首页 > 最新文献

2010 2nd Computer Science and Electronic Engineering Conference (CEEC)最新文献

英文 中文
Universal intelligent data compression systems: A review 通用智能数据压缩系统综述
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606482
A. Kattan
Researchers have classically addressed the problem of universal compression using two approaches. The first approach has been to develop adaptive compression algorithms, where the system changes its behaviour during the compression to fit the encoding situation of the given data. The second approach has been to use the composition of multiple compression algorithms. Recently, however, a third approach has been adopted by researchers in order to develop compression systems: the application of computational intelligence paradigms. This has shown remarkable results in the data compression domain improving the decision making process and outperforming conventional systems of data compression. This paper reviews some of the previous attempts to address the universal compression problem within conventional and computational intelligence techniques.
研究人员通常使用两种方法来解决通用压缩问题。第一种方法是开发自适应压缩算法,其中系统在压缩过程中改变其行为以适应给定数据的编码情况。第二种方法是使用多种压缩算法的组合。然而,最近研究人员采用了第三种方法来开发压缩系统:应用计算智能范式。这在数据压缩领域显示出显著的效果,改进了决策过程,优于传统的数据压缩系统。本文回顾了以前在传统和计算智能技术中解决通用压缩问题的一些尝试。
{"title":"Universal intelligent data compression systems: A review","authors":"A. Kattan","doi":"10.1109/CEEC.2010.5606482","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606482","url":null,"abstract":"Researchers have classically addressed the problem of universal compression using two approaches. The first approach has been to develop adaptive compression algorithms, where the system changes its behaviour during the compression to fit the encoding situation of the given data. The second approach has been to use the composition of multiple compression algorithms. Recently, however, a third approach has been adopted by researchers in order to develop compression systems: the application of computational intelligence paradigms. This has shown remarkable results in the data compression domain improving the decision making process and outperforming conventional systems of data compression. This paper reviews some of the previous attempts to address the universal compression problem within conventional and computational intelligence techniques.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Evaluating UPnP service discovery protocols by using NS2 simulator 利用NS2模拟器评估UPnP服务发现协议
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606486
I. Al-Mejibli, M. Colley
Examining a protocol is necessary in order to identify its advantages and disadvantages precisely. Here we apply UPnP technology on an Ethernet network to evaluate its performance and identify its positive and negative sides. As it is known that UPnP can be run on many media that support IP such as Ethernet, Bluetooth and Wi-Fi. This paper produces an evaluation of UPnP service discovery protocol on different network sizes and shape by using NS2 simulator. This evaluation includes an assessment to the required transmission time which is required in the sending and receiving of messages for discovering all services in a defined network, and the cost for each examined network size to achieve this process. Cost means the required number of messages that should be transmitted to discover all services in the defined network. In addition to, examine the effect of the network shape to the performance of the UPnP protocol.
为了准确地确定协议的优点和缺点,检查协议是必要的。在此,我们将UPnP技术应用于以太网网络,以评估其性能并识别其积极和消极的方面。众所周知,UPnP可以在许多支持IP的媒体上运行,如以太网、蓝牙和Wi-Fi。本文利用NS2模拟器对不同网络规模和网络形态下的UPnP服务发现协议进行了评估。此评估包括对发现已定义网络中所有服务所需的消息发送和接收所需的传输时间的评估,以及为实现此过程所检查的每种网络规模的成本。成本是指发现所定义网络中所有服务所需传输的消息数量。此外,还研究了网络形状对UPnP协议性能的影响。
{"title":"Evaluating UPnP service discovery protocols by using NS2 simulator","authors":"I. Al-Mejibli, M. Colley","doi":"10.1109/CEEC.2010.5606486","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606486","url":null,"abstract":"Examining a protocol is necessary in order to identify its advantages and disadvantages precisely. Here we apply UPnP technology on an Ethernet network to evaluate its performance and identify its positive and negative sides. As it is known that UPnP can be run on many media that support IP such as Ethernet, Bluetooth and Wi-Fi. This paper produces an evaluation of UPnP service discovery protocol on different network sizes and shape by using NS2 simulator. This evaluation includes an assessment to the required transmission time which is required in the sending and receiving of messages for discovering all services in a defined network, and the cost for each examined network size to achieve this process. Cost means the required number of messages that should be transmitted to discover all services in the defined network. In addition to, examine the effect of the network shape to the performance of the UPnP protocol.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reducing search space traversal in 3D scene reconstruction 减少三维场景重构中的搜索空间遍历
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606497
Thomas Warsop, Sameer Singh
Three-dimensional scene recovery from two-dimensional image data is a challenging task. Typical methods compute two-dimensional image feature correspondences between image frames. However, these methods introduce errors as three-dimensional warping of image elements is not considered. Further, no previous method presented exploits the strong correlation between three-dimensional scene elements in adjacent video frames. In this work, we describe a simple three-dimensional scene recovery method which is extended using a novel extension exploiting temporal information, increasing efficiency of the method. The proposed method is applied to the recovery of outdoor scenes. Comparing with other, more traditional, three-dimensional recovery methods, the proposed method provides more accurate results and the addition of temporal information is shown to speed up execution without reducing accuracy.
