Proceedings of the 2018 VII International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
Applying QFD Method to Develop Ceramic Products by Two Artists: A Case of Art Tiles 应用QFD方法开发两位艺术家的陶瓷产品:以艺术瓷砖为例
J. Lee, Shuo-fang Liu
{"title":"Applying QFD Method to Develop Ceramic Products by Two Artists: A Case of Art Tiles","authors":"J. Lee, Shuo-fang Liu","doi":"10.1145/3301326.3301344","DOIUrl":"https://doi.org/10.1145/3301326.3301344","url":null,"abstract":"Purpose: The \"Joint-Art Products\" is a combination works of two artists idea. Via the QFD method, we use a digitization way to score idea and emotion. This is a discovery step in product innovation management. Design/methodology/approach: We used the vocabulary image method to analyze the works' characteristics. We used the 500 adjectives to match the description of the works. First, we invited the artist to provide their works as a sample. Then we used semantic analysis method to analyze his works. From the semantic to the new pictures, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other ideas, especially the possibility of their works. At last, we put the new pictures on the position map to see how the skills, elements and colors affected how each painting had. As a reference, we expected this study to promote the required study staff and artists to improve their work. In order to avoid too many vocabulary words causing the analysis to fail, we selected the adjectives with the following subjects: 1) style elements, 2) joining relationships, 3) detail treatments, 4) materials, 5) color treatments and 6) textures. There are six projects to select and place in each system project. We used the case study method to analyze the artists who have worked in the art field for more than fifteen years and often held exhibitions because the artists had considerable artistic experience. Findings: From the semantic to the production processes, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other people's ideas, especially the designer and producer. Originality/value: As a reference, this study was expected to promote the required study staff to improve their products. The application of the proposed model is shown in the design industry.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Mango Detection using Image Processing and HOG-SVM 基于图像处理和HOG-SVM的芒果自动检测
Maria Jeseca C. Baculo, N. Marcos
{"title":"Automatic Mango Detection using Image Processing and HOG-SVM","authors":"Maria Jeseca C. Baculo, N. Marcos","doi":"10.1145/3301326.3301358","DOIUrl":"https://doi.org/10.1145/3301326.3301358","url":null,"abstract":"Mango is an agricultural produce with high export value as it is being consumed internationally. To ensure its production yield, the manual handling and classification tasks should be performed with precision and care by local farmers. Image processing and machine learning has improved the way classification, defect detection, and yield approximation are handled. Detection is considered as an initial step prior to performing these tasks. This paper presents an automatic mango detector by combining a Support Vector Machine (SVM) classifier trained with Histogram of Oriented Gradients (HOG) features and image segmentation. The image segmentation performed on both HSV and RGB color spaces using image processing techniques achieved a mean IoU of 0.7938. A HOG-SVM based classifier was trained and achieved an F-score of 89.38%. Results show that combining segmentation with HOG-SVM can detect and localize healthy and defective mango images with different background color and illumination.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Edge Computing-Based Deep Learning Object Detection 基于边缘计算的深度学习目标检测性能评价
Chuan-Wen Chen, S. Ruan, Chang-Hong Lin, Chun-Chi Hung
{"title":"Performance Evaluation of Edge Computing-Based Deep Learning Object Detection","authors":"Chuan-Wen Chen, S. Ruan, Chang-Hong Lin, Chun-Chi Hung","doi":"10.1145/3301326.3301369","DOIUrl":"https://doi.org/10.1145/3301326.3301369","url":null,"abstract":"This article presents a method for implementing the deep learning object detection based on a low-cost edge computing IoT device. The limit of the hardware is a challenge for working the pre-trained neural network model on a low-cost IoT device. Hence, we utilize the Neural Compute Stick (NCS) to accelerate the neural network model on a low-cost IoT device by its high efficiency floating-point operation. With the NCS, the low-cost IoT device can successfully work the pre-trained neural network model and become an edge computing device. The experimental results show the proposed method can effectively detect the objects based on deep learning on an edge computing IoT device. Furthermore, the objective experiment demonstrates the proposed method can immediately infer the neural network model for images in average 1.7 seconds with only one of the NCS and the neural network model can reach average 9.2 fps for the video sequences with four NCSs acceleration. In addition, the discrepancy of the neural network model between the edge device and the edge server is less than 2% mean average precision (mAP).","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Application Cluster Architecture for the New Computing Environment 面向新计算环境的应用集群体系结构研究
