{"title":"Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline","authors":"Wenchen Sun, Fang’ai Liu, Weizhi Xu","doi":"10.1145/3323933.3324091","DOIUrl":"https://doi.org/10.1145/3323933.3324091","url":null,"abstract":"This article has been removed from the ACM Digital Library because it was found to plagiarize an earlier work written by Zhedong Zheng, Liang Zheng and Yi Yang, published by IEEE Xplore and entitled \"Unlabeled Samples Generated by GAN Improve the Person Re-identification Baseline in vitro\" 2017 IEEE International Conference on Computer Vision https://doi.org/10.1109/ICCV.2017.405. For further information, contact the ACM Director of Publications.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Of Interoperability In Cloud Computing","authors":"Emiroğlu Bülent Gürsel, A. Tarek","doi":"10.1145/3323933.3324089","DOIUrl":"https://doi.org/10.1145/3323933.3324089","url":null,"abstract":"Today most of traditional forms of education are not suitable for requirements of educational development and can't keep up with changes in learning demand over time, but Computer networks have provided many opportunities for it. By Cloud Computing software and files are imported into cloud, so word processing, presentations, databases, and more can be accessed from a web browsers. Educational institutions can take advantage of cloud applications to provide students and teachers with free or cost-effective alternatives instead of expensive proprietary productivity tools. In this paper we use semantic models in cloud computing to provide platform-independent data presentation and improve the description of the service. We analyze and discuss how cloud computing can affect boundaries of educational resources in background of semantic web by providing a technological solution using experimental and semantic platforms and numerically cloud services.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"486 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Detection in Thermal Imaging Using YOLO","authors":"Marina Ivasic-Kos, M. Krišto, M. Pobar","doi":"10.1145/3323933.3324076","DOIUrl":"https://doi.org/10.1145/3323933.3324076","url":null,"abstract":"In this paper, we consider the problem of automatic detection of humans in thermal videos and images. The thermal videos are recorded on a meadow with a small forest with up to three persons present on the scene at different positions and ranges from the camera. To simulate realistic conditions that can happen during surveillance and monitoring of protected areas, all videos are recorded at night but different weather conditions--clear weather, rain, and fog. We present the results of human detection on a custom dataset of thermal videos using the out-of-the-box YOLO convolutional neural network and the YOLO network trained on a subset of our dataset. YOLO is an object detector pretrained on the COCO image dataset of RGB images of various object classes. Test experimental results have shown significantly improved performance of human detection in thermal imaging in terms of average precision for trained YOLO model over the original model.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114758364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Trust in E-government: The case of Kuwait","authors":"Zainab M. Aljazzaf","doi":"10.1145/3323933.3324073","DOIUrl":"https://doi.org/10.1145/3323933.3324073","url":null,"abstract":"The Internet has a great influence on every aspect of modern life. E-government is an approach to use theWeb to convey government data and administrations to people. People think that it is hard to involve themselves in e-government due to the inadequate trust they are yet to develop with e-government. In the current e-government literature, many authors have worked to figure out factors that may have an influence towards e-government and build trust models. However, e-government in Kuwait is still developing and there is no study conducted about trust in e-government. Thus, this study structures the trust model keeping the context of the Kuwaiti society in view by including important factors that are affecting the citizens' determination to trust e-government in Kuwait. Accordingly, a questionnaire is designed to test the conceptual model and the analyzed data uncovers that different factors determine the people intention to trust e-government, such as perceived usefulness, security, website quality, and social influence.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of OLSR and AODV Routing Protocols with different Parameters in Mobile Ad-hoc Networks using NS2 Simulator","authors":"A. Mouiz, A. Badri, A. Baghdad, A. Sahel","doi":"10.1145/3323933.3324065","DOIUrl":"https://doi.org/10.1145/3323933.3324065","url":null,"abstract":"Wireless sensor networks have become increasingly popular thanks to the great advances in the field of telecommunications. Indeed, the sensor nodes that constitute these networks have shown their effectiveness in monitoring and remote control of the physical environment with better accuracy. However, the implementation of such a system poses many problems where optimizing energy consumption remains one of the major research challenges. Our goal in this article is to ensure good quality of service and routing of information to treatment stations to extend the life of the entire network while saving the energy spent by each network sensor. This article presents two routing methods for wireless sensor networks, namely Optimized Link State Routing Protocol and Ad-hoc On Demand Vector Protocol. Our performance analysis was based on various parameters such as throughput, Packet Delivery Fraction and End-to-End Delay to ensure good resource utilization, improve security and better scalability. The results obtained from the simulation were evaluated on the NS2 simulator and gave a better performance of the routing protocol in terms of reliability, robustness and energy conservation.