{"title":"Research on real-time estimation for human pose","authors":"B. Li, Z. Zhao","doi":"10.1109/ICCSNT.2013.6967117","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967117","url":null,"abstract":"This study addresses a method for real-time estimation for human pose. Firstly, depending upon his feature, image segmentation is performed on a human dynamic image preprocessed. His body composition is secondly sampled and its key points are correspondingly selected. His human skeleton and contours are separately sketched according to such key points' positions and his feature extracted. Finally, distance matrices can be built from the distances between the key points of human skeleton in order to realize image recognition with the result that such pedestrian pose is capable of being estimated successfully. The experimental results shows that his method has a better realtime capability and usual poses can be estimated to some extent.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123102330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new method of eliminating spurious spectral peak based on array rotation","authors":"Rentao Wang, Xulong Chen, Bin Li, Ke Ma, Jian Gao","doi":"10.1109/ICCSNT.2013.6967312","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967312","url":null,"abstract":"When suing the multiple signal classification (MUSIC) direction finding algorithm based on uniform linear array, the estimation of the real arrival direction may be interfered due to the occurrence of the spurious spectral peak if the ratio of the element spacing to wavelength is more than 0.5. The available methods of eliminating spurious spectral peak are mainly suitable for active direction finding and non-uniform array. However, passive direction finding and uniform array are preferred in practical application. Aiming at this issue, by analyzing the causes of spurious spectral peaks, a novel method using mechanical rotating (array rotating method) to eliminate spurious spectral peaks is proposed in this paper. And the effectiveness is shown by simulation results. The new method can be easily implemented and widely applied, and can meet real engineering design requirements.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"21 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiqiang Wei, Yaqing Song, Hao Liu, Yanxiu Sheng, Xi Wang
{"title":"The research and implementation of GPS intelligent transmission strategy based on on-board Android smartphones","authors":"Zhiqiang Wei, Yaqing Song, Hao Liu, Yanxiu Sheng, Xi Wang","doi":"10.1109/ICCSNT.2013.6967324","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967324","url":null,"abstract":"Smartphones have been widely integrated with GPS receiver, which may provide accurate location information of vehicles without cost increase. Traditionally, LBS applications obtain vehicle locations then using the Hypertext Transfer Protocol (HTTP) protocol uploaded to central servers with a fixed frequency. In this paper, we exploit an intelligent strategy of GPS sensing and transmitting. Explicitly, we implemented a platform to collect real-time GPS data from vehicles. A common Android Smartphone serves as a GPS sensor in a vehicle. Client Application software is designed to generate GPS location updates with adaptive time stamps once it executed. In the final comparison, MQTT push technology is introduced into GPS transmission in order to effectively reduce mobile traffic.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An EPA-FRT based dual-network platform for humanoid robot control systems","authors":"Hanrong Lu, Feng Zheng, Haitao Wei, Li Lu","doi":"10.1109/ICCSNT.2013.6967343","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967343","url":null,"abstract":"In order to accomplish complex movements and interact with the environment, humanoid robots are required to be equipped with many motors, servo drivers and sensors to provide enough DOF, achieve fast responses and acquire adequate sensor data. Most interfaces that commercial servo drivers and sensors provide cannot satisfy the performance requirement as the number of drivers and sensors grows. Adopting Real-Time Ethernet is a trend in high-speed motion control scenarios such as robot systems and variable-frequency drive (VFD) control systems. This paper proposes an EPA-FRT based dual-network scheme for humanoid robot control and establishes a system that is compatible to both CAN and Ethernet interfaces. The network structure and scheduling scheme of the dual-network system are presented. A prototype test is performed and analyzed compared to the CAN bus. Experimental results show the effectiveness and advantage of the scheme.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple wideband radiation sources direction finding algorithm under background of interference","authors":"Yang Jian, Liu Yu, D. Hui","doi":"10.1109/ICCSNT.2013.6967292","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967292","url":null,"abstract":"In electronic countermeasures, in order to interfere the normal work of reconnaissance receiver, the noise signal emitted by the jammer is usually used for electromagnetic suppression. Otherwise, the radar signal may be exist in the reality electromagnetic environment. Signals can not be recognized in time domain because of the superposition of interference signal and radar signal. The directions of them can not be found. So it is important to have the research on the detection and direction finding (DF) algorithm of mixed signals under the background of interference. The algorithm in this paper is considered in the frequency domain. The signals can be detected and recognized according to the maximum values and mean square values of spectral modulus after the short time Fourier transform (STFT). Then the direction can be found by the interception of the useful data segment. The equipment is simple in this algorithm. Its amount of computation is less and it is suitable for the project realization. The directions of interference signal and radar signal can be found simultaneously. Computer simulation results show that high accuracy can be achieved on certain conditions.