{"title":"SlowFast Convolution LSTM Networks for Dynamic Gesture Recognition","authors":"Xunlei Zhang, Tie Yun, L. Qi","doi":"10.1145/3449365.3449375","DOIUrl":"https://doi.org/10.1145/3449365.3449375","url":null,"abstract":"Computer vision-based gesture recognition is gradually becoming a popular research direction in the field of human-computer interaction (HCI). However, there are various challenges in the extraction of gesture features, such as complex backgrounds, light changes and shadows. Dynamic gesture recognition aims to identify ongoing gestures from a continuous sequence of gestures, which makes it difficult to accurately extract features about continuous gestures due to not knowing the start frame and stop frame of each gesture instance. In order to overcome the various challenges in the dynamic gesture recognition task, we propose a deep architecture for the recognition of dynamic gestures by applying the SlowFast pathways and convolution LSTM to gesture recognition. End-to-end feature extraction of dynamic gestures is performed through the SlowFast pathways, avoiding the complex feature extraction process. Due to the long time span of dynamic gestures, the motion feature of gestures also play an important role in the specific connotations of gestures, hence the introduction of convolution LSTM to capture the movement information of gestures. The proposed architecture is verified on the ChaLearn LAP large-scale isolated gesture dataset (IsoGD). The results show the validity of our proposed architecture.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133444815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Path of Roses and Financial Literacy: Exploring the Usability of UK's Digital Banking Services to Improve Younger Adult Adoption","authors":"Kushwanth Koya, David Jones","doi":"10.1145/3449365.3449369","DOIUrl":"https://doi.org/10.1145/3449365.3449369","url":null,"abstract":"Digital retail banking is a prominent method for customers to interact with their banks. However, over the last decade the banking industry has experienced a slowing of digital retail banking adoption rates worldwide, especially in younger adults. Scholars attribute this adoption slowdown on the dissimilar growth of adoption rates and development maturity of digital retail banking applications, where the adoption rates have summited faster than development maturity. As UK banks are advancing their capabilities in digital banking, to the extent of replacing traditional branches with self-service kiosks, it becomes essential to design usable applications for customers. In retail banking, younger customers tend to continue banking as they age with the institution of their first business, hence it becomes essential for banking institutions to provide mature digital services to attract and retain the digital natives. A focussed survey and interviews conducted by the research team indicates that younger adults find the current user-interfaces impede cognitive and visual access to information and are not user-specific. Additionally, it was also found that their lack of financial knowledge and information deters them from using various features and products provided digitally by the banks. Therefore, it appears that inculcation of accessible financial information and user-specificities into the design of digital banking applications, in addition to offering giveaways could improve user adoption rates in young adults.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Affine Transform for Skew Correction Based on Generative Adversarial Network Method for Multi-Camera Person Re-Identification","authors":"Ziyang Ni, J. Pei, Yang Zhao","doi":"10.1145/3449365.3449380","DOIUrl":"https://doi.org/10.1145/3449365.3449380","url":null,"abstract":"In intelligent video surveillance system, person re-identification is a key technology. In order to address the problem, the decrease in performance of person Re-Id lead by the skew pedestrian images, this paper proposes the affine transform for skew correction based on generative adversarial network (GAN) method for multi-camera person re-identification (Re-Id). Firstly, an effective GAN is proposed to guide the spatial transformer network (STN) to learn affine transform parameters for skew correction in an adversarial way, and STN is adopted as the preprocessing model for Re-Id to reduce influence of variations in person posture. Then, features are extracted by a deep convolutional neural network from input images which are corrected by STN, and finally results can be obtained by measuring similarity between features. Besides, in the proposed GAN, a classification model and related loss functions are introduced to reduce the damage to the key features of pedestrian during skew correction. The effectiveness of the proposed method is verified by experiments conducted on the skew pedestrian dataset.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130653990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Movilizer Application with Genre and Rating Classification Using NW-KNN Method","authors":"V. C. Mawardi, Cindy Winata, J. Hendryli","doi":"10.1145/3449365.3449371","DOIUrl":"https://doi.org/10.1145/3449365.3449371","url":null,"abstract":"Information about movies can be easily seen in cyberspace. However, not all film sites present relevant and accurate information as examples of high rating films but have bad comments. In addition, there is a review that has not been accompanied by ratings and the genre is unknown. The classification of input data in the form of text will be processed and classified into the same or similar class using the Neighbor-Weighted K-Nearest Neighbor (NW-KNN) method. The NW-KNN method is able to classify well for data that is not evenly distributed by giving weights to each class in the system. The description text of the film will be classified into 10 classes with the number of training data as many as 1028, while the movie review text will be classified into 5 classes with the number of training data as many as 10032. The results of system testing indicate that the NW-KNN method produces an accuracy of 96.6% film genre and 86.85% to classify film reviews into movie ratings.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132739335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Customer Journey Mapping of a Public Mobile Application: The Case Study of a State Electricity Enterprise","authors":"S. Ramjan, K. Campiranon","doi":"10.1145/3449365.3449372","DOIUrl":"https://doi.org/10.1145/3449365.3449372","url":null,"abstract":"Although electricity enterprises are state-owned and are often monopolies, they face a number of challenges to remain competitive for enhance customer satisfaction. In turn, a number of state electricity enterprises have developed public mobile applications (apps) to meet customer needs. It can be challenging for state enterprises to collect data from citizens in order to design the app's specifications and determine its requirements. The aim of this research is to examine the satisfaction level of state electricity enterprise customers in Thailand by using the Customer Journey Mapping (CJM) technique in order to develop interview questions. The questions are then used to interview target respondents who have used the current version of the mobile application to obtain a satisfaction level and suggestions. Following data collection and triangulation techniques, the research results were utilized to specify Terms of Reference (TOR) for the Thai state electricity enterprises to develop a public mobile application.