Proceedings of the 2018 10th International Conference on Computer and Automation Engineering最新文献

筛选
英文 中文
Capability-oriented Analysis and Design for Collaborative Systems: An example from the Doha 2022 World Cup Games 面向能力的协作系统分析与设计:以2022年多哈世界杯为例
P. Loucopoulos, E. Kavakli, D. Anagnostopoulos, G. Dimitrakopoulos
{"title":"Capability-oriented Analysis and Design for Collaborative Systems: An example from the Doha 2022 World Cup Games","authors":"P. Loucopoulos, E. Kavakli, D. Anagnostopoulos, G. Dimitrakopoulos","doi":"10.1145/3192975.3192998","DOIUrl":"https://doi.org/10.1145/3192975.3192998","url":null,"abstract":"This paper presents a capability-oriented approach that facilitates strategic decisions for dealing with emergent behaviour and dynamics of artefacts and their evolutionary trajectory, where these artefacts are often a blending of physical and cyber actors working synergistically for achieving enterprise goals. We demonstrate this approach using an example from an application involving decision making for supporting venue operations for the Doha 2022 World Cup Games. The example focuses on the operations surrounding the strategy for security measures for entrance of spectators to a venue. For this specific example one needs to identify the capabilities required in order to establish a level of service acceptable to spectators within the resource constraints to be offered by the organising committee.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129828967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How Repetitive are Karate Kicks Performed by Skilled Practitioners? 熟练的空手道练习者的踢腿动作有多重复?
T. Hachaj, M. Piekarczyk, M. Ogiela
{"title":"How Repetitive are Karate Kicks Performed by Skilled Practitioners?","authors":"T. Hachaj, M. Piekarczyk, M. Ogiela","doi":"10.1145/3192975.3192989","DOIUrl":"https://doi.org/10.1145/3192975.3192989","url":null,"abstract":"The aim of this paper is to propose the DTW-based signal comparison method that allows comparing motion capture (MoCap) measurements obtained from athletes even with different body proportions. We have applied the proposed framework to evaluate how repetitive are popular karate kicks performed by skilled athletes. The repetition level is defined with DTW distances and alignments of preprocessed MoCap data of a single activity performed by the same person. This knowledge is an important step to prepare tabularized norms which can be used as very useful tool by sport society to improve the training with the aid of modern computer methods. With those norms we can tell which DTW distances are typical for highly skilled karateka. The maximal distance between two aligned trajectories might differs from 9.36 ± 2.08 cm for to even 29.21 ± 16.5 cm. This last situation is caused by the fact that a person can perform the same kick with large nonlinear temporal displacements of actions phase, however, we have to remember, that those displacements happen in time periods of about 0.05 seconds in length. The results we obtained are very important because they show what range values one should expect from this kind of comparison and might be a reference for other scientists.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Kernelized Fuzzy C-means Clustering Algorithm based on Bat Algorithm 一种基于Bat算法的核模糊c均值聚类算法
Chunying Cheng, Chunhua Bao
{"title":"A Kernelized Fuzzy C-means Clustering Algorithm based on Bat Algorithm","authors":"Chunying Cheng, Chunhua Bao","doi":"10.1145/3192975.3193009","DOIUrl":"https://doi.org/10.1145/3192975.3193009","url":null,"abstract":"To overcome the defects of easily falling into local optimum and being sensitive to initial values brought by kernelized fuzzy means clustering algorithm (KFCM), a kernelized fuzzy means clustering algorithm based on bat algorithm (BA-KFCM) is proposed in this paper. In this paper, IRIS dataset, Glass dataset and Wine dataset in the classical datasets are used to simulate the experiment respectively, and the results of the algorithm are compared with those of the particle swarm optimization algorithm and the firefly algorithm so as to verify the effectiveness of the algorithm. The experimental results show that the proposed algorithm is superior to other algorithms in terms of effects and has a better quality of clustering.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117318357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Self-modifying Code Detection Based on Backward Analysis 基于后向分析的动态自修改代码检测
Shi Dawei, Lv De-long, Ye Zhibin
