Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711226
Doe-Hyung Lee, Kwang-seok Hong
In this paper, we propose a real-time hand gesture recognition system based on difference image entropy using a stereo camera. Existing systems use hand detection primarily with some type of marker. Our system, however, uses a real-time hand image recognition system. In the detection step, we implement a depth map using a sum of absolute differences based on the acquired right-left image using a stereo camera. This system detects a foreground object and perceives it as a hand. The hand gesture recognition system uses the difference image entropy of the input image and the average image. To evaluate the performance of the proposed technology, we implement a recognition experiment using the hand gesture 240 database. The proposed method shows an average recognition rate of 85%. Using the proposed method, we implement a Chinese chess game based on hand gesture recognition.
{"title":"Game interface using hand gesture recognition","authors":"Doe-Hyung Lee, Kwang-seok Hong","doi":"10.1109/ICCIT.2010.5711226","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711226","url":null,"abstract":"In this paper, we propose a real-time hand gesture recognition system based on difference image entropy using a stereo camera. Existing systems use hand detection primarily with some type of marker. Our system, however, uses a real-time hand image recognition system. In the detection step, we implement a depth map using a sum of absolute differences based on the acquired right-left image using a stereo camera. This system detects a foreground object and perceives it as a hand. The hand gesture recognition system uses the difference image entropy of the input image and the average image. To evaluate the performance of the proposed technology, we implement a recognition experiment using the hand gesture 240 database. The proposed method shows an average recognition rate of 85%. Using the proposed method, we implement a Chinese chess game based on hand gesture recognition.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"758 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711195
Wann-Jyi Horng, T. Hu, Ju-Lan Tsai
This article conducts an empirical investigation examining the model construction and the association between Philippine and Indonesia exchange markets by using the data of Philippine Peso exchange rates against US Dollar and the Indonesia exchange rate against US Dollar from January 2003 to December 2009. In addition, we also adopt Student's t distribution to analyze the proposed model. The empirical results show that the mutual effects of the Philippine and the Indonesia exchange markets may be constructed in bivariate IGARCH (1, 1) model with a DCC. Our findings suggest that there exists a positive relationship between Philippine and Indonesia exchange market returns, that is, the volatilities of these two exchange market returns are synchronously influence. Furthermore, the average estimator of the DCC coefficients of two exchange market returns equals to 0.3067. The Japan exchange rate return volatility will also affect the variation risk of the Philippine exchange market; likewise the Japan exchange rate return volatility will impact the variation risk of the Indonesia's exchange market. Additionally, Philippine and Indonesia stock markets do not have the asymmetrical effect in the research data period.
{"title":"DCC analysis of two exchange markets with a factor of Japan dollars: Study of Philippine and Indonesia exchange markets","authors":"Wann-Jyi Horng, T. Hu, Ju-Lan Tsai","doi":"10.1109/ICCIT.2010.5711195","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711195","url":null,"abstract":"This article conducts an empirical investigation examining the model construction and the association between Philippine and Indonesia exchange markets by using the data of Philippine Peso exchange rates against US Dollar and the Indonesia exchange rate against US Dollar from January 2003 to December 2009. In addition, we also adopt Student's t distribution to analyze the proposed model. The empirical results show that the mutual effects of the Philippine and the Indonesia exchange markets may be constructed in bivariate IGARCH (1, 1) model with a DCC. Our findings suggest that there exists a positive relationship between Philippine and Indonesia exchange market returns, that is, the volatilities of these two exchange market returns are synchronously influence. Furthermore, the average estimator of the DCC coefficients of two exchange market returns equals to 0.3067. The Japan exchange rate return volatility will also affect the variation risk of the Philippine exchange market; likewise the Japan exchange rate return volatility will impact the variation risk of the Indonesia's exchange market. Additionally, Philippine and Indonesia stock markets do not have the asymmetrical effect in the research data period.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711053
Jong-Hyoun Kim, Teresa Cho
Current virtual game interfaces can't comprehend our metaphor, can't reflect on our natural behavior aspect, can't make us immerse into a game, and makes a barrier between virtual game space and our real behavior. It is very challenging issue to use real objects tightly related to human-being's behaviors or reactions for interacting with game applications. Interactive AR interfaces may augment users' perception of the real world by adding virtual information to it. In addition, users' interaction with the system may be augmented, making the computer as seamlessly as possible. We attempted an experiment on camera-based interface for online TCG game application which emits excellence of AR. This experiment uses real TCG cards which are recognized by texture based AR algorithm. These initiative experiments not only guarantee the consistency between the game-player's behaviors and the gaming environment, but also make real and virtual world seamless. This consistency increases friendliness and immersion to a game as well as the ability of bodily sensation for a game. This new interface takes the results of human-being's behaviors as input event, and will open the new field of digital interfaces for forthcoming ubiquitous computing.
