Xiaotao Yang, Yingyou Wen, Mingyang Zhang, Hong Zhao
{"title":"3D visual correlation model for wireless visual sensor networks","authors":"Xiaotao Yang, Yingyou Wen, Mingyang Zhang, Hong Zhao","doi":"10.1109/ICIS.2017.7959972","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959972","url":null,"abstract":"Wireless visual sensor networks comprise a large number of camera-equipped sensor devices and obtain visual information from field of interest. In a Wireless visual sensor network, there exist visual correlation characteristics among images observed by cameras with overlapped field of views. To describe those characteristics, the conventional method is based on image processing. However, it is too complex to be applied to cameras in resource-constrained wireless visual sensor networks. In this paper, based on 3D sensing model and coordinate transformation theory, a novel 3D visual correlation model is designed to exploit the correlation characteristics among cameras for spatial wireless visual sensor networks. The designed model, of which a visual correlation function was proposed, and then a 3D visual correlation coefficient algorithm is derived. Experimental results demonstrated that the designed model can accurately model the visual correlation characteristics and the proposed 3D visual correlation coefficient algorithm outperforms the state-of-the-art algorithms.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"36 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of recommendation system of micro video's topic","authors":"Dongdong Jiang, Wenqian Shang","doi":"10.1109/ICIS.2017.7960040","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960040","url":null,"abstract":"With the development of Internet technology and the arrival of the era of big data, it is necessary to analyze and excavate the micro video data. It can help micro video creators to create better to analysis micro video data. This paper mainly introduces the structure design, key technical points and specific implementation steps of the micro video topic recommendation system.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm study under big data environment of personalized recommendation based on user interest model","authors":"Guo Qingju, Ji Wen-tian, Zhou Renyun","doi":"10.1109/ICIS.2017.7959988","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959988","url":null,"abstract":"Based on core problems of personalized recommendation, traditional collaborative filtering recommendation algorithm and theories of AprioriAll algorithm based on association rule, it is proposed to build two-dimension user interest model combining user's implicit and explicit interests and increase the threshold value of third dimension time in this paper t o realize the real-time personalized recommendation based on user interest. Through experimental evaluation, it is proved that the accuracy and real-time of recommendation is improved through the model and algorithm under big data environment.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A flexible finger-mounted airbrush model for immersive freehand painting","authors":"Ruimin Lyu, Yuefeng Ze, Wei Chen, Fei Chen, Yuan Liu, Lifang Chen, Haojie Hao","doi":"10.1109/ICIS.2017.7960025","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960025","url":null,"abstract":"To provide immersive freehand painting experience, we proposed a flexible airbrush model making use of the hands tracking capability of Leap Motion Controller. The airbrush model uses a common screen as the painting canvas. When the user moves hands over the screen, the brush model continually acquires his/her hands movement data and extracts multiple control signals which describes multiple gestures. The virtual airbrush moves along with the user's hands movement as if it is fixed on his/her finger, and its properties change with gestures' change. When the virtual airbrush intersects with the screen, it continually exerts paints onto the screen. User test shows that the user can easily create multifarious brush stroke effects by directly operating over the screen.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparision between steganography software tools","authors":"H. Arif, H. Hajjdiab","doi":"10.1109/ICIS.2017.7960030","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960030","url":null,"abstract":"The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generation of view-dependent textures for an inaccurate model","authors":"Zhen Wang, Wei-dong Geng","doi":"10.1109/ICIS.2017.7959974","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959974","url":null,"abstract":"Existing methods of texture generation from registered images only work well on accurate models. For inaccurate models, texture drifts may occur. In this paper, we propose a view-dependent seamless texture generation method for inaccurate models. Under a specific viewpoint, this method first assigns each mesh face with a label associated with a registered image to generate a primitive texture. Different from previous methods, our label assignment process is dependent on the current view direction to reduce projective displacements of texture due to imprecision of the geometry. Then, a gradient-domain editing method is used to eliminate seams between image segments. If more than one observation views are given, the seam-levelling method further ensures color consistency between views. Experiments show that our method endows more sense of reality to inaccurate models and succeeds in maintaining temporal color consistency throughout a pre-defined sequence of viewpoints.