{"title":"Modeling Pervasive Context-Aware Mobile Phone Application","authors":"Fekade Getahun Taddesse, B. Abebe","doi":"10.1109/SITIS.2015.126","DOIUrl":"https://doi.org/10.1109/SITIS.2015.126","url":null,"abstract":"Recently, the IT industry has shown great advancement in building various technological resources. Smart phones with better processing power that almost matches with personal computers are built. Although mobile phones have achieved their original purpose (i.e. interconnecting people, facilitating business, recreation, intelligence and emergency communication), they become main source of distraction for humans in doing their job. One of the main problems of modern day smart phones is battery capacity that has not shown similar exponential growth as processing power, memory or storage devices. Nowadays people are dependent on mobile phone to conduct their day to day activities. Battery consumption is also increasing with our increasing dependency on those devices and it has to be managed. In this study, we have proposed and developed a model for a pervasive context-aware mobile phone. Context information is collected from different sources and preprocessed to have a standard metrics. Ontology based context modeling approach has been used to serialize, store and process the context information in the mobile phones. Appropriate context reasoning approaches have been studied and prediction of the user's activity from the context information collected in context acquisition has been done. A prototype application has been developed tested for the home domain. The prototype application has been tested indifferent circumstances using different devices and it exhibits an average accuracy of 78%.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chanthaphan, K. Uchimura, T. Satonaka, Tsuyoshi Makioka
{"title":"Facial Emotion Recognition Based on Facial Motion Stream Generated by Kinect","authors":"N. Chanthaphan, K. Uchimura, T. Satonaka, Tsuyoshi Makioka","doi":"10.1109/SITIS.2015.31","DOIUrl":"https://doi.org/10.1109/SITIS.2015.31","url":null,"abstract":"Nowadays, the human facial emotion recognition has been used in wide range of applications that is directly involved in a human life. Due to the fragility of humans, the performance in these applications has to be improved. In this paper, we describe the novel approach to extract the facial feature from moving pictures. We introduce the facial movement stream, which is derived from the distance measurement between each pair of the coordinates located on human facial wireframe flowing through each frame of the movement. We have proposed the Facial Emotion Recognition Based on Facial Motion Stream generated by Kinect employing two kinds of facial features. The first one was just a simple distance value of each pair-wise coordinates packed into 153-dimensional feature vector per frame. The second one was derived from the first one based on Structured Streaming Skeleton approach and it became 765-dimensional feature vector per frame. We have presented the method to construct the dataset by ourselves since there was no dataset available for our approach. The facial movements of five people were collected in the experiment. The result shows that the average accuracy of SSS feature outperformed the simple distance feature using K-Nearest Neighbors by 10% and that using Support Vector Machine by 26%.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128277515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Jony, Nabeel Mohammed, A. Habib, S. Momen, Rakibul Islam Rony
{"title":"An Evaluation of Data Processing Solutions Considering Preprocessing and \"Special\" Features","authors":"R. Jony, Nabeel Mohammed, A. Habib, S. Momen, Rakibul Islam Rony","doi":"10.1109/SITIS.2015.125","DOIUrl":"https://doi.org/10.1109/SITIS.2015.125","url":null,"abstract":"Recently we have witnessed an explosion of data in the digital world. In order to make sense of data, proper tools are required to carry out extensive data analysis. This is especially true with the advent of Big Data and how it is slowly becoming a part of everyday life. In this paper we evaluated multiple data processing tools in light of their data pre-processing features and \"special features\". These \"special features\" are a part of the contribution of this paper, as they have been gathered from a literature survey and through interviews of 20 experts from industry and academia. Based on these features 13 tools were scored, from which we selected four for further hands on testing. The hands on testing highlighted the strengths and weaknesses of these tools, giving an insight into their suitability in Big Data processing.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Data Structures for Dynamic Graph Analysis","authors":"Benjamin Schiller, J. Castrillón, T. Strufe","doi":"10.1109/SITIS.2015.94","DOIUrl":"https://doi.org/10.1109/SITIS.2015.94","url":null,"abstract":"In the era of social networks, gene sequencing, and big data, a new class of applications that analyze the properties of large graphs as they dynamically change over time has emerged. The performance of these applications is highly influenced by the data structures used to store and access the graph in memory. Depending on its size and structure, update frequency, and read accesses of the analysis, the use of different data structures can yield great performance variations. Even for expert programmers, it is not always obvious, which data structure is the best choice for a given scenario. In this paper, we present a framework for handling this issue automatically. It provides compile-time support for automatically selecting the most efficient data structures for a given graph analysis application assuming a consistent workload on the graph. We perform a measurement study to better understand the performance of five data structures and evaluate a prototype Java implementation of our framework. It achieves a speedup of up to 4.7× compared to basic data structure configurations for the analysis of real-world dynamic graphs.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124364460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Fujikawa, H. Yamaki, Yukiko Yamamoto, S. Tsuruta
