Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614688
Patrick Stefanescu, M. Mocan, Werner Stefanescu
The importance of time and costs for people living in the 21st century is well known; therefore many cities from different countries implemented a new system for validating tickets in public transport vehicles called ticketing system (TS). The paper highlights the implementation of the validation system in Timisoara, Romania and the advantages and disadvantages related to costs and time that are spend for this system to work properly also the benefits regarding the company that implemented it and the citizens that are using the services provided by the public transport company. The information is obtained from two platforms named: RadFleet and Sat-Sale that are integrated in the ticketing system.
{"title":"Inside the ticketing system and the benefits brought by it","authors":"Patrick Stefanescu, M. Mocan, Werner Stefanescu","doi":"10.1109/ICSSE.2013.6614688","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614688","url":null,"abstract":"The importance of time and costs for people living in the 21st century is well known; therefore many cities from different countries implemented a new system for validating tickets in public transport vehicles called ticketing system (TS). The paper highlights the implementation of the validation system in Timisoara, Romania and the advantages and disadvantages related to costs and time that are spend for this system to work properly also the benefits regarding the company that implemented it and the citizens that are using the services provided by the public transport company. The information is obtained from two platforms named: RadFleet and Sat-Sale that are integrated in the ticketing system.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614647
D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz
This paper presents a marker localization system consisting of multiple cameras. It is the basis of a real-time robotic motion tracking system aiming for high localization accuracy and high time resolution. These goals are achieved using several cameras with very redundant field-of-views. The paper presents the theoretical background of 3D camera calibration and localization, the localization accuracy measurement setup, and its results. The measurements are obtained using a color marker and an industrial robotic arm for measurement ground truth generation. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.
提出了一种由多摄像机组成的标记定位系统。它是实现高定位精度和高时间分辨率的实时机器人运动跟踪系统的基础。这些目标是通过几个具有冗余视场的相机来实现的。本文介绍了三维摄像机标定与定位的理论背景、定位精度的测量方法及其结果。测量是使用颜色标记和工业机械臂来测量地面真实值。Smart Mobile Eyes for Localization (SMEyeL)项目是开源的:源代码、所有测量输入数据和文档都是公开的。
{"title":"Marker localization with a multi-camera system","authors":"D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz","doi":"10.1109/ICSSE.2013.6614647","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614647","url":null,"abstract":"This paper presents a marker localization system consisting of multiple cameras. It is the basis of a real-time robotic motion tracking system aiming for high localization accuracy and high time resolution. These goals are achieved using several cameras with very redundant field-of-views. The paper presents the theoretical background of 3D camera calibration and localization, the localization accuracy measurement setup, and its results. The measurements are obtained using a color marker and an industrial robotic arm for measurement ground truth generation. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614649
Chun-Wen Hung, Chih-Li Huo, Yu-Hsiang Yu, Tsung-Ying Sun
This paper developed two procedures to extract road area. It uses initial road detection and continuous image tracking to reduce computation cost. Experiment using three difference environments to verify that this algorithm is can be realized.
{"title":"Road area detection based on image segmentation and contour feature","authors":"Chun-Wen Hung, Chih-Li Huo, Yu-Hsiang Yu, Tsung-Ying Sun","doi":"10.1109/ICSSE.2013.6614649","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614649","url":null,"abstract":"This paper developed two procedures to extract road area. It uses initial road detection and continuous image tracking to reduce computation cost. Experiment using three difference environments to verify that this algorithm is can be realized.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614650
J. Chang, Yi-Hsin Chang
This paper applies weighted mean to construct interval-valued fuzzy relations for grayscale image edge detection. This fuzzy relation image shows the changes in intensity values between a 3×3 window central pixel and its eight neighbor pixels. We employ two weighting parameters, and perform the weighted mean aggregation for the central pixel and its eight neighbor pixels in a sliding window across the image to lead to the fuzzy edge images. Finally, the image edge map is obtained through a threshold operation. Moreover, to decrease the edge detection error, weighting parameters of the mean can be learned by the gradient method caste in discrete formulation. By the training results of eight grayscale synthetic images with adding random noises, we have shown that the integration of interval-valued fuzzy relations with the weighted mean aggregation algorithm will produce a more robust response in detecting the image edge. Finally, by applying the optimal edge detection parameters to natural images, we have found that it is better compared to the well-known Canny edge detector.
