{"title":"A study of mobile advertisement recommendation using real big data from AdLocus","authors":"T. Wu, Shih-Hau Fang, Yong-Bin Wu, Cheng-Tse Wu, Jen-Wei Huang, Yu Tsao","doi":"10.1109/GCCE.2016.7800364","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800364","url":null,"abstract":"AdLocus is an APP developed by HyXen Company for mobile advertisements. This advertising software can push the message to the target users within specified locations. Based on the real big data provided by AdLocus, we design a dynamic advertisements recommendation system to increase the advertising efficiency. The proposed method uses the regression models and the click probability to recommend the amount of mobile advertisements for every 30 minutes. The results show that our recommendation can efficiently raise the successful clicking rate to satisfy the required clicks number. Moreover, the proposed method avoids the redundant advertisements to reduce the system cost.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shintaro Saika, Saki Takahashi, Masaru Takeuchi, J. Katto
{"title":"Accuracy improvement in human detection using HOG features on train-mounted camera","authors":"Shintaro Saika, Saki Takahashi, Masaru Takeuchi, J. Katto","doi":"10.1109/GCCE.2016.7800373","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800373","url":null,"abstract":"Nowadays, researches on accident prevention using train-mounted cameras had been progressing. Our proposed method considers temporal continuity between frames by using motion vectors in addition to conventional thresholding on similarity values obtained by a human detection method using HOG features. Experiments show the effectiveness of our method as compared with a previous method using only HOG features.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved power routing algorithm for power packet distribution system","authors":"C. Reza, D. Lu","doi":"10.1109/GCCE.2016.7800436","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800436","url":null,"abstract":"Recently proposed power packet (PP) distribution system can reduce stand-by power, improve the traditional power distribution system efficiency using less power processing stages, and monitor load demand intelligently from source side to keep the power system stable. Each PP includes header and footer bits which are used to distribute the PP. Reduced footer bit can save the transitional switching loss. A modified PP format with reduced footer bit and an improved algorithm to route the PP to the objective loads are proposed in this paper and verified by the experimental results.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation and analysis of system latency of edge computing for multimedia data processing","authors":"Kentaro Imagane, Kenji Kanai, J. Katto, T. Tsuda","doi":"10.1109/GCCE.2016.7800393","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800393","url":null,"abstract":"In order to analyze system latency of edge computing for multimedia data processing, we propose a model of system latency of two different distributed processing scenarios: pipeline and parallel processing. We validate the model by using actual cloud services and human detection processing.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Out-of-band authentication protocol for digital signage and smartphone interaction","authors":"Hirotaka Nakajima, Shigeya Suzuki, Tetsuro Tokunaga, Kiyoshi Tanaka, Y. Miyazaki, Koichi Maruyama, Osamu Nakamura","doi":"10.1109/GCCE.2016.7800428","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800428","url":null,"abstract":"An interactive digital signage system which allow users to fetch detailed information using their smartphone is widely deployed. Bluetooth Low Energy(BLE) broadcast beacon is a one of possible method to broadcast a detailed information to users. However, BLE beacon doesn't provide a way to assay an authenticity of beacon since BLE broadcast is insecure untrusted communication. Out-of-band authentication is used to improve trustworthiness for such untrusted pathway. A new authentication protocol is proposed to assay the authenticity of digital signage when the information is broadcasted via BLE beacon. The authors implement the protocol and evaluate its effectiveness.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-UAV tracking and scanning systems in M2M communication for disaster response","authors":"Maher Aljehani, M. Inoue","doi":"10.1109/GCCE.2016.7800524","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800524","url":null,"abstract":"Natural disasters (e.g. earthquake, tsunami, and eruption) are unavoidable casualties in the history of human being. In many incidents, people die due to lack of data such as the status of evacuation routes, pedestrians' traffic in the impacted area and real-time alert systems. Employing Unmanned Aerial Vehicles (UAVs) in this field of research is so beneficial for multiple reasons. For instance, UAV has a high-speed of covering areas, route's safety, constructions' conditions and pedestrians' movements aerially and without human interfering in real-time.