Proceedings of the 3rd International Conference on Graphics and Signal Processing最新文献

筛选
英文 中文
Performance Comparison of Different CNN models for Indian Road Dataset 不同CNN模型在印度道路数据集上的性能比较
Abhishek Mukhopadhyay, P. Biswas, Ayush Agarwal, Imon Mukherjee
{"title":"Performance Comparison of Different CNN models for Indian Road Dataset","authors":"Abhishek Mukhopadhyay, P. Biswas, Ayush Agarwal, Imon Mukherjee","doi":"10.1145/3338472.3338480","DOIUrl":"https://doi.org/10.1145/3338472.3338480","url":null,"abstract":"Recent advancement in the field of computer vision and development of Deep Neural Network based object detection led researchers and industries to focus on autonomous vehicles. This paper aims to find how accurately previously proposed CNN architectures detect on-road obstacles in Indian road scenarios in the context of autonomous vehicle. We have compared three different convolution neural networks trained with COCO dataset for detecting autorickshaws in Indian road. We undertook statistical hypothesis testing to find effect of these three models, i.e. YOLOv3, Mask R-CNN, and RetinaNet on detection accuracy rate. While measuring accuracy, we have noted that detection accuracy rate of RetinaNet is significantly better than other two CNN architectures. Although there is no significant difference between other two networks in context of detection rate. The accuracy rate shows the performance of RetinaNet invariant to autorickshaws' color and shape, and different climatic and complex background scenarios.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117195052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Secure Routing Technology Based on NDN for VANET 基于NDN的VANET安全路由技术研究
Xiaowei Gai
{"title":"Research on Secure Routing Technology Based on NDN for VANET","authors":"Xiaowei Gai","doi":"10.1145/3338472.3338495","DOIUrl":"https://doi.org/10.1145/3338472.3338495","url":null,"abstract":"NDN (Named Data Networking) is a new information-centric future network architecture. This new network architecture uses a \"named content\" mechanism instead of a \"named host\" mechanism based on TCP/IP networks. The mechanism decouples the geographic location from the identity identifier, while the transport content object itself is attached with security-related metadata. Compared with the traditional IP address-centric TCP/IP network, the information-centric NDN network is more suitable for high-speed dynamic VANET network environment. Therefore, we propose a secure content routing scheme for NOLSR in mobile networks. Despite the introduction of security mechanisms in NDN, these security mechanisms cannot meet the security requirements in wireless networks. In order to establish a secure routing mechanism in wireless dynamic networks, this paper uses identity-based cryptography for key distribution and management, and introduces some new security mechanisms, such as forward security mechanisms to reduce the threat of key leakage. Interest flooding will cause broadcast storm in wireless network. NOLSR adopts MPR mechanism for interest flooding. In order to reduce overhead in wireless mobile networks, LFBL (listen first-forward last) is adopted in MPR. To prevent the selection of the attacker-controlled node as the MPR node and the selection of the self-serving node in the MPR node, the malicious node and the self-private node are selected by using the trust value and voting mechanism between the computing nodes. Finally, this paper analyses the security attributes of NOLSR scheme, verifies the feasibility of NOLSR scheme in detail, and compares the efficiency of this scheme with other related schemes.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standardization of the Central Console in Police Vehicles 警车中控台的标准化
Piotr Łuka, A. Urban
{"title":"Standardization of the Central Console in Police Vehicles","authors":"Piotr Łuka, A. Urban","doi":"10.1145/3338472.3338494","DOIUrl":"https://doi.org/10.1145/3338472.3338494","url":null,"abstract":"The article was written in the framework of the project entitled \"Development of Police vehicles classification depending on their purpose and standardization of the central console of vehicles in the scope of arrangement and installation of ICT system and control devices of special purpose signals\" DOB-BIO7/04/02/2015 with the value of PLN 4 058 789, co-funded by the National Centre for Research and Development under the contest 7/2015.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns 使用挑战响应和链下签名模式在区块链上应用改进的SHA256
Maria Rona L. Perez, B. Gerardo, R. Medina
{"title":"Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns","authors":"Maria Rona L. Perez, B. Gerardo, R. Medina","doi":"10.1145/3338472.3338486","DOIUrl":"https://doi.org/10.1145/3338472.3338486","url":null,"abstract":"This article has been removed from the ACM Digital Library because it was found to plagiarize an earlier work written by Eberhardt J., Tai S. (2017) On or Off the Blockchain? Insights on Off-Chaining Computation and Data. In: De Paoli F., Schulte S., Broch Johnsen E. (eds) Service-Oriented and Cloud Computing. ESOCC 2017. Lecture Notes in Computer Science, vol 10465. Springer, Cham https://link.springer.com/chapter/10.1007/978-3-319-67262-5_1 For further information, contact the ACM Director of Publications.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Light Field Image Encryption Based on Pixel Substitution and Double Random Phase Encoding 基于像素替换和双随机相位编码的光场图像加密
Kangkang Wei, Wenying Wen
{"title":"Light Field Image Encryption Based on Pixel Substitution and Double Random Phase Encoding","authors":"Kangkang Wei, Wenying Wen","doi":"10.1145/3338472.3338477","DOIUrl":"https://doi.org/10.1145/3338472.3338477","url":null,"abstract":"In this paper, a light field image (LFI) encryption scheme based on pixel substitution and double random phase encoding (DRPE) is presented. The LFI includes the direction and intensity information of the light in the propagation process. Firstly, we employ an angular domain plane to represent the multi-view image of the LFI. Furthermore, pixel substitution processing based on rows and columns for a single view LFI. Finally, by the Fourier transform based on DRPE to obtain a encrypted image. Experimental results show that proposed scheme can be reliable and has a better immunity to noise and higher execution efficiency.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Visualization of Guided GAN on MNIST dataset MNIST数据集上引导GAN的设计与可视化
Haohe Liu, Siqi Yao, Yulin Wang
