By Topic

Consumer Electronics, IEEE Transactions on

Issue 1 • Date February 2015

Filter Results

Displaying Results 1 - 22 of 22
  • IEEE Transactions on Consumer Electronics - Table of contents

    Publication Year: 2015 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • IEEE Consumer Electronics Society

    Publication Year: 2015 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • 2015 IEEE Consumer Electronics Society Board of Governors

    Publication Year: 2015 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • 2015 IEEE Consumer Electronics Society Officers and Committee Chairs

    Publication Year: 2015 , Page(s): ii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (27 KB)  

    Provides a listing of current staff, committee members and society officers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent screen system for context-related scenery viewing in smart home

    Publication Year: 2015 , Page(s): 1 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (2112 KB)  
    Freely Available from IEEE
  • Variable step-size MLMS algorithm for digital predistortion in wideband OFDM systems

    Publication Year: 2015 , Page(s): 10 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB)  

    As one of the most promising linearization techniques, adaptive Digital Predistortion (PD) has been widely utilized in modern wireless communication systems for improving the efficiency of Power Amplifier (PA). In view of the non-stationary signal environment for the wideband PAs, an efficient indirect learning adaptive PD is proposed in the paper based on the Memory Polynomial Model (MPM). The coefficients of the proposed PD can be effectively identified by the Modified Least Mean Square (MLMS) learning algorithm. In addition, more stable convergence and lower steady-state error can be achieved simultaneously for the PAs with deep memory effects by adopting the variable step-size parameter. Theoretical analysis results regarding the learning stability, convergence behavior, and selection criteria of initial settings are derived. Simulations demonstrate that MLMS outperforms traditional LMS, Normalized LMS (NLMS), and Generalized Normalized Gradient Descent (GNGD) algorithms in terms of the Normalized Mean Square Error (NMSE) and out-of-band Power Spectral Density (PSD) under the noisy feedback condition for the wideband PAs1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A signaling emergency alert system multiplexed with T-DMB channel for emergency alert service

    Publication Year: 2015 , Page(s): 16 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1283 KB) |  | HTML iconHTML  

    Mobile broadcasting services are considered effective methods for emergency alert delivery. Terrestrial digital multimedia broadcasting (T-DMB) offers an emergency alert service called automatic emergency alert service (AEAS). However, the conventional AEAS is inefficient in the aspects of alert service channel, disabled T-DMB receiver, and location-based service. Therefore, this paper proposes a novel signaling method in order to overcome the drawbacks of the AEAS. The presented alert system exploits an additional alert channel, which is multiplexed with the conventional T-DMB channel. This paper also addresses the multiplexing approach, which effectively eliminates the interference between the additional alert channel and the TDMB channel. The simulation results confirm that the proposed signaling method effectively offers the emergency alert services in T-DMB1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home appliance load disaggregation using cepstrum-smoothing-based method

    Publication Year: 2015 , Page(s): 24 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4277 KB) |  | HTML iconHTML  

    Various load disaggregation methods have been developed for monitoring home appliance loads to save energy in a smart home. Most of load disaggregation methods are designed to focus on the on/off events of single appliance. In reality, however, multiple appliances can be turned on/off simultaneously. Load disaggregation can be complicated by the simultaneous on/off events of multiple appliances. This paper presents a cepstrum-smoothing-based load disaggregation method to effectively deal with the simultaneous on/off events of multiple appliances. Further, a data acquisition system is developed to obtain only the characteristic signals of appliances and to filter the noise inputted from the power supply. Test results are provided to demonstrate the effectiveness of the proposed cepstrum-smoothing- based load disaggregation method1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of the data transportation network of a multi-hop data-content-sharing home network

    Publication Year: 2015 , Page(s): 31 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (764 KB) |  | HTML iconHTML  

    This paper demonstrates the implementation of indoor Bluetooth communication multi-hop networks. Since the performance of such networks determines the range of applications that they can support, the performance of Bluetooth wireless multi-hop networks is a common topic of interest. Communication network models are widely used to estimate the performance of networks in many different aspects. This paper focuses on one of the aspects, i.e., the time performance of the data transportation network of a Bluetooth multi-hop home network, and provides a novel empirical model for latency in multi-hop networks with asynchronous links when links are active. The model offers a sharp estimation of the latency added with every hop in the communication such that electronics product designers and network managers can effectively run time-constrained applications in this type of network. The model is based on the results from experiments carried out on a real test bed. The test bed includes Bluetooth nodes and proprietary middleware at the HCI (Host Controller Interface) level of communication. The experimental results show that the time performance worsens with an increasing number of hops in the communication and additionally provide evidence of the quadratic dependence on the number of hops exhibited by the latency 1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-memory write-ahead logging for mobile smart devices with NVRAM

    Publication Year: 2015 , Page(s): 39 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (521 KB) |  | HTML iconHTML  

