{"title":"Layered perceptual representation for shadow vision: From detection to removal","authors":"Cheng Li, Jing Gao, Yanbin Shi, Qingshun Han","doi":"10.1109/ICAIOT.2015.7111538","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111538","url":null,"abstract":"On the research of shadow essence and visual scheme, we propose a single image shadow removal method based on certain layered perceptual representation models with the flowchart from shadow detection to shadow removal. Firstly, a modified intersecting cortical model, the typically useful image factorization technique, is applied to extract umbra and penumbra masks. Then, under the energy minimization framework, scale factors for umbra are computed. Furthermore, transparency-coupled atmospheric transfer function is introduced for penumbra compensation by pixel-by-pixel transparency estimation. For aerial images, experimental results illustrate that shadow regions are matted well, and the proposed method yields vivid shadow-free images with smooth boundaries.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on refactoring sequential program to parallel code in multicore era","authors":"Song Zhao, Yixin Bian, Sensen Zhang","doi":"10.1109/ICAIOT.2015.7111558","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111558","url":null,"abstract":"Nowdays it is inevitable to face the emergence of multicore processors and parallel platforms. In the multicore time, sequential programs need to be refactored for parallelism. Refactoring is a process of adjusting the code structure of a program keeping its internal function. However, refactoring sequential code to concurrent program is not trivial. In this paper, a survey of the current literature that frequently reported parallel refactoring are carried out. It is important for programmers or computer researchers to exploit multicore platform in order to get better understand and perform refactoring in parallel. This review can help the research community to know the different directions about development of parallel refactoring in order to improve the quality of software.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126611705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of elliptic curve Diffie-Hellman key agreement scheme on IRIS nodes","authors":"Xing Zhang, Shaohua Ma, Dong Han, Wei Shi","doi":"10.1109/ICAIOT.2015.7111560","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111560","url":null,"abstract":"To meet the need of key agreement and pairwise-key creation between sensors in wireless sensor network composed of IRIS nodes, this paper presents the implementation of ECDH (elliptic curve Diffie-Hellman) key agreement scheme on IRIS nodes. We choose 6 kinds of optimization algorithms for ECDH to test and compare these optimization algorithms. By turning these optimization techniques on or off, we compare the ROM/RAM consumptions, initialization time and key establishment time.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122627794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secondary framework for small targets segmentation In Remote Sensing Images","authors":"Hailong Zhu, Hongzhi Sun","doi":"10.1109/ICAIOT.2015.7111562","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111562","url":null,"abstract":"The automatic interpreting of small object using computer in Remote Sensing Image(RSI) is sharply limited by low resolution and the uncertainty of imaging season, leading to the results of low recognition rate and poor generalization ability. In this paper, the Erlongshan Reservoir region of Heilongjiang province is selected as research area, and a secondary segmentation framework is proposed for small objects recognition based on salience detection and Hough Transform. Firstly, the salience of particular small objects is calculated to find candidates of small objects. Next, the Hough Transform is performed on an enhanced RSI constrained by the size of small size to identify small objects from others, such as highway fragment, river fragment, house and farmland and so on. The experiments results regarding small reservoir segmentation show that the method has high robustness and generalization ability, and the idea of classification can be used to the automatic interpreting process of other kind of small objects of RSI.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}