{"title":"A segmentation method for remote sensing image region on Riemannian manifolds","authors":"Hailong Zhu, Song Zhao, Xiping Duan","doi":"10.1109/ICAIOT.2015.7111530","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111530","url":null,"abstract":"Focus on the issue of rotation and scale in-variance for remote sensing image(RSI) segmentation, a feature extraction and classification method is proposed based on differential space. A RSI is divided into many regions with different size, and all the covariance matrices of each region are calculated. Those covariance matrices construct a connected Riemannian manifold. The map relation between the Riemannian manifold and a Tangent space is built that contains an Exponent and a Logarithmic matrices computation. Furthermore, the distance measure is established on the Riemannian manifold. It is employed to segment regions of a RSI. Experiment results show that the method is efficient and has robust rotation and scale invariance.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129417930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Virtual Endoscopy path planning","authors":"Hongxia Wang, Xiuzhen Wang","doi":"10.1109/ICAIOT.2015.7111542","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111542","url":null,"abstract":"Some key techniques and realizations of Virtual Endoscopy are systematically investigated in this thesis. It consists of the reading of CT data, the pre-processing of medical images, the techniques of segment tissues, 3D Reconstruction and the techniques of path planning. Great stress is laid on 3D Reconstruction and the techniques of path planning in this thesis. The primary work of studies is as follows: First of all, Study the loading of the chest CT data and the pre-process of filtering and interpolation. Secondly, the semi-automatic thresholding algorithm based on thresholding segmentation is proposed. The CT images are segmented using the methods. In addition, Marching Cubes algorithms is improved in the process of VE rendering algorithm to improve the efficiency of rendering. Finally, based on the technique of distance transform method, this thesis puts forward a distance transform method on the basis of maximum-cost spanning tree, which is able to create central path quickly and to solve some branch questions.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural cognition and intelligent computing on the emotional symbols of cyber language","authors":"Shuang Huang, Xuan Zhou, Weihui Dai, M. Ivanovi","doi":"10.1109/ICAIOT.2015.7111561","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111561","url":null,"abstract":"This paper presented a mechanism model to describe the neural cognition of emotional symbols in cyber language, and discussed the subjective assessment of their emotional parameters in the PAD space. On this basis, an intelligent method was put forward for computing the dynamic emotional characteristics of the multi and mixed symbols in a cyber language message.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color image encryption algorithm with realitypreserving fractional discrete cosine transform and spatiotemporal chaotic mapping","authors":"Liang Ya-ru, Liu Guo-ping, Wu Jian-hua","doi":"10.1109/ICAIOT.2015.7111546","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111546","url":null,"abstract":"A color image encryption scheme is proposed based on a reality-preserving fractional discrete cosine transform (RPFrDCT) and spatiotemporal chaotic mapping. The scrambling and diffusion operations are carried out after the RPFrDCT and make three components of image affect each other. The main advantages of this scheme are the real-valued output, the nonlinear manipulation, the high sensitiveness and high robustness to the cipher keys. Experimental results demonstrate that the proposed encryption scheme is feasible and effective.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new cooperative spectrum sensing with radio environment map in cognitive radio networks","authors":"Yi Chen, Hang Zhang, Hang Hu, Qian Wang","doi":"10.1109/ICAIOT.2015.7111533","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111533","url":null,"abstract":"Spectrum sensing is regarded as an important part of the CR network. Its detection accuracy is the key aspect which affects the performance of CR network. In this paper, a novel cooperative spectrum sensing based on radio environment map (REM) is proposed. This new algorithm utilizes the REM information of the primary users (PUs) and the secondary users (SUs) to raise the detective performance of the spectrum sensing. Simulations show that the detection accuracy is improved and this algorithm is more suitable for practice wireless channel because it needs no priori information of SNR.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aamir Ansari, Mohamed H. Sedky, Neelam Sharma, Anurag Tyagi
