International Conference on Cyberworlds最新文献

筛选
英文 中文
Partial Differential Equations for Function Based Geometry Modelling within Visual Cyberworlds 视觉网络世界中基于函数的几何建模偏微分方程
International Conference on Cyberworlds Pub Date : 2008-09-22 DOI: 10.1109/CW.2008.42
H. Ugail, A. Sourin
{"title":"Partial Differential Equations for Function Based Geometry Modelling within Visual Cyberworlds","authors":"H. Ugail, A. Sourin","doi":"10.1109/CW.2008.42","DOIUrl":"https://doi.org/10.1109/CW.2008.42","url":null,"abstract":"We propose the use of partial differential equations (PDEs) for shape modelling within visual cyberworlds. PDEs, especially those that are elliptic in nature, enable surface modelling to be defined as boundary-value problems. Here we show how the PDE based on the Biharmonic equation subject to suitable boundary conditions can be used for shape modelling within visual cyberworlds. We discuss an analytic solution formulation for the Biharmonic equation which allows us to define a function based geometry whereby the resulting geometry can be visualised efficiently at arbitrary levels of shape resolutions. In particular, we discuss how function based PDE surfaces can be readily integrated within VRML and X3D environments.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Legal Aspects of Virtual Identity 虚拟身份的法律问题
International Conference on Cyberworlds Pub Date : 2007-10-24 DOI: 10.1109/CW.2007.66
Jacob van Kokswijk
{"title":"Legal Aspects of Virtual Identity","authors":"Jacob van Kokswijk","doi":"10.1109/CW.2007.66","DOIUrl":"https://doi.org/10.1109/CW.2007.66","url":null,"abstract":"A Virtual Identity is the representation of an identity in a virtual environment, consisting of a property of objects allowing these objects to be distinguished from each other. It can exist independently from human control and can (inter)act autonomously in an electronic system. Since the Internet virtual identities (VIDs) are step by step interwoven in (trans)actions of persons but neglected in the law of persons and property. Most people don't realise that they are using VIDs when entering a marketplace (such as eBay), a chat room, or a dating site. They take for granted that an artificial identity is representing them. Given the emerging use of auction and transaction websites the sometimes public backlash against virtual shapes is not proportional to the daily growing accounts that use virtual identities for social and commercial transactions. This paper describes the legal aspects of virtual identities in the context of virtual environments.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Potentials of Cyberworlds -An Axiomatic Approach- 网络世界的潜力-一种公理化的方法
International Conference on Cyberworlds Pub Date : 2004-11-18 DOI: 10.1109/CW.2004.63
T. Kunii
{"title":"The Potentials of Cyberworlds -An Axiomatic Approach-","authors":"T. Kunii","doi":"10.1109/CW.2004.63","DOIUrl":"https://doi.org/10.1109/CW.2004.63","url":null,"abstract":"Considering the increasingly large impacts and potentials of cyberworlds as seen in e-financing that trades GDP equivalent in a day, we human beings living in the real world are at the stage of needing to firmly identify the nature of cyberworlds. It is clear that if we continue to deal with cyberworlds as we have been, they grow chaotic beyond human understanding and control, endangering the real world. In an effort to make cyberworlds an academic discipline to overcome the critical situation, we axiomatize cyberworlds and then theorize them as Euclid did in identifying shapes in the real world.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Moving Shadow Removal Based on ILT 基于ILT的移动阴影去除
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW.2008.17
Yuanzhi Hu, Rang-ding Wang
{"title":"Moving Shadow Removal Based on ILT","authors":"Yuanzhi Hu, Rang-ding Wang","doi":"10.1109/CW.2008.17","DOIUrl":"https://doi.org/10.1109/CW.2008.17","url":null,"abstract":"Moving shadows cause serious problem while segmenting and extracting foreground from video sequences, due to the misclassification of moving shadow as foreground. In order to detect the moving objects accurately, this paper proposes to remove the moving shadows based on the similarity between little textured patches. The potential shadow points are detected by analyzing the intensity and color properties firstly, and then, the shadow detection approach is improved by evaluating the textural similarity between the current frame and the corresponding background model. Experiment results on both indoor and outdoor scenes exhibit that the proposed method succeeds in removing shadows robustly and achieves the real-time performance.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Template Security Using Watermarking Reinforcement Based Cancellable Transformation 基于水印增强可消去变换的生物特征模板安全
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW52790.2021.00052
Samira Bader, Lamia Rzouga Haddada, N. Amara
{"title":"Biometric Template Security Using Watermarking Reinforcement Based Cancellable Transformation","authors":"Samira Bader, Lamia Rzouga Haddada, N. Amara","doi":"10.1109/CW52790.2021.00052","DOIUrl":"https://doi.org/10.1109/CW52790.2021.00052","url":null,"abstract":"The use of biometric technology in authentication and integrity verification systems necessarily gives rise to issues relating to the security and privacy of transmitted and stored templates. Many techniques have been proposed in the literature involving crypto-biometric algorithm, template transformation method and watermarking reinforcement scheme. Watermarking reinforcement relying on biometrics usually combines the watermarking technique with a feature transformation scheme. We present a new watermarking reinforcement scheme including two security levels to protect biometric data. The first security level is proposed to verify the integrity of the fingerprint while transmitted or stored based on a watermarking approach. To avoid any registration of the stored biometric template, a second security level is developed based on cancellable transformation. The watermarking of the fingerprint image is applied in the wavelet packet decomposition multiresolution domain using a binary watermark derived from the fingerprint minutiae. The developed transformation is designed to explore the relative relation between minutiae in the pair-polar coordinate domain. The transformed minutiae satisfy the non-invertibility recovery of the original ones. Under various scenarios, the suggested scheme is evaluated using the public fingerprint database BioSecure and FVC2002 DB1. The realized testing and derived results show the robustness of the first security level under various attacks and the satisfaction of the second level security to protect biometrics template with an insignificant degradation of the authentication performance.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Collaborative Filtering Based on Item Similarity Modified and Common Ratings 基于项目相似度修正和公共评级的改进协同过滤