    In recent years, ensuring the reliability of databases in battery-powered mobile devices such as smartphones and tablets has gained in importance, since most mobile applications use a lightweight embedded database. Write-ahead logging (WAL) has been one of the representative techniques in embedded databases to ensure their reliability. However, this technique causes additional data write overhead. Besides, the file system provides its own reliability technique and this may therefore cause duplicate overhead. Both types of overhead lead to the performance degradation of mobile applications and have an adverse effect on the user experience. This paper proposes an efficient in-memory write-ahead logging (IMWAL) technique for the embedded databases of mobile devices adopting nonvolatile random access memory (NVRAM). When a write operation for the embedded database is invoked, IMWAL assures that the new data in a mobile application are all written to the NVRAM as a write-ahead data log. This data log is reused to update the embedded database file by remapping the memory address and therefore it reduces the additional writes. With IMWAL, write operations can resume even after crashes occur in the mobile devices and ensure the reliability of the embedded database with performance improvement. To evaluate the proposed technique, it is implemented on the in-memory file system of a real mobile platform. Its performance is evaluated against original WAL-on mode and WAL-off mode with various experiments, including various benchmarks and real mobile application workloads. The results show that IMWAL performs 14% faster than the original WAL technique for embedded databases in real mobile devices on average1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustered page clustered page-level mapping for flash memory-based storage devices

    Publication Year: 2015 , Page(s): 47 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (892 KB) |  | HTML iconHTML  

    Recent consumer devices such as smartphones, smart TVs and tablet PCs adopt NAND flash memory as storage device due to its advantages of small size, reliability, low power consumption, and high performance. The unique characteristics of NAND flash memory require an additional software layer, called flash translation layer (FTL), between traditional file systems and flash memory. In order to reduce the garbage collection cost, FTLs generally try to separate hot and cold data. Previous hot and cold separation techniques monitor the storage access patterns within storage device, or exploit file system hints from host system. This paper proposes a novel clustered page-level mapping, called CPM, which can separate hot and cold data efficiently by allocating different flash memory block groups to different logical address regions. CPM can reduce the FTL map loading overhead during garbage collection and it does not require any high-cost monitoring overhead or host hint. This paper also proposes a K-associative version of CPM, called K-CPM, which allows different logical address regions to share a physical block group in order to achieve high block utilizations. Experimental results show that CPM improves the storage I/O performance by about 54% compared with a previous page-level mapping FTL, and K-CPM further improves the performance by about 19.4% compared with CPM. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure pseudonym-based near field communication protocol for the consumer internet of things

    Publication Year: 2015 , Page(s): 56 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (364 KB) |  | HTML iconHTML  

    Near Field Communication (NFC) has been used for short range communications in a number of applications for consumer electronics devices. Specifically, NFC has been used in electronic payment systems. To ensure secure communications, security protocols for various NFC applications have been proposed. Recently, a conditional privacy preserving security protocol was introduced. However this paper demonstrates that the protocol is vulnerable to two impersonations attacks and then proposes a new secure pseudonym-based NFC protocol that eliminates vulnerabilities of the previous security protocol. Security and performance analysis results confirm that the proposed protocol could solve security problems of the previously introduced NFC security protocol with a marginal computational cost increase1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating single-image super-resolution polynomial regression in mobile devices

    Publication Year: 2015 , Page(s): 63 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1481 KB) |  | HTML iconHTML  

    This paper introduces a new super-resolution algorithm based on machine learning along with a novel hybrid implementation for next generation mobile devices. The proposed super-resolution algorithm entails a two dimensional polynomial regression method using only the input image properties for the learning task. Model selection is applied for defining the optimal degree of polynomial by adopting regularization capability in order to avoid overfitting. Although it is widely believed that machine learning algorithms are not appropriate for real-time implementation, the paper in hand proves that there are indeed specific hypothesis representations that are able to be integrated into real-time mobile applications. With aim to achieve this goal, the increasing GPU employment in modern mobile devices is exploited. More precisely, by utilizing the mobile GPU as a co-processor in a hybrid pipelined implementation, significant performance speedup along with superior quantitative results can be achieved.1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach for denoising and enhancement of extremely low-light video

    Publication Year: 2015 , Page(s): 72 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4670 KB) |  | HTML iconHTML  

    In this paper, a novel approach for noise reduction and enhancement of extremely low-light video is proposed. For noise removal, a motion adaptive temporal filtering based on a Kalman structured updating is presented. Dynamic range of denoised video is increased by adjustment of RGB histograms using Gamma correction with adaptive clipping thresholds. Finally, residual noise is removed using a nonlocal means (NLM) denoising filter. The proposed method works directly on the color filter array (CFA) raw video for achieving low memory consumption1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An MPEG-2 to H.264/AVC intra-frame transcoder architecture with mode decision in transform domain

    Publication Year: 2015 , Page(s): 81 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (831 KB) |  | HTML iconHTML  

    The computational complexity of the MPEG-2 to H.264/AVC transcoder, in particular the encoder, is technically challenging, but it can be reduced by reusing the information accessible in the decoding process. A low-latency mode decision algorithm performed in transform domain within the MPEG-2 decoder is proposed. The encoder stage contains two mutually exclusive intra prediction algorithms of block sizes 4x4 and 16x16 sharing the hardware logic. The shared intra prediction unit is supported by an on-chip memory organization. The proposed architecture is implemented on FPGA development board. Its implementation supports high throughputs that correspond to a real-time processing of a variety of video resolutions including QFHD 2160p at 30 fps. Furthermore, the minimal required frequency for CIF, SD and HD1080p resolutions are significantly reduced compared to the state of the art1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of class imbalance on personalized program guide performance

