{"title":"Infrared weak-small target image fusion based on contrast and wavelet transform","authors":"Kai Zhang, Jun Wan, Xiaozhu Wang, Xiaoshuang Jiao","doi":"10.1145/3373477.3373702","DOIUrl":"https://doi.org/10.1145/3373477.3373702","url":null,"abstract":"The image details and contour information cannot be fully reflected for the current infrared single-band data. It is difficult for the weak-small target to resist background interference after imaging, so that the image produces a lower signal to noise ratio. Therefore, it is necessary to use the texture difference of different band data to improve the signal-to-noise ratio of the image through the complementary fusion method. In this paper, based on weak-small targets in infrared images under different backgrounds, the paper proposes a fusion method based on contrast and wavelet transform. Firstly, the source images are denoised, and multiscale two-dimensional decomposition are performed to obtain low-frequency component and high-frequency component. On this basis, the high-frequency component adopt the method of maximizing absolute value, and the low-frequency component use the method of weighted averaging. Then the image is reconstructed. Finally, the reconstructed image is fused by gray contrast modulation. The fusion results are compared with many fusion algorithms. The experimental results show that the proposed algorithm can improve the intensity of weak-small targets and easily identify weak-small targets in the image. It solves the background interference problem of weak-small targets in the image.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122670013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE optimization of A/V streaming using Linux OS fine tuning","authors":"Kyaw Thet Han, Phyo Thandar Thant","doi":"10.1145/3373477.3373484","DOIUrl":"https://doi.org/10.1145/3373477.3373484","url":null,"abstract":"Default Linux operating system (OS) is not capable of handling large I/O workload that comes from A/V streaming. Linux OS runs on multiple devices ranging from embedded systems to supercomputers and it needs to be fine-tuned to the desired system or hardware setup. Sometimes, the fine-tuning process can be subtle. To ease the fine-tuning process to some extent, a method of fine-tuning the OS with multi-objective optimization is proposed to improve upon default configurations and get a good QoE from the optimized A/V streaming system. The proposed QoE optimization is conducted by automating the process of adjusting OS configurations and evaluating the adjusted parameters with A/V streaming simulated performance tests.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Zahari, Latha Nair Muralitharan, N. Izni, M. Malarvili
{"title":"Fusion of anthropometric measurement and multi parameter trends for cardiorespiratory fitness assessment","authors":"W. Zahari, Latha Nair Muralitharan, N. Izni, M. Malarvili","doi":"10.1145/3373477.3373692","DOIUrl":"https://doi.org/10.1145/3373477.3373692","url":null,"abstract":"Cardiorespiratory fitness (CRF) is widely accepted to have strong relationships with reduction of metabolic-related diseases such as cardiovascular diseases (CVD), obesity, hypertension, and type II diabetes. CRF also has been accepted to be assessed by measuring maximal oxygen consumption, VO2 max over the years as the gold standard. However, this method required a professional and sophisticated equipment. Hence, this study aimed to fuse several features from anthropometric measurement and multiparameter trends to allow for CRF assessment with minimal equipment and no requirement for a trained person. This study utilized WEKA for classifications of the features. A number of 31 UTM staff aged between 30--40 years old participated in this study with 17 female subjects and 14 male subjects. As a result, Naïve Bayes showed the best result with 80% accuracy and 90.9% sensitivity for the combination features of bone density (BD), muscle mass (MM), recovery heart rate (RHR), resting systolic blood pressure (RSBP). As for conclusion, CRF also can be assessed by using these combinations of features.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Zhu, Rongbin Gu, C. Pan, You-de Li, Bei Zhu, Jing Li
{"title":"CPU and network traffic anomaly detection method for cloud data center","authors":"Zheng Zhu, Rongbin Gu, C. Pan, You-de Li, Bei Zhu, Jing Li","doi":"10.1145/3373477.3373501","DOIUrl":"https://doi.org/10.1145/3373477.3373501","url":null,"abstract":"With the development of the cloud service market, the number of network security attacks on cloud data centers is gradually increasing. The existing anomaly detection methods are all aimed at the research of known attacks, and there is not much progress on the research of some unknown attacks and workload peaks of cloud platforms. In order to deal with the unknown attack of the cloud platform and distinguish the behavior after the attack from the peak load under normal work, this paper studies a cloud data center anomaly detection method for Distributed Denial of Service(DDoS) attacks. We built a virtual machine cluster on openstack, simulated DDoS attacks on virtual machines, collected CPU utilization and network traffic data before and after the attack, and performed anomaly detection and analysis through a single class classification algorithm and analysis of time window sequences. We evaluated the performance of this method through lab-based experiments and real-world cloud data center experiments.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetry semiquantum dialogue protocol","authors":"Minghui Zhang, Jiayao Wu, Jiayao Wang","doi":"10.1145/3373477.3373483","DOIUrl":"https://doi.org/10.1145/3373477.3373483","url":null,"abstract":"Asymmetry quantum dialogue (AQD) can achieve bidirectional communication between two communicants simultaneously in which both parties can transmit different amounts of message to each other. However, the traditional AQD protocol is available only under the condition that both parties have quantum communication capacities. In this paper, an asymmetry semiquantum dialogue (ASQD) protocol has been proposed. Different form the previous AQD protocols, the proposed ASQD protocol can realize the mutual transmission of secret messages between the classical party and quantum party. Therefore, the ASQD protocol can achieve asymmetry quantum dialogue with fewer quantum resources. Furthermore, the security analysis proves that the ASQD protocol is secure against information leakage problem and eavesdropper's active attacks.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software code analysis using ensemble learning techniques","authors":"Simran Aggarwal","doi":"10.1145/3373477.3373486","DOIUrl":"https://doi.org/10.1145/3373477.3373486","url":null,"abstract":"Ensuing the advent of advancements in software systems, the probability of them containing high severity defects is exponentially on the rise. With each technological addition, the complexity of software is increasing. Reproduction and rectification of a defect requires time and effort. Current state of the art analysis tools cater to the investigation of static aspects of a production level code. However, it is imperative to assess the dynamic development process of a system so as to be able to timely detect erroneous components early on in the development life cycle of a software. A novel automated defect prediction feature enhancement is proposed that analyses the static structure of the current code and state of the software in past releases to extract relevant static and dynamic feature sets. Data generated is modelled for defect trends in the future release of the software by four ensemble classifiers. Results demonstrate the superiority of Voting algorithm for the problem of defect prediction.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conceptual model of mobile disaster relief system combining social apps","authors":"Hsiu-Ju Chen","doi":"10.1145/3373477.3373481","DOIUrl":"https://doi.org/10.1145/3373477.3373481","url":null,"abstract":"Disaster relief tasks often compete with time. Mobile technology has enabled the response of location and the wireless operation of diverse applications to achieve interoperability among different ad hoc networks for instant disaster response. However, social apps are more commonly used for instant interpersonal interaction than disaster relief systems; they enable group or community communication with flexibility. In addition, the response of resources delivery increases the coordination of disaster relief resources deployment. With the frequent use of social apps, this study is therefore motivated to propose a conceptual framework of mobile disaster relief management system combining social apps to integrate disaster information, enhance information communication immediacy in disaster relief, and to confirm resources delivery. An initial use case diagram is provided. The results facilitate the following development of mobile disaster relief management system combining social apps to increase disaster relief coordination and efficiency.","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126808968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 1st International Conference on Advanced Information Science and System","authors":"","doi":"10.1145/3373477","DOIUrl":"https://doi.org/10.1145/3373477","url":null,"abstract":"","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126061942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}