{"title":"Partial Differential Equations for Function Based Geometry Modelling within Visual Cyberworlds","authors":"H. Ugail, A. Sourin","doi":"10.1109/CW.2008.42","DOIUrl":"https://doi.org/10.1109/CW.2008.42","url":null,"abstract":"We propose the use of partial differential equations (PDEs) for shape modelling within visual cyberworlds. PDEs, especially those that are elliptic in nature, enable surface modelling to be defined as boundary-value problems. Here we show how the PDE based on the Biharmonic equation subject to suitable boundary conditions can be used for shape modelling within visual cyberworlds. We discuss an analytic solution formulation for the Biharmonic equation which allows us to define a function based geometry whereby the resulting geometry can be visualised efficiently at arbitrary levels of shape resolutions. In particular, we discuss how function based PDE surfaces can be readily integrated within VRML and X3D environments.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal Aspects of Virtual Identity","authors":"Jacob van Kokswijk","doi":"10.1109/CW.2007.66","DOIUrl":"https://doi.org/10.1109/CW.2007.66","url":null,"abstract":"A Virtual Identity is the representation of an identity in a virtual environment, consisting of a property of objects allowing these objects to be distinguished from each other. It can exist independently from human control and can (inter)act autonomously in an electronic system. Since the Internet virtual identities (VIDs) are step by step interwoven in (trans)actions of persons but neglected in the law of persons and property. Most people don't realise that they are using VIDs when entering a marketplace (such as eBay), a chat room, or a dating site. They take for granted that an artificial identity is representing them. Given the emerging use of auction and transaction websites the sometimes public backlash against virtual shapes is not proportional to the daily growing accounts that use virtual identities for social and commercial transactions. This paper describes the legal aspects of virtual identities in the context of virtual environments.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Potentials of Cyberworlds -An Axiomatic Approach-","authors":"T. Kunii","doi":"10.1109/CW.2004.63","DOIUrl":"https://doi.org/10.1109/CW.2004.63","url":null,"abstract":"Considering the increasingly large impacts and potentials of cyberworlds as seen in e-financing that trades GDP equivalent in a day, we human beings living in the real world are at the stage of needing to firmly identify the nature of cyberworlds. It is clear that if we continue to deal with cyberworlds as we have been, they grow chaotic beyond human understanding and control, endangering the real world. In an effort to make cyberworlds an academic discipline to overcome the critical situation, we axiomatize cyberworlds and then theorize them as Euclid did in identifying shapes in the real world.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moving Shadow Removal Based on ILT","authors":"Yuanzhi Hu, Rang-ding Wang","doi":"10.1109/CW.2008.17","DOIUrl":"https://doi.org/10.1109/CW.2008.17","url":null,"abstract":"Moving shadows cause serious problem while segmenting and extracting foreground from video sequences, due to the misclassification of moving shadow as foreground. In order to detect the moving objects accurately, this paper proposes to remove the moving shadows based on the similarity between little textured patches. The potential shadow points are detected by analyzing the intensity and color properties firstly, and then, the shadow detection approach is improved by evaluating the textural similarity between the current frame and the corresponding background model. Experiment results on both indoor and outdoor scenes exhibit that the proposed method succeeds in removing shadows robustly and achieves the real-time performance.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric Template Security Using Watermarking Reinforcement Based Cancellable Transformation","authors":"Samira Bader, Lamia Rzouga Haddada, N. Amara","doi":"10.1109/CW52790.2021.00052","DOIUrl":"https://doi.org/10.1109/CW52790.2021.00052","url":null,"abstract":"The use of biometric technology in authentication and integrity verification systems necessarily gives rise to issues relating to the security and privacy of transmitted and stored templates. Many techniques have been proposed in the literature involving crypto-biometric algorithm, template transformation method and watermarking reinforcement scheme. Watermarking reinforcement relying on biometrics usually combines the watermarking technique with a feature transformation scheme. We present a new watermarking reinforcement scheme including two security levels to protect biometric data. The first security level is proposed to verify the integrity of the fingerprint while transmitted or stored based on a watermarking approach. To avoid any registration of the stored biometric template, a second security level is developed based on cancellable transformation. The watermarking of the fingerprint image is applied in the wavelet packet decomposition multiresolution domain using a binary watermark derived from the fingerprint minutiae. The developed transformation is designed to explore the relative relation between minutiae in the pair-polar coordinate domain. The transformed minutiae satisfy the non-invertibility recovery of the original ones. Under various scenarios, the suggested scheme is evaluated using the public fingerprint database BioSecure and FVC2002 DB1. The realized testing and derived results show the robustness of the first security level under various attacks and the satisfaction of the second level security to protect biometrics template with an insignificant degradation of the authentication performance.