Mobile — 78
NSL — 22
NSL Project — 2

Presentation Rehearsal for Graduation thesis

by Jinyoung Choi on 2016-11-07 08:30:33

Date : 2016. 11. 07 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : 스마트폰의 상황정보와 스마트워치의 PPG 센서를 이용한 사용자 부정적 감성 예측 모델 Author : Jinyoung Choi   Continue reading →


Presentation rehearsal for IEMEK conf' 2016 - 2

by Ikhee Shin on 2016-10-31 09:25:06

Date : 2016. 10. 31 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Evaluation of low power features in wearable OS Author : Ikhee Shin, Sungyup Lee, Hyungshin Kim   Abstract : Wearable devices have limited hardware resources because of its small battery capacity. An embedded operating system is necessary to provide services with limited hardware resources. power management is also required to handle services efficiently with a small battery capacity. We introduce Wearbench, a low power feature benchmark for wearable application, and use Wearbench to measure power consumption of embedded operating systems for nanoQplus, FreeRTOS, and ChibiOS. From the result, we suggest how to improve low power feature of embedded operating systems. Proceeding : Proceedings of Institute of Embedded Engineering of Korea 2016, November, 2016 Continue reading →


Presentation rehearsal for IEMEK conf' 2016

by Jinse Kwon on 2016-10-30 22:51:11

Date : 2016. 10. 31 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : A Disaster Warning System Using Ultrasound Modulation and Bluetooth Ad-hoc Network Author : Jinse Kwon, Jemin Lee, Hyungshin Kim   Abstract : A warning system is important to protect people and property from a disaster. Current disaster warning system could easily be collapsed by a disaster because it strongly depends on cell towers for mobile communication. In this paper, we present the ad hoc network to easily and rapidly update the disaster information using the ultrasound modulation and Bluetooth advertising mode in the communication failure state. Our system shows that a smartphone can detect modulation packets up to 720bit/s with bit-error-rate lower than 10-3. In addition, the Bluetooth ad hoc network in an advertising mode reduces the round trip delay between nodes and battery loss by adjusting the advertising period. Proceeding ... Continue reading →


Learning sound location from a single microphone

by Do Trung Hai on 2016-10-27 11:07:44

Date : 2016. 11. 14 (Mon) 10:00 A.M. Location: EB5. 533 Presenter: Do Trung Hai   Seminar Title: Learning sound location from a single microphone Author: Ashutosh Saxena; Andrew Y. Ng  (Computer Science Department, Stanford University, CA 94305, USA) Abstract: We consider the problem of estimating the incident angle of a sound, using only a single microphone. The ability to perform monaural (single-ear) localization is important to many animals; indeed, monaural cues are also the primary method by which humans decide if a sound comes from the front or back, as well as estimate its elevation. Such monaural localization is made possible by the structure of the pinna (outer ear), which modifies sound in a way that is dependent on its incident angle. In this paper, we propose a machine learning approach to monaural localization, using only a single microphone and an “artificial pinna” (that distorts sound in a direction-dependent way). Our ... Continue reading →


dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel

by Sihyeong Park on 2016-10-17 20:30:38

Date: 2016.11.24(Mon) 10:00 A.M. Locate: EB5. 533 Presenter: Sihyeong Park Title: dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel Author: Martin Hoffmann, Florian Lukas, Christian Dietrich, Daniel Lohmann Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, such as bit flips caused by cosmic radiation, nowadays also affect automotive and other cost-sensitive “ground-level” control systems. For such cost-sensitive systems, many software-based measures have been suggested to harden applications against transient effects. However, all these measures assume that the underlying operating system works reliably in all cases. We present software-based concepts for constructing an operating system ... Continue reading →


An RF doormat for tracking people's room locations

by Jinse Kwon on 2016-10-16 19:41:39

Date : 2016. 10. 16 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : An RF doormat for tracking people's room locations Author : Juhi Ranjan,Yu Yao, Kamin Whitehouse (University of Virginia, Charlottesville, VA, USA)   Abstract : Many occupant-oriented smarthome applications such as automated lighting, heating and cooling, and activity recognition need room location information of residents within a building. Surveillance based tracking systems used to track people in commercial buildings, are privacy invasive in homes. In this paper, we present the RF Doormat - a RF threshold system that can accurately track people's room locations by monitoring their movement through the doorways in the home. We also present a set of guidelines and a visualization to easily and rapidly setup the RF-Doormat system on any doorway. To evaluate our system, we perform 580 doorway crossings across 11 different doorways in a home. ... Continue reading →


