首页 > 最新文献

Proceedings of the 1st International Conference on Information Science and Systems最新文献

英文 中文
Cost-Efficient Distributed Amplification in a Bidirectional Optical Fiber Link 双向光纤链路中成本效益高的分布式放大
F. Khan, Ahmed Raza Danish, S. Ghafoor
We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.
我们提出并演示了一种在双向链路中实现分布式放大的新技术。多个光信号在一根光纤上以双工方式传输。多通道仅使用链路两侧的两个光源产生。分布式放大是利用拉曼散射实现的,其中下行方向的数据调制信号也充当泵浦信号。为了获得最大的拉曼增益和最小化瑞利散射,下行和上行信号的中心频率之差保持在13thz。得到的误码率图显示接收器灵敏度值较低。
{"title":"Cost-Efficient Distributed Amplification in a Bidirectional Optical Fiber Link","authors":"F. Khan, Ahmed Raza Danish, S. Ghafoor","doi":"10.1145/3209914.3209935","DOIUrl":"https://doi.org/10.1145/3209914.3209935","url":null,"abstract":"We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128918663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Data Warehouse and Data Mining in Landscape Research 数据仓库与数据挖掘在景观研究中的应用
Duan Ran, Chunyu Yang, S. Jiafu
The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.
信息技术的发展推动了风景园林研究的进程。数据仓库和数据挖掘技术可以解决海量数据的存储和操作问题。并根据数据处理分析,解决景观照明中人工照明与植物生物节律的关系。提出了适合各类植物的人工照明技术参数,有利于园林植物夜景的科学研究。
{"title":"Application of Data Warehouse and Data Mining in Landscape Research","authors":"Duan Ran, Chunyu Yang, S. Jiafu","doi":"10.1145/3209914.3234640","DOIUrl":"https://doi.org/10.1145/3209914.3234640","url":null,"abstract":"The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demographic Variables in Knowledge Sharing Behavior among IT Engineers in Taiwan 资讯科技工程师知识分享行为之人口统计变数研究
Chiang Hsing Tien
The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.
本研究的目的是探讨人口统计学变量对知识共享的影响。该研究进行了定量研究,参与者为IT工程师。采用随机抽样。调查问卷通过邮件发送给25家IT公司。问卷的封面解释了研究的目的。随信附上一个贴好邮票的回邮信封。调查问卷共发出250份,回收84份。回复率为33.6%。采用IBM SPSS 22进行独立t检验和单因素方差分析。研究结果表明:(1)知识共享行为在受教育程度上存在差异;(2)知识共享行为在专业上存在显著影响;(3)知识共享行为在性别、年龄、职位等级、任职年限、工作场所、婚姻状况、子女数量上不存在显著影响。
{"title":"Demographic Variables in Knowledge Sharing Behavior among IT Engineers in Taiwan","authors":"Chiang Hsing Tien","doi":"10.1145/3209914.3209924","DOIUrl":"https://doi.org/10.1145/3209914.3209924","url":null,"abstract":"The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"127 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scalable Network Area Storage with Virtualization: Modelling and Evaluation using Stochastic Reward Nets 具有虚拟化的可扩展网络区域存储:使用随机奖励网建模和评估
Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son
Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.
数据中心存储系统的建模与分析对可用性预测具有重要意义。许多文献研究提出了不同的架构和技术来提高存储系统的可用性。在本文中,我们提出了在网络区域存储中集成虚拟化技术。我们使用随机奖励网来模拟系统的架构和操作场景。此外,我们研究了各种感兴趣的措施,包括稳态可用性,停机时间和停机成本,以及系统可用性对影响参数的敏感性。分析结果表明,所提出的虚拟化存储系统能够获得可接受的服务可用性水平。此外,灵敏度分析还指出了服务可用性对系统参数的复杂依赖关系。本文提出了一个初步的研究,以帮助指导可扩展的网络区域存储与虚拟化在实践中的发展。
{"title":"A Scalable Network Area Storage with Virtualization: Modelling and Evaluation using Stochastic Reward Nets","authors":"Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son","doi":"10.1145/3209914.3209918","DOIUrl":"https://doi.org/10.1145/3209914.3209918","url":null,"abstract":"Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Ship Image Retrieval Based on BoVW Model under Hadoop Platform Hadoop 平台下基于 BoVW 模型的船舶图像检索研究
R. Hu, J. Yang, Bangpei Zhu, Zhiqiang Guo
Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.
