Yang Qifan, Tang Hao, Zhao Xuebing, Li Yin, Zhang Sanfeng
{"title":"Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone Platform","authors":"Yang Qifan, Tang Hao, Zhao Xuebing, Li Yin, Zhang Sanfeng","doi":"10.1109/CSE.2014.273","DOIUrl":"https://doi.org/10.1109/CSE.2014.273","url":null,"abstract":"User experience of smart mobile devices can be improved in numerous scenarios with the assist of in-air gesture recognition. Most existing methods proposed by industry and academia are based on special sensors. On the contrary, a special sensor-independent in-air gesture recognition method named Dolphin is proposed in this paper which can be applied to off-the-shelf smart devices directly. The only sensors Dolphin needs are the loudspeaker and microphone embedded in the device. Dolphin emits a continuous 21 KHz tone by the loudspeaker and receive the gesture-reflecting ultrasonic wave by the microphone. The gesture performed is encoded into the reflected ultrasonic in the form of Doppler shift. By combining manual recognition and machine leaning methods, Dolphin extracts features from Doppler shift and recognizes a rich set of pre-defined gestures with high accuracy in real time. Parameter selection strategy and gesture recognition under several scenarios are discussed and evaluated in detail. Dolphin can be adapted to multiple devices and users by training using machine learning methods.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Segmentation Method for Broadcast Sports Video","authors":"Hao Sun, Jim X. Chen, H. Wechsler, Yongquan Jiang","doi":"10.1109/CSE.2014.328","DOIUrl":"https://doi.org/10.1109/CSE.2014.328","url":null,"abstract":"We introduce a novel method, named S-CRP (Segmentation based on distance dependent Chinese Restaurant Process), to segment broadcast sports videos into semantic shots. S-CRP employs distance dependent Chinese Restaurant Process (DCRP) using two segmentation criteria, namely appearance and time distances. It takes advantage of the customer (frame) assignments in DCRP and is able to reduce the negative effect of noisy frames without the use of domain knowledge and more sophisticated classifiers. In addition, we find that the conventional performance evaluation metrics are unable to reflect the quality of the segmentation properly. We introduced a new performance metric, namely Levenshtein distance Ratio, which gives a more accurate measure of how well the segmentation result can match the original video structure.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solutions for the Key Technologies of Cultural Transmission Platform under Wireless Networks","authors":"Chao Guo, Yinbo Liu, Xingang Liu","doi":"10.1109/CSE.2014.192","DOIUrl":"https://doi.org/10.1109/CSE.2014.192","url":null,"abstract":"The college students are outstanding contemporary youth, and the universities are source of various social trend of thought. It is a big challenge for the college educational workers to cultivate the college students of healthy, upward characters. However, the traditional teaching methods cannot meet the requirements and get an expected result. To solve these problems, a cultural transmission platform under wireless networks is developed in this paper. This platform combined the political and ideological education and wireless smart terminals, which can reduce the burden of college students and teachers. The system used Tomcat to be the website server, used web service to be the middle layer of communication between android and MySQL database and used B/S+C/S model to be the frame of communication and operation. The platform consisted of the mobile terminal which has the function of the news display, interactive, voting, a login/registration and the local server which do the data saving, information disposing and information exchanging. This system reduced the burden of the college students and teachers, which also broadened their horizons and improved the ability of the college's cultural transmission.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129798969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRA: A Real-Time CUDA-Based Resolution Adapter in Screen Recording Applications","authors":"Kang-Tso Wu, Shin-Hung Chang","doi":"10.1109/CSE.2014.211","DOIUrl":"https://doi.org/10.1109/CSE.2014.211","url":null,"abstract":"Recently, screen recording technology is widely used by lots of applications, such as remote control, distance learning, and distance conference etc. A problem, called Asymmetric Screen Resolution (ASR) in this paper, will occur in these applications. The ASR problem means that the resolution of a recording computer is different from that of a display computer. Different computer system will have different screen resolution and the ASR problem will result in screen recording resolution mismatch between the recording computer and display computer. This paper proposes a novel CRA algorithm to apply advantage of the CUDA parallel computing for adjusting the resolution on the Graphics Processing Unit (GPU). This algorithm effectively reduces CPU utilization and guarantees the display quality after adjusting resolution. Four different application scenarios, web browsing, text editing, slide presentation, and video playback are used to test the performance of our proposed CRA algorithm. These experiments measure CPU utilization and the PSNR of image adjusted by the CRA algorithm. The experimental results show that CRA algorithm effectively reduce CPU utilization 32%~40% while using whole screen in resolution adjustment. The CRA algorithm effectively reduces CPU utilization 0.1%~13% while using difference rectangle in resolution adjustment. On image quality measurements, the PSNR value is controlled between 25db~28db while using the CRA algorithm to adjust screen resolution from 1920×1080 to 1536×864. The PSNR value is controlled between 26db~34db by using the CRA algorithm to adjust screen resolution from 1920×1080 to 960×540. Using CRA algorithm presented in this paper will definitely get a good image quality, and effectively reduce CPU utilization.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alljoyn Based Direct Proximity Service Development: Overview and Prototype","authors":"Yufeng Wang, Li Wei, Qun Jin, Jianhua Ma","doi":"10.1109/CSE.2014.138","DOIUrl":"https://doi.org/10.1109/CSE.2014.138","url":null,"abstract":"Proximity awareness, the ability to actively (or passively) and continuously search for relevant value in one's physical proximity, is at the core of mobile revolution that is changing the way we interact with people and things around us. Especially, Device-to-Device (D2D) (peer-to-peer (P2P)) solutions support infrastructure-free and self-organized proximity services, and have great commercial potential from application viewpoint. However, astonishingly, the glaring absence of the practical and easy-to-use proximity service development framework is alarming. This paper aims at investigating the Qualcomm All Joyn middleware, an open source peer-to-peer software development framework for ad-hoc proximity based D2D communication, and exploring how this middleware can enable the development of distributed application in mobile social networks in proximity (MSNP). Specifically, we thoroughly overview the core concepts and basic components in All Joyn framework, and summarize the typical workflow of developing All Joyn based proximity application. Furthermore, an All Joyn based MSNP prototype, All Chat, is designed and implemented, in which users can enjoy text chat and photo sharing with both group and peer interaction modes in real time.