Proceedings of the 3rd International Conference on Vision, Image and Signal Processing最新文献

筛选
英文 中文
Sketch-aae: A Seq2Seq Model to Generate Sketch Drawings Sketch-aae:一个Seq2Seq模型来生成草图
Jia Lu, Xueming Li, Xianlin Zhang
{"title":"Sketch-aae: A Seq2Seq Model to Generate Sketch Drawings","authors":"Jia Lu, Xueming Li, Xianlin Zhang","doi":"10.1145/3387168.3387178","DOIUrl":"https://doi.org/10.1145/3387168.3387178","url":null,"abstract":"Sketch plays an important role in human nonverbal communication, which is a superior way to describe specific objects visually. Generating human free-hand sketches has become topical in computer graphics and vision, inspired by various applications related to sketches such as sketch object recognition. Existing methods on sketch generation failed to utilize stroke sequence information of human free-hand sketches. Especially, a recent study proposed an end-to-end variational autoencoder (VAE) model called sketch-rnn which learned to sketch with human input. However, the performance of sketch-rnn is affected by the original input seriously hence decreased its robustness. In this paper, we proposed a sequence-to-sequence model called sketch-aae to generate multiple categories of humanlike sketches of higher quality than sketch-rnn. We achieve this by introducing an adversarial autoencoder (AAE) model, which uses generative adversarial networks (GAN) to improve the robustness of VAE. To our best knowledge, for the first time, the AAE model is used to synthesize sketches. A VGGNet classification model is then formulated to prove the similarity between our generated sketches and human free-hand sketches. Extensive experiments both qualitatively and quantitatively demonstrate that the proposed model is superiority over the state-of-the-art for sketch generation and multi-class sketch classification.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust Infrared Air Object Tracking Fusing Convolutional And Hand-Crafted Features 鲁棒红外空中目标跟踪融合卷积和手工制作的特点
Kai Zhang, Chenhui Li, Xiaotian Wang, Kai Yang, Xi Yang
{"title":"Robust Infrared Air Object Tracking Fusing Convolutional And Hand-Crafted Features","authors":"Kai Zhang, Chenhui Li, Xiaotian Wang, Kai Yang, Xi Yang","doi":"10.1145/3387168.3387239","DOIUrl":"https://doi.org/10.1145/3387168.3387239","url":null,"abstract":"The infrared objects do not have color information, and they have low resolution. Therefore, the hand-crafted features cannot robustly describe observation model of the object, and it is easy to track failure in the presence of heavy occlusion and infrared distractors. Based on the correlation filtering theory, a robust air object tracking algorithm using convolutional and hand-crafted features is proposed in this paper. Firstly, there are differences in the ability of different layer features to describe the objects. We reconstruct the foreground mask with feature map selection approach, and select the features which are sensitive to intra-class appearance variation. Then, convolutional and hand-crafted features are fused and embedded in the correlation filtering theory to estimate the object position, achieving the air object tracking. Finally, to re-capture the object when the tracking fails, the proposed algorithm introduces YOLOv3 for re-detection. We verify our algorithm with actual infrared image sequence and the simulation image sequence. The experimental results show that the proposed algorithm can accurately track air objects with high precision.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetically-enhanced Multi-dimensional Constellation Design for Wireless Systems 无线系统的遗传增强多维星座设计
Zefeng Lin, Song-Wen Huang, M. Jiang
{"title":"Genetically-enhanced Multi-dimensional Constellation Design for Wireless Systems","authors":"Zefeng Lin, Song-Wen Huang, M. Jiang","doi":"10.1145/3387168.3387193","DOIUrl":"https://doi.org/10.1145/3387168.3387193","url":null,"abstract":"In wireless communications, the design of digital constellations and the associated bit labeling methods have a large impact on the robustness of transmissions. With the aid of increased minimum Euclidean distance (MED), high-dimension constellations have shown notable performance improvements against their conventional two-dimensional (2-D) counterparts, such as conventional quadrature amplitude modulation (QAM). In this paper, we propose a new method that exploits genetic algorithm (GA) to construct multi-dimensional constellations with optimized MED and bit labeling. More specifically, the GA-based design method is capable of producing both new constellations that have greater MED values and near-optimum labeling that yields improved performance, when compared with conventional schemes. A few design examples and simulation results are provided to demonstrate the benefits of the proposed constellation and labeling design method.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm 一种基于树突状细胞算法的加密劫持恶意软件分类器模型
