{"title":"Immersive game with vibrotactile and thermal feedback","authors":"Da-hye Kim, Sang-Youn Ki","doi":"10.1109/ICCIT.2010.5711187","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711187","url":null,"abstract":"This paper proposes an immersive game system where a user haptically senses the state of a target object. To construct the game, we first present a vibrotactile signal generation method which provides variable vibrotactile effects according to a user's interaction and graphic environments. The generated vibrotactile effects are used for the input of vibration motors in order to convey vibrotactile information having a large bandwidth to the players. The player also feels the thermal sensation according to graphic environment. We conduct experiments to evaluate the proposed system. The experiment clearly shows that the proposed game with vibrotactile and thermal feedbacks provides realism and immersion to the players.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"96 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research on the informationalization of engineering management","authors":"Sun Ying","doi":"10.1109/ICCIT.2010.5711163","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711163","url":null,"abstract":"This paper discusses the informationalization of engineering management (IEM ) from two aspects. The IEM is one of the fields of informationalization and is also a kind of tools for engineering management. Then the author makes clear the concept and essential features of IEM. In the last part of the paper, the working p rocess of IEM, features of information system and the developing conditions are put forward.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient computation of multiple sliding window skylines on data streams","authors":"Yu Won Lee, K. Lee, Myoung-Ho Kim","doi":"10.1109/ICCIT.2010.5711197","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711197","url":null,"abstract":"Given a set of objects, the skyline query returns those objects which are not dominated by other objects in the same dataset. An object o dominates another object o' if and only if o is strictly better than o' on at least one dimension and o is not worse than o' on the other dimensions. Although the skyline computation has received considerable attention recently, most techniques are designed for static datasets. However, in many applications, skyline computation over data streams is highly required and techniques for static datasets are inefficient or useless in data streams. Since data streams are unbounded, queries on them generally have sliding window specifications. When many concurrent users ask queries over a data stream, the sliding windows that different users are interested in can vary widely. In this paper, we propose skyline computation techniques for processing multiple queries against sliding windows efficiently. We first present two naive techniques called MSO and SSO, then propose a hybrid method called SMO which exploits the advantages of both MSO and SSO. The experimental results show that SMO processes skyline queries efficiently.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The durability of prefabricated large panel building in Beijing","authors":"Ji Yingbo","doi":"10.1109/ICCIT.2010.5711155","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711155","url":null,"abstract":"The durable performance of the prefabricated panel building in Beijing was analyzed through the formatted questionnaire survey. Survey results showed that the majority of the respondent thought there was no or mild cracking, leakage, condensation & mould on the prefabricated concrete panel building. More than 75% percent of the respondents held a same above attitude. Which is much different from general opinion that the prefabricate panel building is a kind of structure with poor durability. From the three aspects of the panel building durability, more than 20% percent respondents had the idea that there was much serious and more serious leakage on the roof. So the water resist is one of the important factors to be thought in progress of construction industrialization.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational institutes: Wireless network standards, security and future","authors":"R. Shukla, S. S. Kolahi, R. Freeth, Avikash Kumar","doi":"10.1109/ICCIT.2010.5711033","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711033","url":null,"abstract":"Wireless networks have made their mark in higher educational institutes worldwide. The authors have conducted a web-based survey to investigate various aspects of wireless networks in higher education institutes around the world. This paper discusses the findings of the survey results in higher education institutes worldwide. Thirty-six higher education institutes participated in this survey. Three of the institutes filled the survey partially and therefore survey results for thirty-three institutes only were considered. There were seventeen questions in the survey covering topics related to wireless networks only in education institutes. This paper presents the survey results pertaining to wireless network standards, security and future of this technology in education institutes. Most of the earlier studies that have been done prior to this, have covered wireless usage in their own country. This research has attempted to survey countries across the world. For a better understanding of the survey results this paper presents a brief review of different wireless technologies in relation to wireless network security and standards available in the market. Subsequently survey results of wireless network standards, security techniques used by the higher education institutes are depicted and analysed.