从二维图像数据中恢复三维场景是一项具有挑战性的任务。典型的方法是计算图像帧之间的二维图像特征对应关系。然而,这些方法由于没有考虑图像元素的三维扭曲而引入了误差。此外,以前的方法没有利用相邻视频帧中三维场景元素之间的强相关性。本文描述了一种简单的三维场景恢复方法,该方法采用了一种利用时间信息的扩展,提高了方法的效率。将该方法应用于室外场景的恢复。与其他更传统的三维恢复方法相比,该方法提供了更准确的结果,并且在不降低精度的情况下增加了时间信息,从而加快了执行速度。
{"title":"Reducing search space traversal in 3D scene reconstruction","authors":"Thomas Warsop, Sameer Singh","doi":"10.1109/CEEC.2010.5606497","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606497","url":null,"abstract":"Three-dimensional scene recovery from two-dimensional image data is a challenging task. Typical methods compute two-dimensional image feature correspondences between image frames. However, these methods introduce errors as three-dimensional warping of image elements is not considered. Further, no previous method presented exploits the strong correlation between three-dimensional scene elements in adjacent video frames. In this work, we describe a simple three-dimensional scene recovery method which is extended using a novel extension exploiting temporal information, increasing efficiency of the method. The proposed method is applied to the recovery of outdoor scenes. Comparing with other, more traditional, three-dimensional recovery methods, the proposed method provides more accurate results and the addition of temporal information is shown to speed up execution without reducing accuracy.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Java programs in Coq Coq中Java程序的验证
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606499
Seokhyun Han
This paper is a research on functional interpretation of object-oriented programs in the intensional type theory with dependent record types and coercive subtyping. We are here simulating a type-theoretic model of Java programs in Coq. Representing a class and its interface-type, which declares a set of methods and their signatures for code reuse, as dependent record types, the type-theoretic encoding enjoys desirable subtyping relationships that correctly capture the important object-oriented features such as inheritance, subtype polymorphism and dynamic dispatch. Furthermore, since the model is given in the intensional type theory, machine-supported verification of Java programs can be done by proving specifications that is satisfied by Java programs in Coq with regard to the state of objects.