{"title":"Applying weighted mean aggregation to edge detection of images","authors":"J. Chang, Yi-Hsin Chang","doi":"10.1109/ICSSE.2013.6614650","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614650","url":null,"abstract":"This paper applies weighted mean to construct interval-valued fuzzy relations for grayscale image edge detection. This fuzzy relation image shows the changes in intensity values between a 3×3 window central pixel and its eight neighbor pixels. We employ two weighting parameters, and perform the weighted mean aggregation for the central pixel and its eight neighbor pixels in a sliding window across the image to lead to the fuzzy edge images. Finally, the image edge map is obtained through a threshold operation. Moreover, to decrease the edge detection error, weighting parameters of the mean can be learned by the gradient method caste in discrete formulation. By the training results of eight grayscale synthetic images with adding random noises, we have shown that the integration of interval-valued fuzzy relations with the weighted mean aggregation algorithm will produce a more robust response in detecting the image edge. Finally, by applying the optimal edge detection parameters to natural images, we have found that it is better compared to the well-known Canny edge detector.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115091825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614702
Tsung-Hui Lu, Zhe-Jung Lee
Privacy protection currently circulating in global IT industries could potentially cause the next wave in information security. However, currently still lack of success story among different industries. We aimed to develop an influenza solution and assessed its effectiveness to help school planned to build up their own system. We brainstormed from among experts from the school administration, law enforcement departments and layers, and IT specialists, because lacked of successful story; the opinions from experts were helpful when blinded in founding the directions. We built a prototype with applications used in campus and took the PDCA to defined flows and procedures based on the suggestions from experts followed by penetration testing to test the result. This research aimed to find out what, why and how of relation between school and privacy protection in digital times. We used Delphi to brainstorming the outcome was the requirement and success factors on how to build up a privacy information management system in campus. And followed by a series of processes and procedures to construct the system. The results were statistic ratio from AHP and workflows with procedures to be consider when we built the privacy protection system in our case study. Our findings highlight the potential of a well design system combine with thoughtful administration can manage privacy information effectiveness.
{"title":"A case study on privacy information protection in campus","authors":"Tsung-Hui Lu, Zhe-Jung Lee","doi":"10.1109/ICSSE.2013.6614702","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614702","url":null,"abstract":"Privacy protection currently circulating in global IT industries could potentially cause the next wave in information security. However, currently still lack of success story among different industries. We aimed to develop an influenza solution and assessed its effectiveness to help school planned to build up their own system. We brainstormed from among experts from the school administration, law enforcement departments and layers, and IT specialists, because lacked of successful story; the opinions from experts were helpful when blinded in founding the directions. We built a prototype with applications used in campus and took the PDCA to defined flows and procedures based on the suggestions from experts followed by penetration testing to test the result. This research aimed to find out what, why and how of relation between school and privacy protection in digital times. We used Delphi to brainstorming the outcome was the requirement and success factors on how to build up a privacy information management system in campus. And followed by a series of processes and procedures to construct the system. The results were statistic ratio from AHP and workflows with procedures to be consider when we built the privacy protection system in our case study. Our findings highlight the potential of a well design system combine with thoughtful administration can manage privacy information effectiveness.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"20 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614676
W. Kao, Wei-Te Chang, Sheng-Ju Wu, Chien-Hui Liu, Shi Yin
Some gaze tracking systems have been proposed in the field, but very few of them can be directly applied in normal lighting environments. Many image imperfection issues are difficult to be dealt with so that a typical system is usually equipped with a strong infrared ray (IR) illuminant. The user experience is not so good even if the IR illuminant is invisible. In this paper, we present a high speed (240 frames/s) gaze tracking system operating in a normal office lighting condition. A set of image processing algorithms to deal with the issues of poor image contrast and high random noise have been presented. The experimental result shows that the system can achieve the accuracy of 1° and 1.7° for the horizontal and vertical coordinates of the detected iris center, respectively.