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart grid, smart transportation, and smart city: Where we are? Keynote address","authors":"Chao Lu","doi":"10.1109/ICIS.2017.7959959","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959959","url":null,"abstract":"Smart systems such as smart grid, smart transportation, and smart city are typical applications supported by Internet-of-Things. Particularly, the smart grid is the integration of renewable energy resources, information and communication technologies into the electricity grid to achieve a reliable, cost efficient, sustainable, and environment-friendly power grid. To deal with uncertainties raised by components such as renewable energy resources in the smart grid systems, our research team at Towson University has developed a modeling and simulation framework to assess techniques, enabling the effectiveness of smart grid operations. With the development of smart sensors, smart vehicles, and vehicular communication technologies, the smart transportation system is considered to be the future of transportation critical infrastructure: improving traffic efficiency and safety. To this end, our research team has been working on the investigation and evaluation techniques that seek to mitigate traffic congestion and improve traffic efficiency. Furthermore, while smart city concept holds great promise of boosting living standards through effective management and utilization of scarce resources, unavailability of real-world datasets and ideal test environments to evaluate algorithms and models has slowed research progress. A group of our research team has been working on the reviews of major research endeavors and projects ongoing in the field. Our research group has been trying to integrate information communication technology with physical infrastructures for a more effective resource management geared towards improving city living standard.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoTs for capturing and mastering massive data online learning courses","authors":"A. Njeru, Mwana Said Omar, Sun Yi","doi":"10.1109/ICIS.2017.7959975","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959975","url":null,"abstract":"The rapid growth of educational data mining (EDM) is an emerging field in the academic world of research and studies focusing on collection, archiving, and analysis of data related to delivery methodology, quality of materials and student learning and assessment. The information analyzed informs the learning institution on how to improve learning experiences and how to run the institutional effectively. This paper explores the value of the Internet of Things (IoTs) in capturing and mastering massive data for online courses to assess and identify typical learning scenarios for learners. We hope this would be a useful instrumental tool to the range of approaches in education institutions to help their struggling learners to succeed in the academic field.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faten Fakhfakh, M. Tounsi, M. Mosbah, D. Méry, A. Kacem
{"title":"A correct-by-construction approach for proving distributed algorithms in spanning trees","authors":"Faten Fakhfakh, M. Tounsi, M. Mosbah, D. Méry, A. Kacem","doi":"10.1109/ICIS.2017.8332403","DOIUrl":"https://doi.org/10.1109/ICIS.2017.8332403","url":null,"abstract":"Dynamic networks are characterized by frequent topology changes due to the unpredictable appearance and disappearance of mobile devices and/or communication links. In this paper, we propose a correct-by-construction approach for proving distributed algorithms in a forest of spanning trees. Our approach consists in two phases. The first one aims to control the dynamic structure of the network by triggering a maintenance operation when the forest is altered. To do so, we develop a formal pattern using the Event-B method which is based on an existing model for building and maintaining a spanning forest in dynamic networks. The second phase of our approach deals with distributed algorithms which can be applied to spanning trees. We illustrate our pattern through an example of a leader election algorithm. The proof statistics show that our solution can save efforts on specifying as well as proving the correctness of distributed algorithms in a forest of spanning trees.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of deep learning in object detection","authors":"Xinyi Zhou, Wei Gong, W. Fu, Fengtong Du","doi":"10.1109/ICIS.2017.7960069","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960069","url":null,"abstract":"This paper deals with the field of computer vision, mainly for the application of deep learning in object detection task. On the one hand, there is a simple summary of the datasets and deep learning algorithms commonly used in computer vision. On the other hand, a new dataset is built according to those commonly used datasets, and choose one of the network called faster r-cnn to work on this new dataset. Through the experiment to strengthen the understanding of these networks, and through the analysis of the results learn the importance of deep learning technology, and the importance of the dataset for deep learning.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}