{"title":"Hardware Design of Intrusion Detection System for Automotive CAN Bus Using Random Forest","authors":"Daegi Lee, C. Han, Seongsoo Lee","doi":"10.1109/ICEIC57457.2023.10049883","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049883","url":null,"abstract":"Controller area network (CAN) bus is a reliable protocol that connects electronic control units in a vehicle to send and receive control data for driving a vehicle. However, CAN-bus is quite weak against external attacks since it was not designed considering cybersecurity. In this paper, we propose an intrusion detection system (IDS). It monitors data frames on CAN bus, and detects spoofing attack using random forest, one of the machine learning techniques. When combined with node exclusion system (NES) in the previous works, IDS can effectively detect the hacked node and NES can exclude it from the CAN bus. The proposed IDS and NES have been designed and verified with Modelsim simulator.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":" 69","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alliah May Eugenio, Marian Jowie Patulot, Lykha Jane Seguiro, Angelica Nicole Tuazon, Shekinah Lor B. Huyo-a, Mideth B. Abisado, G. Sampedro
{"title":"EyeRis: Visual Image Recognition using Machine Learning for the Visually-Impaired","authors":"Alliah May Eugenio, Marian Jowie Patulot, Lykha Jane Seguiro, Angelica Nicole Tuazon, Shekinah Lor B. Huyo-a, Mideth B. Abisado, G. Sampedro","doi":"10.1109/ICEIC57457.2023.10049927","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049927","url":null,"abstract":"Visually impaired people struggle daily and have difficulty recognizing and distinguishing objects around them. Thus, they mainly depend on supervision from other people to assist them. Since smartphones have become a necessity in this modern world, the researchers formulated a solution to help the visually impaired through a machine learning-based mobile application for object recognition. Nowadays, software applications can provide accurate findings in picture classification and processing processes thanks to machine learning techniques and algorithms. In this study, the researchers use a convolutional neural network (CNN)-based system on TensorFlow Lite to create a mobile version of a visual information system employing a machine learning strategy and deep learning framework. The main objectives of the smartphone application, EyeRis, is to recognize and categorize items in real-time and to separate photographs from the user-selected scenarios. Results were analyzed and contrasted based on the app’s obtained recognition accuracy data. It demonstrated the utility of CNN as a model for image recognition algorithms.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin-Hyuk Choi, Heunseung Lim, Sang-Suk Yun, Minwoo Shin, J. Paik
{"title":"Image Stitching Method for Surround View Image without Seamline","authors":"Jin-Hyuk Choi, Heunseung Lim, Sang-Suk Yun, Minwoo Shin, J. Paik","doi":"10.1109/ICEIC57457.2023.10049955","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049955","url":null,"abstract":"The surround view system delivers the surrounding environment to the driver in a top-down manner so that the driver can recognize blind spots. In this system, image stitching is combining camera images facing different directions into a single image. As an easy-to-access method, there is a method of warping through homography by extracting and matching the features of the images to be stitched. However, this method has a limitation in that stitching is not performed properly if the geometric distortion is severe. In order to solve this problem, a method of estimating a seam and stitching images is being studied in many existing methods, and a representative method is a method using a distance matrix using the difference of gradient components. However, this method has a problem of falling into the local minima and causing a loop phenomenon. To solve this problem, we propose a seamline estimation method using ℓ0-norm based gradient priors. The optimal seam can be found by obtaining the energy matrix through ℓ0-gradient priors and estimating the distance matrix through this. In this method, improved seam estimation is possible because the shortest distance is calculated as the point where the rate of change between the two images is minimized.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hojin Choi, Hyuk Kwon, Junghee Lee, Yonghee Lee, Kijoong Kim