{"title":"An Internet of things approach for motion detection using Raspberry Pi","authors":"Aamir Ansari, Mohamed H. Sedky, Neelam Sharma, Anurag Tyagi","doi":"10.1109/ICAIOT.2015.7111554","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111554","url":null,"abstract":"Internet of things is the communication of anything with any other thing, the communication mainly transferring of use able data, for example a sensor in a room to monitor and control the temperature. It is estimated that by 2020 there will be about 50 billion internet-enabled devices. This paper aims to describe a security alarm system using low processing power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos and videos to a cloud server. Moreover, Internet of things based application can be used remotely to view the activity and get notifications when motion is detected. The photos and videos are sent directly to a cloud server, when the cloud is not available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore, advantages like these make this application ideal for monitoring homes in absence.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124740598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industrie 4.0: Enabling technologies","authors":"J. Wan, Hu Cai, Keliang Zhou","doi":"10.1109/ICAIOT.2015.7111555","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111555","url":null,"abstract":"With the development of industries, we have realized the third industrial revolution. Following the development of Cyber-Physical Systems (CPS), industrial wireless network and some other enabling technologies, the fourth industrial revolution is being gradually rolled out. This paper presents an overview of the background, concept, basic methods, major technologies and application scenarios for industrie 4.0. In our view, industrie 4.0 as an abstract concept can closely integrate the physical world with virtual world. This strategy of industrie 4.0 will lead to more and more people coming to participate in the manufacturing process and further popularize our products through CPS technology. The typical approach for industrie 4.0 is the social manufacturing. In fact, the social manufacturing can directly link our customers' need and our industries, but it must be based on the enabling technologies, such as embedded systems, wireless sensor network, industrial robots, 3D printing, cloud computing, and big data. Therefore, this paper in detail explains these concepts, advantages and the relations to industries. We can foresee that our life will be changed to be more efficient, fast, safe and convenient due to the development of industrie 4.0 in the near future.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125282416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of power-quality disturbances using PSO-MP and parametric dictionaries","authors":"Zhang Jun, Zeng Ping-ping, Ma Jian, Wu Jian-hua","doi":"10.1109/ICAIOT.2015.7111529","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111529","url":null,"abstract":"This paper aims to develop a new scheme for the classification of power-quality disturbances (PQDs). We propose to employ two discriminative dictionaries, designed based on the structures of PQDs, to respectively decompose a disturbance signal. Matching pursuit optimized by particle swarm optimization (PSO-MP) is used as the decomposition method. Reconstruction errors after sparse coding are employed to coarsely classify the PQDs into two categories, corresponding to the two dictionaries. Next, the specific class can be identified by evaluating the value of parameters of atoms. One main advantage of the approach is that it does not require a training set as many other classification methods do. The PQDs considered in this paper include sag, swell, interruption, harmonic and oscillatory transient. Experimental results indicate that the proposed approach achieves a high classification accuracy and robustness against noise.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rank sequence method for detecting black hole attack in ad hoc network","authors":"Xiong Kai, Yin Mingyong, Li Wenkang, Jiang Hong","doi":"10.1109/ICAIOT.2015.7111559","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111559","url":null,"abstract":"This paper discusses one of the route security problems called the black hole attack. In the network, we can capture some AODV route tables to gain a rank sequences by using the FP-Growth, which is a data association rule mining. We choose the rank sequences for detecting the malicious node because the rank sequences are not sensitive to the noise interfered. A suspicious set consists of nodes which are selected by whether the rank of a node is changed in the sequence. Then, we use the DE-Cusum to distinguish the black hole route and normal one in the suspicious set. In this paper, the FP-Growth reflects an idea which is about reducing data dimensions. This algorithm excludes many normal nodes before the DE-Cusum detection because the normal node has a stable rank in a sequence. In the simulation, we use the NS2 to build a black hole attack scenario with 11 nodes. Simulation results show that the proposed algorithm can reduce much vain detection.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One methodology for spam review detection based on review coherence metrics","authors":"Xinkai Yang","doi":"10.1109/ICAIOT.2015.7111547","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111547","url":null,"abstract":"In this paper, we propose an iterative computation framework to detect spam reviews based on coherent examination. We first define some reviews' coherent metrics to analyze review coherence in the granularity of sentence. Then the framework and its evaluation process are discussed in details.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}