{"title":"Dynamic Self-modifying Code Detection Based on Backward Analysis","authors":"Shi Dawei, Lv De-long, Ye Zhibin","doi":"10.1145/3192975.3193016","DOIUrl":"https://doi.org/10.1145/3192975.3193016","url":null,"abstract":"Self-modifying code (SMC) is widely used in obfuscated program for enhancing the difficulty in reverse engineering. The typical mode of self-modifying code is restore-execute-hide, it drives program to conceal real behaviors at most of the time, and only under actual running will the real code be restored and executed. In order to locate the SMC and further recover the original logic of code for guiding program analysis, dynamic self-modifying code detecting method based on backward analysis is proposed. Our method first extracts execution trace such as instructions and status through dynamic analysis. Then we maintain a memory set to store the memory address of execution instructions, the memory set will update dynamically while backward searching the trace, and simultaneously will we check the memory write address to match with current memory set in order to identify the mode \"modify then execute\". By means of validating self-modifying code which is identified via above procedures, we can easily deobfuscate the program which use self-modifying code and achieve its original logic. A prototype that can be applied in self-modifying code detection is designed and implemented. The evaluation results show our method can trace the execution of program effectively, and can reduce the consumption in time and space.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121464214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Modified Superimposed Training Scheme for Individual Channel Estimation for Amplify-and-Forward Relay Network 放大转发中继网络中单个信道估计的改进叠加训练方案
Xianwen He, Gaoqi Dou, Jun Gao
{"title":"A Modified Superimposed Training Scheme for Individual Channel Estimation for Amplify-and-Forward Relay Network","authors":"Xianwen He, Gaoqi Dou, Jun Gao","doi":"10.1145/3192975.3192997","DOIUrl":"https://doi.org/10.1145/3192975.3192997","url":null,"abstract":"In this letter, we deal with the problem of individual channel estimation in amplify-and-forward (AF) relaying systems. A novel superimposed training (ST) scheme is proposed where the relay superimposes its own training sequence directly on top of the received data signal without bandwidth expansion. As a result, the training sequences from the source and relay nodes are independent of each other and can be viewed as a time-multiplexed (TM) mode in the proposed scheme, thus making it more flexible and robust in relay-training design. To remove the data-induced interference and relaying-propagated noise during channel estimation, a modified ST scheme is designed by discarding some relaying data to accommodate the relay-training sequence. Simulation results are presented to assess the performances of the proposed scheme and to obtain the optimal power allocation.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Verification of Third Party Design Files in Manufacturing 制造过程中第三方设计文件的安全性验证
Alexander Giehl, Norbert Wiedermann
{"title":"Security Verification of Third Party Design Files in Manufacturing","authors":"Alexander Giehl, Norbert Wiedermann","doi":"10.1145/3192975.3192984","DOIUrl":"https://doi.org/10.1145/3192975.3192984","url":null,"abstract":"Customer-individual production in manufacturing is a current trend related to the Industrie 4.0 paradigm. Creation of design files by the customers is becoming more frequent. These design files are typically generated outside the company boundaries and then transferred to the organization where they are eventually processed and scheduled for production. From a security perspective, this introduces new attack vectors targeting producing companies. Design files with malicious configuration parameters can threaten the availability of the manufacturing plant resulting in financial risks and can even cause harm to humans. Human verification of design files is error-prone why an automated solution is required. A graph-theoretic modeling framework for machine tools capable of verifying the security of product designs is proposed. This framework is used to model an exemplary production process implemented in a wood processing plant based on the experiences of a real-world case study. Simulation of the modeled scenario shows the feasibility of the framework. Apart from security verification, the approach can be adopted to decide if a product design can be manufactured with a given set of machine tools.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Foreground Object Detection Combining Gaussian Mixture Model and Inter-Frame Difference in the Application of Classroom recording Apparatus 结合高斯混合模型和帧间差分的前景目标检测在教室记录仪中的应用
Zhuang Jun, Zhang Xinhua
