Authentication of Aerial Input Numerals by Leap Motion and CNN Leap Motion和CNN对空中输入数字的验证
Shun Yamamoto, S. Ito, Momoyo Ito, M. Fukumi
{"title":"Authentication of Aerial Input Numerals by Leap Motion and CNN","authors":"Shun Yamamoto, S. Ito, Momoyo Ito, M. Fukumi","doi":"10.1109/IOTAIS.2018.8600847","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600847","url":null,"abstract":"As information technology has advanced in recent years, services which include personal authentication systems such as ATM are increasing. Current main personal authentication systems include IC cards, passwords, and biometrics authentication such as fingerprint authentication. However, there are several problems in these systems. Therefore, better systems are needed.As such systems, we propose a method to write numerals in the air using the Leap motion and to carry out personal authentication from such aerial handwriting data. We try to authenticate numerals 0 to 9 which are written by three subjects. After applying some pre-processing to inputs, learning and identification are carried out using CNN which is a method of machine learning. As a result, average identification accuracy was 90.3%. From this result, it is suggested that input numerals in the air can be authenticated and there is a possibility to construct a new personal authentication system.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sentiment Analysis on the Level of Customer Satisfaction to Data Cellular Services Using the Naive Bayes Classifier Algorithm 基于朴素贝叶斯分类器的蜂窝数据服务用户满意度的情感分析
Febriyani S. Fitri, Muhammad Nasrun, C. Setianingsih
{"title":"Sentiment Analysis on the Level of Customer Satisfaction to Data Cellular Services Using the Naive Bayes Classifier Algorithm","authors":"Febriyani S. Fitri, Muhammad Nasrun, C. Setianingsih","doi":"10.1109/IOTAIS.2018.8600870","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600870","url":null,"abstract":"Internet users in Indonesia have increased in recent years. Many product service providers who provide internet access services in accordance with tariff options and their superiority. In this research, sentiment analysis on social media to some service data service operator to see the level of public satisfaction in using data service of telecommunication operator for internet access in Indonesia.In this research is sentiment analysis with several stages, namely the collection of sentiment data using API (Application Programming Interface) which is available on Twitter. The preprocessing stage is then processed to process raw initial data, then perform POS tagging and weighing the word with TF-IDF calculation and perform classification using the Naive Bayes Classifier (NBC) method. This study yields an average value of 94,5% precision rate, 93,3% Recall and 99,09% Accuracy.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
KrishiMitr (Farmer’s Friend): Using Machine Learning to Identify Diseases in Plants KrishiMitr(农民的朋友):使用机器学习来识别植物的疾病
Parul Sharma, Yash Paul Singh Berwal, Wiqas Ghai
{"title":"KrishiMitr (Farmer’s Friend): Using Machine Learning to Identify Diseases in Plants","authors":"Parul Sharma, Yash Paul Singh Berwal, Wiqas Ghai","doi":"10.1109/IOTAIS.2018.8600898","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600898","url":null,"abstract":"Automatic disease detection using visible symptoms on leaves is becoming more and more important. Here we describe an algorithm, which uses machine learning to detect diseases in a wide variety of plants and diseases. High accuracy (>93%) was obtained with very noisy images, different backgrounds and different disease coverage. The algorithm is able to train itself, which means that the accuracy can increase with usage. It can run on a variety of platforms including smartphones and can thus aid non-expert farmers manage diseases effectively.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122023821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
FPGA Implementation of Modular Multiplier in Residue Number System 余数系统中模块化乘法器的FPGA实现
Yinan Kong, Md. Selim Hossain
{"title":"FPGA Implementation of Modular Multiplier in Residue Number System","authors":"Yinan Kong, Md. Selim Hossain","doi":"10.1109/IOTAIS.2018.8600881","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600881","url":null,"abstract":"This work presents a description of a highperformance hardware implementation of a Montgomery modular multiplier using a residue number system (RNS). An RNS can be considered as self-defense against simple power analysis (SPA) and differential power analysis (DPA) attacks, and can be used for public-key cryptography, such as the Rivest, Shamir and Adleman (RSA) cryptosystem and elliptic curve cryptosystems (ECC). Various kinds of security are required for Big Data analysis. The proposed RNS-based modular multiplier is suitable for public-key cryptography that can be used for Big Data security. It is implemented on field-programmable gate-array (FPGA) technology and optimized by trying different variants of the Montgomery Algorithm on it. The proposed RNS-based modular multiplication takes only 22 ns on the Xilinx Virtex-II FPGA. In addition, it needs relatively few resources on the FPGA, needing only 68 slices.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Large Data Download Method for IoT Machines Using LPWAN and General User’s Smartphones 使用LPWAN和普通用户智能手机的物联网机器的大数据下载方法
T. Ogawa, T. Yoshimura, N. Miyaho
{"title":"Large Data Download Method for IoT Machines Using LPWAN and General User’s Smartphones","authors":"T. Ogawa, T. Yoshimura, N. Miyaho","doi":"10.1109/IOTAIS.2018.8600862","DOIUrl":"https://doi.org/10.1109/IOTAIS.2018.8600862","url":null,"abstract":"By applying low power wide area network (LPWAN) to communication between a machine and the cloud, it can be anticipated that communication costs and the amount of power consumed by the machine can both be reduced. However, considering the addition of functions to the machine, it is necessary to have a technology able to transfer a large amount of data, which cannot be transferred by LPWAN, to the machine from the cloud at low cost. In this paper, a novel large data download method by Wi-Fi from cloud to machine using the terminals of general users is proposed. In the proposed method, the cloud selects the delivery terminals satisfying the data arrival rate requirement by analyzing the correlation of the movement history between the terminals. It guarantees a data arrival rate with a higher degree of accuracy than the existing DTN and CC-DTN, and at the same time minimizes the number of delivery terminals. In addition, this paper shows an authentication procedure that prevents DoS attacks on LPWAN by a spoofing terminal, which cannot be prevented by existing network authentication technology. Also, we report the effectiveness of the proposed method, which is confirmed by numerical calculation.","PeriodicalId":302621,"journal":{"name":"2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信