2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )最新文献

筛选
英文 中文
FPGA Implementation of ARM MCU with Five-stage Pipeline ARM单片机五级流水线的FPGA实现
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983568
Chi-Lin Chiang, Mao-Hsu Yen, Che-Wei Chang, Yih-Hsia Lin, Yuan-Fu Ku
{"title":"FPGA Implementation of ARM MCU with Five-stage Pipeline","authors":"Chi-Lin Chiang, Mao-Hsu Yen, Che-Wei Chang, Yih-Hsia Lin, Yuan-Fu Ku","doi":"10.1109/ICKII55100.2022.9983568","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983568","url":null,"abstract":"We proposed a new 32-bits Microcontroller core with a five-stage pipeline based on the Cortex-M0 microcontroller with the three-stage pipeline of ARM Holdings PLC. The architecture provides flexible banked memory to support the mixed-width instruction set architecture (ISA), which improves the clock rate of Cortex-M0 and reduces the memory size in the ARM MCU. In this study, we implemented the ARM MCU by using Harvard architecture. Thus, the design speeds up the clock rate of processing as the instruction and the data are fetched simultaneously. The design was described in System Verilog HDL, simulated under Modelsim environment, and implemented by Altera DE10 FPGA platform. The results of FPGA implementation showed that the ARM MCU worked normally under 80 MHz in comparison with Cortex-M0 which works under 50MHz. The proposed architecture provides higher throughput and is compatible with the instruction set of Cortex-M0.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121774321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud and AI-supported Mobile Information Multi-agent System for Smart Energy-saving 基于云与ai的移动信息多智能体智能节能系统
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983592
Sheng-Yuan Yang
{"title":"Cloud and AI-supported Mobile Information Multi-agent System for Smart Energy-saving","authors":"Sheng-Yuan Yang","doi":"10.1109/ICKII55100.2022.9983592","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983592","url":null,"abstract":"This study aims to explore a cloud and AI-supported mobile multi-agent system to quickly and precisely provide good quality and real-time information, provided by the Dr. What-Info system, for smart energy-saving. The illustrated system and experiments verify and validate the effectiveness and efficiency of the proposed system.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Algorithm of Convolution Neural Networks for Enhancing Facial Expression Recognition 增强面部表情识别的卷积神经网络集成算法
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983573
Gwo-Chuan Lee, Zi-Yang Li, Tsai-Wei Li
{"title":"Ensemble Algorithm of Convolution Neural Networks for Enhancing Facial Expression Recognition","authors":"Gwo-Chuan Lee, Zi-Yang Li, Tsai-Wei Li","doi":"10.1109/ICKII55100.2022.9983573","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983573","url":null,"abstract":"Artificial intelligence (AI) cooperates with multiple industries to improve the overall industry framework. Especially, human emotion recognition plays an indispensable role in supporting medical care, psychological counseling, crime prevention and detection, and crime investigation. The research on emotion recognition includes emotion-specific intonation patterns, literal expressions of emotions, and facial expressions. Recently, the deep learning model of facial emotion recognition aims to capture tiny changes in facial muscles to provide greater recognition accuracy. Hybrid models in facial expression recognition have been constantly proposed to improve the performance of deep learning models in these years. In this study, we proposed an ensemble learning algorithm for the accuracy of the facial emotion recognition model with three deep learning models: VGG16, InceptionResNetV2, and EfficientNetB0. To enhance the performance of these benchmark models, we applied transfer learning, fine-tuning, and data augmentation to implement the training and validation of the Facial Expression Recognition 2013 (FER-2013) Dataset. The developed algorithm finds the best-predicted value by prioritizing the InceptionResNetV2. The experimental results show that the proposed ensemble learning algorithm of priorities edges up 2.81% accuracy of the model identification. The future extension of this study ventures into the Internet of Things (IoT), medical care, and crime detection and prevention.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Resource Optimization for a Log Monitoring System 日志监控系统的计算资源优化
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983580
Thanin Srithai, V. C. Barroso, P. Phunchongharn
