2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
3D visual correlation model for wireless visual sensor networks 无线视觉传感器网络的三维视觉相关模型
Xiaotao Yang, Yingyou Wen, Mingyang Zhang, Hong Zhao
{"title":"3D visual correlation model for wireless visual sensor networks","authors":"Xiaotao Yang, Yingyou Wen, Mingyang Zhang, Hong Zhao","doi":"10.1109/ICIS.2017.7959972","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959972","url":null,"abstract":"Wireless visual sensor networks comprise a large number of camera-equipped sensor devices and obtain visual information from field of interest. In a Wireless visual sensor network, there exist visual correlation characteristics among images observed by cameras with overlapped field of views. To describe those characteristics, the conventional method is based on image processing. However, it is too complex to be applied to cameras in resource-constrained wireless visual sensor networks. In this paper, based on 3D sensing model and coordinate transformation theory, a novel 3D visual correlation model is designed to exploit the correlation characteristics among cameras for spatial wireless visual sensor networks. The designed model, of which a visual correlation function was proposed, and then a 3D visual correlation coefficient algorithm is derived. Experimental results demonstrated that the designed model can accurately model the visual correlation characteristics and the proposed 3D visual correlation coefficient algorithm outperforms the state-of-the-art algorithms.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"36 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of recommendation system of micro video's topic 微视频话题推荐系统的设计与实现
Dongdong Jiang, Wenqian Shang
{"title":"Design and implementation of recommendation system of micro video's topic","authors":"Dongdong Jiang, Wenqian Shang","doi":"10.1109/ICIS.2017.7960040","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960040","url":null,"abstract":"With the development of Internet technology and the arrival of the era of big data, it is necessary to analyze and excavate the micro video data. It can help micro video creators to create better to analysis micro video data. This paper mainly introduces the structure design, key technical points and specific implementation steps of the micro video topic recommendation system.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Algorithm study under big data environment of personalized recommendation based on user interest model 大数据环境下基于用户兴趣模型的个性化推荐算法研究
Guo Qingju, Ji Wen-tian, Zhou Renyun
{"title":"Algorithm study under big data environment of personalized recommendation based on user interest model","authors":"Guo Qingju, Ji Wen-tian, Zhou Renyun","doi":"10.1109/ICIS.2017.7959988","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959988","url":null,"abstract":"Based on core problems of personalized recommendation, traditional collaborative filtering recommendation algorithm and theories of AprioriAll algorithm based on association rule, it is proposed to build two-dimension user interest model combining user's implicit and explicit interests and increase the threshold value of third dimension time in this paper t o realize the real-time personalized recommendation based on user interest. Through experimental evaluation, it is proved that the accuracy and real-time of recommendation is improved through the model and algorithm under big data environment.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A flexible finger-mounted airbrush model for immersive freehand painting 一个灵活的手指安装喷枪模型身临其境的写意绘画
Ruimin Lyu, Yuefeng Ze, Wei Chen, Fei Chen, Yuan Liu, Lifang Chen, Haojie Hao
{"title":"A flexible finger-mounted airbrush model for immersive freehand painting","authors":"Ruimin Lyu, Yuefeng Ze, Wei Chen, Fei Chen, Yuan Liu, Lifang Chen, Haojie Hao","doi":"10.1109/ICIS.2017.7960025","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960025","url":null,"abstract":"To provide immersive freehand painting experience, we proposed a flexible airbrush model making use of the hands tracking capability of Leap Motion Controller. The airbrush model uses a common screen as the painting canvas. When the user moves hands over the screen, the brush model continually acquires his/her hands movement data and extracts multiple control signals which describes multiple gestures. The virtual airbrush moves along with the user's hands movement as if it is fixed on his/her finger, and its properties change with gestures' change. When the virtual airbrush intersects with the screen, it continually exerts paints onto the screen. User test shows that the user can easily create multifarious brush stroke effects by directly operating over the screen.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparision between steganography software tools 隐写软件工具的比较
H. Arif, H. Hajjdiab
{"title":"A comparision between steganography software tools","authors":"H. Arif, H. Hajjdiab","doi":"10.1109/ICIS.2017.7960030","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960030","url":null,"abstract":"The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generation of view-dependent textures for an inaccurate model 为不准确的模型生成依赖于视图的纹理
Zhen Wang, Wei-dong Geng
{"title":"Generation of view-dependent textures for an inaccurate model","authors":"Zhen Wang, Wei-dong Geng","doi":"10.1109/ICIS.2017.7959974","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959974","url":null,"abstract":"Existing methods of texture generation from registered images only work well on accurate models. For inaccurate models, texture drifts may occur. In this paper, we propose a view-dependent seamless texture generation method for inaccurate models. Under a specific viewpoint, this method first assigns each mesh face with a label associated with a registered image to generate a primitive texture. Different from previous methods, our label assignment process is dependent on the current view direction to reduce projective displacements of texture due to imprecision of the geometry. Then, a gradient-domain editing method is used to eliminate seams between image segments. If more than one observation views are given, the seam-levelling method further ensures color consistency between views. Experiments show that our method endows more sense of reality to inaccurate models and succeeds in maintaining temporal color consistency throughout a pre-defined sequence of viewpoints.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart grid, smart transportation, and smart city: Where we are? Keynote address 智能电网、智能交通和智能城市:我们在哪里?主题演讲
