{"title":"Robust visual odometry using stereo reconstruction error model","authors":"Dan Pojar, P. Jeong, S. Nedevschi","doi":"10.1109/ICCP.2012.6356178","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356178","url":null,"abstract":"The fundamental problem of localization remains one of the key areas of improvement concerning any type of mobile vehicle. Lately great interest in the research community was presented for vision based localization methods. In this article a solution is proposed for radically improving precision when a stereo camera is used for image acquisition. While providing great number of advantages, stereo cameras have one major disadvantage: that of very noisy coordinates of the reconstructed 3D coordinates. Here we present a method to correspondingly take into account the noise in the case of consecutive spatial movements of a stereo camera. The solution is based on an elegant error model that is used for weighting each measurement correspondingly to its modeled error. Computationally the burden of such modifications to the direct visual odometry model does not affect the on-line speed.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115236639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile embedded system for human computer communication in assistive technology","authors":"R. Lupu, F. Ungureanu, R. Bozomitu","doi":"10.1109/ICCP.2012.6356187","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356187","url":null,"abstract":"In this paper a new technology to communicate with people with neuro-locomotor disabilities using embedded systems and eye tracking approach is presented. The eye movement is detected by a special device and the voluntary eye blinking is correlated with a pictogram or keyword selection reflecting patient's needs. The implemented eye tracking method uses image processing technique based on binarization algorithm.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Part-based pedestrian detection using HoG features and vertical symmetry","authors":"Andrei Claudiu Cosma, R. Brehar, S. Nedevschi","doi":"10.1109/ICCP.2012.6356190","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356190","url":null,"abstract":"This paper describes a new approach for pedestrian detection in traffic scenes. The originality of the method resides in the combination of the benefits of the symmetry characteristic for pedestrians in intensity images and the benefits of deformable part-based models for recognizing pedestrians in multiple object hypotheses generated by a stereo vision system. A mixture model based on several pedestrian attitudes is used for addressing the large intraclass variability that pedestrians may have (they may have different poses and attitudes like: standing, walking, running etc). We have used a probabilistic approach based on support vector machine (SVM) and histograms of gradient orientations (HoG) features for pedestrian classification.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a conceptual model for describing the personas methodology","authors":"S. Negru, S. Buraga","doi":"10.1109/ICCP.2012.6356169","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356169","url":null,"abstract":"In the field of Human-Computer Interaction, the Personas methodology is used to communicate the user's preferences, goals, frustrations and requirements. Although a widely used method, little progress has been made in creating a personas model. This paper aims to provide such a conceptual model, which includes concepts and properties used in the personas methodology, via an OWL specification.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aggregated metrics guided software restructuring","authors":"Z. Marian","doi":"10.1109/ICCP.2012.6356197","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356197","url":null,"abstract":"Software restructuring is of major importance in improving the reusability of a software system, being a form of perfective maintenance that modifies the structure of the system, without affecting the external behavior of the code. We are investigating in this paper how multiple software metrics defined for the application classes from a software system can be aggregated and used in order to improve the system's internal structure. Computational experiments are provided showing the effectiveness of using the aggregated software metric for restructuring a software system. The obtained results are promising, and illustrate that the research direction started in this paper has potential and it is worth being further investigated and extended.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131781610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of techniques for opportunistic networking","authors":"A. Asandei, C. Dobre, P. Johnson","doi":"10.1109/ICCP.2012.6356211","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356211","url":null,"abstract":"Opportunistic networks, as opposed to classic ones, rely on human-carried devices. This leads to a high mobility of all the nodes in the network and a very dynamic topology. Developing good forwarding algorithms for optimum routing in opportunistic networks presents a specific set of challenges. The most notable forwarding solutions rely on social human mobility patterns. They depend on several key factors and assumptions. The purpose of this paper is to provide an increased understanding on how these factors can influence routing performance. For this purpose we focus on the number of copies for each generated message, altruism and frequency of exchanged messages. The analysis is based on data collected from a social tracing experiment conducted at the University Politehnica of Bucharest. The setup and implementation of this experiment will also be presented in this paper.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121274273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel color, shape and texture-based scene image descriptors","authors":"S. Banerji, A. Sinha, Chengjun Liu","doi":"10.1109/ICCP.2012.6356193","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356193","url":null,"abstract":"This paper introduces several novel color, shape and texture-based image descriptors for scene image classification with applications to image search and retrieval. Specifically, first, a new 3-Dimensional Local Binary Pattern (3D-LBP) descriptor is proposed for color image local feature extraction. Second, a new shape descriptor (HaarHOG) is introduced by combining Haar wavelet transformation and Histogram of Oriented Gradients (HOG). Third, these descriptors are fused using an optimal feature representation technique to generate a robust 3-Dimensional LBP-HaarHOG (3DLH) descriptor that can perform well on different scene image categories. Finally, the Enhanced Fisher Model (EFM) is applied for discriminatory feature extraction and the nearest neighbor classification rule is used for image classification. The proposed descriptors and fusion technique are evaluated using three grand challenge datasets: the MIT Scene dataset, the UIUC Sports Event dataset, and a part of the Caltech 256 dataset.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126937697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing software locking mechanisms against reverse engineering, using artificial neural networks","authors":"C. Lungu, R. Potolea","doi":"10.1109/ICCP.2012.6356165","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356165","url":null,"abstract":"Protection of intellectual property against unwanted tampering is a pressing issue to many content providers. Access to sensitive information typically takes the form of copyright violations. To address this issue, owners typically employ different protection mechanisms. Many are weak (e.g., they have single points of failure), rendering them vulnerable to static analysis. Others are expensive to implement (e.g., they induce large performance penalties). In this paper we present a new method of protecting copyrighted material by using a locking mechanism based on artificial neural networks (ANN). Understanding the operation of a ANN is difficult as the knowledge is embedded in a complex, distributed, and sometimes self-contradictory form. The security of our system is based on replacing the decryption function of the protected information with a semantically equivalent artificial neural network. We designed the system so as to eliminate single points of failure and allow for retroactive key generations for the same protected material. This allows a many-to-one relationship between the keys and the encryption. The protection offered by our mechanism is resilient to reverse engineering and static analysis. We also describe a methodology for creating these types of locking mechanisms and also evaluate the proposed system based on several properties.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Valued Neuron with a periodic activation function — New learning strategy","authors":"V. M. Lupea","doi":"10.1109/ICCP.2012.6356164","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356164","url":null,"abstract":"Multi-Value Neurons (MVN) arouse from the necessity to solve those highly non-linear, multi-threshold problems. Various activation functions and learning algorithms were developed in the last years, which in time gave birth to a new type of MVN, called MVN with a periodic activation function (MVN-P). This neuron presented higher functionality than a MVN. The next natural step was trying to integrate this MVN-P into a Neural Network (NN) to increase further more its functionality.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposed generalized mean single multiplicative neuron model","authors":"M. A. Attia, E. Sallam, M. Fahmy","doi":"10.1109/ICCP.2012.6356163","DOIUrl":"https://doi.org/10.1109/ICCP.2012.6356163","url":null,"abstract":"This paper presents a single multiplicative neuron model based on a polynomial architecture. The proposed neuron model consists of a non-linear aggregation function based on the concept of generalized mean of all multiplicative inputs. This neuron model has the same number of parameters as the single multiplicative neuron model (SMN). The SMN model is a special case of the proposed generalized mean single multiplicative neuron (GMSMN) model. The structure of this model is simpler than higher-order neuron model. The simulation results show that the performance of the proposed neuron model is better than SMN model.","PeriodicalId":406461,"journal":{"name":"2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127271254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}