2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)最新文献

筛选
英文 中文
Modeling Pervasive Context-Aware Mobile Phone Application 建模普遍的上下文感知移动电话应用程序
Fekade Getahun Taddesse, B. Abebe
{"title":"Modeling Pervasive Context-Aware Mobile Phone Application","authors":"Fekade Getahun Taddesse, B. Abebe","doi":"10.1109/SITIS.2015.126","DOIUrl":"https://doi.org/10.1109/SITIS.2015.126","url":null,"abstract":"Recently, the IT industry has shown great advancement in building various technological resources. Smart phones with better processing power that almost matches with personal computers are built. Although mobile phones have achieved their original purpose (i.e. interconnecting people, facilitating business, recreation, intelligence and emergency communication), they become main source of distraction for humans in doing their job. One of the main problems of modern day smart phones is battery capacity that has not shown similar exponential growth as processing power, memory or storage devices. Nowadays people are dependent on mobile phone to conduct their day to day activities. Battery consumption is also increasing with our increasing dependency on those devices and it has to be managed. In this study, we have proposed and developed a model for a pervasive context-aware mobile phone. Context information is collected from different sources and preprocessed to have a standard metrics. Ontology based context modeling approach has been used to serialize, store and process the context information in the mobile phones. Appropriate context reasoning approaches have been studied and prediction of the user's activity from the context information collected in context acquisition has been done. A prototype application has been developed tested for the home domain. The prototype application has been tested indifferent circumstances using different devices and it exhibits an average accuracy of 78%.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial Emotion Recognition Based on Facial Motion Stream Generated by Kinect 基于Kinect生成的面部运动流的面部情绪识别
N. Chanthaphan, K. Uchimura, T. Satonaka, Tsuyoshi Makioka
{"title":"Facial Emotion Recognition Based on Facial Motion Stream Generated by Kinect","authors":"N. Chanthaphan, K. Uchimura, T. Satonaka, Tsuyoshi Makioka","doi":"10.1109/SITIS.2015.31","DOIUrl":"https://doi.org/10.1109/SITIS.2015.31","url":null,"abstract":"Nowadays, the human facial emotion recognition has been used in wide range of applications that is directly involved in a human life. Due to the fragility of humans, the performance in these applications has to be improved. In this paper, we describe the novel approach to extract the facial feature from moving pictures. We introduce the facial movement stream, which is derived from the distance measurement between each pair of the coordinates located on human facial wireframe flowing through each frame of the movement. We have proposed the Facial Emotion Recognition Based on Facial Motion Stream generated by Kinect employing two kinds of facial features. The first one was just a simple distance value of each pair-wise coordinates packed into 153-dimensional feature vector per frame. The second one was derived from the first one based on Structured Streaming Skeleton approach and it became 765-dimensional feature vector per frame. We have presented the method to construct the dataset by ourselves since there was no dataset available for our approach. The facial movements of five people were collected in the experiment. The result shows that the average accuracy of SSS feature outperformed the simple distance feature using K-Nearest Neighbors by 10% and that using Support Vector Machine by 26%.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128277515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Evaluation of Data Processing Solutions Considering Preprocessing and "Special" Features 考虑预处理和“特殊”特征的数据处理方案评价
R. Jony, Nabeel Mohammed, A. Habib, S. Momen, Rakibul Islam Rony
{"title":"An Evaluation of Data Processing Solutions Considering Preprocessing and \"Special\" Features","authors":"R. Jony, Nabeel Mohammed, A. Habib, S. Momen, Rakibul Islam Rony","doi":"10.1109/SITIS.2015.125","DOIUrl":"https://doi.org/10.1109/SITIS.2015.125","url":null,"abstract":"Recently we have witnessed an explosion of data in the digital world. In order to make sense of data, proper tools are required to carry out extensive data analysis. This is especially true with the advent of Big Data and how it is slowly becoming a part of everyday life. In this paper we evaluated multiple data processing tools in light of their data pre-processing features and \"special features\". These \"special features\" are a part of the contribution of this paper, as they have been gathered from a literature survey and through interviews of 20 experts from industry and academia. Based on these features 13 tools were scored, from which we selected four for further hands on testing. The hands on testing highlighted the strengths and weaknesses of these tools, giving an insight into their suitability in Big Data processing.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Data Structures for Dynamic Graph Analysis 动态图分析的有效数据结构
