2015 Federated Conference on Computer Science and Information Systems (FedCSIS)最新文献

筛选
英文 中文
Tagging fireworkers activities from body sensors under distribution drift 分布漂移下身体传感器对消防员活动的标记
M. Boullé
{"title":"Tagging fireworkers activities from body sensors under distribution drift","authors":"M. Boullé","doi":"10.15439/2015F423","DOIUrl":"https://doi.org/10.15439/2015F423","url":null,"abstract":"We describe our submission to the AAIA'15 Data Mining Competition, where the objective is to tag the activity of firefighters based on vital functions and movement sensor readings. Our solution exploits a selective naive Bayes classifier, with optimal preprocessing, variable selection and model averaging, together with an automatic variable construction method that builds many variables from time series records. The most challenging part of the challenge is that the input variables are not independent and identically distributed (i.i.d.) between the train and test datasets. We suggest a methodology to alleviate this problem, that enabled to get a final score of 0.76 (team marcb).","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116846449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Robotic arm detection in space with image recognition made in Linux with the Hough circles method 利用Hough圆法在Linux环境下进行图像识别的空间机械臂检测
R. Szabó, A. Gontean
{"title":"Robotic arm detection in space with image recognition made in Linux with the Hough circles method","authors":"R. Szabó, A. Gontean","doi":"10.15439/2015F10","DOIUrl":"https://doi.org/10.15439/2015F10","url":null,"abstract":"This paper presents a method to recognize a robotic arm in space using the Hough circles method. The robotic arm has colored bottle stoppers glued at the joints, which are recognized with color filtering. After this step, the biggest colored spot is detected and marked using the Hough circle method. The joints are numbered, this way each joint's position is known. The joints can be united with lines and this way a skeleton of the robotic arm can be drawn which can be loaded in a PC to create a control application.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123687718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new benchmark dataset for Multi-Skill Resource-Constrained Project Scheduling Problem 多技能资源约束项目调度问题的新基准数据集
P. Myszkowski, Marek Skowronski, Krzysztof Sikora
{"title":"A new benchmark dataset for Multi-Skill Resource-Constrained Project Scheduling Problem","authors":"P. Myszkowski, Marek Skowronski, Krzysztof Sikora","doi":"10.15439/2015F273","DOIUrl":"https://doi.org/10.15439/2015F273","url":null,"abstract":"In this paper novel project scheduling difficulty estimations are proposed for Multi-Skill Resource-Constrained Project Scheduling Problem (MS-RCPSP). The main goal of introducing the complexity estimations is an attempt of estimation the project complexity before launching the optimization process. What is more, the dataset instance generator is also presented as a tool to create new instances for extending the research area. Furthermore, the dataset proposed in previous works is extended by new instances, described thoroughly and released as a benchmark dataset. The dataset instances are also scheduled using simple heuristic and greedy algorithm in duration- and cost- oriented optimization modes. Finally, a brief summary of investigated methods and potential further research directions is presented.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Spatial information in classification of activity videos 活动视频分类中的空间信息
Shreeya Sengupta, Hui Wang, William Blackburn, P. Ojha
{"title":"Spatial information in classification of activity videos","authors":"Shreeya Sengupta, Hui Wang, William Blackburn, P. Ojha","doi":"10.15439/2015F382","DOIUrl":"https://doi.org/10.15439/2015F382","url":null,"abstract":"Spatial information describes the relative spatial position of an object in a video. Such information may aid several video analysis tasks such as object, scene, event and activity recognition. This paper studies the effect of spatial information on video activity recognition. The paper firstly performs activity recognition on KTH and Weizmann videos using Hidden Markov Model and k-Nearest Neighbour classifiers trained on Histogram Of Oriented Optical Flows feature. Histogram of Oriented Optical Flows feature is based on optical flow vectors and ignores any spatial information present in a video. Further, in this paper, a new feature set, referred to as Regional Motion Vectors is proposed. This feature like Histogram of Oriented Optical Flow is derived from optical flow vectors; however, unlike Histogram of Oriented Optical Flows preserves any spatial information in a video. Activity recognition was again performed using the two classifiers, this time trained on Regional Motion Vectors feature. Results show that when Regional Motion Vectors is used as the feature set on the KTH dataset, there is a significant improvement in the performance of k-Nearest Neighbour. When Regional Motion Vector is used on the Weizmann dataset, performances of the k-Nearest Neighbour improves significantly for some of the cases and for the other cases, the performance is comparable to when oriented optical flows is used as a feature set. Slight improvement is achieved by Hidden Markov Model on both the datasets. As Histogram of Oriented Optical Flows ignores spatial information and Regional Motion Vectors preserves it, the increase in the performance of the classifiers on using Reginal Motion Vectors instead of Histogram of Oriented Optical Flows illustrates the importance of spatial information in video activity recognition.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A generic framework to support participatory surveillance through crowdsensing 通过群体感知支持参与性监测的通用框架
A. Malatras, Laurent Beslay
{"title":"A generic framework to support participatory surveillance through crowdsensing","authors":"A. Malatras, Laurent Beslay","doi":"10.15439/2015F359","DOIUrl":"https://doi.org/10.15439/2015F359","url":null,"abstract":"Harnessing the power and popularity of participatory or opportunistic sensing for the purpose of providing added value security and surveillance services is a promising research direction. However, challenges such as increased privacy concerns, as well as technological issues related to the reliable processing and meaningful analysis of the collected data, hinder the widespread deployment of participatory surveillance applications. We present here our work on addressing some of the aforementioned concerns through our related participatory application that focuses on crisis management and in particular buildings' evacuation. We discuss the technical aspects of our work, the viability and practicality of which is validated by means of a real experiment comprising 14 users in the context of an emergency evacuation exercise.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
