{"title":"A practical image retouching method","authors":"V. Savchenko, Nikita Kojekine, H. Unno","doi":"10.1109/CW.2002.1180916","DOIUrl":"https://doi.org/10.1109/CW.2002.1180916","url":null,"abstract":"In this paper we present a novel fast algorithm for image retouching. A space-mapping technique is used to transform a missing (or damaged) part of a surface into a different shape in a continuous manner. Experimental results are included to demonstrate the feasibility of our approach. The proposed approach shows the obvious relationship between the surface retouching problem and image inpainting. We consider shape transformation as a general type of operation for restoring missing data, and attempt to approach the well-known problem of \"fulfillment\" of damaged or missing areas from a single point of view, namely, that of the space mapping technique.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guozhen Zhang, Zixue Cheng, Tongjun Huang, A. He, A. Koyama
{"title":"Design of an effective learning method SQ3R based distance learning system","authors":"Guozhen Zhang, Zixue Cheng, Tongjun Huang, A. He, A. Koyama","doi":"10.1109/CW.2002.1180896","DOIUrl":"https://doi.org/10.1109/CW.2002.1180896","url":null,"abstract":"With the advantage of the scientific and the objective, many educational psychology-based learning methods, such as SQ3R learning method, meaningful reception learning method, SQ4R method, etc. are widely used in school education and individual study. At the same time, recently the WWW based education systems have flourished. But there are still few learning methods standing up for the WWW based learning, so the learning quality and efficiency cannot be ensured. We pose a method to design and implement educational psychology-based learning-support tools for individual learning in Web-based distance learning systems. This method is based on an effective study method SQ3R, which is a very popular learning method in school education in America and Europe. However the effective study method SQ3R cannot be directly applied into the Web-based distance learning system, so we design a method and a group of tools to support the learners using SQ3R in the Web-based distance learning system. Supported by this learning method, learners' learning effectiveness can be greatly improved.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130937158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-based software engineering education environment supporting collaboration between the teacher side and the student groups","authors":"A. Hazeyama, K. Osada","doi":"10.1109/CW.2002.1180897","DOIUrl":"https://doi.org/10.1109/CW.2002.1180897","url":null,"abstract":"Software development is knowledge-intensive work. In a software project, various types of problems need to be resolved. One approach to acquiring the knowledge necessary for software development in a university education environment is for the students to experience project-based software development. For this kind of education to succeed, collaboration is inevitable between both the teacher side (teacher and teaching assistants) and student groups and within the group membership. This paper describes a collaborative software engineering education environment that in particular focuses on supporting collaboration between the student groups and the teacher side, its application to a real class and the results. The system supports four aspects of collaboration; inspection, acceptance testing, comments attachment for artifacts, and informal communication.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133692194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. C. Hung, A. Y. Chang, Kuan-Cheng Lin, Rong-Chi Chang
{"title":"Mobile Distributed Web Server System","authors":"J. C. Hung, A. Y. Chang, Kuan-Cheng Lin, Rong-Chi Chang","doi":"10.1109/CW.2002.1180900","DOIUrl":"https://doi.org/10.1109/CW.2002.1180900","url":null,"abstract":"The Internet traffic is growing rapidly in recent years. How to distribute the network traffic effectively is an important issue. In this paper, we propose a mobile distributed web server system to distribute Web content to the mobile servers around the world in inexpensive and effective way. The proposed method is fully compatible with current existing systems. In this paper, we discuss the Web content requesting imbalance (WCRI) problem and describe how this system is able to solve this problem. We also provide a possible implementation of a mobile distributed Web server system.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS control in group communication","authors":"Takuya Tojo, M. Takizawa","doi":"10.1109/CW.2002.1180891","DOIUrl":"https://doi.org/10.1109/CW.2002.1180891","url":null,"abstract":"This paper discusses a communication model to exchange multimedia messages in a group of multiple processes. Quality of Service (QoS) required by an application has to be supported. In traditional communication protocols like TCP and RTP, a process can reliably deliver messages to one or more than one process, i.e. one-way transmission. In the group communication, a process sends multimedia messages to multiple processes while receiving multimedia messages from multiple processes in a group. In addition, messages are required to be causally delivered. We discuss how to transmit multimedia messages to each destination process so as to satisfy QoS requirement.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122650318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of the WD public-key cryptosystem","authors":"Hui-Feng Huang, Chinchen Chang","doi":"10.1109/CW.2002.1180886","DOIUrl":"https://doi.org/10.1109/CW.2002.1180886","url":null,"abstract":"The theory of generalized inverses of matrices over finite fields has been used in cryptographic applications in recent years. Wu and Dawson (1998) proposed a public-key cryptosystem based on generalized inverses of matrices. In 2001, Sun proposed a scheme for cryptanalysing Wu and Dawson's public-key cryptosystem. However, his method is time intensive because message recovery requires the pre-computation of many plaintext and ciphertext pairs (m/sub i/, c/sub i/). This paper shows how anyone knowing only the public key and a ciphertext can easily retrieve the corresponding message by solving the linear equation system. Thus, it proves that the proposed cryptanalysis method is very efficient for breaking Wu and Dawson's public-key cryptosystem.