Asif Khan, Jianping Li, Jalaluddin Khan, K. Mohamed Jasim, Rijwan Alam, V. M. Niaz Ahamed
{"title":"Complex Environment Fuzzy Vision Computing","authors":"Asif Khan, Jianping Li, Jalaluddin Khan, K. Mohamed Jasim, Rijwan Alam, V. M. Niaz Ahamed","doi":"10.1109/ICCWAMTIP.2018.8632575","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632575","url":null,"abstract":"A robot that follows the path is automated device to follow a certain path. In domestic and industrial applications such types of robot play a vital role. A few of the current methods used to control the path follower robot are by utilizing microcontroller, guided tape techniques and so on. In this paper our aim to provide a line follower robot based on machine vision. In image processing machine vision is a technique where image-processing algorithms are utilized to process the acquired image. To get the image of the track a camera has been used and utilizing suitable software of image processing and relying upon the results created the robot is followed processes the acquired image. In this manner for the guidance of line follower robot along their track machine vision has been used.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database Selection Model Based on Fuzzy Comprehensive Evaluation","authors":"Jiyang Zhu, Huiben Zhang, Yang Xu, Wenshuo Zhao","doi":"10.1109/ICCWAMTIP.2018.8632563","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632563","url":null,"abstract":"Along with the constant development of information technology, the database has become the basis of information resources management and development in the information-oriented society. Faced with the advantages and disadvantages of relational database and non-relational database, it is very important to provide a set of scientific options for database administrators. In this paper, a database selection model based on comprehensive evaluation method is proposed, which provides a reasonable database selection scheme for database administrators. The performance of increasing, deleting, modifying, querying are the primary indicator of this model, and the consumption of time, disk, CPU, I/O are the second indicator. The method of fuzzy comprehensive evaluation is applied to the establishment of database selection model, which is the innovation of this research.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Reliability Simulation of Cloud System in the Cloudsim","authors":"Han Xu, Gongcheng Wang, Liang Luo, Meilian Lei","doi":"10.1109/ICCWAMTIP.2018.8632572","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632572","url":null,"abstract":"With the expansion of scale and the increase of users, the reliability of the cloud system has got more and more attention in the industry and academia. Services may be interrupted by random resource failures (such as network failure, virtual machine (VM)failure)in a realistic scenario. Many researchers have studied the reliability of cloud systems. However, in a cloud system, few of them propose a general sustainable platform to evaluate the effect of reliability on other quality of service (QoS)factor, such as energy, performance, ea.tl. To solve this problem, we first introduce two typical reliability factors including VM failure and server failure. Secondly, we give the design and realization of reliability simulation of cloud system in CloudSim. Finally, experiments based on a set of realistic configurations and operation runtimes are implemented in CloudSim to illustrate the effect of two reliability factors on cloud system under different resource scheduling algorithms.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Title page]","authors":"","doi":"10.1109/iccwamtip.2018.8632602","DOIUrl":"https://doi.org/10.1109/iccwamtip.2018.8632602","url":null,"abstract":"","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fan Mou, Yong He, Jing Peng, Yi Ma, Ze-zhong Zheng, Shengli Wang, Jiang Li
{"title":"A New Urban Functional Regions Minig Method with MPETM","authors":"Fan Mou, Yong He, Jing Peng, Yi Ma, Ze-zhong Zheng, Shengli Wang, Jiang Li","doi":"10.1109/ICCWAMTIP.2018.8632580","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632580","url":null,"abstract":"Urban functional regions mining plays an important role in Smart Cities. At present, the main approaches to deal with this problem are probabilistic topic models. Some researchers also use deep learning methods to solve this problem. In this paper, we present a new method for urban functional regions mining called MPETM which combines deep learning and probabilistic topic models. Experiment results show that the MPETM framework has superior accuracy than other current popular methods.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid
{"title":"An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network","authors":"Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid","doi":"10.1109/ICCWAMTIP.2018.8632587","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632587","url":null,"abstract":"Internet of Things (loT)is the fast-growing emerging technology and it is making our daily life (activities)easier and better. The loT is connecting millions of sensors and heterogeneous devices having different computation, communication, and storage capabilities which are increasing rapidly. The loT network is dissimilar and larger from the conventional network. However, different natures of the connected devices raising security concerns and challenges which affect the importance of loT technology. In this paper, we proposed an authentication scheme based on the OAuth 2.0 protocol to secure access loT network by providing authentication service. An OAuth 2.0 protocol is used to propose authentication mechanism to allow only authorized and authentic users by comparing user information and access tokens in the security manager local database and denies the access to the loT network. It also keeps safe loT network from different types of attacks like impersonation and replays attacks etc.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccwamtip.2018.8632584","DOIUrl":"https://doi.org/10.1109/iccwamtip.2018.8632584","url":null,"abstract":"","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Face Fusion Based on Variational Auto-Encoder","authors":"Xiang Li, Jinghao Wen, Anni Chen, Bo Chen","doi":"10.1109/ICCWAMTIP.2018.8632589","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632589","url":null,"abstract":"Face fusion refers to fuse two different facial images into a new face image that retains the facial features of the original image. Our network model is combine Variational Auto-Encoder(V Ae)and Generative Adversarial Networks(GAN), which achieved the end-to-end fusion task. Not only does it guarantee the quality of the fusion image(the image generated by GAN is sharp and photorealistic), but also doesn't lose specific details of the face(This is guaranteed by VAE). In the end, the experiment achieved a promising result on the CelebA dataset.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhong Ge, Xinmin Gao, Xingying Deng, Jiang-Wei Mao
{"title":"Study on the Constituent Elements of Domestic General Chip Industry Technology Alliance","authors":"Zhong Ge, Xinmin Gao, Xingying Deng, Jiang-Wei Mao","doi":"10.1109/ICCWAMTIP.2018.8632568","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632568","url":null,"abstract":"China's “pain of lack of core” objective facts, the party central committee is very concerned. Especially after the US sanctions on ZTE this year, everyone in China is thinking about the “China core”: the Internet power cannot be without the “China core”, the network power more indispensable “China core”, digital China more need “China core”! How does“China core” re-encircle breakthrough, how to build? It has become a major proposition that our government, IT community, and many scholars pay great attention to. This paper uses external theory as guidance, draws on the successful experience of foreign integrated circuit technology alliance, and discusses the construction factors of China's general chip industry technology alliance, in order to provide reference for solving the independent supply of “China core”.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xian-Li Li, Ping Wan, Hai-Tao Zhang, Ming Li, Yuzhe Jiang
{"title":"The Application Research of Internet of Things to Oil Pipeline Leak Detection","authors":"Xian-Li Li, Ping Wan, Hai-Tao Zhang, Ming Li, Yuzhe Jiang","doi":"10.1109/ICCWAMTIP.2018.8632561","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2018.8632561","url":null,"abstract":"With the development of science and technology, the Internet of things technology has been gradually applied to various fields, it has become one of hot spot after the computer, the Internet and mobile communication technology. This paper focuses on the application research of Internet of things to oil pipeline leak detection. In general, oil pipelines are partially or completely buried under the ground, due to many reasons such as rust and breakage, leakage accident happens frequently. Aiming at this problem, this paper utilizes Internet of things technology to collect and process pressure signals, and detects the leakage by using negative pressure wave method to locate the leakage position, it is effective and exact.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}