TRACO: An automatic loop nest parallelizer for numerical applications 用于数值应用的自动循环嵌套并行化器
M. Pałkowski, T. Klimek, W. Bielecki
{"title":"TRACO: An automatic loop nest parallelizer for numerical applications","authors":"M. Pałkowski, T. Klimek, W. Bielecki","doi":"10.15439/2015F34","DOIUrl":"https://doi.org/10.15439/2015F34","url":null,"abstract":"We present the source-to-source TRACO compiler allowing for increasing program locality and parallelizing arbitrarily nested loop sequences in numerical applications. Algorithms for generation of tiled code and extracting synchronization-free slices composed of tiles are presented. Parallelism of arbitrary nested loops is obtained by creating a kernel of computations represented in the OpenMP standard to be executed independently on many CPUs. We consider benchmarks, typical from compute-intensive sequences of algebra operations or numerical computation from industry and engineering. The speed-up of programs generated by TRACO are discussed. Related compilers and techniques are considered. Future work is outlined.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust security mechanism for marine Wireless Sensor Networks 船舶无线传感器网络信任安全机制
Walid Elgenaidi, T. Newe
{"title":"Trust security mechanism for marine Wireless Sensor Networks","authors":"Walid Elgenaidi, T. Newe","doi":"10.15439/2015F169","DOIUrl":"https://doi.org/10.15439/2015F169","url":null,"abstract":"To provide a strong security service in Wireless Sensor Networks (WSNs), cryptographic mechanisms are required. Generally these security mechanisms demand intensive use of limited resource, such as memory, and energy to provide a defense against attacks. Monitoring the behavior of nodes and detecting risks according to these behaviors, and then taking decisions based on these measurements generally requires the use of a trusted Key Management scheme. In this paper we compare two existing security key management schemes that were designed for use in mobile ad hoc networks: “An overlay approach to data security in ad-hoc networks” authored by Jorg Liebeherr, Guangyu Dong, and “A hierarchical key management scheme for secure group communications in mobile ad hoc networks” authored by Nen-Chung Wang, Shian-Zhang Fang. Then a Hybrid Security Key Management Mechanism designed for use in the marine environment is proposed. This scheme focuses on reducing the memory storage of keys, using a leader node that is responsible for both the node joining and the node revoke processes. This security mechanism is implementing in real time on the Waspmote sensor platform.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Influence of on-device measurement analysis on energy efficiency in Machine-to-Machine systems 设备上测量分析对机对机系统能效的影响
Pavle Skocir, M. Kusek, G. Jezic
{"title":"Influence of on-device measurement analysis on energy efficiency in Machine-to-Machine systems","authors":"Pavle Skocir, M. Kusek, G. Jezic","doi":"10.15439/2015F306","DOIUrl":"https://doi.org/10.15439/2015F306","url":null,"abstract":"Machine-to-Machine Communication (M2M) enables communication between heterogeneous devices without human intervention. It is considered to be a key enabler technology for the concept of Internet of Things (IoT) and Cyber Physical Systems (CPS). With M2M's integration with Wireless Sensor Networks (WSN), information from different kinds sensors can be obtained. In order to discover useful knowledge from sensor data, various data mining techniques need to be applied. Due to the development of microprocessors on end devices in M2M system which collect data from sensors, data processing can also be executed on those devices. However, since end devices are often battery powered, energy consumption when running those algorithms needs to be taken into account. In this paper we implement an algorithm in M2M system, on Libelium Waspmote devices, which detects temperature plummeting in an indoor space. Afterwards, energy consumption of Waspmote devices is analyzed for two cases: when algorithm is executed on-device and when algorithm is executed on gateway or on back-end system.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature model driven generation of software artifacts 特性模型驱动软件工件的生成
Roman Taborsky, V. Vranić
{"title":"Feature model driven generation of software artifacts","authors":"Roman Taborsky, V. Vranić","doi":"10.15439/2015F364","DOIUrl":"https://doi.org/10.15439/2015F364","url":null,"abstract":"The objective of feature modeling is to foster software reuse by enabling to explicitly and abstractly express commonality and variability in the domain. Feature modeling alone is not sufficient to express all the aspects of the software being developed. Other models and, eventually, code is necessary. These software assets are being configured by the feature model based on the selection of variable features. However, selecting a feature is far from a naive component based approach where feature inclusion would simply mean including the corresponding component. More often than not, feature inclusion affects several places in models or code to be configured requiring their nontrivial adaptation. Feature inclusion recalls transformation and this is at heart of the approach to feature model driven generation of software artifacts proposed in this paper. Features are viewed as solution space transformations that may be executed during the generative process conducted by the feature model configuration.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Run-time UI adaptation in the context of the Device-Independent Architecture 在与设备无关的体系结构上下文中的运行时UI适配
J. Chmielewski
{"title":"Run-time UI adaptation in the context of the Device-Independent Architecture","authors":"J. Chmielewski","doi":"10.15439/2015F259","DOIUrl":"https://doi.org/10.15439/2015F259","url":null,"abstract":"The increasing diversity of end-devices used by users to access their applications and systems strengthens the need for device-independent methods for implementing these applications. The Device-Independent Architecture (DIA) is one of the available approaches to this problem, but it does not directly address the issue of user interface (UI) device-independency. This issue can be addressed by real-time UI adaptation, but it is not clear whether the DIA architecture requires new UI adaptation methods or may use existing ones. This paper presents results of our analysis of this issue. Through theoretical model-based analysis of UI adaptation in various application architectures and through case studies of practical UI adaptation solutions we came up with a conclusion that the DIA-based systems may use existing real-time UI adaptation methods. Although, they have to be used with a different set of optimization criteria.","PeriodicalId":276884,"journal":{"name":"2015 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"31 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信