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Possible techniques for three dimensional hatching","authors":"V. Savchenko, H. Unno, Nikita Kojekine","doi":"10.1109/CW.2002.1180920","DOIUrl":"https://doi.org/10.1109/CW.2002.1180920","url":null,"abstract":"This paper introduces a basic technique for drawing non-photorealistic images of volume models. The turtle graphics approach to imitating painting operations is implemented in 3D space. Objects are defined by sets of scattered range data. Analytically (that is, functionally represented) and procedurally defined geometric objects can also be used. The proposed technique is described in detail and painting examples that demonstrate its applicability to non-photorealistic rendering or hatching are provided.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122786067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRLE - an efficient data compression scheme for image composition of parallel volume rendering systems","authors":"Ching-Feng Lin, Yeh-Ching Chung, Don-Lin Yang","doi":"10.1109/CW.2002.1180918","DOIUrl":"https://doi.org/10.1109/CW.2002.1180918","url":null,"abstract":"In this paper we present an efficient data compression scheme, the template run-length encoding (TRLE) scheme, for image composition of parallel volume rendering systems. Given an image with 2n/spl times/2n pixels, in the TRLE scheme, the image is treated as n/spl times/n blocks and each block has 2/spl times/2 pixels. Since a pixel can be a blank or non-blank pixel, there are 16 templates in a block. To compress an image, the TRLE scheme uses the templates to encode blocks row by row. Blocks in the same row are encoded as a TRLE-sequence. By packing all TRLE-sequences in a packet, the packet is the compressed partial image that can be sent/received among processors. To evaluate the performance of the TRLE scheme, we compare the proposed scheme with the BR, the RLE, and the BRLC schemes. Since a data compression scheme needs to cooperate with some data communication schemes, in the implementation, the binary-swap (BS), the parallel-pipelined (PP), and the rotate-tiling (RT) data communication schemes are used. By combining the four data compression schemes with the three data communication schemes, we have twelve image composition methods. These twelve methods are implemented on a PC cluster The data computation time and the data communication time are measured. The experimental results show that the TRLE data compression scheme with the RT data communication scheme outperforms other eleven image composition methods.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"University software education matched to social requests","authors":"T. Yamaura, A. Onoma","doi":"10.1109/CW.2002.1180898","DOIUrl":"https://doi.org/10.1109/CW.2002.1180898","url":null,"abstract":"We raised issues of how the software education matching to a social request should be carried out in universities in this cyber-world era. In the high-tech era, it is unavoidable that almost all the high-tech products are provided as black-box. For this reason, it, too, is unavoidable that the education in high-tech era will, in stead of extracting the befit of the high-tech stuff, force us to memorize the \"manners\" which were institutionalized by a few high-tech gurus. As basic tools, everybody has to learn word processors, such as Word and Ichitaro, PowerPoint and Excel, and LATEX including tgif. On the other hand, special subjects, such as programming languages, programming language theory, compiler theory, OS theory, DBMS, Internet technology, business models, and software engineering are needed when becoming a software specialist. Mathematics, such as differentiation integral calculus, and physics, such as general dynamics must be also required as liberal arts of software science. The laws related to the patent, copyright, and accountancy for a floatation, and the logical thinking method are the subjects which should be studied as an application subject. In order to prepare the educational environment to study this wide scope of subjects, we must tackle the issues such as restriction of the number of credits and maintenance of lecturer staff. Such issues may be solved by applying less strict criteria when hiring lecturers, reexamining of the whole curriculum, or changing the system of company examination when employing new hires. This paper shows some proposals and remedies applicable to the universities in Japan.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A stitching algorithm of still pictures with camera translation","authors":"Yang Linghong, M. Hirakawa","doi":"10.1109/CW.2002.1180877","DOIUrl":"https://doi.org/10.1109/CW.2002.1180877","url":null,"abstract":"We propose a method to stitch still images taken by a camera with translation and generate a panoramic image automatically. In such a situation, perspective parallax may arise at overlapping regions of two neighboring picture images, making stitching difficult if we use the existing algorithm in panoramic systems. To solve this problem, we introduce a technique of pattern detection and point-based matching. Pattern detection is carried out in two stages. The first is line detection, and the second is image segmentation. By using this technique, the system finds where the overlapping region is in each pair of neighboring images, and ascertains whether perspective parallax exists. If this pattern detection cannot extract a similar segment from two neighboring images, point-based matching is applied to complete panoramic image generation. Several points with significant features are sampled from one image, and their corresponding points are searched in the other image by point pattern matching.","PeriodicalId":376322,"journal":{"name":"First International Symposium on Cyber Worlds, 2002. Proceedings.","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}