Chao Lu
{"title":"Smart grid, smart transportation, and smart city: Where we are? Keynote address","authors":"Chao Lu","doi":"10.1109/ICIS.2017.7959959","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959959","url":null,"abstract":"Smart systems such as smart grid, smart transportation, and smart city are typical applications supported by Internet-of-Things. Particularly, the smart grid is the integration of renewable energy resources, information and communication technologies into the electricity grid to achieve a reliable, cost efficient, sustainable, and environment-friendly power grid. To deal with uncertainties raised by components such as renewable energy resources in the smart grid systems, our research team at Towson University has developed a modeling and simulation framework to assess techniques, enabling the effectiveness of smart grid operations. With the development of smart sensors, smart vehicles, and vehicular communication technologies, the smart transportation system is considered to be the future of transportation critical infrastructure: improving traffic efficiency and safety. To this end, our research team has been working on the investigation and evaluation techniques that seek to mitigate traffic congestion and improve traffic efficiency. Furthermore, while smart city concept holds great promise of boosting living standards through effective management and utilization of scarce resources, unavailability of real-world datasets and ideal test environments to evaluate algorithms and models has slowed research progress. A group of our research team has been working on the reviews of major research endeavors and projects ongoing in the field. Our research group has been trying to integrate information communication technology with physical infrastructures for a more effective resource management geared towards improving city living standard.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoTs for capturing and mastering massive data online learning courses 捕捉和掌握海量数据的物联网在线学习课程
A. Njeru, Mwana Said Omar, Sun Yi
{"title":"IoTs for capturing and mastering massive data online learning courses","authors":"A. Njeru, Mwana Said Omar, Sun Yi","doi":"10.1109/ICIS.2017.7959975","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7959975","url":null,"abstract":"The rapid growth of educational data mining (EDM) is an emerging field in the academic world of research and studies focusing on collection, archiving, and analysis of data related to delivery methodology, quality of materials and student learning and assessment. The information analyzed informs the learning institution on how to improve learning experiences and how to run the institutional effectively. This paper explores the value of the Internet of Things (IoTs) in capturing and mastering massive data for online courses to assess and identify typical learning scenarios for learners. We hope this would be a useful instrumental tool to the range of approaches in education institutions to help their struggling learners to succeed in the academic field.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A correct-by-construction approach for proving distributed algorithms in spanning trees 生成树中分布式算法的构造正确证明方法
Faten Fakhfakh, M. Tounsi, M. Mosbah, D. Méry, A. Kacem
{"title":"A correct-by-construction approach for proving distributed algorithms in spanning trees","authors":"Faten Fakhfakh, M. Tounsi, M. Mosbah, D. Méry, A. Kacem","doi":"10.1109/ICIS.2017.8332403","DOIUrl":"https://doi.org/10.1109/ICIS.2017.8332403","url":null,"abstract":"Dynamic networks are characterized by frequent topology changes due to the unpredictable appearance and disappearance of mobile devices and/or communication links. In this paper, we propose a correct-by-construction approach for proving distributed algorithms in a forest of spanning trees. Our approach consists in two phases. The first one aims to control the dynamic structure of the network by triggering a maintenance operation when the forest is altered. To do so, we develop a formal pattern using the Event-B method which is based on an existing model for building and maintaining a spanning forest in dynamic networks. The second phase of our approach deals with distributed algorithms which can be applied to spanning trees. We illustrate our pattern through an example of a leader election algorithm. The proof statistics show that our solution can save efforts on specifying as well as proving the correctness of distributed algorithms in a forest of spanning trees.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of deep learning in object detection 深度学习在目标检测中的应用
Xinyi Zhou, Wei Gong, W. Fu, Fengtong Du
{"title":"Application of deep learning in object detection","authors":"Xinyi Zhou, Wei Gong, W. Fu, Fengtong Du","doi":"10.1109/ICIS.2017.7960069","DOIUrl":"https://doi.org/10.1109/ICIS.2017.7960069","url":null,"abstract":"This paper deals with the field of computer vision, mainly for the application of deep learning in object detection task. On the one hand, there is a simple summary of the datasets and deep learning algorithms commonly used in computer vision. On the other hand, a new dataset is built according to those commonly used datasets, and choose one of the network called faster r-cnn to work on this new dataset. Through the experiment to strengthen the understanding of these networks, and through the analysis of the results learn the importance of deep learning technology, and the importance of the dataset for deep learning.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 280
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信