{"title":"Combining Face Detection and Novelty to Identify Important Events in a Visual Lifelog","authors":"A. Doherty, A. Smeaton","doi":"10.1109/CIT.2008.WORKSHOPS.31","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.31","url":null,"abstract":"The SenseCam is a passively capturing wearable camera, worn around the neck and takes an average of almost 2,000 images per day, which equates to over 650,000 images per year.It is used to create a personal lifelog or visual recording of the wearer's life and generates information which can be helpful as a human memory aid. For such a large amount of visual information to be of any use, it is accepted that it should be structured into \"events\", of which there are about 8,000 in a wearer's average year. In automatically segmenting SenseCam images into events, it is desirable to automatically emphasise more important events and decrease the emphasis on mundane/routine events. This paper introduces the concept of novelty to help determine the importance of events in a lifelog. By combining novelty with face-to-face conversation detection, our system improves on previous approaches. In our experiments we use a large set of lifelog images, a total of 288,479 images collected by 6 users over a time period of one month each.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"121 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lansheng Han, Shuxia Han, Q. Deng, Junqing Yu, Yunfeng He
{"title":"Source Tracing and Pursuing of Network Virus","authors":"Lansheng Han, Shuxia Han, Q. Deng, Junqing Yu, Yunfeng He","doi":"10.1109/CIT.2008.WORKSHOPS.25","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.25","url":null,"abstract":"Recently with the popularity of network, computer virus also enlarger its host into the whole network. However, the current single-computer cleaning method is passive, which cannot cope with the endless network virus. This paper proposes the advantages of the network should be taken in fighting against network virus. When a vertex is found be infected, anti-virus should trace where it come and pursuing where it go, then the spreading path of the virus can be got. By describing the spreading of virus in the network, the paper first constructs a discrete spreading model for the virus. Then, based on the model, the paper presents algorithms for source tracing and pursuing which assure to catch most viruses in a sub-net. At last, the paper also carries on simulation tests for the strategies and the test results confirm the algorithms and also get some useful advice for the real activities.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114221120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Codec System Design for Continuous Color Barcode Symbols","authors":"Songwen Pei, Guobo Li, Baifeng Wu","doi":"10.1109/CIT.2008.WORKSHOPS.9","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.9","url":null,"abstract":"To address the limits of capacity and the disadvantages of motional scanning capability of traditional two-dimensional barcodes, a novel 3-D continuous barcode (3-D CoBe) is proposed. It adds color as a third dimension based on our previous research on 2-D continuous barcodes (2-D CoBe). The novel 3-D CoBe is called 2-D continuous color barcode (CCB) as well. Furthermore, we implemented a codec system including an encoding sub-system and a decoding sub-system for a target application. In the codec system, CCB is generated and printed on papers by an encoding software sub-system, in addition to being recognized and decoded by a hand-held device with a decoding sub-system in real-time. It is verified that the codec system for CCB is practical and effective.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering Microarray Data by Using a Stochastic Algorithm","authors":"H. Shon, Sunshin Kim, Seung-Jung Shin, K. Ryu","doi":"10.1109/CIT.2008.WORKSHOPS.117","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.117","url":null,"abstract":"The clustering of gene expression data is used to analyze the results of microarray studies. This method is often useful in understanding how a particular class of genes functions together during a biological process. In this study, we attempted to perform clustering using the Markov cluster (MCL) algorithm, a clustering method for graphs based on the simulation of stochastic flow. It is a fast and efficient algorithm that clusters nodes in a graph through simulation by computing probability. First, we converted the raw matrix into a sample matrix using the Euclidean distance of the genes between the samples. Second, we applied the MCL algorithm to the new matrix of Euclidean distance and considered 2 factors, namely, the inflation and diagonal terms of the matrix. We have turned to set the proper factors through massive experiments. In addition, distance thresholds, i.e., the average of each column data elements, were used to clearly distinguish between groups. Our experimental result shows about 70% accuracy in average compared to the class that is known before. We also compared the MCL algorithm with the self-organizing map (SOM) clustering, K-means clustering and hierarchical clustering (HC) algorithms.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121095744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Spatial-Temporal Channel for Information Fusion","authors":"Weihua Li, Xiaodong Fu","doi":"10.1109/CIT.2008.WORKSHOPS.17","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.17","url":null,"abstract":"This paper introduces the needs of information fusion on the sensor networks. It proposes the spatial-temporal channel concept based on the channel theory to support information fusion. Intelligent agents are the suitable tools to build the logic sensor. The paper presents the information fusion scheme and shows that the integration of agent communication mechanism and ontology can improve the ability of intelligent agents so that they can improve information fusion.