Benjamin Schiller, J. Castrillón, T. Strufe
{"title":"Efficient Data Structures for Dynamic Graph Analysis","authors":"Benjamin Schiller, J. Castrillón, T. Strufe","doi":"10.1109/SITIS.2015.94","DOIUrl":"https://doi.org/10.1109/SITIS.2015.94","url":null,"abstract":"In the era of social networks, gene sequencing, and big data, a new class of applications that analyze the properties of large graphs as they dynamically change over time has emerged. The performance of these applications is highly influenced by the data structures used to store and access the graph in memory. Depending on its size and structure, update frequency, and read accesses of the analysis, the use of different data structures can yield great performance variations. Even for expert programmers, it is not always obvious, which data structure is the best choice for a given scenario. In this paper, we present a framework for handling this issue automatically. It provides compile-time support for automatically selecting the most efficient data structures for a given graph analysis application assuming a consistent workload on the graph. We perform a measurement study to better understand the performance of five data structures and evaluate a prototype Java implementation of our framework. It achieves a speedup of up to 4.7× compared to basic data structure configurations for the analysis of real-world dynamic graphs.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124364460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network Virtualization Using VPN for Stable Communication with Offshore Cloud 利用 VPN 实现网络虚拟化,与离岸云进行稳定通信
H. Fujikawa, H. Yamaki, Yukiko Yamamoto, S. Tsuruta
{"title":"Network Virtualization Using VPN for Stable Communication with Offshore Cloud","authors":"H. Fujikawa, H. Yamaki, Yukiko Yamamoto, S. Tsuruta","doi":"10.1109/SITIS.2015.128","DOIUrl":"https://doi.org/10.1109/SITIS.2015.128","url":null,"abstract":"It has become common to access cloud computers in other countries via the Internet. However, in some countries, many international communication channels are suddenly shut down by governmental bodies. This causes significant degradation of the Quality of Service (QoS) for accessing cloud computers, Web conferences, and so on. To cope with this, we propose a network virtualization method for intelligent routers to detect the restriction of international communication and form VPN bypass. The routers placed at user's offices bypass/switch routes from the internet to VPN contracted by each enterprise or company to ensure QoS and only during shutdown and the like not to be regulated by governmental bodies. More concretely, a method for applying asymmetric criteria to decide whether to bypass is proposed for robust Internet operation to keep connections with cloud servers. Differential values of network latency are used for detecting the start of intentional network barriers, and absolute threshold values to determine both their start and end. This method is verified by a network simulator as well as latency on real regulation. Validation has been done by more than 50 offices' successful real usage.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Social Network Analysis of Face Tracking in News Video 新闻视频中人脸跟踪的社会网络分析
B. Renoust, T. Ngo, Duy-Dinh Le, S. Satoh
{"title":"A Social Network Analysis of Face Tracking in News Video","authors":"B. Renoust, T. Ngo, Duy-Dinh Le, S. Satoh","doi":"10.1109/SITIS.2015.30","DOIUrl":"https://doi.org/10.1109/SITIS.2015.30","url":null,"abstract":"In the age of data processing, news videos are rich mines of information. After all, the news are essentially created to convey information to the public. But can we go beyond what is directly presented to us and see a wider picture? Many works already focus on what we can discover and understand from the analysis of years of news broadcasting. These analysis bring monitoring and understanding of the activity of public figures, political strategies, explanation and even prediction of critical media events. Such tools can help public figures in managing their public image, as well as support the work of journalists, social scientists and other media experts. News analysis can be also seen from the lens of complex systems, gathering many types of entities, attributes and interactions over time. As many public figures intervene in different news stories, a first interesting task is to observe the social interactions between these actors. Towards this goal, we propose to use video analysis to automatise the process of constructing social networks directly from news video archives. In this paper we are introducing a system deriving multiple social networks from face detections in news video. We present preliminary results obtained from analysis of these networks monitoring of the activity of more than a hundred public figures over a decade of the NHK news archives.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recovery Medical Articles Using Semantic Enrichment Method 利用语义富集方法恢复医学文章