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Credit-Based Allocation Method of Resource Quotas for Cloud Users","authors":"Jing Chen, Yinglong Wang, Bing Xue, Zhigang Zhao, Ying Guo","doi":"10.1109/CSE.2014.84","DOIUrl":"https://doi.org/10.1109/CSE.2014.84","url":null,"abstract":"Many studies have been conducted on resource allocation and scheduling methods. While these methods seldom give effective measures to prevent resource abuse. To some extent, the restriction of resource quota relieves the problem of resource abuse in regard to public cloud platform. The common allocation method mainly adopts a fixed resource quota to limit an user's resource usage for the user's first application. When the user requires more resources, he is asked to apply for a new resource quota again. Generally, the administrator of cloud platform simply checks his resource demand and gives him the requested quota. However, in some cases, an user can occupy the quota with low resource utilization in long time, and even he can lie to deceive more resource quota. These may lead a single user to exceedingly occupy resource quota, while other users cannot gain enough resource quota. The fairness in resource quota allocation is violated. To address this issue, we propose a credit-based allocation method of resource quotas for cloud users in this paper. The key idea is to first set up an user's credit factor according to the user's historical resource quota utilizations, and then allocate the user new resource quota based on it. We conduct three simulated experiments on our method. The experimental results show that our method imposes punitive allocation on malicious behaviours, such as occupying resource quota with low quota utilization in long time, deceiving more resource quota and etc. Besides, our method can also satisfy more users' resource quota demands with respect to limited resource. Compared with the existing common method, our method strengthens the fairness in resource quota allocation effectively.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Snapshot Backups in Cloud Virtual Disks","authors":"Po-Jen Chuang, Wei-Chin Wong","doi":"10.1109/CSE.2014.341","DOIUrl":"https://doi.org/10.1109/CSE.2014.341","url":null,"abstract":"This paper presents a new snapshot backup approach to solve the snapshot damage problem in snapshot rollback. The new approach adopts a fixed number of XOR operations to generate additional snapshot backups, uses the generated extra backups to repair damaged snapshots, and as a result maintains desirable system performance. Simulation results show that, when compared with previous snapshot approaches, our approach consumes only slightly more system resources -- due to involving the XOR operations, but is able to achieve more desirable snapshot rollback and overall system performance because the generated extra backups bring up the degrees of file recovery.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126933383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Weakness-Based Attack Pattern Modeling and Relational Analysis Method","authors":"Lili Lu, Song Huang, Zhengping Ren","doi":"10.1109/CSE.2014.203","DOIUrl":"https://doi.org/10.1109/CSE.2014.203","url":null,"abstract":"With growing popularity of online services, the amount of information on web increases dramatically, which has resulted in increasingly concerns on web application security. Subject knowledge is in desperate need to guide security testing against advanced attacks. Unlike common software security weakness study pattern, a combination analysis method based on Colored Petri Net is presented in this paper. An Attack Pattern is modeled to describe a single weakness's specific exploiting process. Then attack nets are constructed as a result of their relational analysis. The method is verified by a case study.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multiple Interfaces Routing System Embedded on FPGA","authors":"Zhihua Chen, Deshi Li","doi":"10.1109/CSE.2014.241","DOIUrl":"https://doi.org/10.1109/CSE.2014.241","url":null,"abstract":"To solve the problem of data forwarding between various types of interfaces, we design a multi-interface routing system based on FPGA for the heterogeneous network communication system. In order to deal with the problem of port address non-uniform, we propose a virtual IP address allocation method, and based on the method, we design a routing algorithm. The simulation results show that the algorithm have routing function between different ports. In addition, we test a case on FPGA, and our experimental results show that we achieve data forwarding between RS232, USB, and Ethernet port. It's proved that we realize a multi-interface routing mechanism which can work in a heterogeneous network communication system.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122540133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eye Detection for Gaze Tracker with Near Infrared Illuminator","authors":"Hyun-Cheol Kim, J. Cha, Won Don Lee","doi":"10.1109/CSE.2014.111","DOIUrl":"https://doi.org/10.1109/CSE.2014.111","url":null,"abstract":"In this paper, an eye detection method is proposed based on the features of eye images generated in the gaze tracking environment. By configuring the corneal specular reflection detector, pupil detector, and eyelid detector in a cascade format, in actual applications reliable eye detection can be achieved even when an image of only one eye is captured because a part of the user moves out of camera range or when changes occur in the brightness and focus because the user moves back and forth. For the corneal specular reflection detector, a block setting method and a thresholding method are proposed to ensure the corneal specular reflection is not missed. Furthermore, a method of suppressing the effects of eyelashes and corneal specular reflection is proposed that allows more accurate determination of the pupil in the pupil detection process. The eyelid detector determines the presence/absence of an eyelid by using a vertical integral projection function. The eyes were detected reliably when the proposed methods were applied to the captured images in an actual gaze tracking system.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126363516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}