首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
Wireless Sensors Network in the Efficient Management of Greenhouse Crops 无线传感器网络在温室作物高效管理中的应用
Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yánez, Cristhy Jiménez Granizo
A Greenhouse is an indoor covered place where plants are grown and cultivated. In the agriculture field, the crops into greenhouse are highly used due that they provide a little micro-environment that can be easier controlled. At this same context, there are some important parameters that should be monitored at a greenhouse in order to achieve good results at the end of the agricultural production. Two of these parameters are precisely the temperature and humidity that are been commonly measured with manual methods. The wireless sensors networks (WSN) are defined as the collection of sensor nodes that perform a specific task and they are representing one of the technological solutions to automatize and improve the management of crops. This paper summarizes the work carried out to provide an efficient control mechanism of microclimate into greenhouses through the implementation of an infrastructure of Wireless Sensors Network to control environmental parameters. It was possible to probe the effectiveness of this mechanism through the comparative analysis of measures taken using both (1) traditional manual mechanism and (2) automatized with sensors mechanism. A crop of tomato was selected as a case study in which a physic network topology was deployed. Additionally, a management data application was developed taking into account usability parameters in order to create a tool easily accepted by the future users.
温室是种植植物的室内有盖的地方。在农业领域,由于温室作物提供了一个更容易控制的微环境,因此被高度利用。在同样的背景下,为了在农业生产结束时取得良好的效果,在温室中应该监测一些重要的参数。其中两个参数就是通常用人工方法测量的温度和湿度。无线传感器网络(WSN)被定义为执行特定任务的传感器节点的集合,它们代表了自动化和改进作物管理的技术解决方案之一。本文总结了通过实施无线传感器网络基础设施来控制环境参数,为温室小气候提供有效控制机制所做的工作。通过对比分析(1)传统手动机构和(2)带有传感器的自动化机构所采取的措施,可以探讨该机构的有效性。选择番茄作物作为部署物理网络拓扑的案例研究。此外,还开发了一个考虑可用性参数的管理数据应用程序,以便创建一个易于被未来用户接受的工具。
{"title":"Wireless Sensors Network in the Efficient Management of Greenhouse Crops","authors":"Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yánez, Cristhy Jiménez Granizo","doi":"10.1109/ITNG.2012.136","DOIUrl":"https://doi.org/10.1109/ITNG.2012.136","url":null,"abstract":"A Greenhouse is an indoor covered place where plants are grown and cultivated. In the agriculture field, the crops into greenhouse are highly used due that they provide a little micro-environment that can be easier controlled. At this same context, there are some important parameters that should be monitored at a greenhouse in order to achieve good results at the end of the agricultural production. Two of these parameters are precisely the temperature and humidity that are been commonly measured with manual methods. The wireless sensors networks (WSN) are defined as the collection of sensor nodes that perform a specific task and they are representing one of the technological solutions to automatize and improve the management of crops. This paper summarizes the work carried out to provide an efficient control mechanism of microclimate into greenhouses through the implementation of an infrastructure of Wireless Sensors Network to control environmental parameters. It was possible to probe the effectiveness of this mechanism through the comparative analysis of measures taken using both (1) traditional manual mechanism and (2) automatized with sensors mechanism. A crop of tomato was selected as a case study in which a physic network topology was deployed. Additionally, a management data application was developed taking into account usability parameters in order to create a tool easily accepted by the future users.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133682217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset 基于小波变换的步态识别方法及其评价,以中国科学院步态数据库为人类步态识别数据集
K. Arai, Rosa Andrie
Human Gait: HG recognition method based on wavelet transformation is proposed. Using Chinese Academy of Sciences (CASIA), the proposed method is evaluated and is compared to the conventional HG recognition method without utilizing wavelet transformation. In particular, two preprocessing methods, model based and model free methods are attempted for the proposed HG recognition. Also 2D Discrete Wavelet Transform (DWT), and 2D lifting Wavelet Transform (LWT) level 1 decomposition are features in the proposed HG recognition method. Haar base function of wavelet transformation is also used for feature extraction in the proposed method. Experimental results with CASIA database show x % improvement in terms of correct classification performance in comparison to the conventional method.