图像数据是船舶航行记录中的关键数据之一。船舶场景再现依赖于船舶场景的高效检索。近年来,图像数量的指数增长使得传统的单机图像检索方法逐渐显示出效率低下的问题。本文提出了在Hadoop平台下基于BoVW (Bag of Visual Words)模型的图像检索方法,实现了分布式图像检索。首先,本文以BoVW模型为研究对象。基于Hadoop平台,改进了传统视觉词典的构建方法,采用术语频率-逆文档频率(TF-IDF)对词频向量进行加权。然后并行生成倒排索引用于图像检索。实验结果表明,该方法在保持原始检索结果的同时,将视觉词典构建效率提高了一倍,有效地提高了图像检索的效率。
{"title":"Research on Ship Image Retrieval Based on BoVW Model under Hadoop Platform","authors":"R. Hu, J. Yang, Bangpei Zhu, Zhiqiang Guo","doi":"10.1145/3209914.3209948","DOIUrl":"https://doi.org/10.1145/3209914.3209948","url":null,"abstract":"Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combined Source Code Approach for Test Case Prioritization 测试用例优先级的组合源代码方法
Iyad Alazzam, K. Nahar
Regression testing is an activity in the software testing process to ensure the software is validated and verified after modification occurred on software. It is costly process procedure which has been expected to reach half cost of the software maintenance cost. Many techniques and approaches have been used in regression testing process to enhance the efficiency and effectiveness of regression testing process. Such as test case reduction, test case selection, test case prioritization and retest all. Test case prioritization has been used in regression testing to increase the effectiveness through selecting the most vital test case that has the ability in finding and uncovering errors in the system under test. This paper has introduced a new algorithm for prioritizing test cases in test suite that is based on method and line of code coverage. Test cases which cover the most methods and line of code are more effective and efficient in finding errors.
回归测试是软件测试过程中的一项活动,以确保在软件发生修改后对软件进行验证和验证。这是一个昂贵的过程过程,预计将达到软件维护成本的一半。为了提高回归测试过程的效率和有效性,在回归测试过程中使用了许多技术和方法。比如测试用例缩减、测试用例选择、测试用例优先级排序和重新测试。测试用例优先级已经在回归测试中使用,通过选择最重要的测试用例来提高效率,这些测试用例具有发现和发现被测系统中的错误的能力。本文介绍了一种基于方法和代码行覆盖率对测试套件中的测试用例进行优先级排序的新算法。覆盖大多数方法和代码行的测试用例在查找错误方面更有效和高效。
{"title":"Combined Source Code Approach for Test Case Prioritization","authors":"Iyad Alazzam, K. Nahar","doi":"10.1145/3209914.3209936","DOIUrl":"https://doi.org/10.1145/3209914.3209936","url":null,"abstract":"Regression testing is an activity in the software testing process to ensure the software is validated and verified after modification occurred on software. It is costly process procedure which has been expected to reach half cost of the software maintenance cost. Many techniques and approaches have been used in regression testing process to enhance the efficiency and effectiveness of regression testing process. Such as test case reduction, test case selection, test case prioritization and retest all. Test case prioritization has been used in regression testing to increase the effectiveness through selecting the most vital test case that has the ability in finding and uncovering errors in the system under test. This paper has introduced a new algorithm for prioritizing test cases in test suite that is based on method and line of code coverage. Test cases which cover the most methods and line of code are more effective and efficient in finding errors.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on the Management Model of Smart Tourism Industry under the Era of Big Data 大数据时代下智慧旅游产业管理模式研究
Zhao Hua
With the rapid development of Internet and the communication technology, the construction of smart tourism is no longer a slogan that can not be realized. The construction of smart tourism in tourist destinations conforms to the strategic goal of tourism industry development in China. Based on the background of big data, this paper elaborated the connotation of big data and smart tourism, and built a large data platform to realize the forecast and feedback of smart tourism through the analysis of tourism development. The platform could be divided into government tourism platform, tourists platform, tourism enterprises platform and community residents platform relying on big data do their own duty. Eventually this paper put forward a construction model and path to realize the smart tourism platform.
随着互联网和通信技术的快速发展,建设智慧旅游不再是一句无法实现的口号。在旅游目的地建设智慧旅游,符合中国旅游业发展的战略目标。本文以大数据为背景,阐述了大数据和智慧旅游的内涵,构建了大数据平台,通过对旅游发展的分析,实现对智慧旅游的预测和反馈。平台可分为政府旅游平台、游客平台、旅游企业平台和社区居民平台,依托大数据各司其职。最后提出了实现智慧旅游平台的建设模式和路径。
{"title":"A Study on the Management Model of Smart Tourism Industry under the Era of Big Data","authors":"Zhao Hua","doi":"10.1145/3209914.3234637","DOIUrl":"https://doi.org/10.1145/3209914.3234637","url":null,"abstract":"With the rapid development of Internet and the communication technology, the construction of smart tourism is no longer a slogan that can not be realized. The construction of smart tourism in tourist destinations conforms to the strategic goal of tourism industry development in China. Based on the background of big data, this paper elaborated the connotation of big data and smart tourism, and built a large data platform to realize the forecast and feedback of smart tourism through the analysis of tourism development. The platform could be divided into government tourism platform, tourists platform, tourism enterprises platform and community residents platform relying on big data do their own duty. Eventually this paper put forward a construction model and path to realize the smart tourism platform.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protocol Keywords Extraction Method Based on Frequent Item-Sets Mining 基于频繁项集挖掘的协议关键字提取方法
Gaochao Li, Q. Qian, Zhonghua Wang, Xin Zou, Xunxun Chen, Xiao Wu
Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.