{"title":"Hardware-Based Isolation Technique to Guarantee Availability of Security Controls in a Gateway for Industrial Networks","authors":"Hojin Choi, Hyuk Kwon, Junghee Lee, Yonghee Lee, Kijoong Kim","doi":"10.1109/ICEIC57457.2023.10049871","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049871","url":null,"abstract":"Protocols such as DNP and Modbus are widely used in many industrial networks, and security controls are often employed in a protocol gateway placed in-between public and trusted networks. In this paper, an architecture is proposed to protect the security controls running in a hardware-isolated space by providing an isolation environment to the protocol stack and security controls via TrustZone, even if the protocol stack is compromised. In addition, we evaluate whether our proposed architecture can protect against attack scenarios such as manipulation commands, information leakage, and fuzzing attacks, and we compare the performance of the gateway with and without TrustZone.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngsu Kwon, Jinho Han, Yongcheol Peter Cho, Juyeob Kim, Jaehoon Chung, Jaewoong Choi, Sujin Park, Igyeong Kim, Hyunjeong Kwon, Jinkyu Kim, Hyun-Mi Kim, Won Jeon, Youngdeuk Jeon, Minhyung Cho, Minseok Choi
{"title":"Chiplet Heterogeneous-Integration AI Processor","authors":"Youngsu Kwon, Jinho Han, Yongcheol Peter Cho, Juyeob Kim, Jaehoon Chung, Jaewoong Choi, Sujin Park, Igyeong Kim, Hyunjeong Kwon, Jinkyu Kim, Hyun-Mi Kim, Won Jeon, Youngdeuk Jeon, Minhyung Cho, Minseok Choi","doi":"10.1109/ICEIC57457.2023.10049867","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049867","url":null,"abstract":"The scale of neural networks for Artificial Intelligence is ever increasing to achieve human-level intelligence. The era of data explosion computing is evolving with the advent of the huge AI network operating on huge amount of data including parameters, images, sentences, and etc. Designing AI processor which is the computational foundation of the data explosion computing is facing physical limitation of semiconductors as well as skyrocketing cost. The chiplet processor integrating multiple dies into a single chip is a viable solution to deal with AI processors for data explosion computing. The chiplet-based design compared to IP-based design provides much higher performance with lower cost. In this paper, we present design aspects of chiplet AI processor including the architecture design for incorporating NPU chiplets, HBM chiplets, and 2.5D interposers, signal integrity for high-speed interconnections on the interposer, PDN for chiplets, chiplet-bonding reliability, thermal stability, and chiplet link for inter-chiplet data transfer on heterogeneous integration architecture.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"138 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Genevive Macrayo, Wilfredo Casiño, Jerecho Dalangin, Jervin Gabriel Gahoy, Aaron Christian Reyes, Christian Vitto, Mideth B. Abisado, Shekinah Lor B. Huyo-a, G. Sampedro
{"title":"Please Be Nice: A Deep Learning Based Approach to Content Moderation of Internet Memes","authors":"Genevive Macrayo, Wilfredo Casiño, Jerecho Dalangin, Jervin Gabriel Gahoy, Aaron Christian Reyes, Christian Vitto, Mideth B. Abisado, Shekinah Lor B. Huyo-a, G. Sampedro","doi":"10.1109/ICEIC57457.2023.10049865","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049865","url":null,"abstract":"The internet has grown throughout time from a means for information distribution to a multipurpose tool that allows people to communicate, meet, and interact with one another. In socializing online, sending images with cultural and relatable context, otherwise known as memes, has become a common practice. Memes are sent everywhere, from forums and posts to even private messages. They are famous for converging thoughts, current events, or symbols creatively and colloquially. It combines text with a visual graphic and conveys many emotions, including hatred, which can harm other netizens. As a tool for communication, it can be used to convey humor or even as a tool for cyberbullying through hateful speech. Since memes are sent in image form, filtering out hateful speech in the form of memes can be difficult. To address this rising issue, researchers explore the use of deep learning approaches to detect hate speech on multimodal memes as a systematic approach for eliminating hate speech. The model performed well in this investigation, with an overall accuracy of 62.5%. When identifying pictures, it also has a high proportion of precision (71.37%). This brings the suggested model’s ability to detect hate speech in memes to a close.