提出了基于小波变换的人体步态HG识别方法。利用中国科学院(CASIA)对该方法进行了评价,并与不使用小波变换的传统HG识别方法进行了比较。在此基础上,对基于模型和无模型两种预处理方法进行了尝试。二维离散小波变换(DWT)和二维提升小波变换(LWT)一级分解是该方法的特点。该方法还利用小波变换的Haar基函数进行特征提取。在CASIA数据库上的实验结果表明,与传统方法相比,该方法的正确分类性能提高了x %。
{"title":"Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset","authors":"K. Arai, Rosa Andrie","doi":"10.1109/ITNG.2012.164","DOIUrl":"https://doi.org/10.1109/ITNG.2012.164","url":null,"abstract":"Human Gait: HG recognition method based on wavelet transformation is proposed. Using Chinese Academy of Sciences (CASIA), the proposed method is evaluated and is compared to the conventional HG recognition method without utilizing wavelet transformation. In particular, two preprocessing methods, model based and model free methods are attempted for the proposed HG recognition. Also 2D Discrete Wavelet Transform (DWT), and 2D lifting Wavelet Transform (LWT) level 1 decomposition are features in the proposed HG recognition method. Haar base function of wavelet transformation is also used for feature extraction in the proposed method. Experimental results with CASIA database show x % improvement in terms of correct classification performance in comparison to the conventional method.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number 基于二进小波变换的数据隐藏方法利用基于随机数的排列矩阵游程编码提高循环图像上秘密图像的不可见性
K. Arai
An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images which are embedded in circulation images is evaluated with the Root Mean Square difference between the original secret image and extracted one from the circulation images. Mean while the conventional Multi- Resolution Analysis (MRA) based data hiding is attempted with a variety of parameters, level of MRA and the frequency component location of which secret image is replaced to it and is compared to the proposed method. It is found that the proposed data hiding method is superior to the conventional method. Also the conventional data hiding method is not robust against circulation image processing.
针对循环图像中秘密图像的不可见性问题,提出了基于二进小波变换的数据隐藏方法,并采用随机数确定隐码位置的行长编码秘密图像。通过实验证实,秘密图像在流通图像中几乎是不可见的。讨论了该方法对循环图像数据压缩的鲁棒性。利用原始秘密图像与从循环图像中提取的秘密图像的均方根差来评价嵌入到循环图像中的秘密图像的数据隐藏性能。同时,对基于多分辨率分析(MRA)的传统数据隐藏方法进行了多种参数的尝试,将多分辨率分析的水平和秘密图像的频率分量位置替换为MRA,并与提出的方法进行了比较。实验结果表明,所提出的数据隐藏方法优于传统的数据隐藏方法。此外,传统的数据隐藏方法对循环图像处理的鲁棒性较差。
{"title":"Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number","authors":"K. Arai","doi":"10.1109/ITNG.2012.163","DOIUrl":"https://doi.org/10.1109/ITNG.2012.163","url":null,"abstract":"An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images which are embedded in circulation images is evaluated with the Root Mean Square difference between the original secret image and extracted one from the circulation images. Mean while the conventional Multi- Resolution Analysis (MRA) based data hiding is attempted with a variety of parameters, level of MRA and the frequency component location of which secret image is replaced to it and is compared to the proposed method. It is found that the proposed data hiding method is superior to the conventional method. Also the conventional data hiding method is not robust against circulation image processing.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Engine Web Store: Create Your Web Store and Publish It on Your Social Network 社交引擎网络商店:创建你的网络商店,并在你的社交网络上发布
Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira
This investigation proposes the creation of a Web Store, using Social Networks for increasing reliability and customer confidence. A social engine, developed by the authors, provides a simple and intuitive way to create a Web Store on the cloud. The concept was tested with a Usability Test, by the Research and Development Department of Magazine Luiza (one of the larger Retailer/E-retailer in Brazil). The initial results are promising and the Company is operating it as an in-house basis, in order to probe the concept. It is expected that this way the trust in the Magazine E-commerce operation will attain a higher confidence degree and thus get a larger share of the Brazilian market.