网络应用识别技术广泛应用于网络管理、网络优化和入侵检测等领域。其中,深度包检测(Deep Packet Inspection, DPI)是最受欢迎的一种检测方法,它依靠少量的有效载荷数据,具有较高的检测精度。然而,DPI依赖于有效的协议关键字。为了应对应用程序更新的速度,提出了一种基于频繁项集挖掘的非加密网络应用协议关键字提取方法。它包括两个主要步骤:首先,我们使用无监督方法生成候选词,并根据词的长度和位置规则减小词集的大小。然后,采用频繁项集挖掘方法提取有效的协议关键字,并通过评估候选词的共现关系去除噪声词和冗余词;实验结果表明,与Proword相比,我们的方法缩小了关键字集的大小,能够更好地提取真实的协议关键字。
{"title":"Protocol Keywords Extraction Method Based on Frequent Item-Sets Mining","authors":"Gaochao Li, Q. Qian, Zhonghua Wang, Xin Zou, Xunxun Chen, Xiao Wu","doi":"10.1145/3209914.3209937","DOIUrl":"https://doi.org/10.1145/3209914.3209937","url":null,"abstract":"Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Hybrid Features of QR Code to Locate and Track in Augmented Reality 利用QR码的混合特征在增强现实中定位和跟踪
Caixia Zhang, Gang Bai
Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.
增强现实技术(AR)是一种将虚拟三维模型实时无缝集成到真实场景图像中的技术。以QR码作为识别标记,提出了一种基于混合特征提取QR码虚拟直线并对摄像机进行定位和跟踪的算法,避免了仅通过特征点进行定位和跟踪失败的可能性。实验结果表明,直线与特征点相结合的方法比只使用直线或特征点的方法效果更好。进一步,开发了AR(增强现实)系统。
{"title":"Using Hybrid Features of QR Code to Locate and Track in Augmented Reality","authors":"Caixia Zhang, Gang Bai","doi":"10.1145/3209914.3226161","DOIUrl":"https://doi.org/10.1145/3209914.3226161","url":null,"abstract":"Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixit - A Semi-Automatic Software Deployment Tool for Arbitrary Targets Fixit -针对任意目标的半自动软件部署工具
E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn
The deployment of software packages becomes more and more difficult. Thus Canonical Ltd. has created a framework called "JuJu" that serves as a DevOps toolchain. JuJu allows an integrated software development, deployment and operation of software packages. Additionally Canocial provided hundreds of open-source JuJu-maintained software packages in an own online store for download. However, our tests revealed that only 14 % of 35 picked packages from the Canonical's JuJu charm store really be installed as they are. The reason is that many of them are sensitive against mismatches of what is contained in the relevant JuJu files and what exists as target hardware at the customer. Because of that, a new concept and tool called Fixit was created by us for the semi-automatic software-deployment of JuJu software packages onto arbitrary hardware and software environments such as Windows and Linux operating systems. Fixit improves the quota of successful first-try installations from 14 to 69 %. This is accomplished by semi-automatic analysis and transformation of the package source codes.
软件包的部署变得越来越困难。因此,Canonical有限公司创建了一个名为“JuJu”的框架,作为DevOps工具链。集聚软件开发、部署和运行于一体的软件包。此外,Canocial在自己的在线商店中提供了数百个由juju维护的开源软件包供下载。然而,我们的测试显示,从Canonical的JuJu魅力商店中挑选的35个软件包中,只有14%真正安装。原因是它们中的许多对相关JuJu文件中包含的内容与客户作为目标硬件存在的内容不匹配非常敏感。因此,我们创造了一个名为Fixit的新概念和工具,用于将聚聚软件包半自动部署到任意硬件和软件环境(如Windows和Linux操作系统)上。Fixit将首次尝试安装成功的配额从14%提高到69%。这是通过对包源代码的半自动分析和转换来完成的。
{"title":"Fixit - A Semi-Automatic Software Deployment Tool for Arbitrary Targets","authors":"E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn","doi":"10.1145/3209914.3209938","DOIUrl":"https://doi.org/10.1145/3209914.3209938","url":null,"abstract":"The deployment of software packages becomes more and more difficult. Thus Canonical Ltd. has created a framework called \"JuJu\" that serves as a DevOps toolchain. JuJu allows an integrated software development, deployment and operation of software packages. Additionally Canocial provided hundreds of open-source JuJu-maintained software packages in an own online store for download. However, our tests revealed that only 14 % of 35 picked packages from the Canonical's JuJu charm store really be installed as they are. The reason is that many of them are sensitive against mismatches of what is contained in the relevant JuJu files and what exists as target hardware at the customer. Because of that, a new concept and tool called Fixit was created by us for the semi-automatic software-deployment of JuJu software packages onto arbitrary hardware and software environments such as Windows and Linux operating systems. Fixit improves the quota of successful first-try installations from 14 to 69 %. This is accomplished by semi-automatic analysis and transformation of the package source codes.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 1st International Conference on Information Science and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1