2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

筛选
英文 中文
Complex Environment Fuzzy Vision Computing 复杂环境模糊视觉计算
Asif Khan, Jianping Li, Jalaluddin Khan, K. Mohamed Jasim, Rijwan Alam, V. M. Niaz Ahamed
{"title":"Complex Environment Fuzzy Vision Computing","authors":"Asif Khan, Jianping Li, Jalaluddin Khan, K. Mohamed Jasim, Rijwan Alam, V. M. Niaz Ahamed","doi":"10.1109/ICCWAMTIP.2018.8632575","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632575","url":null,"abstract":"A robot that follows the path is automated device to follow a certain path. In domestic and industrial applications such types of robot play a vital role. A few of the current methods used to control the path follower robot are by utilizing microcontroller, guided tape techniques and so on. In this paper our aim to provide a line follower robot based on machine vision. In image processing machine vision is a technique where image-processing algorithms are utilized to process the acquired image. To get the image of the track a camera has been used and utilizing suitable software of image processing and relying upon the results created the robot is followed processes the acquired image. In this manner for the guidance of line follower robot along their track machine vision has been used.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Database Selection Model Based on Fuzzy Comprehensive Evaluation 基于模糊综合评价的数据库选择模型
Jiyang Zhu, Huiben Zhang, Yang Xu, Wenshuo Zhao
{"title":"Database Selection Model Based on Fuzzy Comprehensive Evaluation","authors":"Jiyang Zhu, Huiben Zhang, Yang Xu, Wenshuo Zhao","doi":"10.1109/ICCWAMTIP.2018.8632563","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632563","url":null,"abstract":"Along with the constant development of information technology, the database has become the basis of information resources management and development in the information-oriented society. Faced with the advantages and disadvantages of relational database and non-relational database, it is very important to provide a set of scientific options for database administrators. In this paper, a database selection model based on comprehensive evaluation method is proposed, which provides a reasonable database selection scheme for database administrators. The performance of increasing, deleting, modifying, querying are the primary indicator of this model, and the consumption of time, disk, CPU, I/O are the second indicator. The method of fuzzy comprehensive evaluation is applied to the establishment of database selection model, which is the innovation of this research.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design of Reliability Simulation of Cloud System in the Cloudsim 基于Cloudsim的云系统可靠性仿真设计
Han Xu, Gongcheng Wang, Liang Luo, Meilian Lei
{"title":"The Design of Reliability Simulation of Cloud System in the Cloudsim","authors":"Han Xu, Gongcheng Wang, Liang Luo, Meilian Lei","doi":"10.1109/ICCWAMTIP.2018.8632572","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632572","url":null,"abstract":"With the expansion of scale and the increase of users, the reliability of the cloud system has got more and more attention in the industry and academia. Services may be interrupted by random resource failures (such as network failure, virtual machine (VM)failure)in a realistic scenario. Many researchers have studied the reliability of cloud systems. However, in a cloud system, few of them propose a general sustainable platform to evaluate the effect of reliability on other quality of service (QoS)factor, such as energy, performance, ea.tl. To solve this problem, we first introduce two typical reliability factors including VM failure and server failure. Secondly, we give the design and realization of reliability simulation of cloud system in CloudSim. Finally, experiments based on a set of realistic configurations and operation runtimes are implemented in CloudSim to illustrate the effect of two reliability factors on cloud system under different resource scheduling algorithms.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Title page] (标题页)
{"title":"[Title page]","authors":"","doi":"10.1109/iccwamtip.2018.8632602","DOIUrl":"https://doi.org/10.1109/iccwamtip.2018.8632602","url":null,"abstract":"","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Urban Functional Regions Minig Method with MPETM 基于MPETM的城市功能区挖掘新方法
Fan Mou, Yong He, Jing Peng, Yi Ma, Ze-zhong Zheng, Shengli Wang, Jiang Li
{"title":"A New Urban Functional Regions Minig Method with MPETM","authors":"Fan Mou, Yong He, Jing Peng, Yi Ma, Ze-zhong Zheng, Shengli Wang, Jiang Li","doi":"10.1109/ICCWAMTIP.2018.8632580","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632580","url":null,"abstract":"Urban functional regions mining plays an important role in Smart Cities. At present, the main approaches to deal with this problem are probabilistic topic models. Some researchers also use deep learning methods to solve this problem. In this paper, we present a new method for urban functional regions mining called MPETM which combines deep learning and probabilistic topic models. Experiment results show that the MPETM framework has superior accuracy than other current popular methods.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network 基于Oauth 2.0协议的物联网网络认证技术
Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid
{"title":"An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network","authors":"Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid","doi":"10.1109/ICCWAMTIP.2018.8632587","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632587","url":null,"abstract":"Internet of Things (loT)is the fast-growing emerging technology and it is making our daily life (activities)easier and better. The loT is connecting millions of sensors and heterogeneous devices having different computation, communication, and storage capabilities which are increasing rapidly. The loT network is dissimilar and larger from the conventional network. However, different natures of the connected devices raising security concerns and challenges which affect the importance of loT technology. In this paper, we proposed an authentication scheme based on the OAuth 2.0 protocol to secure access loT network by providing authentication service. An OAuth 2.0 protocol is used to propose authentication mechanism to allow only authorized and authentic users by comparing user information and access tokens in the security manager local database and denies the access to the loT network. It also keeps safe loT network from different types of attacks like impersonation and replays attacks etc.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccwamtip.2018.8632584","DOIUrl":"https://doi.org/10.1109/iccwamtip.2018.8632584","url":null,"abstract":"","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Face Fusion Based on Variational Auto-Encoder 一种基于变分自编码器的人脸融合方法
Xiang Li, Jinghao Wen, Anni Chen, Bo Chen
{"title":"A Method for Face Fusion Based on Variational Auto-Encoder","authors":"Xiang Li, Jinghao Wen, Anni Chen, Bo Chen","doi":"10.1109/ICCWAMTIP.2018.8632589","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632589","url":null,"abstract":"Face fusion refers to fuse two different facial images into a new face image that retains the facial features of the original image. Our network model is combine Variational Auto-Encoder(V Ae)and Generative Adversarial Networks(GAN), which achieved the end-to-end fusion task. Not only does it guarantee the quality of the fusion image(the image generated by GAN is sharp and photorealistic), but also doesn't lose specific details of the face(This is guaranteed by VAE). In the end, the experiment achieved a promising result on the CelebA dataset.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the Constituent Elements of Domestic General Chip Industry Technology Alliance 国内通用芯片产业技术联盟构成要素研究
Zhong Ge, Xinmin Gao, Xingying Deng, Jiang-Wei Mao
{"title":"Study on the Constituent Elements of Domestic General Chip Industry Technology Alliance","authors":"Zhong Ge, Xinmin Gao, Xingying Deng, Jiang-Wei Mao","doi":"10.1109/ICCWAMTIP.2018.8632568","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632568","url":null,"abstract":"China's “pain of lack of core” objective facts, the party central committee is very concerned. Especially after the US sanctions on ZTE this year, everyone in China is thinking about the “China core”: the Internet power cannot be without the “China core”, the network power more indispensable “China core”, digital China more need “China core”! How does“China core” re-encircle breakthrough, how to build? It has become a major proposition that our government, IT community, and many scholars pay great attention to. This paper uses external theory as guidance, draws on the successful experience of foreign integrated circuit technology alliance, and discusses the construction factors of China's general chip industry technology alliance, in order to provide reference for solving the independent supply of “China core”.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Application Research of Internet of Things to Oil Pipeline Leak Detection 物联网在输油管道泄漏检测中的应用研究
Xian-Li Li, Ping Wan, Hai-Tao Zhang, Ming Li, Yuzhe Jiang
{"title":"The Application Research of Internet of Things to Oil Pipeline Leak Detection","authors":"Xian-Li Li, Ping Wan, Hai-Tao Zhang, Ming Li, Yuzhe Jiang","doi":"10.1109/ICCWAMTIP.2018.8632561","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632561","url":null,"abstract":"With the development of science and technology, the Internet of things technology has been gradually applied to various fields, it has become one of hot spot after the computer, the Internet and mobile communication technology. This paper focuses on the application research of Internet of things to oil pipeline leak detection. In general, oil pipelines are partially or completely buried under the ground, due to many reasons such as rust and breakage, leakage accident happens frequently. Aiming at this problem, this paper utilizes Internet of things technology to collect and process pressure signals, and detects the leakage by using negative pressure wave method to locate the leakage position, it is effective and exact.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信