    Publication Year: 2015 , Page(s): 90 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (688 KB) |  | HTML iconHTML  

    When TV recommender systems perform well, number of interactions in which their users expressed positive feedback on the recommended content is expected to be greater than the number of negative ones. This is known as class imbalance and, paradoxically, it degrades the system performance by making the identification of the programs the user will dislike increasingly difficult. As the misclassification of the unwanted content is easily perceived by TV viewers, it should be avoided by all means. In this paper, a personalized TV program guide based on neural network is described. It is shown how class imbalance information can be exploited in learning the user preferences. This not only improves the system performance, but increases the user satisfaction as well1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker verification method for operation system of consumer electronic devices

    Publication Year: 2015 , Page(s): 96 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1513 KB) |  | HTML iconHTML  

    A system is proposed that can remotely operate consumer electronic devices by voice. It uses the mobile phone as a controller. And it uses the CELP(code excited linear prediction) parameters that are used for speech coding in mobile phones. A speaker verification function protects private information and separates the user's voice from that of people nearby who are also speaking. A CELP-based speaker verification method is used to match the audio stream by comparing the trajectories of continuous phonemes. Experimental evaluation of the speaker verification method demonstrated the effectiveness of the proposed verification method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting asymmetric CPU performance for fast startup of subsystem in mobile smart devices

    Publication Year: 2015 , Page(s): 103 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1351 KB) |  | HTML iconHTML  

    Fast startup of a subsystem, such as an image subsystem, is important in mobile smart devices because the startup time is directly related to the responsiveness of applications, such as a camera. This paper proposes a CPU switch method that offloads the long initialization phase from the subsystem to the fast main CPU in an application processor. By providing a consistent execution environment in the main CPU, the subsystem software can be easily ported without significant engineering costs. The evaluation results show that the proposed scheme greatly reduces the startup time of the image subsystem by up to 78%1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speaker localization in noisy environments using steered response voice power

    Publication Year: 2015 , Page(s): 112 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2649 KB) |  | HTML iconHTML  

    Many devices, including smart TVs and humanoid robots, can be operated through speech interface. Since a user can interact with such a device at a distance, speech-operated devices must be able to process speech signals from a distance. Although many methods exist to localize speakers via sound source localization, it is very difficult to reliably find the location of a speaker in a noisy environment. In particular, conventional sound source localization methods only find the loudest sound source within a given area, and such a sound source may not necessarily be related to human speech. This can be problematic in real environments where loud noises frequently occur, and the performance of speech-based interfaces for a variety of devices could be negatively impacted as a result. In this paper, a new speaker localization method is proposed. It identifies the location associated with the maximum voice power from all candidate locations. The proposed method is tested under a variety of conditions using both simulation data and real data, and the results indicate that the performance of the proposed method is superior to that of a conventional algorithm for various types of noises1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy fusion based high dynamic range imaging using adaptive histogram separation

    Publication Year: 2015 , Page(s): 119 - 127
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4245 KB) |  | HTML iconHTML  

    In this work, a high dynamic range (HDR) image generation method using a single input image is presented. The proposed approach generates over- and under-exposed images by making use of a novel adaptive histogram separation scheme. Thus, it becomes possible to eliminate ghosting effects which generally occur when several input image containing camera/object motion are utilized in HDR imaging. Additionally, it is proposed to utilize a fuzzy logic based approach at the fusion stage which takes visibility of the inputs pixels into account. Since the proposed approach is computationally light-weight, it is possible to implement it on mobile devices such as smart phones and compact cameras. Experimental results show that the proposed approach is able to provide ghost-free and improved HDR performance compared to the existing methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental updates based on graph theory for consumer electronic devices

    Publication Year: 2015 , Page(s): 128 - 136
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2106 KB) |  | HTML iconHTML  

    This paper presents a method for incremental updating on consumer electronic devices, called differential compression based on Dijkstra algorithm (DDIFF). It describes the similarities between the old and new versions as a directed weighted graph. In the graph, the shortest path between the start and end vertices corresponds to the minimal delta. As a result, the delta-encoding problem is reduced to the single-source shortest path problem. Experiments show that the proposed method is feasible, and average data transmission saving is as high as 69.3%. In comparison with the existing methods, DDIFF constructs the minimal patch, and the patch costs less time to apply1. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preparation of papers for publication in IEEE Transactions on Consumer Electronics

    Publication Year: 2015 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE

Aims & Scope

The main focus for the IEEE Transactions on Consumer Electronics is the engineering and research aspects of the theory, design, construction, manufacture or end use of mass market electronics, systems, software and services for consumers.

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
R. Simon Sherratt, IEEE Fellow
Professor of Consumer Electronics
School of Systems Engineering
The University of Reading
Reading, Berkshire RG6 6AY  U.K.
r.s.sherratt@reading.ac.uk; sherratt@ieee.org
Phone:+44 (0) 118 3788588