这项调查建议创建一个网络商店,使用社会网络来提高可靠性和客户信心。作者开发了一个社交引擎,提供了一种简单直观的方式在云上创建Web Store。这个概念由Luiza杂志(巴西较大的零售商/电子零售商之一)的研发部门进行了可用性测试。最初的结果是有希望的,公司正在内部操作它,以探索这个概念。预计通过这种方式,杂志电商运营的信任度将达到更高的置信度,从而获得更大的巴西市场份额。
{"title":"Social Engine Web Store: Create Your Web Store and Publish It on Your Social Network","authors":"Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira","doi":"10.1109/ITNG.2012.73","DOIUrl":"https://doi.org/10.1109/ITNG.2012.73","url":null,"abstract":"This investigation proposes the creation of a Web Store, using Social Networks for increasing reliability and customer confidence. A social engine, developed by the authors, provides a simple and intuitive way to create a Web Store on the cloud. The concept was tested with a Usability Test, by the Research and Development Department of Magazine Luiza (one of the larger Retailer/E-retailer in Brazil). The initial results are promising and the Company is operating it as an in-house basis, in order to probe the concept. It is expected that this way the trust in the Magazine E-commerce operation will attain a higher confidence degree and thus get a larger share of the Brazilian market.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System Development for Violence Mapping in a Social Network in Real Time 实时社交网络中暴力映射的系统开发
C. G. Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira
This paper presents a proposal for development of a system to map the violence that occurs at São Paulo City in real time, one of the most important Brazilian capitals. This solution must be available in a social network. The application is developed for mobile and uses the Android Platform. Its function is to assist users in their navigability in the city, warning them about points of risk to make people drive more safely. Elements were considered in this research as distance calculation, creation of risk points on the city map, a list of automation risk points automatically and a warning of approaching danger point. With the popularity of mobile devices using the Android Platform and due to the number of occurrences of violence happening in the cities it was found that there is a large market that can be achieved with the development of this platform to address applications - or reduce - this problem.
本文提出了一个开发系统的建议,以实时绘制发生在巴西最重要的首都之一圣保罗市的暴力事件。此解决方案必须在社交网络中可用。该应用程序是为移动设备开发的,使用Android平台。它的功能是帮助用户在城市中导航,警告他们风险点,使人们更安全驾驶。本研究考虑了距离计算、在城市地图上创建风险点、自动创建自动化风险点列表和逼近危险点的警告等要素。随着使用Android平台的移动设备的普及,以及城市中发生的暴力事件的数量,人们发现,通过开发这个平台来解决应用程序或减少这个问题,可以实现一个巨大的市场。
{"title":"System Development for Violence Mapping in a Social Network in Real Time","authors":"C. G. Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira","doi":"10.1109/ITNG.2012.51","DOIUrl":"https://doi.org/10.1109/ITNG.2012.51","url":null,"abstract":"This paper presents a proposal for development of a system to map the violence that occurs at São Paulo City in real time, one of the most important Brazilian capitals. This solution must be available in a social network. The application is developed for mobile and uses the Android Platform. Its function is to assist users in their navigability in the city, warning them about points of risk to make people drive more safely. Elements were considered in this research as distance calculation, creation of risk points on the city map, a list of automation risk points automatically and a warning of approaching danger point. With the popularity of mobile devices using the Android Platform and due to the number of occurrences of violence happening in the cities it was found that there is a large market that can be achieved with the development of this platform to address applications - or reduce - this problem.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment 电话环境下多语言动态语音客服软件的开发
S. Makki, Charles Williams
This paper aims to design and develop a dynamic vocalization interface as telephone agent assistant. This interface uses tools such as, speech-to-text and text-to-speech software to translate the users' requests using a telephone. It consists of a number of libraries for recognition of multiple languages. This application aims for non-native individuals or groups who have accents and therefore have difficulties to utilize the speech recognition applications effectively. Since, the speech recognition engines utilized in telephone systems are generally developed for native language speakers. Although recent speech recognition systems have very intelligent speech recognition engine which can be tuned to any specific accent. They are not good candidates for the service industry, since a variety of users with a variety of accents use these applications for very short period of time and the speech recognition engines of these applications do not have enough time to adapt to many varieties of accents or pronunciations. In this paper, we develop a dynamic vocalization interface which can overcome this shortcoming and allows users with a variety of accents to effectively use the automated telephone systems and request services for their daily requirements. This application can also be utilized in various domains such as: health care, automobile industries to facilitate easier human to computer interactions.