J. C. D. Araujo, J. P. D. Oliveira, L. Marques
{"title":"Recovery Medical Articles Using Semantic Enrichment Method","authors":"J. C. D. Araujo, J. P. D. Oliveira, L. Marques","doi":"10.1109/SITIS.2015.131","DOIUrl":"https://doi.org/10.1109/SITIS.2015.131","url":null,"abstract":"The low success rate when retrieving information through web searches could be verified virtually in all areas of knowledge, due to the large amount of information available which raises the selection complexity for relevant articles. A query consists in chosen terms to drive the search for related documents. However, if new terms could be added in order to expand the relevance of the search, then there is what is called query semantic enrichment. This paper presents a semantic enrichment model to improve the quality of results for medical articles queries. This model knows the search context by using a repository of articles which is previously subjected to Latent Semantic Analysis and is supported by the National Cancer Institute ontology and the WordNet lexical database. In this way, new terms which are semantically related to the conducted search context, could be proposed to help raising precision when retrieving relevant articles.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Rotation Invariant BSIF Descriptor for Video Copy Detection Using a Ring Decomposition 基于环分解的视频复制检测旋转不变BSIF描述符
Yassine Himeur, Karima Ait-Sadi
{"title":"A Rotation Invariant BSIF Descriptor for Video Copy Detection Using a Ring Decomposition","authors":"Yassine Himeur, Karima Ait-Sadi","doi":"10.1109/SITIS.2015.71","DOIUrl":"https://doi.org/10.1109/SITIS.2015.71","url":null,"abstract":"Recently, with the increasing number of Internet users, detecting non legal copy of video sequence is of outstanding importance. This paper provides a new approach for content based video copy detection (CBVCD) which is invariant to rotation and flipping attacks. The proposed scheme is based on binary statistical image features (BSIF) descriptor using a new ring decomposition. The ring partition is particularly suitable for rotation/flipping attacks that affect the video frames. In fact, the visual content of each ring is kept constant when the video frames are rotated or flipped. The proposed VCD system was evaluated under TRECVID 2009 database and compared to others algorithms based on local binary pattern (LBP), local phase quantization (LPQ) or histogram of oriented gradient (HOG) descriptors. The experimental results demonstrated that the proposed descriptor is effective for all the attacks that can affect a video sequence and particularly in the case of rotation and flipping attacks.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Introduction to Feature Selection for Atmospheric Quality Parameters Forecasting 大气质量参数预报特征选择导论
G. Papadourakis, I. Kyriakidis
{"title":"Introduction to Feature Selection for Atmospheric Quality Parameters Forecasting","authors":"G. Papadourakis, I. Kyriakidis","doi":"10.1109/SITIS.2015.23","DOIUrl":"https://doi.org/10.1109/SITIS.2015.23","url":null,"abstract":"Knowledge is only valuable when it can be used efficiently and effectively, therefore knowledge management is increasingly being recognized as a key element in extracting its value. Feature selection and dimensionality reduction can be used for that purpose, in order to reduce the time required to perform data mining and to increase the resulting classification accuracy. This paper presents an introduction to some of these algorithms that can be used to forecast atmospheric quality parameters.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Latent Fingerprint Images with Segmentation Perspective 基于分割透视的潜在指纹图像增强
A. R. Baig, I. Huqqani, K. Khurshid
{"title":"Enhancement of Latent Fingerprint Images with Segmentation Perspective","authors":"A. R. Baig, I. Huqqani, K. Khurshid","doi":"10.1109/SITIS.2015.32","DOIUrl":"https://doi.org/10.1109/SITIS.2015.32","url":null,"abstract":"Latent fingerprints are of decisive influence when it comes to identifying suspects, as these are usually encountered at crime scenes. Also, these serve as a compelling evidence in a court of law. Some of the formidable challenges with latent fingerprints are deficient ridge information and poor ridge clarity due to background noise and non-linear distortions. An effective fingerprint enhancement scheme is suggested to meliorate the clarity and continuity of ridges and valleys in a latent fingerprint image. The proposed method deals with both local (minutia or singular points, ridge termination, bifurcation, broken ridges, short ridges, core and delta) and global features (ridge orientation and ridge frequency), while retaining the true ridge-valley structures and removing noise at the same time. The proposed design establishes scalability, accessibility and flexibility.","PeriodicalId":128616,"journal":{"name":"2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信