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Collaborative Filtering Based on Item Similarity Modified and Common Ratings","authors":"Weijie Wang, J. Yang, Liang He","doi":"10.1109/CW.2012.40","DOIUrl":"https://doi.org/10.1109/CW.2012.40","url":null,"abstract":"Many of the recent algorithms have been developed to improve the various aspects of collaborative filtering recommender systems, however, most of them do not take the sectional data of users and items information or characteristic into account. This paper, we present a new improved collaborative filtering based on item similarity modified and item common ratings which take full advantage of the sectional data of item-user matrix information to modify the similarity calculation and rating prediction. Extensive experiments have been conducted on two different dataset to analyze our proposal approach. The results show that our approach can improve the prediction accuracy of the item-based collaborative filtering not only on different neighbors, but also on different training ratio data set.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PMSM Control Research Based on Particle Swarm Optimization BP Neural Network","authors":"Yu Ren, Limeng Zhou","doi":"10.1109/CW.2008.140","DOIUrl":"https://doi.org/10.1109/CW.2008.140","url":null,"abstract":"This paper presents a control method of the combination of particle swarm optimization algorithm (PSO) and BP neural network for the control of PMSM. PSO can easily and quickly find a optimal parameters of PI, which can be used to generate the study sample space of BP neural network .The BP neural network can be off-line learning, then the network after learning apply to PI controller to control PMSM. This method combines the advantages of PSO and BP neural network learning ability. Compare with the traditional PI control, this method shows a better control performance, can quickly learn ideal PI parameters for motor control.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"33 51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Digital Campus System Based on Vega and Creator","authors":"Zhao-Long Wang, Xiangning Zhou","doi":"10.1109/CW.2008.145","DOIUrl":"https://doi.org/10.1109/CW.2008.145","url":null,"abstract":"By the way on Internet, people' s cognition to a campus humanities environment is only limited to browsing pictures. The authors study and develop a VR display system based on the WEB method by technique of virtual reality. Using this system, people can setup a life-like virtual environment with good operation and easy data interactivity. Through the practical project, it is proved that those 3D models built by this method are very good at dynamic roam, and it guarantees both the precision of models and the data amount of real-time rendering. This paper specifies the self-developed WEB-based VR Revealing System of ShanDong Institute of Business and Technology and discusses mainly the development of environment system and technical focus.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Skin conductance as a real-time indicator of the high/low workload during flight simulator sessions (case study)","authors":"A. Elena, V. Anastasia","doi":"10.1109/CW52790.2021.00045","DOIUrl":"https://doi.org/10.1109/CW52790.2021.00045","url":null,"abstract":"The use of computer-based simulators in the training of specialists in various fields is becoming more widespread. However, the changes in the physiological state of the operator, throughout the simulator training process, remain unclear. To this end, a study of these changes in the state of the flight simulator operator under normal conditions and extreme weather conditions was conducted. It was found that skin conductance parameters depend on the flight stage and significantly change when flight conditions become more difficult.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of Fusing the Data Facing Environment Monitoring","authors":"Bin Shao, Yunliang Jiang, Yuan Zhang","doi":"10.1109/CW.2008.130","DOIUrl":"https://doi.org/10.1109/CW.2008.130","url":null,"abstract":"Although the data fusion and data mining belong to the data processing technology, former researchers combine these technologies quite a few. In fact these technologies are nearly correlative, and both serve the goal of the knowledge detects. The target of data fusion is forming the data foundation of data mining, and the target of data mining is extracting the useful knowledge in the foundation of above data, to complete the knowledge detection. Therefore, our research's aim is combining the two technologies, designs the valid algorithm to carry on the data mining in the foundation of data fusion, mainly on the artificial intelligence theory and the Bayes method, excavates the valid information in the data of environmental monitoring as far as possible.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}