{"title":"Application of Kinect-based Motion Recognition Algorithm in Cultural Tourism","authors":"Jinghua Yu, Qing Wang, Hong Chen","doi":"10.1145/3301326.3301377","DOIUrl":"https://doi.org/10.1145/3301326.3301377","url":null,"abstract":"With the improvement of people's living standards, cultural tourism has become one of the main ways for people to enjoy daily entertainment. In order to enrich the digital entertainment experience in the process of cultural tourism and promote traditional cultural communication in a novel and interesting way, we studied the human motion recognition algorithm based on the global body part features and the joint space local constraint features based on the bone data obtained by Kinect,. We designed a pose simulation game with the theme of Dunhuang mural culture in China, and developed a somatosensory interactive machine hardware facility for convenient experience. This game has fully played the role of digital somatosensory interactive experience. Users can fully mobilize the subjective initiative of the body in the process of participation, and get close to traditional culture, providing a new experience mode for cultural tourism activities.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim
{"title":"A Study on Classification of Traffic Accident Injury Grade Using CNN and NASS-CDS Data","authors":"H. Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim","doi":"10.1145/3301326.3301378","DOIUrl":"https://doi.org/10.1145/3301326.3301378","url":null,"abstract":"In this paper, we propose a new occupant injury prediction algorithm using real car accident data base, NASS-CDS DB. Field crash data which are collected by IIHS is used as input of convolutional neural network to estimate occupant injury. And in order to applying CNN, we are encoding crash information data as two dimensional image. Our experiment results can be shown the validity of our proposed algorithm.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Design Review Method for Functional Safety of Automotive Electrical Systems","authors":"Chih-Chung Chiu, Kuo-Sui Lin","doi":"10.1145/3301326.3301341","DOIUrl":"https://doi.org/10.1145/3301326.3301341","url":null,"abstract":"For an automotive electrical system design review, FMEA can be used to exam what would happen when any wire in the circuit goes open circuit, shorts to ground or shorts to battery, or when any components fail in expected ways. However, traditional FMEA method has some inherent disadvantages as criticized by many researchers. Besides, it is less expensive and far more effective to build in functional safety early in the design stage than try to tack it in the later implementation or operation stage. Thus the main purpose of this study was to propose a new design review method to link DRBFM with vague set based FMEA for recovering traditional FMEA's inherent problems, helping to evaluate, prioritize and prevent automotive electrical systems' failure modes caused by design change. In the first stage, a DRBFM was taken to identify failure modes and capture their causes and effects information needed for subsequent FMEA scoring process. In the second stage, a vague set based FMEA provided a quantitative analysis method to quantify the design discussion and review procedure under uncertain and vague environment. Obtained the quantitative data, a pattern recognition procedure for recognizing action priorities of failure modes was conducted in the third stage. Finally, a numerical example was conducted to demonstrate that the proposed design review method is effective and efficient for continuous improvement of failure modes due to design change of automotive electrical systems.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129489162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ramya, T. Ganeshsingh, D. Sejal, K. Venugopal, S. S. Iyengar, L. Patnaik
{"title":"DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity","authors":"R. Ramya, T. Ganeshsingh, D. Sejal, K. Venugopal, S. S. Iyengar, L. Patnaik","doi":"10.1145/3301326.3301342","DOIUrl":"https://doi.org/10.1145/3301326.3301342","url":null,"abstract":"In recent years, the availability of digital documents over web is increased drastically and there is a need for effective methods to retrieve and organize the digital documents. Since data is dispersed globally and is unorganized, it is a challenging task to develop an effective methods that can generate high quality features in these documents. It is necessary to reduce the gap between users search intention and the retrieved results known as semantic gap. In this paper, Discovering Relevant Documents using Latent Dirichlet Allocation and Cosine Similarity (DRDLC) is proposed. Word similarity is computed using CS Cosine Similarity present in search results documents. LDA is applied on extracted patterns and documents. Hashing is used to extract high relevant documents efficiently. Further, term synonyms are identified using word net and the documents are re-ranked. Experiments using the model Relevance Feature Discovery (RFD) on Reuters Corpus Volume-1 (RCV-1) show that the proposed DRDLC framework results in improved performance by providing more relevant documents to the user input query.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions","authors":"Wen Wen Koh, Chuah Chai Wen","doi":"10.1145/3301326.3301332","DOIUrl":"https://doi.org/10.1145/3301326.3301332","url":null,"abstract":"A timing attack is an example of a side channel attack which relies on the leaking timing information from the implementation of a cryptosystem. The different type of cryptographic primitives used to construct the key derivation functions has resulted in timing variation which enables the adversary to perform timing attack on key derivation functions. Based on the paper published by Chuah and Koh, the software implementation of key derivation functions using hash functions, stream ciphers and block cipher as the cryptographic primitives are vulnerable to the timing attack. This kind of attack can be mitigated via masks the actual timing information using randomness timing solution. The randomness timing solution is based on the concept of \"random for loop\". This paper shows the outcome of experiments on implementing the randomness timing delay on key derivation functions based on three type of cryptographic primitives. The experiment's result indicated that the countermeasure propose is secure against timing side channel attack on key derivation functions proposals.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","authors":"","doi":"10.1145/3301326","DOIUrl":"https://doi.org/10.1145/3301326","url":null,"abstract":"","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}