{"title":"Design of the virtual reality roam system for ancient city","authors":"Q. Xie, L. Ge, Zhenyi Wang","doi":"10.1109/ICSAI.2014.7009271","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009271","url":null,"abstract":"According to the problem that exists in restoring of the ancient architecture, in this paper, which focuses on the virtual reality system of Gu Yuan, a technical solution based on UDK and Kinect is proposed to develop a virtual reality roam system. This system includes Kinect, server and circular-screen projector system. The application of this technical solution provides a new display method for the development and evolution of the ancient city, brings a new kind of experience to the user and embodies three characteristics of virtual reality technology, namely, immersion, interaction and imagination.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ConferenceOne: A cloud-based collaborative conference service system","authors":"Z. Du, Yeming Tang, Ting Liu, Qifeng Liu","doi":"10.1109/ICSAI.2014.7009315","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009315","url":null,"abstract":"Attending and organizing conferences are important activities in the academic career of researchers. The primary purpose of attending conferences is to interact, communicate and collaborate with other research counterparts. In order to solve the problem of limited time and location for face-to-face interaction, communication and collaboration in conferences; we propose the design of a cloud-based collaborative conference system. The system consists of a set of independent conference domains, an academic social network service and an academic knowledge repository. The most distinctive parts of the system include social network services in conference domains, academic social network service, and academic knowledge repository. The system not only has the ability to support group-based online interaction, communication and collaboration through a set of virtual groups in conference spaces; but also is capable of aggregates users and their created digital resources to build conference domain social network services and academic social network service of the system. Furthermore, based on the digital resources in academic knowledge repository, the academic social network service can provide a lot of interesting and useful application including information services, evaluation services and intelligent services. As conference attendees will have much more opportunities to interact, communicate and collaborate with others under the support of the system anytime at any place; participation in conferences will be more beneficial than before.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"W-Revised: An amazing tool for creating customized websites","authors":"Ling-Hua Chang, Sanjiv Behl, Tung-Ho Shieh","doi":"10.1109/ICSAI.2014.7009333","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009333","url":null,"abstract":"We previously developed tools called ISG (for generating information systems) and DWL (for generating web-based systems). DWL is a tool for developing customized web-based systems that can be used by companies. It also provides developmental support after the initial system has been developed for incorporating new products or for making changes to the existing ones. Companies introduce new products frequently and the web pages of its site need to be updated frequently, which can be done conveniently using W-Revised. We use ISG and DWL to generate a tool we call Webpage-Revised tool, or W-Revised for short.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116479782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method mining in experimental software engineering","authors":"Hideaki Uchimiya, Shinpei Ogata, K. Kaijiri","doi":"10.1109/ICSAI.2014.7009433","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009433","url":null,"abstract":"In experimental software engineering, particularly in the domain of predicting or identifying some properties (quality, cost, maturity, etc.), many methods have been proposed. The effectiveness of these methods depends on the software domain, the development process and style, etc., so there is no unique adequate method. The necessity of searching some adequate methods is recognized, but only few search techniques have been proposed thus far. Zhimin proposed a method mining technique for predicting error-prone modules based on a knowledge base consisting of a lot of prediction results. Here, we improve Zhimin's method and propose a general method mining model for experimental software engineering, which can search for some adequate methods on the basis of the performance knowledge base. We also show several applications and their mining results, for example, error-prone module prediction and traceability link recovery.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125948896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang
{"title":"Improving guide-based vulnerability detection with hybrid symbolic execution","authors":"Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang","doi":"10.1109/ICSAI.2014.7009438","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009438","url":null,"abstract":"Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detecting vulnerabilities, this paper presents the improving guide-based vulnerability detection with hybrid symbolic execution, which aims to test suspicious objects. This method conducts path traversal with a hybrid symbolic execution model, which alternates between dynamic and static symbolic execution, and verify whether it is vulnerability through summarizing the characteristics of vulnerabilities and generating a constraint expression. Experimental result shows that this method can successfully detect errors in 56 seconds, which exceeds any other modern mainstream symbolic execution tools including CUTE, KLEE, S2E and Cloud9. Compared with CUTE, this method alleviates the problem of space explosion. Besides, this papaer successfully verifies the vulnerabilities of OpenSSL and some other commonly used software.