Proceedings of the 2018 VII International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
Application of Kinect-based Motion Recognition Algorithm in Cultural Tourism 基于运动学的运动识别算法在文化旅游中的应用
Jinghua Yu, Qing Wang, Hong Chen
{"title":"Application of Kinect-based Motion Recognition Algorithm in Cultural Tourism","authors":"Jinghua Yu, Qing Wang, Hong Chen","doi":"10.1145/3301326.3301377","DOIUrl":"https://doi.org/10.1145/3301326.3301377","url":null,"abstract":"With the improvement of people's living standards, cultural tourism has become one of the main ways for people to enjoy daily entertainment. In order to enrich the digital entertainment experience in the process of cultural tourism and promote traditional cultural communication in a novel and interesting way, we studied the human motion recognition algorithm based on the global body part features and the joint space local constraint features based on the bone data obtained by Kinect,. We designed a pose simulation game with the theme of Dunhuang mural culture in China, and developed a somatosensory interactive machine hardware facility for convenient experience. This game has fully played the role of digital somatosensory interactive experience. Users can fully mobilize the subjective initiative of the body in the process of participation, and get close to traditional culture, providing a new experience mode for cultural tourism activities.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on Classification of Traffic Accident Injury Grade Using CNN and NASS-CDS Data 基于CNN和NASS-CDS数据的交通事故伤害等级分类研究
H. Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim
{"title":"A Study on Classification of Traffic Accident Injury Grade Using CNN and NASS-CDS Data","authors":"H. Song, Yongbeom Lee, Seongkeun Park, Hyeonseok Kim, Eungi Cho, Mingyu Park, Seung-Woo Kim","doi":"10.1145/3301326.3301378","DOIUrl":"https://doi.org/10.1145/3301326.3301378","url":null,"abstract":"In this paper, we propose a new occupant injury prediction algorithm using real car accident data base, NASS-CDS DB. Field crash data which are collected by IIHS is used as input of convolutional neural network to estimate occupant injury. And in order to applying CNN, we are encoding crash information data as two dimensional image. Our experiment results can be shown the validity of our proposed algorithm.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Design Review Method for Functional Safety of Automotive Electrical Systems 汽车电气系统功能安全设计评审新方法
Chih-Chung Chiu, Kuo-Sui Lin
{"title":"A New Design Review Method for Functional Safety of Automotive Electrical Systems","authors":"Chih-Chung Chiu, Kuo-Sui Lin","doi":"10.1145/3301326.3301341","DOIUrl":"https://doi.org/10.1145/3301326.3301341","url":null,"abstract":"For an automotive electrical system design review, FMEA can be used to exam what would happen when any wire in the circuit goes open circuit, shorts to ground or shorts to battery, or when any components fail in expected ways. However, traditional FMEA method has some inherent disadvantages as criticized by many researchers. Besides, it is less expensive and far more effective to build in functional safety early in the design stage than try to tack it in the later implementation or operation stage. Thus the main purpose of this study was to propose a new design review method to link DRBFM with vague set based FMEA for recovering traditional FMEA's inherent problems, helping to evaluate, prioritize and prevent automotive electrical systems' failure modes caused by design change. In the first stage, a DRBFM was taken to identify failure modes and capture their causes and effects information needed for subsequent FMEA scoring process. In the second stage, a vague set based FMEA provided a quantitative analysis method to quantify the design discussion and review procedure under uncertain and vague environment. Obtained the quantitative data, a pattern recognition procedure for recognizing action priorities of failure modes was conducted in the third stage. Finally, a numerical example was conducted to demonstrate that the proposed design review method is effective and efficient for continuous improvement of failure modes due to design change of automotive electrical systems.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129489162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity DRDLC:利用潜在狄利克雷分配和余弦相似度发现相关文档
R. Ramya, T. Ganeshsingh, D. Sejal, K. Venugopal, S. S. Iyengar, L. Patnaik
{"title":"DRDLC: Discovering Relevant Documents Using Latent Dirichlet Allocation and Cosine Similarity","authors":"R. Ramya, T. Ganeshsingh, D. Sejal, K. Venugopal, S. S. Iyengar, L. Patnaik","doi":"10.1145/3301326.3301342","DOIUrl":"https://doi.org/10.1145/3301326.3301342","url":null,"abstract":"In recent years, the availability of digital documents over web is increased drastically and there is a need for effective methods to retrieve and organize the digital documents. Since data is dispersed globally and is unorganized, it is a challenging task to develop an effective methods that can generate high quality features in these documents. It is necessary to reduce the gap between users search intention and the retrieved results known as semantic gap. In this paper, Discovering Relevant Documents using Latent Dirichlet Allocation and Cosine Similarity (DRDLC) is proposed. Word similarity is computed using CS Cosine Similarity present in search results documents. LDA is applied on extracted patterns and documents. Hashing is used to extract high relevant documents efficiently. Further, term synonyms are identified using word net and the documents are re-ranked. Experiments using the model Relevance Feature Discovery (RFD) on Reuters Corpus Volume-1 (RCV-1) show that the proposed DRDLC framework results in improved performance by providing more relevant documents to the user input query.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions 密钥派生函数时边信道攻击的随机时序分析
Wen Wen Koh, Chuah Chai Wen
{"title":"On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions","authors":"Wen Wen Koh, Chuah Chai Wen","doi":"10.1145/3301326.3301332","DOIUrl":"https://doi.org/10.1145/3301326.3301332","url":null,"abstract":"A timing attack is an example of a side channel attack which relies on the leaking timing information from the implementation of a cryptosystem. The different type of cryptographic primitives used to construct the key derivation functions has resulted in timing variation which enables the adversary to perform timing attack on key derivation functions. Based on the paper published by Chuah and Koh, the software implementation of key derivation functions using hash functions, stream ciphers and block cipher as the cryptographic primitives are vulnerable to the timing attack. This kind of attack can be mitigated via masks the actual timing information using randomness timing solution. The randomness timing solution is based on the concept of \"random for loop\". This paper shows the outcome of experiments on implementing the randomness timing delay on key derivation functions based on three type of cryptographic primitives. The experiment's result indicated that the countermeasure propose is secure against timing side channel attack on key derivation functions proposals.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 2018 VII International Conference on Network, Communication and Computing 2018第七届网络、通信与计算国际会议论文集
{"title":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","authors":"","doi":"10.1145/3301326","DOIUrl":"https://doi.org/10.1145/3301326","url":null,"abstract":"","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信