In order to regulate the university student information management, improve work efficiency and quality management, using the popular Java technology, combining SQLServer2000 database, developed a platform independent student information management system. The system realizes the students and teachers of the relevant information to add, modify, delete and query functions, effectively improve the the quality of student information management.
{"title":"Design and Implementation of Student Information Management System Based On Java","authors":"Zhou Xiaofang","doi":"10.1145/3209914.3226153","DOIUrl":"https://doi.org/10.1145/3209914.3226153","url":null,"abstract":"In order to regulate the university student information management, improve work efficiency and quality management, using the popular Java technology, combining SQLServer2000 database, developed a platform independent student information management system. The system realizes the students and teachers of the relevant information to add, modify, delete and query functions, effectively improve the the quality of student information management.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"38 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113939444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ji Youlang, Yu Yang, Z. Hongying, Zhu Jun, Gu Jingjing, Hua Lingya
The knowledge in the knowledge bases such as Freebase, Knowledge Vault and so on are all facts which record the relationships between two entities. It may lead to following two problems. First, this form of knowledge limits the scale of the existing knowledge bases. When extracting new facts, no good patterns with a good ability of summarization can be used. Second, when applied in some real tasks, the knowledge may always suffer the problem of data sparsity. To solve these two problems, in this paper, we define the problem of extracting common senses in a concept level. We evaluate our solutions on Google N-Grams data set, and the results shows a great improvement.
{"title":"Verb Based Conceptual Common Sense Extraction","authors":"Ji Youlang, Yu Yang, Z. Hongying, Zhu Jun, Gu Jingjing, Hua Lingya","doi":"10.1145/3209914.3209941","DOIUrl":"https://doi.org/10.1145/3209914.3209941","url":null,"abstract":"The knowledge in the knowledge bases such as Freebase, Knowledge Vault and so on are all facts which record the relationships between two entities. It may lead to following two problems. First, this form of knowledge limits the scale of the existing knowledge bases. When extracting new facts, no good patterns with a good ability of summarization can be used. Second, when applied in some real tasks, the knowledge may always suffer the problem of data sparsity. To solve these two problems, in this paper, we define the problem of extracting common senses in a concept level. We evaluate our solutions on Google N-Grams data set, and the results shows a great improvement.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Millions of smartphones are stolen in the United States every year, putting victims' personal information at risk since many users often do not lock their phones. To protect individuals' smartphones and the private data stored on them, we developed a system that automatically detects pickpocket and grab-and-run theft, in which a thief grabs the phone from a victim's hand then runs away. Our system applies machine learning to smartphone accelerometer data in order to detect possible theft incidents. Based on a field study and simulated theft scenarios, we are able to detect all thefts at a cost of 1 false alarm per week. Given that many smartphone users refuse to enable screen locking mechanisms over complaints that it takes too long to unlock their devices, our system could be used in conjunction with these systems in order to drastically decrease the number of times a user is asked to provide a lock code. That is, our system could be used to prompt smartphone users for PINs or passcodes only when theft events have been detected.
{"title":"Detecting Phone Theft Using Machine Learning","authors":"Xinyu Liu, D. Wagner, Serge Egelman","doi":"10.1145/3209914.3209923","DOIUrl":"https://doi.org/10.1145/3209914.3209923","url":null,"abstract":"Millions of smartphones are stolen in the United States every year, putting victims' personal information at risk since many users often do not lock their phones. To protect individuals' smartphones and the private data stored on them, we developed a system that automatically detects pickpocket and grab-and-run theft, in which a thief grabs the phone from a victim's hand then runs away. Our system applies machine learning to smartphone accelerometer data in order to detect possible theft incidents. Based on a field study and simulated theft scenarios, we are able to detect all thefts at a cost of 1 false alarm per week. Given that many smartphone users refuse to enable screen locking mechanisms over complaints that it takes too long to unlock their devices, our system could be used in conjunction with these systems in order to drastically decrease the number of times a user is asked to provide a lock code. That is, our system could be used to prompt smartphone users for PINs or passcodes only when theft events have been detected.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. At present, dynamic display is widely used in large fixed exhibition spaces, such as exhibition halls and museums. The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. Art and design quality evaluation, evaluation standard is diverse, based on this, this paper gives a design evaluation system for modern commercial space, this paper defines the architecture and model for the system, the system can have good scalability, reusability and maintainability, provides convenience for future system upgrades and maintenance, for art design and evaluation of the final realization of a comprehensive network of the modern commercial space system.