本文旨在设计和开发一个动态语音界面作为电话座席助手。该界面使用语音转文本和文本转语音软件等工具,通过电话翻译用户的请求。它由许多用于识别多种语言的库组成。这个应用程序的目标是非母语的个人或群体,他们有口音,因此很难有效地利用语音识别应用程序。因此,电话系统中使用的语音识别引擎通常是为母语使用者开发的。虽然最近的语音识别系统有非常智能的语音识别引擎,可以调整到任何特定的口音。它们不适合服务行业,因为具有各种口音的各种用户在很短的时间内使用这些应用程序,并且这些应用程序的语音识别引擎没有足够的时间来适应各种口音或发音。在本文中,我们开发了一个动态发声接口,可以克服这一缺点,并允许各种口音的用户有效地使用自动电话系统并为他们的日常需求请求服务。该应用程序还可用于各种领域,如:医疗保健、汽车工业,以方便人机交互。
{"title":"Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment","authors":"S. Makki, Charles Williams","doi":"10.1109/ITNG.2012.137","DOIUrl":"https://doi.org/10.1109/ITNG.2012.137","url":null,"abstract":"This paper aims to design and develop a dynamic vocalization interface as telephone agent assistant. This interface uses tools such as, speech-to-text and text-to-speech software to translate the users' requests using a telephone. It consists of a number of libraries for recognition of multiple languages. This application aims for non-native individuals or groups who have accents and therefore have difficulties to utilize the speech recognition applications effectively. Since, the speech recognition engines utilized in telephone systems are generally developed for native language speakers. Although recent speech recognition systems have very intelligent speech recognition engine which can be tuned to any specific accent. They are not good candidates for the service industry, since a variety of users with a variety of accents use these applications for very short period of time and the speech recognition engines of these applications do not have enough time to adapt to many varieties of accents or pronunciations. In this paper, we develop a dynamic vocalization interface which can overcome this shortcoming and allows users with a variety of accents to effectively use the automated telephone systems and request services for their daily requirements. This application can also be utilized in various domains such as: health care, automobile industries to facilitate easier human to computer interactions.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems 基于分布式实时组件的嵌入式系统安全建模
Mehrdad Saadatmand, Thomas Leveque
Model Driven Engineering (MDE) and Component Based Software Development (CBSD) are promising approaches to deal with the increasing complexity of Distributed Real-Time Critical Embedded Systems. On one hand, the functionality complexity of embedded systems is rapidly growing. On the other hand, extra-functional properties (EFP) must be taken into account and resource consumption must be optimized due to limited resources. However, EFP are not independent and impact each other. This paper introduces concepts and mechanisms that allow to model security specifications and derive automatically the corresponding security implementations by transforming the original component model into a secured one taking into account sensitive data flow in the system. The resulted architecture ensures security requirements by construction and is expressed in the original meta model, therefore, it enables using the same timing analysis and synthesis as with the original component model.
模型驱动工程(MDE)和基于组件的软件开发(CBSD)是处理分布式实时关键嵌入式系统日益增加的复杂性的有前途的方法。一方面,嵌入式系统的功能复杂性正在迅速增长。另一方面,由于资源有限,必须考虑到额外功能属性(EFP),并且必须优化资源消耗。然而,EFP并不是相互独立的,而是相互影响的。本文介绍了一些概念和机制,这些概念和机制允许对安全规范进行建模,并通过将原始组件模型转换为考虑系统中敏感数据流的安全模型来自动导出相应的安全实现。生成的体系结构通过构造确保安全需求,并在原始元模型中表示,因此,它支持使用与原始组件模型相同的时序分析和综合。
{"title":"Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems","authors":"Mehrdad Saadatmand, Thomas Leveque","doi":"10.1109/ITNG.2012.103","DOIUrl":"https://doi.org/10.1109/ITNG.2012.103","url":null,"abstract":"Model Driven Engineering (MDE) and Component Based Software Development (CBSD) are promising approaches to deal with the increasing complexity of Distributed Real-Time Critical Embedded Systems. On one hand, the functionality complexity of embedded systems is rapidly growing. On the other hand, extra-functional properties (EFP) must be taken into account and resource consumption must be optimized due to limited resources. However, EFP are not independent and impact each other. This paper introduces concepts and mechanisms that allow to model security specifications and derive automatically the corresponding security implementations by transforming the original component model into a secured one taking into account sensitive data flow in the system. The resulted architecture ensures security requirements by construction and is expressed in the original meta model, therefore, it enables using the same timing analysis and synthesis as with the original component model.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance 视频监控中异常行为检测的上下文空间模型
A. Wiliem, V. Madasu, W. Boles, P. Yarlagadda
An automatic anomalous human behaviour detection is one of the goals of smart surveillance systems' domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context, (b) It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to consider knowledge learned from the relevant context only.