Xie Yang, Zhou Xiaolu, Li Gongliang, Tao Yi-zheng
{"title":"Research on the Application Cluster Architecture for the New Computing Environment","authors":"Xie Yang, Zhou Xiaolu, Li Gongliang, Tao Yi-zheng","doi":"10.1145/3301326.3301351","DOIUrl":"https://doi.org/10.1145/3301326.3301351","url":null,"abstract":"Driven by the 'nuclear high base' project, the autonomous new key software and hardware technology has made great breakthroughs. After adaptation, testing and evaluation, there are already some basic software and hardware computing environments with high availability, but the performance and reliability are far from the traditional computing environments. In order to make the application system effective and reliable in the autonomic controllable computing environment, this paper studies the application cluster architecture in the autonomic controllable computing environment, and proposes a cluster architecture that can extend the application nodes on demand. It breaks through the key technical issues of session sharing, transaction processing, task execution and service distribution involved in the architecture, realizes the load balancing of user requests, improves the overall response speed of the application, and users can access the application as long as any application service is not down, thus improving the overall reliability of the application. After the cluster validation of the electronic conference system, the performance and reliability of the system are improved obviously, and the application service nodes can be extended freely according to the number of users and handling capacity.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123845594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Image-ELM-Based Chip Classification Algorithm 一种基于图像elm的高效芯片分类算法
Xinman Zhang, Jiayu Zhang, Xuebin Xu
{"title":"An Efficient Image-ELM-Based Chip Classification Algorithm","authors":"Xinman Zhang, Jiayu Zhang, Xuebin Xu","doi":"10.1145/3301326.3301381","DOIUrl":"https://doi.org/10.1145/3301326.3301381","url":null,"abstract":"The algorithm of classification is one of the important problems to be solved in the field of chip manufacturing, which has a great impact on the efficiency of process such as subsequent chip packaging. According to the requirement of intelligent control of chip production system, chip classification algorithm based on extreme learning machine (ELM) is studied. In this paper, we use image edge gradient information as feature vector and use ELM to classify the chip. In order to improve the speed of the algorithm, we use image pyramid to down-sample the image first. The final experimental results show that, in small-scale testing, our algorithm can achieve 100% accuracy and it is insensitive to illumination changes. When the image rotates, our method can achieve more than 93.3% accuracy.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiobjective Trajectory Planning of a 6D Robot based on Multiobjective Meta Heuristic Search 基于多目标元启发式搜索的6D机器人多目标轨迹规划
N. Pholdee, Sujin Bureerat
{"title":"Multiobjective Trajectory Planning of a 6D Robot based on Multiobjective Meta Heuristic Search","authors":"N. Pholdee, Sujin Bureerat","doi":"10.1145/3301326.3301356","DOIUrl":"https://doi.org/10.1145/3301326.3301356","url":null,"abstract":"In this work, several established multiobjective meta-heuristics (MOMHs) were employed for solving multiobjective time-jerk robot trajectory planning. The optimisation problem is posed to minimise travelling time and jerk subject to velocity, acceleration and jerk constraints. The design variables include joint position and velocity at intermediate positions (passing position), and moving time from the initial position to the intermediate position and from the intermediate position to the final position. Several MOMHs are used to solve the trajectory multiobjective optimisation problem of robot manipulators while their performances are investigated. Based on this study, the best MOMH for multiobjective time-jerk robot trajectory planning is found while the results obtained from such a method are set as the baseline for further study of robot trajectory planning multiobjective optimisation.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Random Number Generator Based on Electronic Noise and the Xorshift Algorithm 一种基于电子噪声和Xorshift算法的随机数发生器
Mandana Ewert