{"title":"The initiative experiments for utilizing real cards in online Trading Card Game","authors":"Jong-Hyoun Kim, Teresa Cho","doi":"10.1109/ICCIT.2010.5711053","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711053","url":null,"abstract":"Current virtual game interfaces can't comprehend our metaphor, can't reflect on our natural behavior aspect, can't make us immerse into a game, and makes a barrier between virtual game space and our real behavior. It is very challenging issue to use real objects tightly related to human-being's behaviors or reactions for interacting with game applications. Interactive AR interfaces may augment users' perception of the real world by adding virtual information to it. In addition, users' interaction with the system may be augmented, making the computer as seamlessly as possible. We attempted an experiment on camera-based interface for online TCG game application which emits excellence of AR. This experiment uses real TCG cards which are recognized by texture based AR algorithm. These initiative experiments not only guarantee the consistency between the game-player's behaviors and the gaming environment, but also make real and virtual world seamless. This consistency increases friendliness and immersion to a game as well as the ability of bodily sensation for a game. This new interface takes the results of human-being's behaviors as input event, and will open the new field of digital interfaces for forthcoming ubiquitous computing.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711120
Kwihoon Kim, Chunghyun Ahn, Jinwoo Hong
This paper mainly focuses on improving NGN authentication performance and security to reduce the critical IMS service authentication procedure with redundant reduction in fixed and mobile networks. In the NGN specifications, authentication is performed at both the NASS and the IMS networks before a user equipment can access the IMS services. Though the NACF-IMS bundled authentication was proposed for this purpose, it cannot protect authentication procedure against IP address spoofing attack and channel between a user equipment and P-CSC-FE due to an absence of key sharing method. We observe that many steps in this two-pass authentication are similar. Based on our observation, this needs to perform NACF authentication. At the IMS service level, authentication is implicitly performed in IMS registration for NGN networks. Simulation results demonstrate that the proposed scheme provides better reduction of authentication procedure and performance for arrival rates with NGN environments than other methods.
{"title":"Unified fast authentication procedure in service and access networks for NGN","authors":"Kwihoon Kim, Chunghyun Ahn, Jinwoo Hong","doi":"10.1109/ICCIT.2010.5711120","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711120","url":null,"abstract":"This paper mainly focuses on improving NGN authentication performance and security to reduce the critical IMS service authentication procedure with redundant reduction in fixed and mobile networks. In the NGN specifications, authentication is performed at both the NASS and the IMS networks before a user equipment can access the IMS services. Though the NACF-IMS bundled authentication was proposed for this purpose, it cannot protect authentication procedure against IP address spoofing attack and channel between a user equipment and P-CSC-FE due to an absence of key sharing method. We observe that many steps in this two-pass authentication are similar. Based on our observation, this needs to perform NACF authentication. At the IMS service level, authentication is implicitly performed in IMS registration for NGN networks. Simulation results demonstrate that the proposed scheme provides better reduction of authentication procedure and performance for arrival rates with NGN environments than other methods.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711160
W. Hongmei, Li Shijiao
With the rapid development of information technology revolution, technological innovation has brought increasing benefit to financial enterprises in China. However, the strategic priority and intense competition of technological innovation in China's financial business, as well as the uncertainty and dynamic of their development process, determine the high risk of technological innovation in China' financial enterprises. This paper analyses the risk in the process of technological innovation, measures the risk in China's financial enterprises based on AHP method, and makes an empirical analysis of the network bank as an example.
{"title":"Empirical analysis on technological innovation risk in China's financial enterprises based on AHP method","authors":"W. Hongmei, Li Shijiao","doi":"10.1109/ICCIT.2010.5711160","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711160","url":null,"abstract":"With the rapid development of information technology revolution, technological innovation has brought increasing benefit to financial enterprises in China. However, the strategic priority and intense competition of technological innovation in China's financial business, as well as the uncertainty and dynamic of their development process, determine the high risk of technological innovation in China' financial enterprises. This paper analyses the risk in the process of technological innovation, measures the risk in China's financial enterprises based on AHP method, and makes an empirical analysis of the network bank as an example.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711057
Natrah Abdullah, W. Adnan, N. Noor
In Human Computer Interaction, visual representation is related to how information is presented and represented. This study seeks to determine if visual representation features in an interface design are beneficial to certain types of users. We conduct an experiment that evaluates individual differences in 3-dimensional view with interaction (3DI) and 3-dimensional view without interaction (3DL). The 3DI is categorized as an active approach and 3DL as a passive approach of task handling. The findings generally show changes in preferences when 3D view with an active approach of information representation is introduced. This finding indicates that preferences in 3DI view have an association with cognitive styles on task handling.