人类异常行为的自动检测是智能监控系统研究的目标之一。自动检测解决了现有监视系统背后的几个人为因素问题。要创建这样的检测系统,需要考虑上下文信息。这是因为为了理解人类的行为,语境是必要的。不幸的是,上下文信息在人类异常行为自动检测方法中的使用仍然有限。本文提出了一个上下文空间模型,它有两个好处:(a)它为系统设计者选择可用于描述上下文的信息提供了指导方针,(b)它使系统能够区分不同的上下文。对采用本文提出的上下文空间模型的基于上下文的系统和基于现有方法实现的系统进行了比较分析。将比较应用于使用来自CAVIAR数据集的视频片段构建的场景。结果表明,基于上下文的系统优于其他系统。这是因为上下文空间模型允许系统只考虑从相关上下文中学习到的知识。
{"title":"A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance","authors":"A. Wiliem, V. Madasu, W. Boles, P. Yarlagadda","doi":"10.1109/ITNG.2012.11","DOIUrl":"https://doi.org/10.1109/ITNG.2012.11","url":null,"abstract":"An automatic anomalous human behaviour detection is one of the goals of smart surveillance systems' domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context, (b) It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to consider knowledge learned from the relevant context only.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129983624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Semantic Web: A Topic Specific Search 语义网:主题特定搜索
K. Dharavath, S. Saritha
Topic - based search provides a promising paradigm for formulating complex semantic queries and representing results on the semantic web. A challenge for the application of the paradigm is the complexity of providing topic - based search services through application programming interfaces (API) and web services. In this paper topic specific search is done on domain like plants and animals. Using the ontology of animal and plant kingdom, the search engine is trained for topic based searching by constructing XML file for various plants and animals. Several images of plants and animals are crawled and classified into the various categories of animals and plants. The search results include the detail information of animal or plant searched along with the image of that category. An additional image filtering tool is designed to narrow down search results according to the user need.
基于主题的搜索为在语义网络上表述复杂的语义查询和表示结果提供了一个很有前途的范例。范例应用的一个挑战是通过应用程序编程接口(API)和web服务提供基于主题的搜索服务的复杂性。本文在植物和动物等领域进行主题搜索。利用动植物本体,通过构造各种动植物的XML文件,训练搜索引擎进行基于主题的搜索。一些植物和动物的图像被爬行并分类到不同的动物和植物类别中。搜索结果包括所搜索动物或植物的详细信息以及该类别的图像。一个额外的图像过滤工具被设计用来根据用户的需要缩小搜索结果。
{"title":"Semantic Web: A Topic Specific Search","authors":"K. Dharavath, S. Saritha","doi":"10.1109/ITNG.2012.29","DOIUrl":"https://doi.org/10.1109/ITNG.2012.29","url":null,"abstract":"Topic - based search provides a promising paradigm for formulating complex semantic queries and representing results on the semantic web. A challenge for the application of the paradigm is the complexity of providing topic - based search services through application programming interfaces (API) and web services. In this paper topic specific search is done on domain like plants and animals. Using the ontology of animal and plant kingdom, the search engine is trained for topic based searching by constructing XML file for various plants and animals. Several images of plants and animals are crawled and classified into the various categories of animals and plants. The search results include the detail information of animal or plant searched along with the image of that category. An additional image filtering tool is designed to narrow down search results according to the user need.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 基于阈值环签名随机数的安全性分析
Kaibin Huang, R. Tso
Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original "1-out-of-n" ring signature. For instance, "t-out-of-n" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.
自2001年Revist等人引入第一个环签名以来,已经提出了几种从原始的“1-out- n”环签名扩展的方案。例如,“t-out- n”阈值环签名被提出并经常被研究。我们注意到门限环签名方案中随机数的粗心生成可能会影响门限环签名的安全性。在这项工作中,我们展示了粗心随机数生成的漏洞,并提供了解决方案,并对修改进行了安全分析。
{"title":"Security Analysis Concerning the Random Numbers of Threshold Ring Signatures","authors":"Kaibin Huang, R. Tso","doi":"10.1109/ITNG.2012.95","DOIUrl":"https://doi.org/10.1109/ITNG.2012.95","url":null,"abstract":"Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original \"1-out-of-n\" ring signature. For instance, \"t-out-of-n\" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1