International Conference on Computer Vision and Image Analysis Applications最新文献

筛选
英文 中文
Frequency domain DOA estimation for positioning in impulse radio ultra-widband systems 脉冲无线电超宽带系统定位的频域DOA估计
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351876
H. Meknessi, F. Harrabi, A. Gharsallah
{"title":"Frequency domain DOA estimation for positioning in impulse radio ultra-widband systems","authors":"H. Meknessi, F. Harrabi, A. Gharsallah","doi":"10.1109/ICCVIA.2015.7351876","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351876","url":null,"abstract":"The emergence of smart antenna technology gave the advantage to reduce interference inherent in dense multipath propagation channels to improve coverage and increase system capacity, so, various localization systems have been proposed based on the Impulse Radio Ultra Wide band (IR-UWB) signals using direction of arrival estimation. In order to ensure high precision in indoor environment, DOA estimation techniques have been developed. In this paper, performance of many high resolution methods for Impulse Radio Ultra Wide band (IR-UWB) systems in frequency domain such as ROOT-MUSIC, estimation of signal parameters via rotational invariance technique (ESPRIT) and Matrix PENCIL are evaluated, as well as these techniques are compared also with the performance corresponding to the Cramer- Rae lower bound (CRB). Synthesis results and relevant performance comparisons are presented.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting young students to learn computer programming in an early schooling 支持年轻学生在早期学习计算机编程
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351898
M. Alghamdi, D. Al-Jumeily, A. Hussain
{"title":"Supporting young students to learn computer programming in an early schooling","authors":"M. Alghamdi, D. Al-Jumeily, A. Hussain","doi":"10.1109/ICCVIA.2015.7351898","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351898","url":null,"abstract":"The deployments of technology across the global toward efficient learning environment are growing rapidly. In United Kingdom educational system, the government is investing 1.1 million pounds in primary and secondary school for early programming lessoning starting from age five upwards. The ideology behind this innovation is to make younger generation linked to innovation and digital industries and improve the pace with the most successful education system in the world. In this paper, an assessment-driven educational programming tutoring system for young students is described in a high-level overview (which provides an abstract design of the main components of the proposed system), as well as a detailed discussion of some of the existing tutoring programming tools for kids. The intention will be to develop this given proposed design fully functional and then evaluate it in different primary schools from the UK and other Middle East countries. One of our main intended aims of this study would be to offer a suitable educational programming system that could ease the process of teaching and learning programming for kids in primary schooling.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new privacy-preserving web metering scheme using third-party-centric analytics 一个新的保护隐私的网络计量方案,使用以第三方为中心的分析
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351874
Fahad Alarifi, M. Fernández
{"title":"A new privacy-preserving web metering scheme using third-party-centric analytics","authors":"Fahad Alarifi, M. Fernández","doi":"10.1109/ICCVIA.2015.7351874","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351874","url":null,"abstract":"It is desirable for advertising webservers to have a web metering scheme that can securely produce accurate number of unique users while preserving users' privacy. To achieve such balance between accuracy and privacy, the web metering scheme has to collect data about users in a privacy-preserving manner. If users are authenticated, it is easy to determine the number of unique visitors; however, authentication and privacy are inherently conflicting requirements. This paper proposes an analytics-based web metering scheme that improves privacy while providing “good enough” accurate results, compared to previous schemes. More precisely, we propose a generic web metering scheme to securely capture data about users in a privacy-preserving manner, and study different scenarios in which the scheme can be implemented. Each scenario is described, outlining assumptions and techniques. The scenarios and underlying techniques can be used as improvements to the privacy of existing schemes (like Google Analytics) while maintaining accurate results.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121461704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of routing protocols in wireless sensor network 无线传感器网络路由协议的分类
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351790
Hiba Sami Bazzi, A. Haidar, Ahmad Bilal
{"title":"Classification of routing protocols in wireless sensor network","authors":"Hiba Sami Bazzi, A. Haidar, Ahmad Bilal","doi":"10.1109/ICCVIA.2015.7351790","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351790","url":null,"abstract":"Lifetime of a node is a critical concern in wireless sensor network (WSN). Nowadays networks are becoming large, so data collected is becoming even larger, which all consume great amount of energy leading to an early death of a node. Therefore, researches are done to minimize the energy used in data sampling and collection to prolong the life time of a network. Through years several routing protocols are proposed and enhanced. In this paper we introduce several factors to consider before choosing and implementing a routing protocol.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Labeling abnormalities in video based complex Human-Object Interactions by robust affordance modelling 基于鲁棒可视性模型的复杂人机交互视频异常标记
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351886
Mahmudul Hassan, A. Dharmaratne
{"title":"Labeling abnormalities in video based complex Human-Object Interactions by robust affordance modelling","authors":"Mahmudul Hassan, A. Dharmaratne","doi":"10.1109/ICCVIA.2015.7351886","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351886","url":null,"abstract":"Identifying abnormalities in complex Human Object Interaction (HOI) based videos and labeling their possible categories is a novel and ambitious research problem, which requires an optimal blend of the state of the art computer vision and machine learning algorithms. For classifying a HOI event normal or abnormal and subsequently classifying the potential abnormal categories requires the knowledge of the mutual relations between the Human, object and the ambient environment. Researchers have been using various contexts like spatial, temporal, sequential etc. to classify the abnormal actions. In this paper, we have introduced a novel context of object's affordance (which is a semantic map of the human, object and the ambient environment) to identify abnormalities in Human Object Interactions. Furthermore, the sub-classification of the abnormalities is also realized. In order to achieve our goal, we have introduced a set of novel attributes associated with the Human and the Objects and mapped them in a Bayesian network framework. The inference capabilities of the system depict the successful identification of abnormal events. We have also initiated a novel dataset of abnormal Human-Object Interactions in domestic settings. This research work also made a valiant effort to capitalize the abundant statistical data sources currently available, related to the domestic accidents and use them to nourish a practical classifier.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114376812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fraud detection in international calls using fuzzy logic 模糊逻辑在国际电话诈骗检测中的应用