{"title":"Design and Visualization of Guided GAN on MNIST dataset","authors":"Haohe Liu, Siqi Yao, Yulin Wang","doi":"10.1145/3338472.3338489","DOIUrl":"https://doi.org/10.1145/3338472.3338489","url":null,"abstract":"In this paper, we propose a hybrid model aiming to map input noise vector to the label of the generated image by Generative Adversarial Network (GAN). This model mainly consists of a pre-trained Deep Convolution Generative Adversarial Network (DCGAN) and a classifier. By using the model, we visualize the distribution of two-dimensional input noise leading to specific type of generated image after each training epoch of GAN. The visualization reveals the distribution feature of the input noise vectors and the performance of the generator. With this feature, we try to build a Guided Generator which can produce a fake image which we exactly need. Two methods are proposed to build the Guided Generator. One is the most significant noise (MSN) method, and another is utilizing labeled noise. MSN method can generate images precisely but with less variations. In contrast, labeled noise method can have more variations but slightly less stable.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134636584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model 基于心理声学模型奇异谱分析的音频子信号信息隐藏框架
Ratthamontree Burimas, Tidanat Kumpuak, Mongkonchai Intarauksorn, Kasorn Galajit, P. Aimmanee, Jessada Karnjana
{"title":"Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model","authors":"Ratthamontree Burimas, Tidanat Kumpuak, Mongkonchai Intarauksorn, Kasorn Galajit, P. Aimmanee, Jessada Karnjana","doi":"10.1145/3338472.3338488","DOIUrl":"https://doi.org/10.1145/3338472.3338488","url":null,"abstract":"This paper proposes a method for hiding information in audio signals by using singular spectrum analysis (SSA) with a psychoacoustic model to enhance the sound quality of a watermarked signal from our previous work. In this framework, an original signal is decomposed into many sub-signals by applying the combination of the SSA-based method and the psychoacoustic model. The sub-signals to be embedded are chosen using signal analysis based on human perception. The watermark bits are embedded into selected sub-signals by modifying some parts of their singular spectra according to an embedding rule. Then, the accuracy of extracted watermark bits and the sound quality of the watermarked signal, compared with that of the original one, are used to verify the performance of our framework. The experimental results show that the proposed framework satisfies the evaluation criteria in terms of inaudibility and robustness. However, it has a significant trade-off between them.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Image Memorability Prediction 图像记忆预测研究综述
Jie Liu, Dou-Dou Wang, Yan Wang, Hao Zhang
{"title":"Review of Image Memorability Prediction","authors":"Jie Liu, Dou-Dou Wang, Yan Wang, Hao Zhang","doi":"10.1145/3338472.3338479","DOIUrl":"https://doi.org/10.1145/3338472.3338479","url":null,"abstract":"With the development of information technology and networks, images can be seen everywhere in life. When people browse magazines and the Internet, they come into contact with thousands of images, some of which remain in people's memories, while others are forgotten. Isola et al. first proposed the concept of image memorability and proved that image memorability is an intrinsic and stable attribute of images and can be shared among different viewers. Image memorability prediction has important research value and can be applied to education, advertising and other fields. In order to promote the research of image memorability prediction, the main theories and methods are summarized. Based on the comparison and analysis of the literatures related to image memorability prediction, this paper firstly reviews the proposal and quantification of the concept of image memorability. The features that affect the image memorability and the methods for extracting features are analyzed. The prediction of predictive image memorability is introduced in detail. The prediction is constructed based on Support Vector Machine and Convolution Neural Network and using different features that affect image memorability. Finally, the future work of image memorability is summarized and forecasted.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Distance Metrics in Clustering Data Mining Techniques 聚类数据挖掘技术中距离度量研究综述
Marina Adriana Mercioni, S. Holban
{"title":"A Survey of Distance Metrics in Clustering Data Mining Techniques","authors":"Marina Adriana Mercioni, S. Holban","doi":"10.1145/3338472.3338490","DOIUrl":"https://doi.org/10.1145/3338472.3338490","url":null,"abstract":"Lately, due to the increasing size of databases, several aspects have been studied in detail, such as grouping, searching for the closest neighbor and other identification methods. It has been found that in the multidimensional space, the concept of distance does not offer high performance. In this paper, we study the effect of different types of distances on the group to see the similarities between objects. Among these distances we mention two distances: the Euclidean distance and Manhattan distance, implemented in a system developed to identify the architectural styles of the buildings. The aim of this paper is using cluster analysis to identify distance metrics impact in detection of architectural styles using Data Mining techniques.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing Eye Gaze of Users with Learning Disability 分析有学习障碍的用户的目光
K. Saluja, Jeevithashree Dv, Somnath Arjun, P. Biswas, Teena Paul
{"title":"Analyzing Eye Gaze of Users with Learning Disability","authors":"K. Saluja, Jeevithashree Dv, Somnath Arjun, P. Biswas, Teena Paul","doi":"10.1145/3338472.3338481","DOIUrl":"https://doi.org/10.1145/3338472.3338481","url":null,"abstract":"This paper investigates eye gaze movements of children with different reading abilities due to learning disability. We analyzed eye gaze fixations using cluster analysis and velocity-based fixation classification algorithms. We used a non-invasive, screen mounted, low-cost eye tracker to collect data from 30 participants including students with learning disabilities. We analyzed raw gaze points, fixations and saccades, and noted that the density of gaze points around fixation. Total number of fixations and regressions (backward gaze movement) were statistically significantly correlated to the reading ability of students. We concluded that by analyzing different eye movements for a representative reading task, we can detect early signs of learning disabilities such as dyslexia.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信