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132752663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A delta-sigma modulator-based class-D amplifier","authors":"Chien-Hung Kuo, Shengyue Lin","doi":"10.1109/GCCE.2016.7800440","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800440","url":null,"abstract":"A new architecture of class-D amplifier with a multibit delta-sigma modulator control is presented in this paper. In the presented amplifier, the 3-bit 8-level digital outputs of the second-order delta-sigma modulator are utilized to generate switching signals with different pulse widths for the class-D power amplifier. A closed-loop class-D amplifier is adopted by feeding the analog output signal from the power stage to the input to improve the linearity. The presented class-D amplifier is simulated with TSMC 0.18-μm CMOS process. The SNDR of the proposed amplifier is 78 dB within a 25 kHz signal bandwidth under a sample rate of 2.56 MHz. The THD is 0.01% at a power consumption of 140 mW.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An on-screen keyboard for over-the-top set-top boxes using an open source operating system","authors":"Ying-Wen Bai, Chi-Jung Lee","doi":"10.1109/GCCE.2016.7800370","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800370","url":null,"abstract":"Currently when users use Over-The-Top (OTT) Set-top Boxes (STBs) to input text using a traditional QWERTY on-screen keyboard, users often spend most of their time to move their eye concentration between various keys. Thus, this paper proposes an on-screen keyboard for OTT STBs to be used with an open source operating system. This on-screen keyboard uses a three-step hierarchical design, so users can omit the steps of moving their focus between the various keys. This design allows users to reduce the number of button operations on the remote controller (RC), to speed up their text entry speed and to reduce their input time.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shen-Li Chen, Yu-Ting Huang, Chih-Ying Yen, K. Chen, Yi-Cih Wu, Jia-Ming Lin, Chih-Hung Yang
{"title":"ESD protection design for the 45-V pLDMOS-SCR (p-n-p-arranged) devices with source-discrete distributions","authors":"Shen-Li Chen, Yu-Ting Huang, Chih-Ying Yen, K. Chen, Yi-Cih Wu, Jia-Ming Lin, Chih-Hung Yang","doi":"10.1109/GCCE.2016.7800464","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800464","url":null,"abstract":"An evaluation of electrostatic-discharge (ESD) reliability by changing the source-end layout of 45-V HV pLDMOS devices is investigated in this paper. After testing and systematic analysis, it can be found that a traditional pLDMOS sample is always very weak in ESD issues (It2= 0.107-A). At the same time, if a pLDMOS with a stripe type embedded SCR (p-n-p-arrangement in the drain-end); the corresponding secondary breakdown-current value can be improved about 501.9% as comparing with a pure pLDMOS. Furthermore, when a pLDMOS-SCR possesses the p-n-p-arranged stripe type and source discrete technique, the trigger voltage (Vt1) values of these samples are all about 45-V ~ 47-V. Next, the holding-voltage (Vh) values were slowly increased with the OD-rows number decreased. Also, the secondary breakdown-current (It2) capabilities are upgraded to 3-A ~ 4-A except for S_DIS 3. Eventually, it can be concluded that a discrete distribution in the source region of a pLDMOS-SCR will upgrade the anti-ESD capability effectively as this embedded SCR is p-n-p-arranged in the drain side.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly secure transaction system for affiliate marketing","authors":"M. Iwashita, S. Tanimoto","doi":"10.1109/GCCE.2016.7800492","DOIUrl":"https://doi.org/10.1109/GCCE.2016.7800492","url":null,"abstract":"Lots of players, such as content holders, platform service providers, and application service providers are expected to continue to grow rapidly along with the utilization of electronic commerce. Moreover, increase in affiliate marketing might induces the appearance of many agents who manage billing areas in the near future. Because a large number of transactions are sent and received through the network, there are many possibilities for each transaction to be falsified. Undoubtedly, billing management is critical; thus, counter-measures are necessary to ensure the success of each transaction. This paper proposes a highly secure transaction system, especially for the growing affiliate marketing.","PeriodicalId":416104,"journal":{"name":"2016 IEEE 5th Global Conference on Consumer Electronics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}