Categories

Mobile — 71
NSL — 19
NSL Project — 2

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

by Sungyup Lee on 2017-03-06 05:41:50

Date : 2017. 03. 06(Wed) 04:00 P.M. Locate : EB5. 533 Presenter : Sungyup Lee Title : Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications Author : Ala Al-Fuqaha, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE, Mehdi Mohammadi, Student Member, IEEE, Mohammed Aledhari, Student Member, IEEE, and Moussa Ayyash, Senior Member, IEEE   Abstract : This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaboratedirectlywithouthumaninvolvementtodeliveranewclass of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phaseoftheIoT.Inthecomingyears,theIoTisexpectedtobridge diverse technologies to ... Continue reading →

204 Views

Job and Graduation Story

by Wonjun Hwang on 2016-12-23 17:56:52

Date : 2016. 12. 26 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Wonjun Hwang Title : Job and Graduation Story Download : https://drive.google.com/open?id=0B4UHhoillqlweHlwVXdJc1huU0E Continue reading →

324 Views

Protecting Privacy of BLE Device Users

by Ikhee Shin on 2016-12-16 16:04:01

Date : 2016.12.19(Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin Title : Protecting Privacy of BLE Device Users Author : Kassem Fawaz, Kyu-Han Kim, Kang G. Shin Abstract Bluetooth Low Energy (BLE) has emerged as an attractive technology to enable Internet of Things (IoTs) to interact with others in their vicinity. Our study of the behavior of more than 200 types of BLE-equipped devices has led to a surprising discovery: the BLE protocol, despite its privacy provisions, fails to address the most basic threat of all—hiding the device’s presence from curious adversaries. Revealing the device’s existence is the stepping stone toward more serious threats that include user profiling/fingerprinting, behavior tracking, inference of sensitive information, and exploitation of known vulnerabilities on the device. With thousands of manufacturers and developers around the world, it is very challenging, if not impossible, to envision the ... Continue reading →

324 Views

Idea: A System for Efficient Failure Management in Smart IoT Environments

by Seula Hwang on 2016-12-01 14:19:15

Date : 2016. 12. 05 (Mon) 10:00 A.M. 2016.12.12(Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Seula Hwang Title : Idea: A System for Efficient Failure Management in Smart IoT Environments Author : Palanivel A. Kodeswaran, Ravi Kokku, Sayandeep Sen, Mudhakar Srivatsa Abstract IoT enabled smart environments are expected to proliferate significantly in the near future, particularly in the context of monitoring services for wellness living, patient healthcare and elderly care. Timely maintenance of failed sensors is of critical importance in such deployments to ensure minimal disruption to monitoring services. However, maintenance of large and geographically spread deployments can be a significant challenge. We present Idea that significantly increases the vtime-before-repair for a smart home deployment, thereby reducing the maintenance overhead. Specifically, our approach leverages the facts that (a) there is inherent sensor redundancy when combinations ... Continue reading →

365 Views

Simultaneous Localisation and Mapping (SLAM): Part I The Essential Algorithms

by Juyeob Kim on 2016-11-25 20:19:28

Date : 2016. 11. 28 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jooyeob Kim Title : Simultaneous Localisation and Mapping (SLAM): Part I The Essential Algorithms Author : Hugh Durrant-Whyte Abstract This tutorial provides an introduction to Simultaneous Localisation and Mapping (SLAM) and the extensive research on SLAM that has been undertaken over the past decade. SLAM is the process by which a mobile robot can build a map of an environment and at the same time use this map to compute it's own location. The past decade has seen rapid and exciting progress in solving the SLAM problem together with many compelling implementations of SLAM methods. Part I of this tutorial (this paper), describes the probabilistic form of the SLAM problem, essential solution methods and significant implementations. Part II of this tutorial will be concerned with recent advances incomputational methods and new formulations of the SLAM problem for large scale and complex ... Continue reading →

359 Views

Presentation Rehearsal for Graduation thesis

by Jinyoung Choi on 2016-11-07 08:30:33

Date : 2016. 11. 07 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : 스마트폰의 상황정보와 스마트워치의 PPG 센서를 이용한 사용자 부정적 감성 예측 모델 Author : Jinyoung Choi   Continue reading →

421 Views

Presentation rehearsal for IEMEK conf' 2016 - 2

by Ikhee Shin on 2016-10-31 09:25:06

Date : 2016. 10. 31 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Evaluation of low power features in wearable OS Author : Ikhee Shin, Sungyup Lee, Hyungshin Kim   Abstract : Wearable devices have limited hardware resources because of its small battery capacity. An embedded operating system is necessary to provide services with limited hardware resources. power management is also required to handle services efficiently with a small battery capacity. We introduce Wearbench, a low power feature benchmark for wearable application, and use Wearbench to measure power consumption of embedded operating systems for nanoQplus, FreeRTOS, and ChibiOS. From the result, we suggest how to improve low power feature of embedded operating systems. Proceeding : Proceedings of Institute of Embedded Engineering of Korea 2016, November, 2016 Continue reading →

