2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)最新文献

筛选
英文 中文
QR Code detection using parallel lines QR码检测使用平行线
Gabriel Klimek, Z. Vámossy
{"title":"QR Code detection using parallel lines","authors":"Gabriel Klimek, Z. Vámossy","doi":"10.1109/CINTI.2013.6705244","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705244","url":null,"abstract":"Several basic techniques are known for QR Code detection in digital images. This paper presents an approach that utilizes a special line parameterization, along with a variant of the Hough-transform, called PClines. The premised parameterization uses a parallel coordinate system, which allows faster accumulation than the slope-intercept method used by the basic Hough-transform, due to simpler computation. The presented technique can be easily adapted to any kind of matrix code. Mathematical and algorithmic foundations of this approach are presented, along with an implementation on Microsoft's .NET framework. Test results are also presented, emphasizing the effect of different parameters on the overall detection rate. These results are then compared to other implementations using the same PClines technique.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121320884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A circular chain intrusion detection for cloud computing based on improved AdjointVM approach 基于改进AdjointVM方法的云计算环链入侵检测
U. Oktay, M. Aydin, O. K. Sahingoz
{"title":"A circular chain intrusion detection for cloud computing based on improved AdjointVM approach","authors":"U. Oktay, M. Aydin, O. K. Sahingoz","doi":"10.1109/CINTI.2013.6705192","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705192","url":null,"abstract":"Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fall body detection algorithm based on tri-accelerometer sensors 基于三加速度传感器的跌倒体检测算法
P. Salgado, P. Afonso
{"title":"Fall body detection algorithm based on tri-accelerometer sensors","authors":"P. Salgado, P. Afonso","doi":"10.1109/CINTI.2013.6705221","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705221","url":null,"abstract":"In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimizing camera placement for localization accuracy 优化相机位置定位精度
D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz
{"title":"Optimizing camera placement for localization accuracy","authors":"D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz","doi":"10.1109/CINTI.2013.6705193","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705193","url":null,"abstract":"This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Document creation with Information retrieval system support 文档创建与信息检索系统的支持
T. Betina, I. Polásek
{"title":"Document creation with Information retrieval system support","authors":"T. Betina, I. Polásek","doi":"10.1109/CINTI.2013.6705181","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705181","url":null,"abstract":"This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"133 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semi-automatic refactoring to aspect-oriented platform 面向方面平台的半自动重构
Pipik Roman, I. Polásek
{"title":"Semi-automatic refactoring to aspect-oriented platform","authors":"Pipik Roman, I. Polásek","doi":"10.1109/CINTI.2013.6705180","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705180","url":null,"abstract":"Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effects of random temperature and pressure influence on the single-channel optical transmission system 随机温度和压力对单通道光传输系统的影响
L. Ladanyi, M. Ďulík, J. Mullerová
{"title":"Effects of random temperature and pressure influence on the single-channel optical transmission system","authors":"L. Ladanyi, M. Ďulík, J. Mullerová","doi":"10.1109/CINTI.2013.6705203","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705203","url":null,"abstract":"In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling patient remote rehabilitation through motion monitoring and analysis 通过运动监测和分析实现患者远程康复
M. Kozlovszky
{"title":"Enabling patient remote rehabilitation through motion monitoring and analysis","authors":"M. Kozlovszky","doi":"10.1109/CINTI.2013.6705171","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705171","url":null,"abstract":"Accurate motion monitoring can provide detailed information through qualitative and quantitative analysis of patient movements in the field of rehabilitation and thus can become an effective tool set for treatment of motion problems. Normally patients are doing rehabilitation training programs under the guidance of their supervisor only during some small fragment (1-2 hours) of the day. Remote motion monitoring can enable skilled medical staff to monitor closely patient's training activities at home during the whole day, thus multi-part (morning, afternoon, evening) training sessions can be included easily into the daily life and in certain cases (e.g.: stroke rehabilitation) this can enhance the healing process significantly and can lead to better restoration results. Accurate movement/motion monitoring can enable medical experts to introduce individual (patient specific) rehabilitation programs, and assess the value of the training program at any time with high granularity level. The MOVANDIS framework is a novel, generic, vendor independent motion data collector and movement visualizer software solution. This paper focuses mainly its internal architecture, and its usage scenarios within the field of telerehabilitation.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using game theory to optimize traffic light of an intersection 运用博弈论优化十字路口交通灯
Mohammad Khanjary
{"title":"Using game theory to optimize traffic light of an intersection","authors":"Mohammad Khanjary","doi":"10.1109/CINTI.2013.6705201","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705201","url":null,"abstract":"Several Approaches have been proposed so far to optimize traffic lights timing of traffic lights based on different technologies such as wireless sensor networks, fuzzy-neural, agents, fuzzy-genetic algorithm, dynamic programming, petri-nets and recently, game theory. In this paper, we propose a new approach based on game theory. The Simulation results showed that the proposed scheme can improve the traffic significantly.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of dynamic overlays for association football from TV broadcasting 足协足球电视转播动态叠加检测
Ing Francisco Siles
{"title":"Detection of dynamic overlays for association football from TV broadcasting","authors":"Ing Francisco Siles","doi":"10.1109/CINTI.2013.6705165","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705165","url":null,"abstract":"This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信