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116075078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of single sign-on for independent web systems based on AJAX","authors":"Yang Tie-jun, Yang Xiu-juan","doi":"10.1109/ICCSNT.2013.6967119","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967119","url":null,"abstract":"Single sign-on (SSO) can unify login management of multiple applications to provide a centralized authentication. Users only need to take the initiative authenticate once to access all applications. Aiming at the problem of the difficulties of session sharing among cross-platform web applications and the complexity of SSO implementation, a light-weighted method of SSO based on AJAX is presented. First, facade design pattern is imposed to build a unified user login interface, which is the main entrance for users to use the services of different web systems. Second, by using asynchronous HTTP processing, authentication requests to different web systems are arranged underlying the login interfaces according to users' identities. Once users push the login submit button, the requests will be sent to the required systems. Then the authentication responses will be sent back independently and asynchronously and users will be forwarded to an operation page according to the authentication results. An extra feature of our method is to achieve flexible and orderly SSO. It is proved the proposed method is a valuable reference of SSO methods.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on algorithm for fireworks simulation based on particle system","authors":"Shi Lei, Wenyon Wang","doi":"10.1109/ICCSNT.2013.6967102","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967102","url":null,"abstract":"This paper is based on the theory of particle system, researching the basic model and principle of setting off fireworks, based on the basis original model, we add some new constraints, such as wind-force, temperature, buoyancy force, at last the model of fireworks is realized. The simulation of fireworks is distinctly and real-time at last.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectural requirements for regional library & information service system: An approach to data integration in cloud","authors":"Bo Zhou, Wenliang Liu","doi":"10.1109/ICCSNT.2013.6967152","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967152","url":null,"abstract":"Under the real information environment, because the time or department to develop information system is different, there are always many heterogeneous information systems run at the different software and hardware platforms which are executed simultaneously. The separate and closed data source in the system makes data hard to be communicated, shared and fused among the systems. Data integration using traditional methods, which is to integrate and to exchange data among data sources according to operation system or database, will cost much time and money to deal with complexity and to keep business being operated. An approach to data integration in cloud the paper proposes uses service features of cloud computing and supports data sharing in many application fields. It is independent of all databases and data sources and it is characteristic of remote storage and dynamic data integration of data sources.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic segmentation and counting of Skeletonema costatum obtained by flow cytometry image","authors":"Wang Di, Xie Jiezhen","doi":"10.1109/ICCSNT.2013.6967266","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967266","url":null,"abstract":"Skeletonema costatum (S. costatum) is one of the most common species that can give rise to red tide, a global marine disaster. For the purpose to monitor and forecast the outburst of red tide caused by S. costatum, many measures have been brought up. In this paper we propose a recursive method to segment and calculate S. costatum images captured by our improved Flow Cytometry. Firstly Otsu method is applied to separate the algae cells from the background. Afterward, the flood filling algorithm is adopted to fill the holes produced by the Otsu method. Then we use the erosion procedure to recursively find out the contours of each S. costatum cells. The result shows that our method can correctly separate most of the cells.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of personal firewall technology based on windows","authors":"Ning Ma","doi":"10.1109/ICCSNT.2013.6967197","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967197","url":null,"abstract":"Firewall, as one kind of network security device, is widely used in all kinds of networks and personal computers. This paper focus on the package filter technology of firewall in kernel layer, an intensive study of Windows operating system architecture and NDIS intermediate driver operating principle also has been made. On this basis, an scheme of personal firewall system based on NDIS intermediate driver has been designed, which include filter driver and UI application in kernel mode and user mode respectively.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128407574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}