{"title":"Enhanced Model of Long-Short Term Memory for Music Generation in Hardware","authors":"Thinh Do Quang, Trang Hoang","doi":"10.1109/ICCE55644.2022.9852030","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852030","url":null,"abstract":"Music generation becomes an economically important research field for the time being since the rapid growth of the entertainment industry. Among various methods for creating music, Long-Short Term Memory, or LSTM, is a preferable way for creating sequence of music notes while maintaining the harmony. This study proposes an enhanced LSTM model in hardware where the range of notes are also included in the generation process as a new factor. Data that comes in and out the LSTM are handled under normalization to reduce the range of note sequence, as well as to increase the consonance. Measurements were taken on the proposed LTSM, and another basic one, which were both implemented on hardware, to analyze the quality of the proposed LSTM and also the impact of the note range over the generation process. It appeared that the proposed LSTM could reach the harmony much efficiently based on the note range analysis; and achieve it faster than the basic LSTM since a smaller number of epoch was required. Those results indicate that LSTM can work with additional factor to improve its quality, rather than concentrating only on the data values.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Axial Attention MLP-Mixer: A New Architecture for Image Segmentation","authors":"Hong-Phuc Lai, Thi-Thao Tran, Van-Truong Pham","doi":"10.1109/ICCE55644.2022.9852066","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852066","url":null,"abstract":"Recently, the MLP-Mixer model has received much attention in vision problems. The advantage of this model is that by using only multi-layer perceptron (MLP) blocks, the model could build well the long-range dependencies of the input patches when pre-trained on huge data sets. Recognizing the importance of information positions in patch processing and the advantage of using MLPs, in this study, we proposed an Axial Attention MLP-Mixer model, shorted as AxialAtt-MLP-Mixer for image segmentation problem. In particular, inspired by advanced attention mechanisms along with position embedding, we proposed a new token layer that replaces the token mixing in the MLP-Mixer model to make the model more aware of global information. In addition, we propose a new model using MLP-Mixer architecture and an axial attention token layer. Through evaluation on two datasets: GlaS and Data Science Bowl 2018, we indicate the superiority of the proposed method along with the ability to get good results right on small datasets without pre-training.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126157832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Dam, G. Houzet, T. Lacrevaz, Gwenaёl Gaborit, T. Vuong
{"title":"Investigation of phase compensation lens to improve the gain of Vivaldi antenna in Ka-band","authors":"T. Dam, G. Houzet, T. Lacrevaz, Gwenaёl Gaborit, T. Vuong","doi":"10.1109/ICCE55644.2022.9852039","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852039","url":null,"abstract":"We present in this paper a method to increase the gain of our directive Vivaldi antenna without increasing the size of the antenna. Based on the theory of E-field phase difference correction, a phase compensation lens (PCL) has been added to the antenna. The most basic unit cell, rectangular unit cell, has been used to build the lens to facilitate the evaluation of the advantages and the limitations of this method. Our antennas have a good impedance matching in the Ka-band (26-40 GHz). The antenna gain enhancement is about 0.4 - 1.4 dBi using this method while the size of the antenna is unchanged.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114496083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Optimal Channel Uses in Ultra-Reliable Short-Packet Relaying Communications","authors":"T. Chu, H. Zepernick, T. Duong","doi":"10.1109/ICCE55644.2022.9852051","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852051","url":null,"abstract":"To support ultra-reliable low latency communication (URLLC) services in fifth-generation mobile networks, short-packet transmission is essential. However, due to the limited packet size, errors cannot be reduced to arbitrarily low levels for a given coding rate as for conventional communication systems covered by the Shannon theory. In this paper, we consider URLLC in dual-hop decode-and-forward relaying networks where the channel in each hop varies fast. A simple but efficient optimization of the block lengths is performed to minimize the block error rate (BLER) of the proposed system. In particular, we deploy machine learning models using the linear regression and normalized method to determine the optimal fraction of channel uses for the transmission over each hop. Numerical results show that the BLER of the consider relaying system with optimal block lengths for each hop based on the machine learning model outperforms conventional relaying systems with equal block lengths.