319 Views

Presentation rehearsal for IEMEK conf' 2016

by Jinse Kwon on 2016-10-30 22:51:11

Date : 2016. 10. 31 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : A Disaster Warning System Using Ultrasound Modulation and Bluetooth Ad-hoc Network Author : Jinse Kwon, Jemin Lee, Hyungshin Kim   Abstract : A warning system is important to protect people and property from a disaster. Current disaster warning system could easily be collapsed by a disaster because it strongly depends on cell towers for mobile communication. In this paper, we present the ad hoc network to easily and rapidly update the disaster information using the ultrasound modulation and Bluetooth advertising mode in the communication failure state. Our system shows that a smartphone can detect modulation packets up to 720bit/s with bit-error-rate lower than 10-3. In addition, the Bluetooth ad hoc network in an advertising mode reduces the round trip delay between nodes and battery loss by adjusting the advertising period. Proceeding ... Continue reading →

303 Views

Learning sound location from a single microphone

by Do Trung Hai on 2016-10-27 11:07:44

Date : 2016. 11. 14 (Mon) 10:00 A.M. Location: EB5. 533 Presenter: Do Trung Hai   Seminar Title: Learning sound location from a single microphone Author: Ashutosh Saxena; Andrew Y. Ng  (Computer Science Department, Stanford University, CA 94305, USA) Abstract: We consider the problem of estimating the incident angle of a sound, using only a single microphone. The ability to perform monaural (single-ear) localization is important to many animals; indeed, monaural cues are also the primary method by which humans decide if a sound comes from the front or back, as well as estimate its elevation. Such monaural localization is made possible by the structure of the pinna (outer ear), which modifies sound in a way that is dependent on its incident angle. In this paper, we propose a machine learning approach to monaural localization, using only a single microphone and an “artificial pinna” (that distorts sound in a direction-dependent way). Our ... Continue reading →

257 Views

dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel

by Sihyeong Park on 2016-10-17 20:30:38

Date: 2016.11.24(Mon) 10:00 A.M. Locate: EB5. 533 Presenter: Sihyeong Park Title: dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel Author: Martin Hoffmann, Florian Lukas, Christian Dietrich, Daniel Lohmann Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, such as bit flips caused by cosmic radiation, nowadays also affect automotive and other cost-sensitive “ground-level” control systems. For such cost-sensitive systems, many software-based measures have been suggested to harden applications against transient effects. However, all these measures assume that the underlying operating system works reliably in all cases. We present software-based concepts for constructing an operating system ... Continue reading →

271 Views

An RF doormat for tracking people's room locations

by Jinse Kwon on 2016-10-16 19:41:39

Date : 2016. 10. 16 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : An RF doormat for tracking people's room locations Author : Juhi Ranjan,Yu Yao, Kamin Whitehouse (University of Virginia, Charlottesville, VA, USA)   Abstract : Many occupant-oriented smarthome applications such as automated lighting, heating and cooling, and activity recognition need room location information of residents within a building. Surveillance based tracking systems used to track people in commercial buildings, are privacy invasive in homes. In this paper, we present the RF Doormat - a RF threshold system that can accurately track people's room locations by monitoring their movement through the doorways in the home. We also present a set of guidelines and a visualization to easily and rapidly setup the RF-Doormat system on any doorway. To evaluate our system, we perform 580 doorway crossings across 11 different doorways in a home. ... Continue reading →

225 Views

Presentation rehearsal for Smarttention 2016

by Jemin Lee on 2016-08-30 16:26:18

Date : 2016. 08. 31 (Wed) 10:00 A.M. Locate: EB5. 533 Presenter: Jemin Lee Seminar Title: Presentation Rehearsal for Smarttention 2016 I am planning to do a presentation with regard to my work, entitled "Reducing Distraction of Smartwatch Users with Deep Learning" in upcoming workshop. For preperation, the rehearsal will be tomorrow. For more inforamtion, vist http://mhci16.smarttention.com/#program         Continue reading →

279 Views

전달 세미나 : RTCSA 2016

by Seula Hwang on 2016-08-23 20:13:41

Date : 2016. 08. 24 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Seminar Title : Reviews for IWCPS 2016 and RTCSA 2016 Continue reading →

287 Views

Beetle: Flexible Communication for Bluetooth Low Energy

by Jinse Kwon on 2016-08-08 10:39:27

Date : 2016. 08. 10 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Beetle: Flexible Communication for Bluetooth Low Energy Author : Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein   Abstract : The next generation of computing peripherals will be low power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low Energy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive applications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are impossible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without ... Continue reading →

311 Views

Understanding the Characteristics of AndroidWear OS

by Jemin Lee on 2016-08-01 17:29:16

Date : 2016. 08. 03. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee   Title: Understanding the Characteristics of AndroidWear OS Author: Renju Liu and Felix Xiaozhu Lin Abstract  Interactive wearable devices bring dramatic changes to apps and hardware, leaving operating system (OS) design in the mist. To this end, we thoroughly examine the execution efficiency of Android Wear, a popular wearable OS. By running a suite of fifteen bench marks, we profile four system aspects: CPU usage, idle episodes, thread-level parallelism, and microarchitectural behaviors. We present the discovered inefficiencies and their root causes, together with a series of widespread, yet unknown OS design flaws. Towards designing future wearable OSes, our study has yielded a generic lesson, key insights, and specific action items.   Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services ... Continue reading →

321 Views