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122564750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining the Hough Transform with MLP for Identifying Cashmere and Wool Fibers","authors":"Huan Wang","doi":"10.1145/3323933.3324093","DOIUrl":"https://doi.org/10.1145/3323933.3324093","url":null,"abstract":"The identification of cashmere and wool fibers has always been a challenge in the textile research field. At present, identification methods are mainly based on physical or biological properties such as DNA composition, which are time-consuming and costly to address. With the development of deep learning and computer vision, many fiber identification methods based on image analysis have emerged that effectively solve these problems, but there is much room for improvement regarding accuracy and time requirements. In this paper, a new identification algorithm is proposed that extracts the outline information of the fibers using the adaptive threshold method, performs the Hough transform on the binarized images, obtains the one-dimensional features from the Hough transform accumulator using a new feature descriptor called \"theta_max\", and lastly designs a Multi-Layer Perceptron (MLP) for classification. Experiments show that, the new algorithm can attain 96% accuracy in our datasets. The work significantly improves identification accuracy, reduces the complexity and time requirements of the classification models, and provides an effective method for the identification of cashmere and wool fibers.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131188950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rotation-Invariant Approach Using Mask to Content-Based Image Retrieval","authors":"Nawal Chifa, A. Badri, Y. Ruichek","doi":"10.1145/3323933.3324066","DOIUrl":"https://doi.org/10.1145/3323933.3324066","url":null,"abstract":"This paper presents an efficient method for the implementation of an image search system invariant to rotation. This method consists of applying circular masks of different size on the image, and extracting the color descriptor from the visible region on the mask, and then combining a texture descriptor for more precision. In our work, we have used the color histogram and histogram of local binary patterns. The experimentation of this approach gave excellent results for color rotation-invariant image retrieval.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research on SOA in the IT Industry of Pakistan","authors":"Momina Shaheen, Tayyaba Anees, Nisar Hussain, Iqra Obaid","doi":"10.1145/3323933.3324080","DOIUrl":"https://doi.org/10.1145/3323933.3324080","url":null,"abstract":"Many architectural patterns and styles are used for bringing in quality in software's such as client-server, component-based, event-driven and data-centric architectures. Service-oriented architecture (SOA) is a new trend for improving the quality attributes of software such as interoperability and availability. Although, research studies claim that SOA adaption is widely used in practice, it is not very clear that is it used in the same way in under developed countries such as Pakistan. This research study analyzes the usage of SOA by the IT industry of Pakistan. In this paper, several opinions of professionals are collected from IT industry who belongs to different companies from all over the Pakistan. Questionnaires and semi-structured interviews helped as investigation tools for this research and the outcomes are analyzed on their responses. Results indicate that 76 % of the IT companies in Pakistan are using SOA. Most of the companies are using tool-based approach for development. Results also indicate a rising tendency of SOA adoption by Pakistan IT industry in upcoming years.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohannad Farag, N. Azlan, Mohammed Hayyan Alsibai, A. N. A. Ghafar
{"title":"Slippage Detection for Grasping Force Control of Robotic Hand Using Force Sensing Resistors","authors":"Mohannad Farag, N. Azlan, Mohammed Hayyan Alsibai, A. N. A. Ghafar","doi":"10.1145/3323933.3324077","DOIUrl":"https://doi.org/10.1145/3323933.3324077","url":null,"abstract":"This paper presents the formulation of a nonlinear adaptive backstepping force control in grasping weight-varying objects using robotic hand driven by Pneumatic Artificial Muscle (PAM). The modelling and control problems arise from the high nonlinear PAM dynamics and the inherent hysteresis leading to a lack of robustness in the hand's performance. The robotic finger and the PAM actuator been mathematically modelled as a nonlinear second order system based on an empirical approach. An adaptive backstepping controller has been designed for force control of the pneumatic hand. The estimator of the system uncertainty is incorporated into the proposed control law and a slip detection strategy is introduced to grasp objects with changing weights. The simulation and experimental results show that the robotic hand can maintain grasping an object and stop further slippage when its weight is increased up to 500 g by detecting the slip signal from the force sensor. The results also have proven that the adaptive backstepping controller is capable to compensate the uncertain coulomb friction force of PAM actuator with maximum hysteresis error 0.18°.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Method of Optimization SIW Bandpass Filter Using Coupling Matrix","authors":"Damou Mehdi, Chetioui Mohammed, Bouaseria Fatima","doi":"10.1145/3323933.3324086","DOIUrl":"https://doi.org/10.1145/3323933.3324086","url":null,"abstract":"In this paper, a novel three-pole substrate integrated waveguide (SIW) bandpass filter (BPF) using the coupling Matrix is proposed, commercially available printed circuit board (PCB) technology. The detailed design procedure beginning from the normalized Chebyshev lowpass filter, to the final optimized SIW bandpass filter is presented. The test filter having a 4.01% fractional bandwidth centered at 1.76 GHz was simulated on a 1.27 mm thick, Rogers RT/Duroid 6010LM substrate with a 10.2 dielectric constant. The design has also been validated and results presented. The simulation response of the SIW bandpass filter show good agreement with a low insertion loss of 1.3 dB. The simulated return losses of about 15 dB were achieved across the filter passband.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}