Chunyong Yin, Hui Zhang, Jun Xiang, Jin Wang, Zhichao Yin, Jeong-Uk Kim
{"title":"A New Mobile Recommendation Algorithm Based on Statistical Theory","authors":"Chunyong Yin, Hui Zhang, Jun Xiang, Jin Wang, Zhichao Yin, Jeong-Uk Kim","doi":"10.1109/AITS.2015.33","DOIUrl":"https://doi.org/10.1109/AITS.2015.33","url":null,"abstract":"With Recommendation technology has been widely used in advertising push, e-commerce and other fields and it has shown its powerful application prospect. But with the index increasing of mobile commerce data size, the size of the recommendation system is also increased and this leads to that the traditional collaborative filtering recommendation algorithm cannot adapt to such a big data processing. To solve the problem, we proposed an algorithm based on the statistical analysis of user data. First, this algorithm classified the data simply, and then we could gain the relatively accurate personalized recommendation results by the statistical analysis of different attributes on the data sets.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Fresh Sea Cucumber Weighing Sorting Machine","authors":"Tongliang Liu, Xuehai Zheng, Chen Li","doi":"10.1109/AITS.2015.11","DOIUrl":"https://doi.org/10.1109/AITS.2015.11","url":null,"abstract":"This topic starting from the actual project, design a set of sea cucumber on the basis of quality grade automatic sorting equipment. Reference to the existing each kind of food electronic weighing type separator, a new form of research articles on sea cucumber processing of weighing separator, abandoned the PC control high cost and the disadvantages of single chip microcomputer control are susceptible to interference, PLC control system, effectively improve the sorting efficiency and sorting accuracy. The human-computer interaction based on the LabVIEW software is designed. Through constructing prototype test, the results show that the design can meet the production requirements of sea cucumber weight sorting.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application and Research of Enterprise Information Based on Grid","authors":"Ruizhen Duan, Zhongwen Wang, Mingshan Chi, Xiaoqiu Xu","doi":"10.1109/AITS.2015.9","DOIUrl":"https://doi.org/10.1109/AITS.2015.9","url":null,"abstract":"To solve the problem of heterogeneity of data that occurs during the process of enterprise informatization, with the help of standard web service technology, and by combining the features of sharing and synergy that grid technology has, a solution to the application of enterprise informatization based on OGSA/WSRF is proposed in this paper to achieve the smooth sharing and integration of the heterogeneous data of enterprises. It will play an important role in improving production efficiency, lowering costs, improving the quality of resource sharing and decision-making and enhancing the core competitiveness of enterprises.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132441799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Smart Home Based on Android","authors":"Shuangquan Li, Jian Li, Xinxin Nie, Lingyong Kong","doi":"10.1109/AITS.2015.15","DOIUrl":"https://doi.org/10.1109/AITS.2015.15","url":null,"abstract":"Modern smart home has secure, convenient, comfortable characteristics, and broad prospects. This article is designed and implemented based on Android smart home control system. The ARM9 of embedded operating system is used as a server, and Android smartphones as a client. The Key Technologies like components resources provided by Android, Socket Communications, SQLite database, and so on, which are used to design intelligent home control terminal software, 2.4G wireless technology used to set home interior local area network, achieve the intelligent home control systems. As it tested, the smart home system is stable, safe, reliable, easy to expand.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nadi, Nashwa El-Bendary, A. Hassanien, Tai-hoon Kim
{"title":"Falling Detection System Based on Machine Learning","authors":"M. Nadi, Nashwa El-Bendary, A. Hassanien, Tai-hoon Kim","doi":"10.1109/AITS.2015.27","DOIUrl":"https://doi.org/10.1109/AITS.2015.27","url":null,"abstract":"As falling is the most important issue that faces elderly people all over the world, this paper proposes a detection system for falling based on Machine Learning (ML). In the proposed system, a dataset of videos containing falling actions has been utilized via dividing each video into many shots that are consequently being converted into gray-level images. Then, for detecting the moving objects in videos, the foreground is firstly detected, then noise and shadow are deleted to detect the moving object. Finally, a number of features, including aspect ratio and falling angle, are extracted and a number of classifiers are being applied in order to detect the occurrence of falling. Experimental results, using 10-fold cross validation, shown that the proposed falling detection approach based on Linear Discriminant Analysis (LDA) classification algorithm has outperformed both support vector machines (SVMs) and Knearest neighbor (KNN) classification algorithms via achieving falling detection with accuracy of 96.59 %.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunyong Yin, Luyu Ma, Lu Feng, Jin Wang, Zhichao Yin, Jeong-Uk Kim