{"title":"Evaluating information representation based on cognitive differences","authors":"Natrah Abdullah, W. Adnan, N. Noor","doi":"10.1109/ICCIT.2010.5711057","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711057","url":null,"abstract":"In Human Computer Interaction, visual representation is related to how information is presented and represented. This study seeks to determine if visual representation features in an interface design are beneficial to certain types of users. We conduct an experiment that evaluates individual differences in 3-dimensional view with interaction (3DI) and 3-dimensional view without interaction (3DL). The 3DI is categorized as an active approach and 3DL as a passive approach of task handling. The findings generally show changes in preferences when 3D view with an active approach of information representation is introduced. This finding indicates that preferences in 3DI view have an association with cognitive styles on task handling.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711224
Ava Pourkashani, R. Rzayev, F. Faghihi
Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.
{"title":"Appropriate hash functions selection for message authentication in electronic tender for insurance companies","authors":"Ava Pourkashani, R. Rzayev, F. Faghihi","doi":"10.1109/ICCIT.2010.5711224","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711224","url":null,"abstract":"Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711051
Wenhua Ma, Lei Huang, Chang-ping Liu
Crowd density analysis is crucial for crowd monitoring and management. This paper proposes a novel method for crowd density analysis. According to the framework, input images are firstly divided into patches, and each patch is associated with a density label based on its texture features. Finally, local information is synthesized for global density estimation. Local image content is described by features based on co-occurrence textures and visual words processing chain. Experiments show that the system is highly robust to scene changes and background noise yet remain discriminative for crowd detection.
{"title":"Crowd density analysis using co-occurrence texture features","authors":"Wenhua Ma, Lei Huang, Chang-ping Liu","doi":"10.1109/ICCIT.2010.5711051","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711051","url":null,"abstract":"Crowd density analysis is crucial for crowd monitoring and management. This paper proposes a novel method for crowd density analysis. According to the framework, input images are firstly divided into patches, and each patch is associated with a density label based on its texture features. Finally, local information is synthesized for global density estimation. Local image content is described by features based on co-occurrence textures and visual words processing chain. Experiments show that the system is highly robust to scene changes and background noise yet remain discriminative for crowd detection.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711157
Wang Wei
It is shown that engineering change management is one of the most important things in hydraulic engineering, which will affect not only the engineering investment but also the construction period. Considering the shortages of the experience and the experts in construction claims, case-based reasoning (CBR) and rule-based reasoning (RBR) in artificial intelligence were used in engineering change and construction claim management. This method summarized the previous cases in engineering claims of hydraulic engineering and the cases were stored structurally. A preliminary model was also proposed, which was currently used in the construction management of trans-basin water transfer engineering.
{"title":"Study of claim support system for hydraulic engineering based on CBR and RBR","authors":"Wang Wei","doi":"10.1109/ICCIT.2010.5711157","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711157","url":null,"abstract":"It is shown that engineering change management is one of the most important things in hydraulic engineering, which will affect not only the engineering investment but also the construction period. Considering the shortages of the experience and the experts in construction claims, case-based reasoning (CBR) and rule-based reasoning (RBR) in artificial intelligence were used in engineering change and construction claim management. This method summarized the previous cases in engineering claims of hydraulic engineering and the cases were stored structurally. A preliminary model was also proposed, which was currently used in the construction management of trans-basin water transfer engineering.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114582672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/ICCIT.2010.5711047
N. Matta, Hassan Atifi, M. Sediri, Mohammed Sagdal
In order to promote reuse, we have to help designers understand the context of previous projects . We have to build project memories that not only simply archive previous project solutions but that document the reasons why these solutions were chosen. These reasons have to show experts skills, document the representation of treated problems and the decision context, etc. This study presents a way to analyze mediated discussions using a discussion forum. We use pragmatic analysis in order to identify criteria that help to analyze coordination messages in design projects. These criteria can help to emphasize the context of decision making based on coordination interactions.
{"title":"Traceability and structuration coordination interactions in design","authors":"N. Matta, Hassan Atifi, M. Sediri, Mohammed Sagdal","doi":"10.1109/ICCIT.2010.5711047","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711047","url":null,"abstract":"In order to promote reuse, we have to help designers understand the context of previous projects . We have to build project memories that not only simply archive previous project solutions but that document the reasons why these solutions were chosen. These reasons have to show experts skills, document the representation of treated problems and the decision context, etc. This study presents a way to analyze mediated discussions using a discussion forum. We use pragmatic analysis in order to identify criteria that help to analyze coordination messages in design projects. These criteria can help to emphasize the context of decision making based on coordination interactions.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116238229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}