{"title":"High speed gaze tracking with visible light","authors":"W. Kao, Wei-Te Chang, Sheng-Ju Wu, Chien-Hui Liu, Shi Yin","doi":"10.1109/ICSSE.2013.6614676","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614676","url":null,"abstract":"Some gaze tracking systems have been proposed in the field, but very few of them can be directly applied in normal lighting environments. Many image imperfection issues are difficult to be dealt with so that a typical system is usually equipped with a strong infrared ray (IR) illuminant. The user experience is not so good even if the IR illuminant is invisible. In this paper, we present a high speed (240 frames/s) gaze tracking system operating in a normal office lighting condition. A set of image processing algorithms to deal with the issues of poor image contrast and high random noise have been presented. The experimental result shows that the system can achieve the accuracy of 1° and 1.7° for the horizontal and vertical coordinates of the detected iris center, respectively.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121374878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614690
Jingwen Wu, H. Hamdan
Choosing the right model is an important step in model-based clustering approaches. In this framework, BIC and ICL criteria were proposed to choose a model for clustering of standard data. On the other hand, in order to accelerate the data processing when using EM algorithm, this algorithm was adapted to binned data (binned-EM algorithm). Then fourteen binned-EM algorithms of fourteen parsimonious Gaussian mixture models were developed to replace the binned-EM algorithm of the most general Gaussian mixture model when data have a simple structure. So this paper studies the application of BIC and ICL criteria to select a good model which better fits binned data, when clustering is based on these fourteen binned-EM algorithms. Numerical experiments on simulated and real data are performed, and the experimental results are analyzed.
{"title":"Model choice for binned-EM algorithms of fourteen parsimonious Gaussian mixture models by BIC and ICL criteria","authors":"Jingwen Wu, H. Hamdan","doi":"10.1109/ICSSE.2013.6614690","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614690","url":null,"abstract":"Choosing the right model is an important step in model-based clustering approaches. In this framework, BIC and ICL criteria were proposed to choose a model for clustering of standard data. On the other hand, in order to accelerate the data processing when using EM algorithm, this algorithm was adapted to binned data (binned-EM algorithm). Then fourteen binned-EM algorithms of fourteen parsimonious Gaussian mixture models were developed to replace the binned-EM algorithm of the most general Gaussian mixture model when data have a simple structure. So this paper studies the application of BIC and ICL criteria to select a good model which better fits binned data, when clustering is based on these fourteen binned-EM algorithms. Numerical experiments on simulated and real data are performed, and the experimental results are analyzed.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614685
Yu-Jen Chou, Bor-Chyun Wang, S. Su
Recently, Intelligent Video Surveillance (IVS) mainly use color image to detect people who are entering, leaving and loitering at a fixed area. When detected event is happening, Intelligent Video Surveillance can turn passive into active to notify security guard immediately, and it makes security guard reduce response time. Actually, the color image may be influenced by light and shadow change condition during background removal and foreground extraction. Foreground object is not easily divided up, and it makes detecting object incomplete and may be misjudged. This research uses a color camera to combine with a depth camera to detect the events. Depth information can resolve the light and shadow change condition problem and complicated color background. It divides up the foreground object easier and more completed, and the foreground object is used to detect the events. Experiment result shows that using depth information to divide up the foreground object for detection can enhance effectively accuracy. Although using depth information to detect can resolve the light and shadow change problem and complicated color background problem, depth information has the distance limit of detection. But color information does not have the distance limit. In view of this, I integrate the advantages of color and depth to implement the Intelligent Video Surveillance. The result shows this is better than only using color or only using depth. The system is very suitable for use in the indoor environment.