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129697473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Common-Mode Voltage Reduction in Two-Level Voltage Source Inverter with Carrier-Based PWM Strategies","authors":"Phong Nguyen Hong Le, Nho-Van Nguyen","doi":"10.1109/ICCE55644.2022.9852084","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852084","url":null,"abstract":"Common-mode voltage (CMV) is known as a popular problem in voltage source inverter (VSI) which leads to a large number of failures in VSI-based systems. This paper presents a carrier-based PWM technique to mitigate CMV for a two-level VSI. The proposed algorithm is based on the principle that zero voltage vectors must be neglected in the switching patterns so that only active vectors are utilized. This leads to the result that the CMV amplitude is limited to one-sixth of DC voltage source. There are four different switching patterns are proposed and analyzed so that a carrier-based PWM (CBPWM) technique for CMV reduction is developed. A MATLAB/Simulink model is built to verify the theoretical analysis. Harmonic distortion factors are also be presented to evaluate the performance of the proposed strategies.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129643615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Vo-Le, Hung Sy Vo, Thien Duy Vu, Nguyen Hong Son
{"title":"Violence Detection using Feature Fusion of Optical Flow and 3D CNN on AICS-Violence Dataset","authors":"C. Vo-Le, Hung Sy Vo, Thien Duy Vu, Nguyen Hong Son","doi":"10.1109/ICCE55644.2022.9852065","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852065","url":null,"abstract":"In this paper, we introduce a new self-developed violence dataset named AICS-Violence. It contains 7576 high-resolution video clips of violent and non-violent scenarios collected by outdoor security cameras. It includes two different test sets with additional non-violent but seemingly violent actions as well. One of those test sets has data collected using a different camera angle compared to that of the training set and the remaining test set. To focus on each group of people in frames, we develop a method to automatically crop candidate boxes from detected human bounding boxes. Furthermore, two methods named 3D DenseNet Fusion OF RGB and 3D DenseNet Fusion OFnom RGB are proposed. In both methods, two 3D DenseNets are used to extract features from RGB and visualized optical flow respectively. Then, two different ways of fusion namely addition and normalization-based multiplication are applied to the two methods respectively. Evaluation results show that our methods achieve slightly better performance in the first test set and especially significantly better generation than those of some other state-of-the-art methods on the second test set.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Van Nhan Vo, Ha Le Vu, Nguyen Quoc Long, Hung Tran, Dang Viet-Hung, Cong Le, Tu Dac Ho
{"title":"Protection Solution for an EH IoT Networks Under a Cooperative UAV Eavesdropper and Malicious Jammer Attack","authors":"Van Nhan Vo, Ha Le Vu, Nguyen Quoc Long, Hung Tran, Dang Viet-Hung, Cong Le, Tu Dac Ho","doi":"10.1109/ICCE55644.2022.9852028","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852028","url":null,"abstract":"Secrecy and system performance are major concerns when implementing the Internet of Things (IoT) paradigm in fifth-generation (5G) communication networks. The detection capability and system performance of an energy harvesting (EH) Internet of Things (IoT) architecture are explored in the presence of an unmanned aerial vehicle (UAV) eavesdropper (UAV EAV). The communication protocol is divided into two phases as follows: 1) a friendly jammer detects the UAV EAV and the relays harvest energy from a power beacon (PB) in the first phase. 2) a ground base station (BS) sends a confidential signal to relays; the selected relay then uses its harvested energy to forward this confidential signal to IoT destinations (IDs) using the decode-and-forward (DF) technique. Simultaneously, the friendly jammer generates an artificial signal to counteract the detected UAV EAV in the second phase. In this Word, a closed-form expression for the probability of detecting the UAV EAV is derived to analyze the detection performance. Furthermore, the leakage probability and outage probability of the considered IoT architecture are determined. Finally, Monte Carlo simulations are employed to verify our approach.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ta Thi Kim Hue, Nguyen Gia Duoc Nguyen Duy Tuan, An Braeken, K. Steenhaut, Kieu-Ha Phung Seee