{"title":"Research on Evaluation System of Art Design for Modern Commercial Space","authors":"Qiao Jimin","doi":"10.1145/3209914.3226154","DOIUrl":"https://doi.org/10.1145/3209914.3226154","url":null,"abstract":"The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. At present, dynamic display is widely used in large fixed exhibition spaces, such as exhibition halls and museums. The modern commercial space art design display techniques of various display forms are not oriented, dynamic display is popular in modern display form, it is different from the static display of the old, the use of movable type, interactive operation, etc., the audience can not only touch the exhibits, the exhibits and operation, specimen the model is it more important to be able to interact with the exhibits, let the audience more direct understanding of the functions and characteristics of products, from static to dynamic display, can mobilize visitors to actively participate in the activities of consciousness, make the display more rich and colorful, have a good effect. Art and design quality evaluation, evaluation standard is diverse, based on this, this paper gives a design evaluation system for modern commercial space, this paper defines the architecture and model for the system, the system can have good scalability, reusability and maintainability, provides convenience for future system upgrades and maintenance, for art design and evaluation of the final realization of a comprehensive network of the modern commercial space system.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The application of modern Chinese multi-category words corpus is very wide. With the development of the Internet, data from the corpus is getting bigger and bigger during collection. The data gradually develops so big that the current relational database is difficult to deal with them. This article analyzes the important role of the big data technology in corpu
{"title":"Application of Big Data and Intelligent Processing Technology in Modern Chinese Multi-category Words Part of Speech Tagging Corpus","authors":"Zhendong Song","doi":"10.1145/3209914.3234639","DOIUrl":"https://doi.org/10.1145/3209914.3234639","url":null,"abstract":"The application of modern Chinese multi-category words corpus is very wide. With the development of the Internet, data from the corpus is getting bigger and bigger during collection. The data gradually develops so big that the current relational database is difficult to deal with them. This article analyzes the important role of the big data technology in corpu","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132981502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a hierarchical weighted round-robin scheduling (HWRR) algorithm is proposed in Load-Balanced two-stage switches. Following the change of traffic load, the proposed algorithm can adjust scheduling weights and allocate bandwidth flexibility. Intensive dispatching will be performed when heavy load is detected. It can reduce the packet drop probability and meet the requirements of different priority traffic. The simulation results show that HWRR achieves stable performance on delay and cell drop probability, and performs well under several types of traffic.
{"title":"An Adaptive Scheduling Algorithm for Multi-Priority Traffic in Load-Balanced Switch","authors":"Ya Gao","doi":"10.1145/3209914.3226167","DOIUrl":"https://doi.org/10.1145/3209914.3226167","url":null,"abstract":"In this paper, a hierarchical weighted round-robin scheduling (HWRR) algorithm is proposed in Load-Balanced two-stage switches. Following the change of traffic load, the proposed algorithm can adjust scheduling weights and allocate bandwidth flexibility. Intensive dispatching will be performed when heavy load is detected. It can reduce the packet drop probability and meet the requirements of different priority traffic. The simulation results show that HWRR achieves stable performance on delay and cell drop probability, and performs well under several types of traffic.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a new approach that can process nonuniformly sampled signals efficiently, in the sense the digital spectrum and signal recovering from nonuniformly sampled signal can be derived precisely. The results of research on estimation spectra of signals whose samples were taken at randomly distributed sampling instants are presented. The paper determines the conditions under which a discrete Fourier transformation spectrum estimator provides an unbiased approximation of the spectrum of the original continuous-time signal in an unlimited range of frequencies. In the research nonuniformly sampled signals is represented as the algebraic addition of impulse function. Based on the random theory, the expected value is obtained. The signal is recovered by the inverse Fourier transformation.
