P. Loucopoulos, E. Kavakli, D. Anagnostopoulos, G. Dimitrakopoulos
{"title":"Capability-oriented Analysis and Design for Collaborative Systems: An example from the Doha 2022 World Cup Games","authors":"P. Loucopoulos, E. Kavakli, D. Anagnostopoulos, G. Dimitrakopoulos","doi":"10.1145/3192975.3192998","DOIUrl":"https://doi.org/10.1145/3192975.3192998","url":null,"abstract":"This paper presents a capability-oriented approach that facilitates strategic decisions for dealing with emergent behaviour and dynamics of artefacts and their evolutionary trajectory, where these artefacts are often a blending of physical and cyber actors working synergistically for achieving enterprise goals. We demonstrate this approach using an example from an application involving decision making for supporting venue operations for the Doha 2022 World Cup Games. The example focuses on the operations surrounding the strategy for security measures for entrance of spectators to a venue. For this specific example one needs to identify the capabilities required in order to establish a level of service acceptable to spectators within the resource constraints to be offered by the organising committee.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129828967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Repetitive are Karate Kicks Performed by Skilled Practitioners?","authors":"T. Hachaj, M. Piekarczyk, M. Ogiela","doi":"10.1145/3192975.3192989","DOIUrl":"https://doi.org/10.1145/3192975.3192989","url":null,"abstract":"The aim of this paper is to propose the DTW-based signal comparison method that allows comparing motion capture (MoCap) measurements obtained from athletes even with different body proportions. We have applied the proposed framework to evaluate how repetitive are popular karate kicks performed by skilled athletes. The repetition level is defined with DTW distances and alignments of preprocessed MoCap data of a single activity performed by the same person. This knowledge is an important step to prepare tabularized norms which can be used as very useful tool by sport society to improve the training with the aid of modern computer methods. With those norms we can tell which DTW distances are typical for highly skilled karateka. The maximal distance between two aligned trajectories might differs from 9.36 ± 2.08 cm for to even 29.21 ± 16.5 cm. This last situation is caused by the fact that a person can perform the same kick with large nonlinear temporal displacements of actions phase, however, we have to remember, that those displacements happen in time periods of about 0.05 seconds in length. The results we obtained are very important because they show what range values one should expect from this kind of comparison and might be a reference for other scientists.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Kernelized Fuzzy C-means Clustering Algorithm based on Bat Algorithm","authors":"Chunying Cheng, Chunhua Bao","doi":"10.1145/3192975.3193009","DOIUrl":"https://doi.org/10.1145/3192975.3193009","url":null,"abstract":"To overcome the defects of easily falling into local optimum and being sensitive to initial values brought by kernelized fuzzy means clustering algorithm (KFCM), a kernelized fuzzy means clustering algorithm based on bat algorithm (BA-KFCM) is proposed in this paper. In this paper, IRIS dataset, Glass dataset and Wine dataset in the classical datasets are used to simulate the experiment respectively, and the results of the algorithm are compared with those of the particle swarm optimization algorithm and the firefly algorithm so as to verify the effectiveness of the algorithm. The experimental results show that the proposed algorithm is superior to other algorithms in terms of effects and has a better quality of clustering.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117318357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Self-modifying Code Detection Based on Backward Analysis","authors":"Shi Dawei, Lv De-long, Ye Zhibin","doi":"10.1145/3192975.3193016","DOIUrl":"https://doi.org/10.1145/3192975.3193016","url":null,"abstract":"Self-modifying code (SMC) is widely used in obfuscated program for enhancing the difficulty in reverse engineering. The typical mode of self-modifying code is restore-execute-hide, it drives program to conceal real behaviors at most of the time, and only under actual running will the real code be restored and executed. In order to locate the SMC and further recover the original logic of code for guiding program analysis, dynamic self-modifying code detecting method based on backward analysis is proposed. Our method first extracts execution trace such as instructions and status through dynamic analysis. Then we maintain a memory set to store the memory address of execution instructions, the memory set will update dynamically while backward searching the trace, and simultaneously will we check the memory write address to match with current memory set in order to identify the mode \"modify then execute\". By means of validating self-modifying code which is identified via above procedures, we can easily deobfuscate the program which use self-modifying code and achieve its original logic. A prototype that can be applied in self-modifying code detection is designed and implemented. The evaluation results show our method can trace the execution of program effectively, and can reduce the consumption in time and space.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121464214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Superimposed Training Scheme for Individual Channel Estimation for Amplify-and-Forward Relay Network","authors":"Xianwen He, Gaoqi Dou, Jun Gao","doi":"10.1145/3192975.3192997","DOIUrl":"https://doi.org/10.1145/3192975.3192997","url":null,"abstract":"In this letter, we deal with the problem of individual channel estimation in amplify-and-forward (AF) relaying systems. A novel superimposed training (ST) scheme is proposed where the relay superimposes its own training sequence directly on top of the received data signal without bandwidth expansion. As a result, the training sequences from the source and relay nodes are independent of each other and can be viewed as a time-multiplexed (TM) mode in the proposed scheme, thus making it more flexible and robust in relay-training design. To remove the data-induced interference and relaying-propagated noise during channel estimation, a modified ST scheme is designed by discarding some relaying data to accommodate the relay-training sequence. Simulation results are presented to assess the performances of the proposed scheme and to obtain the optimal power allocation.