{"title":"Enhance Intelligence Video Surveillance with depth and color information","authors":"Yu-Jen Chou, Bor-Chyun Wang, S. Su","doi":"10.1109/ICSSE.2013.6614685","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614685","url":null,"abstract":"Recently, Intelligent Video Surveillance (IVS) mainly use color image to detect people who are entering, leaving and loitering at a fixed area. When detected event is happening, Intelligent Video Surveillance can turn passive into active to notify security guard immediately, and it makes security guard reduce response time. Actually, the color image may be influenced by light and shadow change condition during background removal and foreground extraction. Foreground object is not easily divided up, and it makes detecting object incomplete and may be misjudged. This research uses a color camera to combine with a depth camera to detect the events. Depth information can resolve the light and shadow change condition problem and complicated color background. It divides up the foreground object easier and more completed, and the foreground object is used to detect the events. Experiment result shows that using depth information to divide up the foreground object for detection can enhance effectively accuracy. Although using depth information to detect can resolve the light and shadow change problem and complicated color background problem, depth information has the distance limit of detection. But color information does not have the distance limit. In view of this, I integrate the advantages of color and depth to implement the Intelligent Video Surveillance. The result shows this is better than only using color or only using depth. The system is very suitable for use in the indoor environment.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614694
Xu He, G. Dymirkovsky
This investigation presents a synthesis solution for stabilizing switching laws a class of parameter-varying plants represented via linear LPV systems that has all unstable subsystems. Considered class of LPV systems has state matrices as parametrically affine with parameter varying in a convex set for which all the subsystems are unstable. Stabilization design of switching laws is solved that enforce overall state trajectory that is asymptotically convergent to the equilibrium state. Via the parameter-dependent multiple Lyapunov function approach, a set of linear matrix inequalities guaranteeing the existence of parameter-dependent Lyapunov functions is derived. An illustrative example and the respective simulation results are given that demonstrate the effectiveness of this new synthesis design for this class of LPV systems.
{"title":"Stabilizing switching laws for switched LPV systems with all unstable subsystems","authors":"Xu He, G. Dymirkovsky","doi":"10.1109/ICSSE.2013.6614694","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614694","url":null,"abstract":"This investigation presents a synthesis solution for stabilizing switching laws a class of parameter-varying plants represented via linear LPV systems that has all unstable subsystems. Considered class of LPV systems has state matrices as parametrically affine with parameter varying in a convex set for which all the subsystems are unstable. Stabilization design of switching laws is solved that enforce overall state trajectory that is asymptotically convergent to the equilibrium state. Via the parameter-dependent multiple Lyapunov function approach, a set of linear matrix inequalities guaranteeing the existence of parameter-dependent Lyapunov functions is derived. An illustrative example and the respective simulation results are given that demonstrate the effectiveness of this new synthesis design for this class of LPV systems.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-04DOI: 10.1109/ICSSE.2013.6614633
Nai-Jen Li, Cheng-Feng Weng, Wen-June Wang, Hsiang-Chieh Chen, Pei-Jun Lee
This paper proposes a method to estimate the number of the people in an indoor environment. The method is implemented on embedded digital signal processing (DSP) system for energy-saving. Using background subtraction technique to extract foreground, every row pixels of extracted foreground and an adjustable human template are weighed by the proposed weighting model and then we accumulate those weighed pixels to estimate the number of people. The experimental results show that the proposed method has outstanding performance on estimating the number of people in the video surveillance.
{"title":"The people number estimation based on the embedded DSP system with surveillance camera","authors":"Nai-Jen Li, Cheng-Feng Weng, Wen-June Wang, Hsiang-Chieh Chen, Pei-Jun Lee","doi":"10.1109/ICSSE.2013.6614633","DOIUrl":"https://doi.org/10.1109/ICSSE.2013.6614633","url":null,"abstract":"This paper proposes a method to estimate the number of the people in an indoor environment. The method is implemented on embedded digital signal processing (DSP) system for energy-saving. Using background subtraction technique to extract foreground, every row pixels of extracted foreground and an adjustable human template are weighed by the proposed weighting model and then we accumulate those weighed pixels to estimate the number of people. The experimental results show that the proposed method has outstanding performance on estimating the number of people in the video surveillance.","PeriodicalId":124317,"journal":{"name":"2013 International Conference on System Science and Engineering (ICSSE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}