{"title":"A Random Number Generator Based on Electronic Noise and the Xorshift Algorithm","authors":"Mandana Ewert","doi":"10.1145/3301326.3301359","DOIUrl":"https://doi.org/10.1145/3301326.3301359","url":null,"abstract":"This paper introduces a random number generator (RNG) based on the avalanche noise of two diodes. A true random number generator (TRNG) generates true random numbers with the use of the electronic noise produced by two avalanche diodes. The amplified outputs of the diodes are sampled and digitized. The difference between the two concurrently sampled and digitized outputs is calculated and used to select a seed and to drive a pseudo-random number generator (PRNG). The PRNG is an xorshift generator that generates 1024 bits in each cycle. Every sequence of 1024 bits is moderately modified and output. The TRNG delivers the next seed and the next cycle begins. The statistical behavior of the generator is analyzed and presented.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of IPsec VPN with SIP Softphones using GNS3 利用GNS3实现SIP软电话IPsec VPN
A. Sushma, T. Sanguankotchakorn
{"title":"Implementation of IPsec VPN with SIP Softphones using GNS3","authors":"A. Sushma, T. Sanguankotchakorn","doi":"10.1145/3301326.3301333","DOIUrl":"https://doi.org/10.1145/3301326.3301333","url":null,"abstract":"Over the past decades, Session Initiation Protocol (SIP) has achieved much attention regarding Voice over IP services(VOIP) when comparing with various protocols like H.323 or MGCP. SIP is the special protocol for present and future IP telephony services which is turning as real challenger for traditional telephony services. Due to its open architecture, the available services are vulnerable to various kinds of security threats like presently live on the Internet. Hence, there is a need to provide security to SIP based VOIP implementations, especially, a remotely secure communication using Virtual Private Networks (VPN). In this paper, we discuss about site-to-site IPsec VPN which communicate in the intra-nets. The implementation of IPsec VPN is done with security protocols for exchanging key management, authentication and integrity using Graphical Network Simulator 3 (GNS3). The encryption of data packets when information is transferred between different sites is tested and verified using tools like Ping, IPerf and Wireshark. The performance in terms of delay, bandwidth consumption, jitter and the data rate of the proposed method with and without Firewalls is analyzed. It is obvious that our proposed method can provide the security and prohibit the attackers to attack the network.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection and Localization of the Copy-paste in Digital Cartoon 数字漫画中复制粘贴的检测与定位
Wenjia Ding, Yi Xie, Yulin Wang
{"title":"Detection and Localization of the Copy-paste in Digital Cartoon","authors":"Wenjia Ding, Yi Xie, Yulin Wang","doi":"10.1145/3301326.3307410","DOIUrl":"https://doi.org/10.1145/3301326.3307410","url":null,"abstract":"The application of digital images is becoming more and more widespread, at the same time, image tampering cannot be ignored. Copy-paste tampering usually refers to the original part of the image copied and pasted to other parts of the image, thus hiding the original information and even directly tampering with the original image. In this paper, focusing on the less researched digital comics, we present a new detection and positioning method on tampering, which improves the efficiency of operation and reduce the missed detection while ensuring the accuracy of detection. This method first blocks the image and then extracts the appropriate eigenvalues from blocks. The experimental results show that the proposed method can effectively detect and locate the copy-paste tamper area in digital comics. The error detection rate is low and the calculation speed is fast.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"20 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127062082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Regression for Image Alignment via Subspace Recovery Techniques 基于子空间恢复技术的鲁棒回归图像对齐
H. T. Likassa, Wen-Hsien Fang
{"title":"Robust Regression for Image Alignment via Subspace Recovery Techniques","authors":"H. T. Likassa, Wen-Hsien Fang","doi":"10.1145/3301326.3301385","DOIUrl":"https://doi.org/10.1145/3301326.3301385","url":null,"abstract":"We present a novel method for joint head pose estimation and face alignment via subspace recovery techniques by incorporating an affine transformation. The new algorithm seeks a set of optimal affine transformations to fix the geometric distortions and deal with a variety of adverse effects such as illumination and occlusions, outliers and heavy sparse noises. Our method is also formulated as a convex optimization problem which can be solved by using an augmented Lagrangian multiplier and takes the advantages of Jacobean transformation matrix in transforming the corrupted images. The convergence analysis is shown to prove the effectiveness of the proposed approach. Conducted simulations justify the superiority and effectiveness of the proposed approach as compared with the main state-of-the-art works.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信