Azuan Ahmad, Wan Shafiuddin, M. Kama, M. Saudi
{"title":"A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm","authors":"Azuan Ahmad, Wan Shafiuddin, M. Kama, M. Saudi","doi":"10.1145/3387168.3387218","DOIUrl":"https://doi.org/10.1145/3387168.3387218","url":null,"abstract":"A new threat known as \"cryptojacking\" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the stolen resources for crytocurrency mining. Worse comes to worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. IoT devices are vulnerable to attacks because of their simple configuration, unpatched vulnerability and weak passwords. IoT devices also prone to be poorly monitored because of their nature. There is lack of studies that provide in depth analysis on cryptojacking malware classification using machine learning approach where the current research mostly focused on manual analysis of web-based cryptojacking attacks. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on machine learning technique that may fit in a low processing capability environment such as IoT and Cyber Physical Systems (CPS). This paper aim to disscuss a new approach based on dendritic cell algorithm in order to provide a lightweight cryptojacking classifier model. The output of this paper will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Confidence Intervals for Single Coefficient of Variation of Weibull Distribution 威布尔分布单变异系数的置信区间
Manussaya La-ongkaew, S. Niwitpong, Suparat Niwitpong
{"title":"Confidence Intervals for Single Coefficient of Variation of Weibull Distribution","authors":"Manussaya La-ongkaew, S. Niwitpong, Suparat Niwitpong","doi":"10.1145/3387168.3387253","DOIUrl":"https://doi.org/10.1145/3387168.3387253","url":null,"abstract":"The aim of this paper is to propose the new confidence intervals for single coefficient of variation of Weibull distributions, using the concept of the generalized confidence interval (GCI), the fiducial generalized confidence interval (FGCI), and the bootstrap percentile method. The coverage probabilities and the expected lengths were evaluated via Monte Carlo simulation. The simulation results showed that the coverage probabilities of the GCIs and the FGCIs were greater than or close to the nominal confidence level. Both of them were recommended. The coverage probabilities of confidence intervals based on the bootstrap percentile method were under the nominal confidence level. Regarding the expected lengths, they tended to decrease when the sample size was increased. All proposed confidence intervals were applied to some real world data in this study.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Existence of Latin Maps 拉丁地图的存在
Zhaoqi Zhang
{"title":"Existence of Latin Maps","authors":"Zhaoqi Zhang","doi":"10.1145/3387168.3387252","DOIUrl":"https://doi.org/10.1145/3387168.3387252","url":null,"abstract":"The Latin square (or Latin cube) plays an important role in comparative experiment design. It is generally restricted to 2 or 3 dimensions [1]. For higher dimensions, a new definition - the Latin map - is used [5]. In this paper, the Latin map is studied in 3 aspects. Firstly, the distribution lemma is proved, which gives two conditions for a map to be a Latin map. Secondly, the distribution lemma is used to prove the existence and non-existence of two classes of Latin maps. Finally, an algorithm of finding a Latin map is introduced.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127680579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of ICT in Poverty Reduction in Onitsha L.G.A of Anambra State 信息通信技术在阿南布拉州奥尼沙州减贫中的作用
Wilson Obinna Igbasi
{"title":"The Role of ICT in Poverty Reduction in Onitsha L.G.A of Anambra State","authors":"Wilson Obinna Igbasi","doi":"10.1145/3387168.3387190","DOIUrl":"https://doi.org/10.1145/3387168.3387190","url":null,"abstract":"The research work is on the role of ICT in poverty reduction in Onitsha L.G.A of Anambra state. A survey research design was adopted for the study. The population consists of the entire indigenes of Onitsha North L.G. A of Anambra state. Stratified sampling technique was used to sample fifty respondents in the area. The questionnaire was the major instrument for data collection and it was validated by an expert in Computer education at Nwafor Orizu College of Education, Nsugbe and expert in Measurement and evaluation at Nnamdi Azikiwe University, Awka both in Anambra State. The mean statistics was used to analyse the data collected. The findings of the study showed that ICT can enhance poverty reduction through provision of employment opportunity, capacity building, e-learning among others. However the major challenges for adopting ICT for poverty reduction include high rate of illiteracy, poor infrastructural facilities, inadequate human resources etc. the paper concluded that government should formulate good ICT policy and subsidize the cost of ICT.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing Virtual Machine Migration Energy Measuring Research 云计算虚拟机迁移能量测量研究