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing portfolio construction using artificial intelligence","authors":"C. Thim, Eric Seah","doi":"10.4156/IJACT.VOL3.ISSUE3.16","DOIUrl":"https://doi.org/10.4156/IJACT.VOL3.ISSUE3.16","url":null,"abstract":"The aim of this research is to enhance the practicability of Artificial Intelligence using Neural Network (NN) in the actual market. This paper generalized the standard Markowitz Theory's Efficient Frontier to mimic and optimise the portfolio construction and develop a neural network heuristic to better understand the chemistry of how Artificial Intelligence can construct optimal portfolio ability and provide advantages to all levels of investors.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123189332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study on no-reference objective video quality assessment based on mobile multimedia broadcasting","authors":"Yujie Zhu, Xiuhua Jiang","doi":"10.1109/ICCIT.2010.5711020","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711020","url":null,"abstract":"This paper focuses on the way for no-reference objective video quality assessment based on de-compressed domain of mobile multimedia broadcasting, it analysis the blocking artifacts and blurring algorithm of damaged image with different test sequences at different compression rates, and uses the linear-weighted methods to estimate the value of objective evaluation of video quality. The experiment's results show that: the no-reference objective assessment value calculated by this algorithm has a strong correlation with PSNR, and it can be used for end users' video quality assessment.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123213615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human detection using image fusion of thermal and visible image with new joint bilateral filter","authors":"Eun-Jin Choi, Dong-Jo Park","doi":"10.1109/ICCIT.2010.5711182","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711182","url":null,"abstract":"We propose a novel human detection system with thermal and visible image sensors using a new joint bilateral filter. There is a limitation to the performance of devices which attempt to detect humans by using only one sensor. Therefore, we use two sensors: an infrared sensor and a color image sensor. To fuse the best features of both types of sensor in order to achieve superior performance in human detection, we use low-level image fusion. To carry out this image fusion process, we propose a new joint bilateral filter which is useful for fusion of the edge information in the visible image and the white region in the thermal image. This image fusion process effectively removes the regions of human shadow which is trouble of background subtraction. To achieve this effect, results from different pairs of fused images that are taken sequentially are subtracted to detect the human effectively. Experimental results show that effective and easy human detection can be achieved by the proposed algorithm.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and analysis of distributed low-rate denial-of-service attacks","authors":"Huaping Hu, J. Zhang, Bo Liu, Lin Chen, Xin Chen","doi":"10.1109/ICCIT.2010.5711129","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711129","url":null,"abstract":"Low-rate denial-of-service attack is a novel category of DDoS attacks. The paper defines defense performance as metric to analyze whether the degree of distribution of attack sources impacts the LDoS attack greatly. From the result of simulation on NS2, the deeper degree of distributed, the better defense performance of Droptail (passive queue management), and the worse defense performance of RED (active queue management). And we also analyze the factors which may have impacts on the attack.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kundu, Chandan Banerjee, S. Guha, Arnab MITRA, Souvik Chakraborty, Chiranjit Pal, Rahul Roy
{"title":"Memory utilization in cloud computing using transparency","authors":"A. Kundu, Chandan Banerjee, S. Guha, Arnab MITRA, Souvik Chakraborty, Chiranjit Pal, Rahul Roy","doi":"10.1109/ICCIT.2010.5711023","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711023","url":null,"abstract":"In this paper we are going to propose memory utilization method in cloud computing environment. End-user generates a service request for selecting memory of service based resources. The proposed mechanism enables users to access memories depending on the predefined criteria. Selection method for accessing the memory of a resource is introduced in this paper. Transparency is used as a virtualization, where multiple memories of several resources appear to the user as a single unit. The resources are virtualized and further delivered to the users as services. The aim of this paper is to select a computing memory of a resource by a service request. Service based memory utilization procedure is described in this paper. In particular, this paper seeks increasing the efficiency of using the memories in distributed manner. We introduce cloud service based memory utilization which is an effective mechanism for allocating memories in cloud computing environment. New types of memory architecture have been discussed for maintaining effectiveness in our approach.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123702998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}