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Individual radiation source identification based on fractal box dimension","authors":"Jingchao Li, Yulong Ying","doi":"10.1109/ICSAI.2014.7009371","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009371","url":null,"abstract":"Nowadays, it is difficult to identify the individual radiation source under low SNR environment. To this problem, the paper proposed a new fractal box dimension based algorithm, to calculate the fractal box dimension of different communication individual radio signals as the subtle characteristics. Basing on the traditional fractal box dimension, the proposed algorithm calculated the derivations of different reconstructing phase space points, and getting the fractal box dimension of the communications signals under different reconstructing conditions, which constitute a feature vector, to realize the purpose of extracting the subtle characteristics of individual radiation source more exactly. Finally, neural network was used to process and classify the fractal box dimension vector features, in order to achieve the purpose of classifying and recognizing different communication radiation source under complex environment.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The online detection of faulty insulator using fast Fourier transformation","authors":"Yingna Yang, Lichun Wang","doi":"10.1109/ICSAI.2014.7009281","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009281","url":null,"abstract":"In high voltage line, faulty insulator, especial zero value insulator, may greatly reduce the insulation level of highvoltage transmission line, thus can threat to the safe operation of power system directly. In order to detect the faulty insulator on the ground, in this paper, the current sensor is slipped into the grounding wire of pylon, and then we can collect the tiny leakage current pulse signal. After that, there are two kinds of method to analyze the signal in this article. The two methods are the analysis of fast Fourier transformation spectrum of leakage current pulse and the corona pulse phase comparison method. Based on the analysis of laboratory and field data, the detector can clearly see the existence of faulty insulator.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geomagnetic field aided inertial navigation using the SITAN algorithm","authors":"Zhiguo Dai, Chong Kang","doi":"10.1109/ICSAI.2014.7009263","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009263","url":null,"abstract":"The SITAN algorithm makes use of terrain elevation information to aid inertial navigation system and achieves good results. The geomagnetic field can be used as the conditions of the auxiliary inertial navigation, because the geomagnetic value map and the terrain elevation map have high similarity. By using the SITAN algorithm and combining the contour information of existed geomagnetic map with the processed by the method of interpolation and linear processing at the same time, the aid inertial navigation simulation was carried out for the measured geomagnetic map to provide reference for a new passive and covert method of geomagnetic field aided navigation.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127860628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangbock Cho, Sang-Bock Cho, Kyung-Hun Lee, Hyung-Seob Han
{"title":"Development of synthesis model for fine tuning and playing style","authors":"Sangbock Cho, Sang-Bock Cho, Kyung-Hun Lee, Hyung-Seob Han","doi":"10.1109/ICSAI.2014.7009377","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009377","url":null,"abstract":"This paper describes a synthesis model that is able to represent playing style and fine tuning for the plucked string instrument. The proposed model is based on digital waveguide theory and the target instrument is the Gayageum, traditional Korean plucked string instrument. It has 12 twisted silk strings, each supported by a movable bridge called Anjok. Each of them is placed on the body; it tunes each string by being moved sideways along a string. Therefore, the movable bridge model is proposed to determine pitch of synthetic sound; this is equivalent to determine length of a delay line in string model of digital waveguide model. The fundamental frequency of each string corresponding to the location of the Anjok was measured and parameterized. This parameter is also used in the string model to compute the loop filter coefficient. Finally, the unique right-hand playing style, flicking with the middle and index fingers, is represented by a FIR filter. Although there were differences between the original and synthesized sound by proposed synthesis model, the entire harmonic magnitude envelope of the synthesized sound followed those of the original sound and it was aurally hard to distinguish them.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based semantic middleware for data storage on peer to peer network","authors":"Javeria Khizar, Sarmad Sadik","doi":"10.1109/ICSAI.2014.7009303","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009303","url":null,"abstract":"Cloud computing is a promising business and computing model. The cloud storage is an essential and most used service, which provides stable and massive data storage space to end users. In this research work, new private cloud storage architecture is proposed with decentralized indexing which is based on peer to peer network. The proposed cloud architecture has semantic middleware for data storage. It is designed for a cloud based environment where client interacts with cloud which is comprised of peers. The private cloud will be available to clients through internet. Each peer in the network contributes its resources to form private cloud. The client can store whole file without dividing into chunks. The various modules in middleware performed different tasks to store and retrieve files from cloud. The ontology is created in Protégé-OWL to make it reusable and ease of management. The proposed architecture is being implemented using latest Java NetBeans framework with Jena API for ontology management.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}