{"title":"Network Virtualization Using VPN for Stable Communication with Offshore Cloud","authors":"H. Fujikawa, H. Yamaki, Yukiko Yamamoto, S. Tsuruta","doi":"10.1109/SITIS.2015.128","DOIUrl":"https://doi.org/10.1109/SITIS.2015.128","url":null,"abstract":"It has become common to access cloud computers in other countries via the Internet. However, in some countries, many international communication channels are suddenly shut down by governmental bodies. This causes significant degradation of the Quality of Service (QoS) for accessing cloud computers, Web conferences, and so on. To cope with this, we propose a network virtualization method for intelligent routers to detect the restriction of international communication and form VPN bypass. The routers placed at user's offices bypass/switch routes from the internet to VPN contracted by each enterprise or company to ensure QoS and only during shutdown and the like not to be regulated by governmental bodies. More concretely, a method for applying asymmetric criteria to decide whether to bypass is proposed for robust Internet operation to keep connections with cloud servers. Differential values of network latency are used for detecting the start of intentional network barriers, and absolute threshold values to determine both their start and end. This method is verified by a network simulator as well as latency on real regulation. Validation has been done by more than 50 offices' successful real usage.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Social Network Analysis of Face Tracking in News Video","authors":"B. Renoust, T. Ngo, Duy-Dinh Le, S. Satoh","doi":"10.1109/SITIS.2015.30","DOIUrl":"https://doi.org/10.1109/SITIS.2015.30","url":null,"abstract":"In the age of data processing, news videos are rich mines of information. After all, the news are essentially created to convey information to the public. But can we go beyond what is directly presented to us and see a wider picture? Many works already focus on what we can discover and understand from the analysis of years of news broadcasting. These analysis bring monitoring and understanding of the activity of public figures, political strategies, explanation and even prediction of critical media events. Such tools can help public figures in managing their public image, as well as support the work of journalists, social scientists and other media experts. News analysis can be also seen from the lens of complex systems, gathering many types of entities, attributes and interactions over time. As many public figures intervene in different news stories, a first interesting task is to observe the social interactions between these actors. Towards this goal, we propose to use video analysis to automatise the process of constructing social networks directly from news video archives. In this paper we are introducing a system deriving multiple social networks from face detections in news video. We present preliminary results obtained from analysis of these networks monitoring of the activity of more than a hundred public figures over a decade of the NHK news archives.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recovery Medical Articles Using Semantic Enrichment Method","authors":"J. C. D. Araujo, J. P. D. Oliveira, L. Marques","doi":"10.1109/SITIS.2015.131","DOIUrl":"https://doi.org/10.1109/SITIS.2015.131","url":null,"abstract":"The low success rate when retrieving information through web searches could be verified virtually in all areas of knowledge, due to the large amount of information available which raises the selection complexity for relevant articles. A query consists in chosen terms to drive the search for related documents. However, if new terms could be added in order to expand the relevance of the search, then there is what is called query semantic enrichment. This paper presents a semantic enrichment model to improve the quality of results for medical articles queries. This model knows the search context by using a repository of articles which is previously subjected to Latent Semantic Analysis and is supported by the National Cancer Institute ontology and the WordNet lexical database. In this way, new terms which are semantically related to the conducted search context, could be proposed to help raising precision when retrieving relevant articles.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Rotation Invariant BSIF Descriptor for Video Copy Detection Using a Ring Decomposition","authors":"Yassine Himeur, Karima Ait-Sadi","doi":"10.1109/SITIS.2015.71","DOIUrl":"https://doi.org/10.1109/SITIS.2015.71","url":null,"abstract":"Recently, with the increasing number of Internet users, detecting non legal copy of video sequence is of outstanding importance. This paper provides a new approach for content based video copy detection (CBVCD) which is invariant to rotation and flipping attacks. The proposed scheme is based on binary statistical image features (BSIF) descriptor using a new ring decomposition. The ring partition is particularly suitable for rotation/flipping attacks that affect the video frames. In fact, the visual content of each ring is kept constant when the video frames are rotated or flipped. The proposed VCD system was evaluated under TRECVID 2009 database and compared to others algorithms based on local binary pattern (LBP), local phase quantization (LPQ) or histogram of oriented gradient (HOG) descriptors. The experimental results demonstrated that the proposed descriptor is effective for all the attacks that can affect a video sequence and particularly in the case of rotation and flipping attacks.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to Feature Selection for Atmospheric Quality Parameters Forecasting","authors":"G. Papadourakis, I. Kyriakidis","doi":"10.1109/SITIS.2015.23","DOIUrl":"https://doi.org/10.1109/SITIS.2015.23","url":null,"abstract":"Knowledge is only valuable when it can be used efficiently and effectively, therefore knowledge management is increasingly being recognized as a key element in extracting its value. Feature selection and dimensionality reduction can be used for that purpose, in order to reduce the time required to perform data mining and to increase the resulting classification accuracy. This paper presents an introduction to some of these algorithms that can be used to forecast atmospheric quality parameters.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Latent Fingerprint Images with Segmentation Perspective","authors":"A. R. Baig, I. Huqqani, K. Khurshid","doi":"10.1109/SITIS.2015.32","DOIUrl":"https://doi.org/10.1109/SITIS.2015.32","url":null,"abstract":"Latent fingerprints are of decisive influence when it comes to identifying suspects, as these are usually encountered at crime scenes. Also, these serve as a compelling evidence in a court of law. Some of the formidable challenges with latent fingerprints are deficient ridge information and poor ridge clarity due to background noise and non-linear distortions. An effective fingerprint enhancement scheme is suggested to meliorate the clarity and continuity of ridges and valleys in a latent fingerprint image. The proposed method deals with both local (minutia or singular points, ridge termination, bifurcation, broken ridges, short ridges, core and delta) and global features (ridge orientation and ridge frequency), while retaining the true ridge-valley structures and removing noise at the same time. The proposed design establishes scalability, accessibility and flexibility.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}