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126609069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generative Image Inpainting for Large-Scale Edge Area","authors":"Jiayi Liang, Xueming Li","doi":"10.1145/3449365.3449379","DOIUrl":"https://doi.org/10.1145/3449365.3449379","url":null,"abstract":"In recent years, applying deep learning to computer vision is a very popular research direction, and a number of models with amazing effects have appeared. Deep learning-based approaches for end-to-end image inpainting have shown promise results. Recent research has made great progress in repairing rectangular and free-form areas but there are still many problems and room for improvement. For example, artifacts, blur and color missing still exist among the completion results of the large-scale border area. In this paper, we propose an end-to-end GAN-based image inpainting method, which has a better effect on the large boundary area. Our model is a two-stage adversarial network. The first stage completes the corresponding edge image, and the second stage uses the edge image generated in the first stage as a prior to complete the color image. We added parallel residual blocks to the edge completion network, and for the image completion network we replace the original residual blocks with multi-scale dilated convolution fusion blocks. Besides, a content loss based on DenseNet is added to the second stage. Experiments on multiple publicly available datasets show that our results have better effects on larger edge areas and can increase the average PSNR (Peak Signal to Noise Ratio) and SSIM (Structural Similarity Index).","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116312563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Model For Bigdata System For Multimedia","authors":"J. Bobulski, M. Kubanek","doi":"10.1145/3449365.3449368","DOIUrl":"https://doi.org/10.1145/3449365.3449368","url":null,"abstract":"Big Data systems are characterized by the processing of data that is created in real time, has a different complexity, is variable and diverse and, most importantly, is huge. They require the application of innovative technologies, tools and methods in order to extract new and useful knowledge from them. Effective data acquisition and processing will play a key role in the global and local economy, social policy and large corporations. Big Data is a new challenge and information opportunities. The article presents a project of a system for multimedia data analysis with the use of artificial intelligence.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122202619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Method of Dynamic Path Modification for Nonholonomic Mobile Robot","authors":"Linan Yin, Mengxu Zhang, Jianhui Wang, Xiangchuan Gao, Jinyuan Shen","doi":"10.1145/3449365.3449381","DOIUrl":"https://doi.org/10.1145/3449365.3449381","url":null,"abstract":"The TEB (timed elastic band) algorithm optimizes the path generated by the global planner to obtain a time-optimal trajectory that can avoid obstacles and satisfy the kinematics and dynamics constraints of the robots. In TEB algorithm, backward is often used to adjust the direction, which makes the trajectory not smooth enough. For differential driving robot, it is more convenient to rotate in situ to adjust direction. Excessive rates of change in acceleration can cause the torque output of the robot chassis motor to abruptly change, subjecting the robot to shock oscillation. In the improved TEB algorithm, the velocity constraint is modified and the specific jerk constraint is constructed. The improved TEB algorithm is simulated on the Stage simulation platform and implemented on a real differential driving robot. The experimental results show that the improved TEB algorithm can generate smoother forward trajectory without backward for wheeled differential driving robot, and the trajectory has good obstacle avoidance effect. Meanwhile, the algorithm can better solve the shock oscillation problem of the robot.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Saliency Detection via Multi-Feature and Manifold-Space Ranking","authors":"Xiaoli Li, Huaici Zhao, Yunpeng Liu","doi":"10.1145/3449365.3449378","DOIUrl":"https://doi.org/10.1145/3449365.3449378","url":null,"abstract":"In this paper, we propose an image saliency detection method by using multi-feature and manifold-space ranking. Basically, the proposed method extracts the color-histogram feature to obtain the fine information of the image, and the color-mean feature to obtain the coarse information respectively. To further improve the detection accuracy of the feature correlation between different image units, a manifold-space ranking method is used to calculate saliency values of image units to construct a saliency map on each feature-space. Specifically, we fuse the two saliency maps to obtain the final saliency map. Extensive experiments demonstrate that the proposed method not only outperforms the other methods, but also improves the accuracy and robustness of the saliency detection.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of Information Management Technology in Computer Big Data System","authors":"Wenjun Ji","doi":"10.1145/3449365.3449366","DOIUrl":"https://doi.org/10.1145/3449365.3449366","url":null,"abstract":"In the context of the important data era, information data has increased, and information processing and storage have become more extensive. People's requirements for computer information processing technology continue to increase, and security issues such as malicious hacker attacks and computer virus intrusion have also increased correspondingly. Therefore, technicians are innovating computers. In information processing technology, computer information processing technology should be optimized to ensure computer network security and important data security. These technologies include data mining technology, cloud computing technology, modern intelligent algorithm technology and firewall technology. As mentioned above, the scientific and reasonable application of computers and information processing technology should attract the attention of technicians and users. We plan to continue to carry out corresponding work in the future to improve the data model structure.","PeriodicalId":188200,"journal":{"name":"Proceedings of the 2021 3rd Asia Pacific Information Technology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133750176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}