Presentation rehearsal for Smarttention 2016

by Jemin Lee on 2016-08-30 16:26:18

Date : 2016. 08. 31 (Wed) 10:00 A.M. Locate: EB5. 533 Presenter: Jemin Lee Seminar Title: Presentation Rehearsal for Smarttention 2016 I am planning to do a presentation with regard to my work, entitled "Reducing Distraction of Smartwatch Users with Deep Learning" in upcoming workshop. For preperation, the rehearsal will be tomorrow. For more inforamtion, vist         Continue reading →


전달 세미나 : RTCSA 2016

by Seula Hwang on 2016-08-23 20:13:41

Date : 2016. 08. 24 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Seminar Title : Reviews for IWCPS 2016 and RTCSA 2016 Continue reading →


Beetle: Flexible Communication for Bluetooth Low Energy

by Jinse Kwon on 2016-08-08 10:39:27

Date : 2016. 08. 10 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Beetle: Flexible Communication for Bluetooth Low Energy Author : Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein   Abstract : The next generation of computing peripherals will be low power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low Energy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive applications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are impossible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without ... Continue reading →


Understanding the Characteristics of AndroidWear OS

by Jemin Lee on 2016-08-01 17:29:16

Date : 2016. 08. 03. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee   Title: Understanding the Characteristics of AndroidWear OS Author: Renju Liu and Felix Xiaozhu Lin Abstract  Interactive wearable devices bring dramatic changes to apps and hardware, leaving operating system (OS) design in the mist. To this end, we thoroughly examine the execution efficiency of Android Wear, a popular wearable OS. By running a suite of fifteen bench marks, we profile four system aspects: CPU usage, idle episodes, thread-level parallelism, and microarchitectural behaviors. We present the discovered inefficiencies and their root causes, together with a series of widespread, yet unknown OS design flaws. Towards designing future wearable OSes, our study has yielded a generic lesson, key insights, and specific action items.   Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services ... Continue reading →


[Video] Surviving Peripheral Failures in Embedded Systems

by Sihyeong Park on 2016-07-25 19:02:29

Date: 2016. 07. 27. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: Sihyeong Park Title: Surviving Peripheral Failures in Embedded Systems Author: Rebecca Smith and Scott Rixner, Rice University Abstract:  Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resource-constrained embedded systems. Phoenix introduces lightweight checkpointing mechanisms that transparently track both the internal program state and the external peripheral state. These mechanisms enable rollback to the precise point at which any failed peripheral access occurred using as little as 6 KB of memory, minimizing both recovery latency and memory utilization.   2015 USENIX Annual Technical Conference Continue reading →


[Video] Drowsy power management

by Jemin Lee on 2016-07-19 17:13:45

Date: 2016. 07. 20. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee Title: Drowsy power management Author: Matthew Lentz, James Litton, Bobby Bhattacharjee   Abstract:  Portable computing devices have fast multi-core processors, large memories, and many on-board sensors and radio interfaces, but are often limited by their energy consumption. Traditional power management subsystems have been extended for smartphones and other portable devices, with the intention of maximizing the time that the devices are in a low-power "sleep" state. The approaches taken by these subsystems prove inefficient for many short-lived tasks common to portable devices, e.g., querying a sensor or polling a cloud service. We introduce Drowsy, a new power management state that replaces "awake." In the Drowsy state, not all system components are woken up, only the minimal set required for a pending task(s). Drowsy constructs and maintains the minimal task set by ... Continue reading →


Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals

by Jinyoung Choi on 2016-07-08 16:33:22

Date : 2016. 07. 13. (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi Title : Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals Author : Vala Jeyhani, Shadi Mahdiani, Mikko Peltokangas, Antti Vehkaoja   Abstract : Heart rate variability (HRV) has become a useful tool in analysis of cardiovascular system in both research and clinical fields. HRV has been also used in other applications such as stress level estimation in wearable devices. HRV is normally obtained from ECG as the time interval of two successive R waves. Recently PPG has been proposed as an alternative for ECG in HRV analysis to overcome some difficulties in measurement of ECG. In addition, PPG-HRV is also used in some commercial devices such as modern optical wrist-worn heart rate monitors. However, some  esearches have shown that PPG is not a surrogate for heart rate ... Continue reading →


전달 세미나 : ATC 2016

by Wonjun Hwang on 2016-07-05 21:50:07

Date : 2016. 07. 6 (Wed) 10:00 P.M. Locate : EB5. 533 Presenter : Wonjun Hwang Seminar Title : Reviews for ATC 2016   Continue reading →


Security Testing Methods and Techniques of Industrial Control Devices

by Sungyup Lee on 2016-06-13 14:00:46

Date : 2016. 07. 06(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Sungyup Lee   Title : Security Testing Methods and Techniques of Industrial Control Devices Author : Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang   Abstract : “Stuxnet” event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications in this area and analyze the features of these certifications. Then, we review and describe the existing security standards in this area. Furthermore, we review and compare the testing tools used for security testing of industrial control devices. Following this ... Continue reading →