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351891
Hussein M. Marah, Osama Mohamed Elrajubi, Abdulla A. Abouda
{"title":"Fraud detection in international calls using fuzzy logic","authors":"Hussein M. Marah, Osama Mohamed Elrajubi, Abdulla A. Abouda","doi":"10.1109/ICCVIA.2015.7351891","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351891","url":null,"abstract":"Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fraud causes severe losses in revenue to operators with other negative side effects. In this paper a new fraud detection technique is proposed. The proposed technique depends on user profiling and using fuzzy logic. Fuzzy logic was used in decision making process by utilizing fuzzy logic membership function. A real database from mobile operator company Almadar Aljadid in Libya is used in this investigation. Five features are extracted and employed as detection patterns in the proposed technique. The five features or detection patterns are, subscriber's mobility, incoming to outgoing calls ratio, suspicious cell activity, irregular calls, and service type.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An algorithm to find the best time to tweet 找到发推特的最佳时间的算法
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351786
Abdullatif M. Al Abdullatif, Raid Alsoghayer, Esra M. AlMajhad
{"title":"An algorithm to find the best time to tweet","authors":"Abdullatif M. Al Abdullatif, Raid Alsoghayer, Esra M. AlMajhad","doi":"10.1109/ICCVIA.2015.7351786","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351786","url":null,"abstract":"The modern technological developments created a quantum leap and a real revolution in the world of communication. Among the most prominent of these communications are the social networks that have made communication easy and fast between individuals. Twitter is one of the social networks that have grown significantly in recent years. Due to the dynamic nature of its timeline, hidden tweets to the followers decreases the activity level with them. Thus, this forms a major challenge for the tweeter. We aim to solve this problem by proposing system that use a novel algorithm dedicated to discover the appropriate times to tweet based on the analysis of the active followers usage behavior. This research will offer a highly valuable solution that helps the tweeters to receive the highest percentage of engagement and the proliferation of tweets among their targeted followers.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Green novel power control framework for dense femtocell grids 面向密集飞cell网格的新型绿色功率控制框架
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351895
Mazen Al Haddad, M. Bayoumi
{"title":"Green novel power control framework for dense femtocell grids","authors":"Mazen Al Haddad, M. Bayoumi","doi":"10.1109/ICCVIA.2015.7351895","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351895","url":null,"abstract":"High dense neighboring Femtocells are seen as future low-cost solution to significantly gain capacity compared to Macro-only deployment. Dense HetNet, which requires progressive introduction of Femtocells, offers scalable networks towards 1000 fold gains in capacity as per technology vision for 5G. In such dense networks, the problem of interference comes between the Macrocells and Femtocells as well as among the Femtocells themselves. Valuable insights in the Macro-Femto interference are available, while the Femto-Femto interference aspects remain partially addressed. This paper outlines this problem and points potential solution strategies to mitigate the Femto-Femto interference, increase the network capacity, decrease the power consumption and likewise reduce the CO2 footprint. According to the system level simulation of our novel power control framework, user throughput is 15,9% to 49,3% greater than that of the conventional power control schemas. This is equal to 9,87 to 12,35kg CO2 emission reduction per year for one Femtocell BS.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A combined distance measure for 2D shape matching 二维形状匹配的组合距离度量
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351875
G. Ramachandran
{"title":"A combined distance measure for 2D shape matching","authors":"G. Ramachandran","doi":"10.1109/ICCVIA.2015.7351875","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351875","url":null,"abstract":"We present a method for 2D shape matching using a combination of distance functions and discrete curvature. The eccentricity transform computes the longest geodesic distance across the object. This transform is invariant to translation and rotation. The maximal eccentricity points yield diameters across the image. We compute the Euclidean distances from the boundary to the diameter to characterize the curvature of the shape. Our shape descriptor is comprised of the best matches retrieved from the normalized histogram of the eccentricities, the Hausdorff distance between the set of distances to the diameter and a measure of the number of points lying on either side of the diameter along with the peak values. We evaluate this descriptor on 2D image databases consisting of rigid and articulated shapes by ranking the number of matches. In almost all cases, the shapes are matched with at least one shape from the same class.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accurate, swift and noiseless image binarization 准确、快速、无噪声的图像二值化
International Conference on Computer Vision and Image Analysis Applications Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351908
Wassim Al-Khawand, S. Kadry, Riccardo Bozzo, K. Smaili
{"title":"Accurate, swift and noiseless image binarization","authors":"Wassim Al-Khawand, S. Kadry, Riccardo Bozzo, K. Smaili","doi":"10.1109/ICCVIA.2015.7351908","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351908","url":null,"abstract":"In this paper, we will present an accurate, swift and noiseless image binarization technique that was tested on real life back side container images. Our approach consists of converting a colored image to a grayscaled one, then to construct the histogram which will be divided into group of colors and after that, the foreground - that can be darker or lighter than the background - will be automatically identified and finally, the foreground boundaries will be assiduously enhanced before creating the binarized image. The average processing time of our proposed method is around 0.8 milliseconds which makes it highly suitable for real life multi-user applications.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信