5th International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
Game interface using hand gesture recognition 游戏界面采用手势识别
Doe-Hyung Lee, Kwang-seok Hong
{"title":"Game interface using hand gesture recognition","authors":"Doe-Hyung Lee, Kwang-seok Hong","doi":"10.1109/ICCIT.2010.5711226","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711226","url":null,"abstract":"In this paper, we propose a real-time hand gesture recognition system based on difference image entropy using a stereo camera. Existing systems use hand detection primarily with some type of marker. Our system, however, uses a real-time hand image recognition system. In the detection step, we implement a depth map using a sum of absolute differences based on the acquired right-left image using a stereo camera. This system detects a foreground object and perceives it as a hand. The hand gesture recognition system uses the difference image entropy of the input image and the average image. To evaluate the performance of the proposed technology, we implement a recognition experiment using the hand gesture 240 database. The proposed method shows an average recognition rate of 85%. Using the proposed method, we implement a Chinese chess game based on hand gesture recognition.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"758 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
DCC analysis of two exchange markets with a factor of Japan dollars: Study of Philippine and Indonesia exchange markets 考虑日元因素的两个外汇市场的DCC分析:菲律宾和印度尼西亚外汇市场的研究
Wann-Jyi Horng, T. Hu, Ju-Lan Tsai
{"title":"DCC analysis of two exchange markets with a factor of Japan dollars: Study of Philippine and Indonesia exchange markets","authors":"Wann-Jyi Horng, T. Hu, Ju-Lan Tsai","doi":"10.1109/ICCIT.2010.5711195","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711195","url":null,"abstract":"This article conducts an empirical investigation examining the model construction and the association between Philippine and Indonesia exchange markets by using the data of Philippine Peso exchange rates against US Dollar and the Indonesia exchange rate against US Dollar from January 2003 to December 2009. In addition, we also adopt Student's t distribution to analyze the proposed model. The empirical results show that the mutual effects of the Philippine and the Indonesia exchange markets may be constructed in bivariate IGARCH (1, 1) model with a DCC. Our findings suggest that there exists a positive relationship between Philippine and Indonesia exchange market returns, that is, the volatilities of these two exchange market returns are synchronously influence. Furthermore, the average estimator of the DCC coefficients of two exchange market returns equals to 0.3067. The Japan exchange rate return volatility will also affect the variation risk of the Philippine exchange market; likewise the Japan exchange rate return volatility will impact the variation risk of the Indonesia's exchange market. Additionally, Philippine and Indonesia stock markets do not have the asymmetrical effect in the research data period.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The initiative experiments for utilizing real cards in online Trading Card Game 在网络集换卡游戏中首次尝试使用真卡牌
Jong-Hyoun Kim, Teresa Cho
{"title":"The initiative experiments for utilizing real cards in online Trading Card Game","authors":"Jong-Hyoun Kim, Teresa Cho","doi":"10.1109/ICCIT.2010.5711053","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711053","url":null,"abstract":"Current virtual game interfaces can't comprehend our metaphor, can't reflect on our natural behavior aspect, can't make us immerse into a game, and makes a barrier between virtual game space and our real behavior. It is very challenging issue to use real objects tightly related to human-being's behaviors or reactions for interacting with game applications. Interactive AR interfaces may augment users' perception of the real world by adding virtual information to it. In addition, users' interaction with the system may be augmented, making the computer as seamlessly as possible. We attempted an experiment on camera-based interface for online TCG game application which emits excellence of AR. This experiment uses real TCG cards which are recognized by texture based AR algorithm. These initiative experiments not only guarantee the consistency between the game-player's behaviors and the gaming environment, but also make real and virtual world seamless. This consistency increases friendliness and immersion to a game as well as the ability of bodily sensation for a game. This new interface takes the results of human-being's behaviors as input event, and will open the new field of digital interfaces for forthcoming ubiquitous computing.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unified fast authentication procedure in service and access networks for NGN NGN业务网络和接入网的统一快速认证流程
Kwihoon Kim, Chunghyun Ahn, Jinwoo Hong
{"title":"Unified fast authentication procedure in service and access networks for NGN","authors":"Kwihoon Kim, Chunghyun Ahn, Jinwoo Hong","doi":"10.1109/ICCIT.2010.5711120","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711120","url":null,"abstract":"This paper mainly focuses on improving NGN authentication performance and security to reduce the critical IMS service authentication procedure with redundant reduction in fixed and mobile networks. In the NGN specifications, authentication is performed at both the NASS and the IMS networks before a user equipment can access the IMS services. Though the NACF-IMS bundled authentication was proposed for this purpose, it cannot protect authentication procedure against IP address spoofing attack and channel between a user equipment and P-CSC-FE due to an absence of key sharing method. We observe that many steps in this two-pass authentication are similar. Based on our observation, this needs to perform NACF authentication. At the IMS service level, authentication is implicitly performed in IMS registration for NGN networks. Simulation results demonstrate that the proposed scheme provides better reduction of authentication procedure and performance for arrival rates with NGN environments than other methods.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical analysis on technological innovation risk in China's financial enterprises based on AHP method 基于AHP方法的中国金融企业技术创新风险实证分析