Liu Jun, Zhang Jie, Dinghong Pu
{"title":"Cloud Computing Virtual Machine Migration Energy Measuring Research","authors":"Liu Jun, Zhang Jie, Dinghong Pu","doi":"10.1145/3387168.3387192","DOIUrl":"https://doi.org/10.1145/3387168.3387192","url":null,"abstract":"This paper research virtual machine migration energy measuring on IPv4/IPv6 network based on cloud computing infrastructure platform, it conducts a research on the energy measuring in IPv4/IPv6 cloud computing platform, and presents a dynamic energy measuring mathematical model based on analyzing CPU energy consumption changes brought by random assignment works. The research determines mathematical model parameter values and it completes the IPv4/IPv6 cloud computing platform virtual machine migration experimentally. This paper achieves the energy consumption of IPv4/IPv6 transition prior-period, mid-period and last-period cloud computing platform virtual machine migration, the conclusions in line with the cloud energy measurement needs, it builds the theoretical foundation for cloud computing platform energy consumption optimize.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solving Dynamic Multi-Objective Optimization Problems Using Cultural Algorithm based on Decomposition 基于分解的文化算法求解动态多目标优化问题
Ramya Ravichandran, Ziad Kobti
{"title":"Solving Dynamic Multi-Objective Optimization Problems Using Cultural Algorithm based on Decomposition","authors":"Ramya Ravichandran, Ziad Kobti","doi":"10.1145/3387168.3387205","DOIUrl":"https://doi.org/10.1145/3387168.3387205","url":null,"abstract":"The importance of dynamic multi-objective optimization problems (DMOPs) is on the rise, in complex systems. DMOPs have several objective functions and constraints that vary over time to be considered simultaneously. As a result, the Pareto optimal solutions (POS) and Pareto front (PF) will also vary with time. The desired algorithm should not only locate the optima but also track the moving optima efficiently. In this paper, we propose a new Cultural Algorithm (CA) based on decomposition (CA/D). The primary objective of the CA/D algorithm is to decompose DMOP into several scalar optimization subproblems and solve simultaneously. The subproblems are optimized utilizing the information shared only by its neighboring problems. The proposed CA/D is evaluated using CEC 2015 optimization benchmark functions. The results show that CA/D outperforms CA, Multi-population CA (MPCA), and MPCA incorporating game strategies (MPCA-GS), particularly in hybrid and composite benchmark problems.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Phonocardiography Analysis Using Discrete Wavelet Transform
Md Tanzil Hoque Chowdhury, K. Poudel, Yating Hu
{"title":"Automatic Phonocardiography Analysis Using Discrete Wavelet Transform","authors":"Md Tanzil Hoque Chowdhury, K. Poudel, Yating Hu","doi":"10.1145/3387168.3387172","DOIUrl":"https://doi.org/10.1145/3387168.3387172","url":null,"abstract":"This paper presents an intelligent algorithm for analyzing the heart sound signal using multi-resolution analysis based on discrete wavelet transform (DWT). This signal processing technique can not only compress and encrypt the phonocardiogram (PCG) signal but also reduces the noises and the murmurs from the PCG signal. This information can assist the cardiologists for taking appropriate actions to diagnosis for the initial stage of the cardiovascular dis- order. We have presented an efficient data compression algorithm based on DWT, energy packing efficiency (EPE), and run-length encoding (RLE) that can compress the signal about 93.70% without losing any pathological information. Further, this paper explores an end-to-end encryption technique using the compression algo-rithm to maintain patient confidentiality. After the compression of the PCG signal, the noises and the murmurs are effectively separated from the signal by reusing DWT. The performance of this algorithm has been evaluated by using 5 normal and 18 abnormal PCG signals available in the University of Michigan Heart Sound and Murmur Library. This method can be used in real time for the remote monitoring of the heart sound.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信