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Verification of Third Party Design Files in Manufacturing","authors":"Alexander Giehl, Norbert Wiedermann","doi":"10.1145/3192975.3192984","DOIUrl":"https://doi.org/10.1145/3192975.3192984","url":null,"abstract":"Customer-individual production in manufacturing is a current trend related to the Industrie 4.0 paradigm. Creation of design files by the customers is becoming more frequent. These design files are typically generated outside the company boundaries and then transferred to the organization where they are eventually processed and scheduled for production. From a security perspective, this introduces new attack vectors targeting producing companies. Design files with malicious configuration parameters can threaten the availability of the manufacturing plant resulting in financial risks and can even cause harm to humans. Human verification of design files is error-prone why an automated solution is required. A graph-theoretic modeling framework for machine tools capable of verifying the security of product designs is proposed. This framework is used to model an exemplary production process implemented in a wood processing plant based on the experiences of a real-world case study. Simulation of the modeled scenario shows the feasibility of the framework. Apart from security verification, the approach can be adopted to decide if a product design can be manufactured with a given set of machine tools.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121796226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foreground Object Detection Combining Gaussian Mixture Model and Inter-Frame Difference in the Application of Classroom recording Apparatus","authors":"Zhuang Jun, Zhang Xinhua","doi":"10.1145/3192975.3193020","DOIUrl":"https://doi.org/10.1145/3192975.3193020","url":null,"abstract":"A new effective approach to detect central coordinate of foreground object in classroom recording application circumstance is proposed in this paper. The new approach includes two steps. The first step is to segment interested blocks from a whole video image by Inter-frame Differences. The second step is to extract the foreground pixels from the interested blocks by Gaussian Mixture Model GMM. The experimental results show that the new algorithm, which combines Gaussian Mixture Model and Inter-frame Differences, performs better than the methods in previous researches in classroom recording application field. The new method is proved to be effective in reducing complexity of calculation with very small expense of accuracy. The adaptability of different number of blocks and different values of block threshold are discussed at the end of the paper.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ho Jae Kim, Geun-Ho Park, Dong-Gyu Kim, Hyoung-Nam Kim
{"title":"Analysis of Bistatic Range and Velocity Tracking Performance according to Dynamic Models in Passive Bistatic Radar","authors":"Ho Jae Kim, Geun-Ho Park, Dong-Gyu Kim, Hyoung-Nam Kim","doi":"10.1145/3192975.3193012","DOIUrl":"https://doi.org/10.1145/3192975.3193012","url":null,"abstract":"This paper analyzes the bistatic range and velocity tracking performance of a target according to the dynamic model of the Kalman filter in a passive bistatic radar (PBR). The bistatic range and velocity can be derived using the time difference and Doppler frequency, respectively. In order to improve the detection performance of the location and velocity of the target in the PBR, time difference and Doppler frequency need to be precisely estimated. This can be achieved by tracking the state of an object with the use of a Kalman filter, the tracking performance of which is affected by the used dynamic model. In this paper, constant velocity model and constant acceleration model are used for analyzing the tracking performance of bistatic range and velocity obtained by the Kalman filter in target movement with constant velocity and acceleration.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinyu Yang, Jing Luo, Yinrui Wang, Xi Zhao, Juan Li
{"title":"Combining auditory perception and visual features for regional recognition of Chinese folk songs","authors":"Xinyu Yang, Jing Luo, Yinrui Wang, Xi Zhao, Juan Li","doi":"10.1145/3192975.3193006","DOIUrl":"https://doi.org/10.1145/3192975.3193006","url":null,"abstract":"The regional recognition of Chinese folk songs is not only conducive to discovering music characteristics and regional styles of specific geographical folk songs, but also has important research value in the existing music information retrieval system. In this paper, an effective and novel approach for regional recognition of Chinese folk songs is proposed, which is based on the fusion of auditory perception and visual features using an ensemble SVM classifier. When the auditory perception features are extracted, the temporal relation among the frame features is fully considered. For the visual features, the color time-frequency maps are used to replace the gray-scale images to capture more texture information, and in order to better characterize the image texture, the texture patterns and the corresponding intensity information are both extracted. Experimental results show that the recognition method combined with auditory perception and visual features can effectively identify Chinese folk songs of different regions with an accuracy rate of 89.29%, which outperforms other state-of-the-art approaches.","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Augmented Reality for Environmental Awareness: A Technology Acceptance Study","authors":"M. Alrowaily, M. Kavakli","doi":"10.1145/3192975.3193002","DOIUrl":"https://doi.org/10.1145/3192975.3193002","url":null,"abstract":"Littering behaviour is a global issue affecting most countries regardless of their development status. Mobile augmented reality (MAR) shows a promising contribution in different fields. However, despite the wider applications of MAR in different area such as cultural heritage [1, 2] and shopping [3], acceptance studies of mobile augmented reality applications with environmental awareness are still rare. This empirical study will contribute to the investigation of the users' acceptance of MAR for environmental context. Perceived Enjoyment (PE) was founded to be strongly positively correlated with the users' attitude (ATU) towards using EVA v2 app (r =0.833, p = < 0.01). The correlation between Perceived Ease of Use (PEOU) and Subjective Norms (SN) was the weakest positive correlation (r =0.36, p = <0.05).","PeriodicalId":128533,"journal":{"name":"Proceedings of the 2018 10th International Conference on Computer and Automation Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}