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Droplet Routing based on a Shape-Dependent Velocity Model on MEDA Biochips","authors":"Chiharu Shiro, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama, Shigeru Yamashita","doi":"10.1109/ICEIC57457.2023.10049887","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049887","url":null,"abstract":"Digital microfluidic biochips (DMFB) have attracted attention in the biochemical and medical industries. A micro electrode dot array (MEDA) biochip reduces limitations of DMFB which have limitations on droplet size, shape, direction of movement, and sensor. In particular, it is known that the droplet moves at a different velocity model if the shape is changed. However, routing of multiple droplets at the same time with shape-dependent velocities has not been considered in the past. In this paper, we propose a multi-droplet routing technique for MEDA biochips with shape-dependent velocity of droplets. The proposed technique takes the advantage of velocities dependent on the shapes and aim to reduce the overall routing time of droplets from sources to destinations. Simulation results show that the proposed technique shortens the routing time by 90% on average compared to the state-of-the-art technique.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ambulance Dispatch Scheme based on Maximum Flow Minimum Cost models","authors":"Junghoon Lee, Jihyun Park, Eunjeong Park","doi":"10.1109/ICEIC57457.2023.10049923","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049923","url":null,"abstract":"This paper designs an ambulance dispatch scheme capable of efficiently coping with demand surge coming from catastrophic situations, taking advantage of the minimum cost maximum flow algorithm. In addition to basic links connections from the source to the sink, links from patients to ambulances are created according to whether the medical equipment in the rescue vehicle fits the patient. The link cost is set to the product of the criticality level of the patient and the distance to the vehicle. The performance measurement result, obtained by a prototype implementation, shows that the proposed scheme can reduce the response time for the patient of highest criticality by up to 33 %, compared with the case only the distance factor is taken into account.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct Phase Control in Digital Phase-Locked Loop Mitigating Loop Delay Effect inside Digital Filter","authors":"In-Woo Jang, Min-Seong Choo","doi":"10.1109/ICEIC57457.2023.10049900","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049900","url":null,"abstract":"A digital phase-locked loop (DPLL) consists of a time-to-digital converter (TDC) or phase detector (PD), a digital loop filter (DLF), an oscillator, and a divider. DPLL has several advantages over traditional analog charge-pump (CP) PLL. It is resistant to process, voltage, and temperature (PVT) variations and has a large voltage and frequency synthesis range. To achieve the desired bandwidth, CPPLLs require large capacitance that occupies a significant silicon area. In comparison, DPLL can reduce the size of the filter capacitor. The synthesized frequency or phase of the DPLL is adjusted both with the proportional and integral path inside the DLF. It is difficult to adjust the frequency all at once with a large proportional gain. And if the delay is formed in the entire loop of the PLL, there is a problem in that the stability of the loop is reduced. An improved DPLL model to overcome the aforementioned defects is proposed and validated in this manuscript.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiayue Wang, Ren Wang, Tae Sung Kim, Jin-Sung Kim, Hyuk-Jae Lee
{"title":"Diagnose Label Errors for 3D Object Classification","authors":"Jiayue Wang, Ren Wang, Tae Sung Kim, Jin-Sung Kim, Hyuk-Jae Lee","doi":"10.1109/ICEIC57457.2023.10049969","DOIUrl":"https://doi.org/10.1109/ICEIC57457.2023.10049969","url":null,"abstract":"3D object classification is widely used in many real-life scenarios and has recently become a popular research area. Meanwhile, 3D datasets tend to be larger and more complex, increasing the difficulty of labeling. Since label errors in test data affect the accuracy of model evaluation and analysis, this study proposes a multi-view post-training label refinery protocol to clean the label errors in test data. Experimental results on ModelNet40 show that 4.58% of test samples are selected as label-error candidates and 29.2% of them are relabeled. On this basis, this study analyzes the weakness of ModelNet40 and provides suggestions for future dataset construction.","PeriodicalId":373752,"journal":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126929946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}