{"title":"A Hybrid Feature Selection Algorithm","authors":"Chunyong Yin, Luyu Ma, Lu Feng, Jin Wang, Zhichao Yin, Jeong-Uk Kim","doi":"10.1109/AITS.2015.35","DOIUrl":"https://doi.org/10.1109/AITS.2015.35","url":null,"abstract":"Feature selection algorithm in intrusion detection, data mining and pattern recognition plays a crucial role, it deletes unrelated and redundant features of the original data set to the optimal feature subset which are applied to some evaluation criteria. Due to the low accuracy, the high false positive rate and the long detection time of the existing feature selection algorithm, in the paper, we put forward a hybrid feature selection algorithm towards efficient intrusion detection, this algorithm chooses the optimal feature subset by combining the correlation algorithm and redundancy algorithm. Experimental results show that the algorithm shows almost and even better than the traditional feature selection algorithm on the different classifiers.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leaf Plant Identification System Based on Hidden Naïve Bays Classifier","authors":"Heba F. Eid, A. Hassanien, Tai-hoon Kim","doi":"10.1109/AITS.2015.28","DOIUrl":"https://doi.org/10.1109/AITS.2015.28","url":null,"abstract":"Plant identification is vital for the management of plant species. An automated plant identification system is required for the characterization of plant species without requiring the expertise of botanists. This paper presents an efficient and computational model for plant species identification using digital images of leaves. The proposed identification system combines the leaf biometric features, where shape and venation features are used for leaf image classification. 10 combined biometric leaf features are extracted and passed to Hidden naaive bays classifiers to be categorized. Several experiments are conducted and demonstrated on 1907 sample leaves of 32 different plant species taken form Flavia dataset. Where, the proposed plant identification model shows consistently performances of 97% average identification accuracy.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Fusion Algorithm Based on Wavelet Transform","authors":"J. Zhang, Qing Zhang","doi":"10.1109/AITS.2015.19","DOIUrl":"https://doi.org/10.1109/AITS.2015.19","url":null,"abstract":"The article based on the MATLAB software simulation was carried out on the image fusion, by using wavelet transform method, Lap lace pyramidal decomposition method and weighted average method of image fusion, respectively. And the integration of subjective evaluation and objective evaluation on the experimental results. The experimental results show that the wavelet transform method in image fusion effect is better.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Trust Management-Based Cluster-Head Selection in Wireless Sensor Networks","authors":"Kong Yong, Yan Xin","doi":"10.1109/AITS.2015.18","DOIUrl":"https://doi.org/10.1109/AITS.2015.18","url":null,"abstract":"WSN (Wireless Sensor Networks) is a distributed sensor network, with its ends being the sensors able to sense and detect the external world. As the sensors in the WSN communicate in a wireless way, network setting is flexible and equipment location is uncertain. A wireless sensor network system typically includes end device, sink node and coordinator. The routing protocol in a wireless sensor network realizes information transmission by seeking the optimal path between the source node and the target node and its primary design goal is to improve the safety and reliability of the entire network. This paper focuses on the communication mode realized through cluster - head node selection based on the trust management mechanism introduced into the hierarchical routing protocol, and through MATLAB simulation test, the performance of use of trust management technology to select cluster-head nodes for communication transmission is made.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Cuibo, Liao Xiandong, Lin Weiyang, Zhang Xu, Gou Xue-rong
{"title":"Feasibility Study for the LTE-Advanced System","authors":"Yu Cuibo, Liao Xiandong, Lin Weiyang, Zhang Xu, Gou Xue-rong","doi":"10.1109/AITS.2015.29","DOIUrl":"https://doi.org/10.1109/AITS.2015.29","url":null,"abstract":"DC (Dual Connectivity) and D2D (Device to Device) are two most promising methods to address huge traffic challenges in extreme dense network. In this paper, we investigate the researches and developments on DC and D2D in 3GPP (Third Generation Partnership Project). DC refers to the operation where some UE consumes radio resources provided by at least two different network points connected with non-ideal backhaul. We detail all the four deployment scenarios of DC, i.e., macro and small cells on the same carrier frequencies, macro and small cells on different carrier frequencies that can be split into two sub-scenarios, and only small cells on one or more carrier frequencies. Then we explain the reason why control plane and user plane architecture are designed in the status quo. As to D2D, we design a general procedure about its discovery and communication establishment. At last, we analyze the pros and cons after introducing these two technologies into the existing wireless cellular network.","PeriodicalId":196795,"journal":{"name":"2015 4th International Conference on Advanced Information Technology and Sensor Application (AITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}