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Research of Dominance Relation Rough Set on Seismology Data","authors":"Shaochun Wu, Yinyin Li, Minfu Fang, Mingjun Xin","doi":"10.1109/CIT.2008.WORKSHOPS.77","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.77","url":null,"abstract":"In this paper, after discussing classical rough set theory based on indiscemibility relation and the problem of its reduction algorithms on Seismology Data, we arrived at a new definition of dominance distinguishing matrix by taking advantage of the unique characteristic of the extended model. Then the corresponding reduction and rule extracting algorithms are accordingly presented to enhance the efficiency of seeking the reduction in some extent. In fact, we use the rough set theory based on Dominance Relation to get the 272 rules with realistic meaning, from 44381 items in the small Seismology Data in China.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavourial Modeling in Mammography","authors":"Brian A. Hope","doi":"10.1109/CIT.2008.WORKSHOPS.78","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.78","url":null,"abstract":"An evolutionary autonomous agent approach to image feature extraction does provide a more effective means of searching an image environment, overcoming the potential combinatorial explosion experienced by more traditional image processing techniques. This approach is also suited to more difficult image processing tasks where the features being searched for are either not visible or not easily distinguishable by the human vision system. This paper proposes the development of an evolutionary based image processing application for mammography.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Chinese Event and Their Argument Roles","authors":"Tan Hongye, Zhao Tiejun, Zheng Jiaheng","doi":"10.1109/CIT.2008.WORKSHOPS.54","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.54","url":null,"abstract":"Event detection and recognition is a major task in ACE evaluation plan. In this paper, we focus on solving the two subtasks: (1) event detection and classification, (2) their argument role identification. For the first subtask, the strategy of local feature selection and explicit discrimination of positive and negative features is used in order to ensure the performance of each type. For the second subtask, the approach based on multi-level patterns is presented in order to improve the coverage of patterns and to use various language information. Experiments on the ACE2005 corpus show that performance of the first subtask is satisfying with the 83.5% macro-average F1-measure. And experiments of the second subtask show that the method based on multi-level patterns is very promising.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoohyun Park, Yongju Lee, Hag-Young Kim, Kyongsok Kim
{"title":"Hybrid Segment-Based Transcoding Proxy Caching of Multimedia Streams","authors":"Yoohyun Park, Yongju Lee, Hag-Young Kim, Kyongsok Kim","doi":"10.1109/CIT.2008.WORKSHOPS.67","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.67","url":null,"abstract":"Streaming media has contributed to a significant amount of todaypsilas Internet traffic. Like traditional Web objects, rich media objects can benefit from proxy caching, but caching streaming media is more of challenging than caching simple Web objects, because the streaming media have features such as huge size and high bandwidth. Due to huge size of streaming media, lots of researches manage the contents with segments for efficient storage management. And to support various bandwidth requirements for the heterogeneous ubiquitous devices, a transcoding proxy is usually necessary to provide not only adapting multimedia streams to the client by transcoding, but also caching them for later use. In this paper, we propose the hybrid segmentation strategy for the transcoding proxy that is uniform segmentation in the same version and is also exponential segmentation among the multiple versions. This strategy reduces the replacement count than uniform segmentation and gets the similar performance to uniform segmentation. The performance results show that hybrid segmentation with aggregated profit function have a high delay saving ratio, high byte-hit ratio and less transcoding data.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125216829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Error Concealment for H.264/AVC","authors":"NamRye Son, S. Jeong","doi":"10.1109/CIT.2008.WORKSHOPS.106","DOIUrl":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.106","url":null,"abstract":"To transmit video bit stream over low bandwidth such as mobile channel, high bit rate algorithm like H.264/AVC codec is exploited. In transmitting high compressed video bit-stream over low bandwidth, packet loss causes severe degradation in image quality. In this paper, a new error concealment algorithm for recovery of missing or erroneous motion vector is proposed. Considering that the missing or erroneous motion vectors in blocks are closely correlated with those of neighboring blocks. The proposed approach is that missing or erroneous motion vector is recovered by grouping the movements of neighboring blocks by their homogeneity. Motion vectors of neighboring block are grouped according to average linkage algorithm clustering and a representative value for each group is determined to obtain the candidate motion vector sets. As a test result, simulation results show that the proposed method dramatically improves complex time compared to existing H.264/AVC error concealment method. Also the proposed method is similar to existing H.264/AVC in terms of visual quality.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}