We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.
{"title":"Cost-Efficient Distributed Amplification in a Bidirectional Optical Fiber Link","authors":"F. Khan, Ahmed Raza Danish, S. Ghafoor","doi":"10.1145/3209914.3209935","DOIUrl":"https://doi.org/10.1145/3209914.3209935","url":null,"abstract":"We propose and demonstrate a novel technique to implement distributed amplification in a bidirectional link. Multiple optical signals are transmitted in a duplex configuration over a single fiber. The multiple channels are generated using only two optical sources on each side of the link. Distributed amplification is achieved using Raman scattering where the data modulated signal in the downlink direction acts as a pump signal as well. To obtain maximum Raman gain and to minimize Rayleigh scattering, the difference between the center frequencies of the downlink and uplink signals is kept at 13 THz. The resulting bit-error-rate plots show low values of receiver sensitivities.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128918663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.
{"title":"Application of Data Warehouse and Data Mining in Landscape Research","authors":"Duan Ran, Chunyu Yang, S. Jiafu","doi":"10.1145/3209914.3234640","DOIUrl":"https://doi.org/10.1145/3209914.3234640","url":null,"abstract":"The development of information technology has promoted the process of landscape architecture research. Data warehouse and data mining technology can solve the huge data storage and operation. And according to the analysis of data processing, solving the relationship between artificial lighting and plant biological rhythm in landscape lighting. The technical parameters of artificial lighting suitable for all kinds of plants are provided, which is beneficial to the scientific study of nightscape of garden plants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.
{"title":"Demographic Variables in Knowledge Sharing Behavior among IT Engineers in Taiwan","authors":"Chiang Hsing Tien","doi":"10.1145/3209914.3209924","DOIUrl":"https://doi.org/10.1145/3209914.3209924","url":null,"abstract":"The purpose of this study was to investigate demographic variables in knowledge sharing. The study conducted a quantitative study, and the participants were IT engineers. Random sampling was used. The questionnaires were sent to 25 IT companies by mails. The cover of the questionnaire explained the purposes of the study. A self-addressed stamped envelope was enclosed. 250 copies of questionnaires were sent and 84 copies were returned. The response rate was 33.6%. The data was analyzed by the independent t-test and One-way ANOVA in IBM SPSS 22. The findings of the study show (1) knowledge sharing behavior differs in terms of education level, (2) knowledge sharing behavior has significant influence in terms of profession, and (3) knowledge sharing behavior does not have significant influence in gender, age group, position grade, job tenure, workplace, marital status, and number of children.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"127 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.
图像数据是船舶航行记录中的关键数据之一。船舶场景再现依赖于船舶场景的高效检索。近年来,图像数量的指数增长使得传统的单机图像检索方法逐渐显示出效率低下的问题。本文提出了在Hadoop平台下基于BoVW (Bag of Visual Words)模型的图像检索方法,实现了分布式图像检索。首先,本文以BoVW模型为研究对象。基于Hadoop平台,改进了传统视觉词典的构建方法,采用术语频率-逆文档频率(TF-IDF)对词频向量进行加权。然后并行生成倒排索引用于图像检索。实验结果表明,该方法在保持原始检索结果的同时,将视觉词典构建效率提高了一倍,有效地提高了图像检索的效率。
{"title":"Research on Ship Image Retrieval Based on BoVW Model under Hadoop Platform","authors":"R. Hu, J. Yang, Bangpei Zhu, Zhiqiang Guo","doi":"10.1145/3209914.3209948","DOIUrl":"https://doi.org/10.1145/3209914.3209948","url":null,"abstract":"Image data is one of the key data in the ship's navigation record. Ship scene reappearance depends on its efficient retrieval. Recently, the exponential growth of the number of images makes the traditional single-machine image retrieval method gradually show the problem of inefficiency. In this paper, the image retrieval method based on the Bag of Visual Words (BoVW) model under the Hadoop platform is proposed and the distributed image retrieval is realized. Firstly, this paper takes BoVW model as the research object. Based on the Hadoop platform, the construction method of traditional visual dictionary is improved and the word frequency vectors are weighted by Term Frequency-Inverse Document Frequency (TF-IDF). Then the inverted index is generated in parallel for image retrieval. Experimental results show this method doubled the efficiency of visual dictionary construction while maintaining the original retrieval results and effectively improved the efficiency of image retrieval.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son
Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.
{"title":"A Scalable Network Area Storage with Virtualization: Modelling and Evaluation using Stochastic Reward Nets","authors":"Luyao Zou, Xuhua Rui, T. Nguyen, D. Min, Eunmi Choi, Tran Duc Thang, Nguyen Nhu Son","doi":"10.1145/3209914.3209918","DOIUrl":"https://doi.org/10.1145/3209914.3209918","url":null,"abstract":"Modelling and analysis of storage system in data centers for availability prediction is of paramount importance. Many studies in literature proposed different architectures and techniques to enhance availability of the storage system. In this paper, we proposed to incorporate virtualization techniques on a network area storage. We used stochastic reward nets to model the system's architecture and operational scenarios. Furthermore, we investigated various measures of interests including steady state availability, downtime and downtime cost, and sensitivity of the system availability with respect to impacting parameters. The analysis results show that the proposed storage system with virtualization can obtain an acceptable level of service availability. Furthermore, the sensitivity analysis also points out complicated dependences of service availability upon system parameters. This paper presents a preliminary study to help guide the development of a scalable network area storage with virtualization in practice.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to regulate the university student information management, improve work efficiency and quality management, using the popular Java technology, combining SQLServer2000 database, developed a platform independent student information management system. The system realizes the students and teachers of the relevant information to add, modify, delete and query functions, effectively improve the the quality of student information management.
