{"title":"Learning hierarchical representation using Siamese Convolution Neural Network for human re-identification","authors":"K. B. Low, U. U. Sheikh","doi":"10.1109/ICDIM.2015.7381875","DOIUrl":"https://doi.org/10.1109/ICDIM.2015.7381875","url":null,"abstract":"Human re-identification is to match a pair of humans appearing in different cameras with non-overlapping views. However, in order to achieve this task, we need to overcome several challenges such as variations in lighting, viewpoint, pose and colour. In this paper, we propose a new approach for person re-identification in multi-camera networks by using a hierarchical structure with a Siamese Convolution Neural Network (SCNN). A set of human pairs is projected into the same feature subspace through a nonlinear transformation that is learned by using a convolution neural network. The learning process minimizes the loss function, which ensures that the similarity distance between positive pairs is less than lower threshold and the similarity distance between negative pairs is higher than upper threshold. Our experiment is achieved by using a small scale of dataset due to the computation time. Viewpoint Invariant Pedestrian Recognition (VIPeR) dataset is used in our experiment, since it is widely employed in this field. Initial results suggest that the proposed SCNN structure has good performance in people re-identification.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consideration of disk segmentation and disk sequencing for efficient use of disk resource on heterogeneous disk environment","authors":"Makoto Kataigi, D. Kobayashi, H. Yokota","doi":"10.1109/ICDIM.2007.4444286","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444286","url":null,"abstract":"Recently, it is needed to have high performance and use capacity efficiently at the same time on the heterogeneous disk environment. But it is difficult to do so because the performance and capacity of each disk are different. We think to extend AOD method for this aim. This method uses the difference of access load between primary data and backup data and balance access load and data amount simultaneously on the homogeneous environment. In this paper, we consider to maximize usable capacity by the position of backup and the disk sequencing. Furthermore, we arrange the primary data in order to balance the performance based on its Bandwidth to Space Ratio.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122329328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Unified Framework for the Semantic Integration of XML Databases","authors":"Doan Dai Duong, Le Thi Thu Thuy","doi":"10.1109/ICDIM.2007.369365","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.369365","url":null,"abstract":"This paper proposes an XML declarative description (XDD) - based integration framework for XML databases. All data components and processing components of the framework, such as databases, ontologies, queries and schema integration components can be formulated by XDD. Since the boundary between the system's components is removed, the interoperation capacity between them is enhanced, thus reducing the overhead of the system's communication. Moreover, an important achievement of this framework is that it can integrate n schemas at a time and simultaneously decompose a query into n subqueries.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-government evaluation: The use of design science approach to build and evaluate customer satisfaction theoretical framework","authors":"M. Wong","doi":"10.1109/ICDIM.2012.6360155","DOIUrl":"https://doi.org/10.1109/ICDIM.2012.6360155","url":null,"abstract":"To date, the literature on E-Government evaluation tends to stress on benchmarking and performance measurements of customer satisfactions with the use of quantitative rather than qualitative measurements. This paper seeks to address this problem by introducing a design science approach to build a new theoretical framework, namely, return on investment (ROI) vs return on relationship (ROR), as a qualitative evaluation tool, to evaluate E-Government services by classifying customer experiences into categories of customer satisfactions. Our results should help government to identify strategic focus areas that need attentions and allocation of funds.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric Encryption Solutions to Millionaire's Problem and Its Extension","authors":"Shundong Li, Yiqi Dai, Daoshun Wang, Ping Luo","doi":"10.1109/ICDIM.2007.369247","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.369247","url":null,"abstract":"Millionaire's problem is the base of secure multiparty computation, and its solutions have become basic blocks of many secure multi-party computation solutions. Unfortunately, most solutions to millionaire's problem are based on public key cryptography, and thus are inefficient. Furthermore, all solutions are designed to solve millionaire's problem for natural number case to privately determine which natural number is larger. If the numbers are real, these solutions do not directly work. In this paper, we first propose a symmetric key cryptographic solution to millionaire's problem for natural numbers case, and then generalize it to the case of real numbers, that is to privately determine which real number is larger. We further prove, by simulation paradigm, that these solutions are private. These solutions are really efficient.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The tecnological business intelligence capabilities and business intelligence system flexibility - The underlying relationship","authors":"S. Kokin, T. Wang","doi":"10.1109/ICDIM.2013.6694020","DOIUrl":"https://doi.org/10.1109/ICDIM.2013.6694020","url":null,"abstract":"Existing studies of business intelligence (BI) assume that the characteristics of business intelligence systems (BIS), called BI capabilities, are critically important for BI implementation project success. In this paper we hypothesize that technological BI Capabilities have more complex interrelationship than it is supposed to be in the contemporary academic literature devoted to the field of BI. We also pay special attention to the relationship between technological BI Capabilities and BIS Flexibility. The results demonstrate that understanding relationship between technological BI capabilities is crucial to the analysis of the reasons of BI implementation projects success and failure. We believe that our study will contribute to the knowledge of both the professionals and academics in the field.","PeriodicalId":328919,"journal":{"name":"International Conference on Digital Information Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}