{"title":"Effective Authentication Mechanism for Vehicular Fog Infrastructure","authors":"Ta Thi Kim Hue, Nguyen Gia Duoc Nguyen Duy Tuan, An Braeken, K. Steenhaut, Kieu-Ha Phung Seee","doi":"10.1109/ICCE55644.2022.9852081","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852081","url":null,"abstract":"Recently, a tangible vehicular fog computing (VFC) platform based on oneM2M, called oneVFC, has been proposed. This platform enabled federated AI learning, but did not include sufficient attention to security. Therefore, this paper proposes an effective authentication and key agreement protocol based on the Elliptic curve cryptography (ECC) to enhance privacy preservation in an authenticated way in order to ensure safer AI training. Experimental results show that the proposed authentication mechanisms make reliable transmissions in highly-mobile vehicular networks possible, resulting in a desirable quality of service (QoS). The performance and security strength of two authenticated encryption modes of AES, GCM and CCM, are also compared and evaluated.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121220892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CNN quantization for anatomical landmarks classification from upper gastrointestinal endoscopic images on Edge Devices","authors":"M. Le, Quang Tung Nguyen, V. Dao, Thanh-Hai Tran","doi":"10.1109/ICCE55644.2022.9852098","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852098","url":null,"abstract":"In recent years, Artificial Intelligence (AI) has played an important role in our daily life. Especially convolutional neural network (CNN) in medical image analysis has been getting more and more attention recently. Using CNN on a portable medical device (such as edge devices) can give out a handy yet accurate disease diagnosis in the medical field. However, the CNNs require a high amount of computing resources which limit the use of CNNs on edge devices. By reducing the size of CNN models while keeping high accuracy, it is easier to integrate CNN onto an edge device for real-time uses. This paper investigates and compares two strategies for CNN quantization to reduce the number of resources required. The first two-stages strategy is based on post-training quantization where the CNN is firstly trained conventionally then post-quantized to achieve its lightweight version. The second one-stage strategy conducts the quantization directly during CNN model training. On the one hand, we discuss the main advantages as well as the drawbacks of each strategy. On the other hand, we implement a state-of-the-art CNN model (i.e. MobileNet-V2) and quantitatively evaluate the performance of the original model with two lightweight models produced by post-quantization and aware training quantization in terms of accuracy and memory requirement. Experiments, conducted on a dataset of endoscopic images for the task of anatomical landmarks classification, show the potential to deploy such techniques on edge devices.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of DNN-based diagnostic platform for self-diagnosis of electric vehicle automatic transmission controller production equipment","authors":"R. Kim, S. Oh, J. Kim","doi":"10.1109/ICCE55644.2022.9852022","DOIUrl":"https://doi.org/10.1109/ICCE55644.2022.9852022","url":null,"abstract":"Recently, with the remarkable development of artificial intelligence technology, a technique for monitoring and predictive maintenance (PdM) of industrial equipment performance based on production data is attracting attention. PdM is emerging as the most effective solution in terms of equipment defect diagnosis and remaining life evaluation in smart manufacturing and industrial big data platforms. In this paper, we predict in advance the cause of poor performance in production equipment that occurs during mass production of SCU (Shift-by-wire Control Unit) controller, a type of automatic transmission applied to electric vehicles. Finally, by applying data-based PdM, we propose an AI (Artificial Intelligence)- based self-diagnosis system for production equipment that enables workers to respond quickly before malfunction occur.","PeriodicalId":388547,"journal":{"name":"2022 IEEE Ninth International Conference on Communications and Electronics (ICCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130254632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}