{"title":"Design and Implementation of Student Information Management System Based On Java","authors":"Zhou Xiaofang","doi":"10.1145/3209914.3226153","DOIUrl":"https://doi.org/10.1145/3209914.3226153","url":null,"abstract":"In order to regulate the university student information management, improve work efficiency and quality management, using the popular Java technology, combining SQLServer2000 database, developed a platform independent student information management system. The system realizes the students and teachers of the relevant information to add, modify, delete and query functions, effectively improve the the quality of student information management.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"38 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113939444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.
{"title":"Protocol Keywords Extraction Method Based on Frequent Item-Sets Mining","authors":"Gaochao Li, Q. Qian, Zhonghua Wang, Xin Zou, Xunxun Chen, Xiao Wu","doi":"10.1145/3209914.3209937","DOIUrl":"https://doi.org/10.1145/3209914.3209937","url":null,"abstract":"Network application identification technology is widely used in the fields of network management, network optimization and intrusion detection and so on. And among the methods, the DPI (Deep Packet Inspection) is the most popular one with high accuracy relaying on a small amount of payload data. However, DPI depends on the effective protocol keywords. In order to cope with the speed of the applications updating, we proposed a protocol keywords extraction method for unencrypted network applications based on frequent itemsets mining. It contains two major steps: Firstly, we generate candidate words by using unsupervised methods and reduce the word set size with rules of words length and position. Then, we extract effective protocol keywords with frequent item-sets mining method and remove the noise words and redundant words by evaluating the candidate word co-occurrence relationship. The experiment result shows that our method shrinks the size of the keywords set and is better at extracting the real protocol keywords compared with Proword.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.
{"title":"Using Hybrid Features of QR Code to Locate and Track in Augmented Reality","authors":"Caixia Zhang, Gang Bai","doi":"10.1145/3209914.3226161","DOIUrl":"https://doi.org/10.1145/3209914.3226161","url":null,"abstract":"Augmented Reality (AR) is a technique which seamlessly integrate virtual 3D models into the image of the real scenario in real time. Using the QR code as the identification mark, an algorithm is proposed to extract the virtual straight line of QR code and to locate and track the camera based on the hybrid features, thus it avoids the possibility of failure when locating and tracking only by feature points. The experimental results show that the method of combining straight lines with feature points is better than that of using only straight lines or feature points. Further, an AR (Augmented Reality) system is developed.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. At present, dynamic display is widely used in large fixed exhibition spaces, such as exhibition halls and museums. The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. Art and design quality evaluation, evaluation standard is diverse, based on this, this paper gives a design evaluation system for modern commercial space, this paper defines the architecture and model for the system, the system can have good scalability, reusability and maintainability, provides convenience for future system upgrades and maintenance, for art design and evaluation of the final realization of a comprehensive network of the modern commercial space system.
{"title":"Research on Evaluation System of Art Design for Modern Commercial Space","authors":"Qiao Jimin","doi":"10.1145/3209914.3226154","DOIUrl":"https://doi.org/10.1145/3209914.3226154","url":null,"abstract":"The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. At present, dynamic display is widely used in large fixed exhibition spaces, such as exhibition halls and museums. The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. Art and design quality evaluation, evaluation standard is diverse, based on this, this paper gives a design evaluation system for modern commercial space, this paper defines the architecture and model for the system, the system can have good scalability, reusability and maintainability, provides convenience for future system upgrades and maintenance, for art design and evaluation of the final realization of a comprehensive network of the modern commercial space system.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Millions of smartphones are stolen in the United States every year, putting victims' personal information at risk since many users often do not lock their phones. To protect individuals' smartphones and the private data stored on them, we developed a system that automatically detects pickpocket and grab-and-run theft, in which a thief grabs the phone from a victim's hand then runs away. Our system applies machine learning to smartphone accelerometer data in order to detect possible theft incidents. Based on a field study and simulated theft scenarios, we are able to detect all thefts at a cost of 1 false alarm per week. Given that many smartphone users refuse to enable screen locking mechanisms over complaints that it takes too long to unlock their devices, our system could be used in conjunction with these systems in order to drastically decrease the number of times a user is asked to provide a lock code. That is, our system could be used to prompt smartphone users for PINs or passcodes only when theft events have been detected.
{"title":"Detecting Phone Theft Using Machine Learning","authors":"Xinyu Liu, D. Wagner, Serge Egelman","doi":"10.1145/3209914.3209923","DOIUrl":"https://doi.org/10.1145/3209914.3209923","url":null,"abstract":"Millions of smartphones are stolen in the United States every year, putting victims' personal information at risk since many users often do not lock their phones. To protect individuals' smartphones and the private data stored on them, we developed a system that automatically detects pickpocket and grab-and-run theft, in which a thief grabs the phone from a victim's hand then runs away. Our system applies machine learning to smartphone accelerometer data in order to detect possible theft incidents. Based on a field study and simulated theft scenarios, we are able to detect all thefts at a cost of 1 false alarm per week. Given that many smartphone users refuse to enable screen locking mechanisms over complaints that it takes too long to unlock their devices, our system could be used in conjunction with these systems in order to drastically decrease the number of times a user is asked to provide a lock code. That is, our system could be used to prompt smartphone users for PINs or passcodes only when theft events have been detected.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}