{"title":"Computing Resource Optimization for a Log Monitoring System","authors":"Thanin Srithai, V. C. Barroso, P. Phunchongharn","doi":"10.1109/ICKII55100.2022.9983580","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983580","url":null,"abstract":"A Large Ion Collider Experiment (ALICE) at the Large Hadron Collider (LHC) in the European Organization for Nuclear Research (CERN) laboratory was built to study heavy-ion collisions and the properties of the quark-gluon plasma. The Online and Offline (O2) software systems of the experiment generate a huge amount of log data that is used for monitoring to detect a potential system failure. Elasticsearch was selected as a log storage and search engine for the monitoring system. One of the main problems is how to allocate the computing resources for Elasticsearch while minimizing cost and satisfying performance thresholds, i.e., throughput). Moreover, lacking knowledge of the search engine's behavior makes it difficult to find the best configuration. The exhaustive search method is a potential approach for solving. However, it is not practical since it consumes a lot of time and computing resources. Due to the limited resources, Bayesian optimization is applied as a solution. The Bayesian method requires only a few samples to create a surrogate function that roughly represents the objective function, i.e., minimizing cost while satisfying the performance needs. Then, the method explores only the area where the optimal solution exists with a high probability. The results show that Bayesian optimization provides the optimal or near-optimal computing resource configuration for given benchmark experiments while requiring only about half of the evaluations compared to other methods, e.g., exhaustive search, regression, and machine learning. The impact of several acquisition functions and initial sample generators were studied in order to find the best solution. These insights can help system operators search for an optimal computing resource configuration quickly and efficiently.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation, Fabrication, Measurement, and Characteristic Analysis of Ka-band Frequency Selective surface ka波段频率选择表面的仿真、制作、测量与特性分析
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983582
Ke-Yang Liao, W. Lau, Jyh-Shin Chen
{"title":"Simulation, Fabrication, Measurement, and Characteristic Analysis of Ka-band Frequency Selective surface","authors":"Ke-Yang Liao, W. Lau, Jyh-Shin Chen","doi":"10.1109/ICKII55100.2022.9983582","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983582","url":null,"abstract":"We design two geometrically patterned frequency-selective surface (FSS) devices, patches and meshes cross arrays, for Ka-band (26.5–40 GHz for satellite communication) filtering application. The fabrication of FSS patterns is a combined CO2 laser engraving system with a chemical etching process. The structure of all samples are single-layer metal surfaces, double-layer metal surfaces, and complementary metal surfaces. These samples are measured with a network analyzer. The obtained results are compared with the simulation results of a 3D High-frequency Simulation Soft-ware (HFSS). The results show that the trends of the curves between the measured and simulated results are consistent with each other.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Data Preprocessing for Privacy-preserving Federated Learning 隐私保护联邦学习的私有数据预处理
2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII ) Pub Date : 2022-07-22 DOI: 10.1109/ICKII55100.2022.9983518
Ruei-Hau Hsu, Ting-Yun Huang
{"title":"Private Data Preprocessing for Privacy-preserving Federated Learning","authors":"Ruei-Hau Hsu, Ting-Yun Huang","doi":"10.1109/ICKII55100.2022.9983518","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983518","url":null,"abstract":"Privacy-preserving federated learning can accomplish model aggregation without leaking to a local model and avoid the problem of sensitive data exposure caused by model leakage. Even though it protects privacy in the training process, any data analysis task proposed by the initiator and the type of data required for the task contains the research or trade secrets of the organization. Being intercepted in the transmission process or known by other data providers, the disclosure of essential research secrets occurs, leading to the theft of research or business ideas. Therefore, it is a critical issue to achieve data matching between the initiator and the participant under the premise of privacy protection. In this study, we propose a federated learning framework that considers the above security issues. A privacy-preserving federated learning architecture based on homomorphic encryption is designed to protect each participant's data and local model. In addition, encrypted query technology is used in this architecture to provide data privacy matching. The data provider searches the data in ciphertext, finds the encrypted data that meets the conditions, and completes the training process without disclosing any requirements of the task initiator.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"49 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信