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW.2012.40
Weijie Wang, J. Yang, Liang He
{"title":"An Improved Collaborative Filtering Based on Item Similarity Modified and Common Ratings","authors":"Weijie Wang, J. Yang, Liang He","doi":"10.1109/CW.2012.40","DOIUrl":"https://doi.org/10.1109/CW.2012.40","url":null,"abstract":"Many of the recent algorithms have been developed to improve the various aspects of collaborative filtering recommender systems, however, most of them do not take the sectional data of users and items information or characteristic into account. This paper, we present a new improved collaborative filtering based on item similarity modified and item common ratings which take full advantage of the sectional data of item-user matrix information to modify the similarity calculation and rating prediction. Extensive experiments have been conducted on two different dataset to analyze our proposal approach. The results show that our approach can improve the prediction accuracy of the item-based collaborative filtering not only on different neighbors, but also on different training ratio data set.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PMSM Control Research Based on Particle Swarm Optimization BP Neural Network 基于粒子群优化BP神经网络的永磁同步电机控制研究
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW.2008.140
Yu Ren, Limeng Zhou
{"title":"PMSM Control Research Based on Particle Swarm Optimization BP Neural Network","authors":"Yu Ren, Limeng Zhou","doi":"10.1109/CW.2008.140","DOIUrl":"https://doi.org/10.1109/CW.2008.140","url":null,"abstract":"This paper presents a control method of the combination of particle swarm optimization algorithm (PSO) and BP neural network for the control of PMSM. PSO can easily and quickly find a optimal parameters of PI, which can be used to generate the study sample space of BP neural network .The BP neural network can be off-line learning, then the network after learning apply to PI controller to control PMSM. This method combines the advantages of PSO and BP neural network learning ability. Compare with the traditional PI control, this method shows a better control performance, can quickly learn ideal PI parameters for motor control.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"33 51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Digital Campus System Based on Vega and Creator 基于Vega和Creator的数字校园系统设计
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW.2008.145
Zhao-Long Wang, Xiangning Zhou
{"title":"Design of Digital Campus System Based on Vega and Creator","authors":"Zhao-Long Wang, Xiangning Zhou","doi":"10.1109/CW.2008.145","DOIUrl":"https://doi.org/10.1109/CW.2008.145","url":null,"abstract":"By the way on Internet, people' s cognition to a campus humanities environment is only limited to browsing pictures. The authors study and develop a VR display system based on the WEB method by technique of virtual reality. Using this system, people can setup a life-like virtual environment with good operation and easy data interactivity. Through the practical project, it is proved that those 3D models built by this method are very good at dynamic roam, and it guarantees both the precision of models and the data amount of real-time rendering. This paper specifies the self-developed WEB-based VR Revealing System of ShanDong Institute of Business and Technology and discusses mainly the development of environment system and technical focus.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skin conductance as a real-time indicator of the high/low workload during flight simulator sessions (case study) 皮肤电导作为飞行模拟器会话期间高/低工作量的实时指标(案例研究)
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW52790.2021.00045
A. Elena, V. Anastasia
{"title":"Skin conductance as a real-time indicator of the high/low workload during flight simulator sessions (case study)","authors":"A. Elena, V. Anastasia","doi":"10.1109/CW52790.2021.00045","DOIUrl":"https://doi.org/10.1109/CW52790.2021.00045","url":null,"abstract":"The use of computer-based simulators in the training of specialists in various fields is becoming more widespread. However, the changes in the physiological state of the operator, throughout the simulator training process, remain unclear. To this end, a study of these changes in the state of the flight simulator operator under normal conditions and extreme weather conditions was conducted. It was found that skin conductance parameters depend on the flight stage and significantly change when flight conditions become more difficult.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Study of Fusing the Data Facing Environment Monitoring 面向环境监测的数据融合研究
International Conference on Cyberworlds Pub Date : 1900-01-01 DOI: 10.1109/CW.2008.130
Bin Shao, Yunliang Jiang, Yuan Zhang
{"title":"The Study of Fusing the Data Facing Environment Monitoring","authors":"Bin Shao, Yunliang Jiang, Yuan Zhang","doi":"10.1109/CW.2008.130","DOIUrl":"https://doi.org/10.1109/CW.2008.130","url":null,"abstract":"Although the data fusion and data mining belong to the data processing technology, former researchers combine these technologies quite a few. In fact these technologies are nearly correlative, and both serve the goal of the knowledge detects. The target of data fusion is forming the data foundation of data mining, and the target of data mining is extracting the useful knowledge in the foundation of above data, to complete the knowledge detection. Therefore, our research's aim is combining the two technologies, designs the valid algorithm to carry on the data mining in the foundation of data fusion, mainly on the artificial intelligence theory and the Bayes method, excavates the valid information in the data of environmental monitoring as far as possible.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信