W. Hongmei, Li Shijiao
{"title":"Empirical analysis on technological innovation risk in China's financial enterprises based on AHP method","authors":"W. Hongmei, Li Shijiao","doi":"10.1109/ICCIT.2010.5711160","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711160","url":null,"abstract":"With the rapid development of information technology revolution, technological innovation has brought increasing benefit to financial enterprises in China. However, the strategic priority and intense competition of technological innovation in China's financial business, as well as the uncertainty and dynamic of their development process, determine the high risk of technological innovation in China' financial enterprises. This paper analyses the risk in the process of technological innovation, measures the risk in China's financial enterprises based on AHP method, and makes an empirical analysis of the network bank as an example.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating information representation based on cognitive differences 基于认知差异的信息表征评估
Natrah Abdullah, W. Adnan, N. Noor
{"title":"Evaluating information representation based on cognitive differences","authors":"Natrah Abdullah, W. Adnan, N. Noor","doi":"10.1109/ICCIT.2010.5711057","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711057","url":null,"abstract":"In Human Computer Interaction, visual representation is related to how information is presented and represented. This study seeks to determine if visual representation features in an interface design are beneficial to certain types of users. We conduct an experiment that evaluates individual differences in 3-dimensional view with interaction (3DI) and 3-dimensional view without interaction (3DL). The 3DI is categorized as an active approach and 3DL as a passive approach of task handling. The findings generally show changes in preferences when 3D view with an active approach of information representation is introduced. This finding indicates that preferences in 3DI view have an association with cognitive styles on task handling.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Appropriate hash functions selection for message authentication in electronic tender for insurance companies 选择合适的哈希函数进行保险公司电子标书信息认证
Ava Pourkashani, R. Rzayev, F. Faghihi
{"title":"Appropriate hash functions selection for message authentication in electronic tender for insurance companies","authors":"Ava Pourkashani, R. Rzayev, F. Faghihi","doi":"10.1109/ICCIT.2010.5711224","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711224","url":null,"abstract":"Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crowd density analysis using co-occurrence texture features 基于共现纹理特征的人群密度分析
Wenhua Ma, Lei Huang, Chang-ping Liu
{"title":"Crowd density analysis using co-occurrence texture features","authors":"Wenhua Ma, Lei Huang, Chang-ping Liu","doi":"10.1109/ICCIT.2010.5711051","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711051","url":null,"abstract":"Crowd density analysis is crucial for crowd monitoring and management. This paper proposes a novel method for crowd density analysis. According to the framework, input images are firstly divided into patches, and each patch is associated with a density label based on its texture features. Finally, local information is synthesized for global density estimation. Local image content is described by features based on co-occurrence textures and visual words processing chain. Experiments show that the system is highly robust to scene changes and background noise yet remain discriminative for crowd detection.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Study of claim support system for hydraulic engineering based on CBR and RBR 基于CBR和RBR的水利工程索赔支持系统研究
Wang Wei
{"title":"Study of claim support system for hydraulic engineering based on CBR and RBR","authors":"Wang Wei","doi":"10.1109/ICCIT.2010.5711157","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711157","url":null,"abstract":"It is shown that engineering change management is one of the most important things in hydraulic engineering, which will affect not only the engineering investment but also the construction period. Considering the shortages of the experience and the experts in construction claims, case-based reasoning (CBR) and rule-based reasoning (RBR) in artificial intelligence were used in engineering change and construction claim management. This method summarized the previous cases in engineering claims of hydraulic engineering and the cases were stored structurally. A preliminary model was also proposed, which was currently used in the construction management of trans-basin water transfer engineering.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traceability and structuration coordination interactions in design 设计中的可追溯性和结构协调的相互作用
N. Matta, Hassan Atifi, M. Sediri, Mohammed Sagdal
{"title":"Traceability and structuration coordination interactions in design","authors":"N. Matta, Hassan Atifi, M. Sediri, Mohammed Sagdal","doi":"10.1109/ICCIT.2010.5711047","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711047","url":null,"abstract":"In order to promote reuse, we have to help designers understand the context of previous projects . We have to build project memories that not only simply archive previous project solutions but that document the reasons why these solutions were chosen. These reasons have to show experts skills, document the representation of treated problems and the decision context, etc. This study presents a way to analyze mediated discussions using a discussion forum. We use pragmatic analysis in order to identify criteria that help to analyze coordination messages in design projects. These criteria can help to emphasize the context of decision making based on coordination interactions.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116238229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信