{"title":"Foreground Object Detection Combining Gaussian Mixture Model and Inter-Frame Difference in the Application of Classroom recording Apparatus","authors":"Zhuang Jun, Zhang Xinhua","doi":"10.1145/3192975.3193020","DOIUrl":"https://doi.org/10.1145/3192975.3193020","url":null,"abstract":"A new effective approach to detect central coordinate of foreground object in classroom recording application circumstance is proposed in this paper. The new approach includes two steps. The first step is to segment interested blocks from a whole video image by Inter-frame Differences. The second step is to extract the foreground pixels from the interested blocks by Gaussian Mixture Model GMM. The experimental results show that the new algorithm, which combines Gaussian Mixture Model and Inter-frame Differences, performs better than the methods in previous researches in classroom recording application field. The new method is proved to be effective in reducing complexity of calculation with very small expense of accuracy. The adaptability of different number of blocks and different values of block threshold are discussed at the end of the paper.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Bistatic Range and Velocity Tracking Performance according to Dynamic Models in Passive Bistatic Radar 基于动态模型的被动双基地雷达距离和速度跟踪性能分析
Ho Jae Kim, Geun-Ho Park, Dong-Gyu Kim, Hyoung-Nam Kim
{"title":"Analysis of Bistatic Range and Velocity Tracking Performance according to Dynamic Models in Passive Bistatic Radar","authors":"Ho Jae Kim, Geun-Ho Park, Dong-Gyu Kim, Hyoung-Nam Kim","doi":"10.1145/3192975.3193012","DOIUrl":"https://doi.org/10.1145/3192975.3193012","url":null,"abstract":"This paper analyzes the bistatic range and velocity tracking performance of a target according to the dynamic model of the Kalman filter in a passive bistatic radar (PBR). The bistatic range and velocity can be derived using the time difference and Doppler frequency, respectively. In order to improve the detection performance of the location and velocity of the target in the PBR, time difference and Doppler frequency need to be precisely estimated. This can be achieved by tracking the state of an object with the use of a Kalman filter, the tracking performance of which is affected by the used dynamic model. In this paper, constant velocity model and constant acceleration model are used for analyzing the tracking performance of bistatic range and velocity obtained by the Kalman filter in target movement with constant velocity and acceleration.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining auditory perception and visual features for regional recognition of Chinese folk songs 结合听觉感知与视觉特征对中国民歌的地域识别
Xinyu Yang, Jing Luo, Yinrui Wang, Xi Zhao, Juan Li
{"title":"Combining auditory perception and visual features for regional recognition of Chinese folk songs","authors":"Xinyu Yang, Jing Luo, Yinrui Wang, Xi Zhao, Juan Li","doi":"10.1145/3192975.3193006","DOIUrl":"https://doi.org/10.1145/3192975.3193006","url":null,"abstract":"The regional recognition of Chinese folk songs is not only conducive to discovering music characteristics and regional styles of specific geographical folk songs, but also has important research value in the existing music information retrieval system. In this paper, an effective and novel approach for regional recognition of Chinese folk songs is proposed, which is based on the fusion of auditory perception and visual features using an ensemble SVM classifier. When the auditory perception features are extracted, the temporal relation among the frame features is fully considered. For the visual features, the color time-frequency maps are used to replace the gray-scale images to capture more texture information, and in order to better characterize the image texture, the texture patterns and the corresponding intensity information are both extracted. Experimental results show that the recognition method combined with auditory perception and visual features can effectively identify Chinese folk songs of different regions with an accuracy rate of 89.29%, which outperforms other state-of-the-art approaches.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Augmented Reality for Environmental Awareness: A Technology Acceptance Study 移动增强现实环境意识:一项技术接受研究
M. Alrowaily, M. Kavakli
{"title":"Mobile Augmented Reality for Environmental Awareness: A Technology Acceptance Study","authors":"M. Alrowaily, M. Kavakli","doi":"10.1145/3192975.3193002","DOIUrl":"https://doi.org/10.1145/3192975.3193002","url":null,"abstract":"Littering behaviour is a global issue affecting most countries regardless of their development status. Mobile augmented reality (MAR) shows a promising contribution in different fields. However, despite the wider applications of MAR in different area such as cultural heritage [1, 2] and shopping [3], acceptance studies of mobile augmented reality applications with environmental awareness are still rare. This empirical study will contribute to the investigation of the users' acceptance of MAR for environmental context. Perceived Enjoyment (PE) was founded to be strongly positively correlated with the users' attitude (ATU) towards using EVA v2 app (r =0.833, p = < 0.01). The correlation between Perceived Ease of Use (PEOU) and Subjective Norms (SN) was the weakest positive correlation (r =0.36, p = <0.05).","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信