{"title":"Signal Recovering Based on Fourier Analysis from Nonuniform Samples","authors":"Yukai Gao","doi":"10.1145/3209914.3234641","DOIUrl":"https://doi.org/10.1145/3209914.3234641","url":null,"abstract":"This paper describes a new approach that can process nonuniformly sampled signals efficiently, in the sense the digital spectrum and signal recovering from nonuniformly sampled signal can be derived precisely. The results of research on estimation spectra of signals whose samples were taken at randomly distributed sampling instants are presented. The paper determines the conditions under which a discrete Fourier transformation spectrum estimator provides an unbiased approximation of the spectrum of the original continuous-time signal in an unlimited range of frequencies. In the research nonuniformly sampled signals is represented as the algebraic addition of impulse function. Based on the random theory, the expected value is obtained. The signal is recovered by the inverse Fourier transformation.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116741415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The introduction of RGB-D sensor has attracted attention from researchers majored in computer vision. With real-time depth measurement provided by RGB-D sensor, a better navigational assistance than traditional aiding tools can be offered for visually impaired people. However, nowadays RGB-D sensor usually has a limited detecting range, and fails in performing depth measurement on objects with special surfaces, such as absorbing, specular, and transparent surfaces. In this paper, a novel algorithm using two RealSense R200 simultaneously to build a short-baseline color stereo vision system is developed. This algorithm enhances depth estimation by fusing color stereo depth map and original RealSense depth map, which is obtained by infrared stereo vision. Moreover, the minimum range is decreased by up to 84.6%, from 650mm to 100mm. We anticipate out algorithm to provide better assistance for visually impaired individuals.
{"title":"Improving RealSense by Fusing Color Stereo Vision and Infrared Stereo Vision for the Visually Impaired","authors":"Hao Chen, Kaiwei Wang, Kailun Yang","doi":"10.1145/3209914.3209944","DOIUrl":"https://doi.org/10.1145/3209914.3209944","url":null,"abstract":"The introduction of RGB-D sensor has attracted attention from researchers majored in computer vision. With real-time depth measurement provided by RGB-D sensor, a better navigational assistance than traditional aiding tools can be offered for visually impaired people. However, nowadays RGB-D sensor usually has a limited detecting range, and fails in performing depth measurement on objects with special surfaces, such as absorbing, specular, and transparent surfaces. In this paper, a novel algorithm using two RealSense R200 simultaneously to build a short-baseline color stereo vision system is developed. This algorithm enhances depth estimation by fusing color stereo depth map and original RealSense depth map, which is obtained by infrared stereo vision. Moreover, the minimum range is decreased by up to 84.6%, from 650mm to 100mm. We anticipate out algorithm to provide better assistance for visually impaired individuals.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"83 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of the Internet, the images become the main medium of information dissemination, while the spread of pornographic images are getting more serious. Therefore, we propose a detection method of pornographic images based on a combination of global and local features. Considering the NPDI database's defective both in quality and quantity, so this paper constructs new database CUC_NSFW (Not Suitable for Work) applying data augmentation methods to improve the classification performance. Pornographic images with only exposed sensitive organs become the bottleneck of improving model recall ratio. We design a sensitive organs detection module, cascaded behind the residual network assisting the recognition of pornography images. And our method makes a good performance based on the research work of pornographic image detection
随着互联网的快速发展,图像成为信息传播的主要媒介,而色情图像的传播也日益严重。因此,我们提出了一种基于全局特征和局部特征相结合的色情图像检测方法。针对NPDI数据库在数量和质量上的缺陷,本文采用数据增强方法构建了新的数据库CUC_NSFW (Not Suitable for Work),以提高分类性能。仅暴露敏感器官的色情图像成为提高模型召回率的瓶颈。我们设计了一个敏感器官检测模块,级联在残差网络后面,帮助识别色情图像。通过对色情图像检测的研究,该方法取得了较好的效果
{"title":"Application of Pornographic Images Recognition Based on Depth Learning","authors":"Ruolin Zhu, Xiaoyu Wu, Beibei Zhu, Li-hua Song","doi":"10.1145/3209914.3209946","DOIUrl":"https://doi.org/10.1145/3209914.3209946","url":null,"abstract":"With the rapid development of the Internet, the images become the main medium of information dissemination, while the spread of pornographic images are getting more serious. Therefore, we propose a detection method of pornographic images based on a combination of global and local features. Considering the NPDI database's defective both in quality and quantity, so this paper constructs new database CUC_NSFW (Not Suitable for Work) applying data augmentation methods to improve the classification performance. Pornographic images with only exposed sensitive organs become the bottleneck of improving model recall ratio. We design a sensitive organs detection module, cascaded behind the residual network assisting the recognition of pornography images. And our method makes a good performance based on the research work of pornographic image detection","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan
Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a ".pxt file". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.
{"title":"'Pandora': A multi-encryption software","authors":"Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan","doi":"10.1145/3209914.3209919","DOIUrl":"https://doi.org/10.1145/3209914.3209919","url":null,"abstract":"Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a \".pxt file\". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}