本文研究了基于依赖记录类型和强制子类型的内蕴类型理论中面向对象程序的功能解释。在这里,我们在Coq中模拟Java程序的类型理论模型。将一个类及其接口类型(它声明一组方法及其签名以供代码重用)表示为依赖的记录类型,类型理论编码具有理想的子类型关系,可以正确捕获重要的面向对象特性,如继承、子类型多态性和动态分派。此外,由于该模型是在内涵类型理论中给出的,因此可以通过证明Coq中的Java程序在对象状态方面满足的规范来完成Java程序的机器支持验证。
{"title":"Verification of Java programs in Coq","authors":"Seokhyun Han","doi":"10.1109/CEEC.2010.5606499","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606499","url":null,"abstract":"This paper is a research on functional interpretation of object-oriented programs in the intensional type theory with dependent record types and coercive subtyping. We are here simulating a type-theoretic model of Java programs in Coq. Representing a class and its interface-type, which declares a set of methods and their signatures for code reuse, as dependent record types, the type-theoretic encoding enjoys desirable subtyping relationships that correctly capture the important object-oriented features such as inheritance, subtype polymorphism and dynamic dispatch. Furthermore, since the model is given in the intensional type theory, machine-supported verification of Java programs can be done by proving specifications that is satisfied by Java programs in Coq with regard to the state of objects.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Curvelet transform based super-resolution using sub-pixel image registration 基于曲波变换的亚像素图像配准超分辨率
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606490
A. A. Patil, R. Singhai, J. Singhai
Super-Resolution (SR) is an approach used to restore High-Resolution (HR) image from one or more Low-Resolution (LR) images. The quality of reconstructed SR image obtained from a set of LR images depends upon the registration accuracy of LR images. However, the HR images can be reconstructed accurately by estimating sub-pixel displacement of image grid of the shifted LR image. In this paper an approach of reconstruction of SR image using a sub-pixel shift image registration and Curvelet Transform (CT) for interpolation is proposed. The curvelet transform is multiscale pyramid which provides optimally sparse representation of objects. Image interpolation is performed at the finest level in Curvelet domain. The experimental results demonstrate that Curvelet Transform performs better as compared to Stationary Wavelet Transform. Also, it is experimentally verified that the computational complexity of the SR algorithm is also reduced by using CT for interpolation.
超分辨率(SR)是一种用于从一个或多个低分辨率(LR)图像恢复高分辨率(HR)图像的方法。从一组LR图像中获得的重建SR图像的质量取决于LR图像的配准精度。然而,通过估计移后LR图像的图像网格的亚像素位移,可以准确地重建HR图像。本文提出了一种利用亚像素偏移配准和曲线变换(CT)插值重建SR图像的方法。曲线变换是一种多尺度金字塔变换,它提供了物体的最优稀疏表示。在Curvelet域中进行最精细的图像插值。实验结果表明,与平稳小波变换相比,曲波变换具有更好的性能。通过实验验证,利用CT进行插值也降低了SR算法的计算复杂度。
{"title":"Curvelet transform based super-resolution using sub-pixel image registration","authors":"A. A. Patil, R. Singhai, J. Singhai","doi":"10.1109/CEEC.2010.5606490","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606490","url":null,"abstract":"Super-Resolution (SR) is an approach used to restore High-Resolution (HR) image from one or more Low-Resolution (LR) images. The quality of reconstructed SR image obtained from a set of LR images depends upon the registration accuracy of LR images. However, the HR images can be reconstructed accurately by estimating sub-pixel displacement of image grid of the shifted LR image. In this paper an approach of reconstruction of SR image using a sub-pixel shift image registration and Curvelet Transform (CT) for interpolation is proposed. The curvelet transform is multiscale pyramid which provides optimally sparse representation of objects. Image interpolation is performed at the finest level in Curvelet domain. The experimental results demonstrate that Curvelet Transform performs better as compared to Stationary Wavelet Transform. Also, it is experimentally verified that the computational complexity of the SR algorithm is also reduced by using CT for interpolation.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Impact of intra-refresh provision on a data-partitioned wireless broadband video streaming scheme 内部刷新对数据分区无线宽带视频流方案的影响
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606483
L. Al-Jobouri, M. Fleury, M. Ghanbari
Intra-refresh macroblocks are normally provided in mobile broadband wireless access to avoid the effect of temporal error propagation. The questions then arise are: in what form should the refresh take place; and what percentage of refresh is necessary. This paper is a study of intra-refresh provision in the context of a robust video streaming scheme. The scheme combines data-partitioned video compression with adaptive channel coding and redundant packets. The main conclusions from a detailed analysis are that: because of the effect on packet size it is important to select a moderate quantization parameter; and because of the higher overhead from cyclic intra macroblock line update it is better to select a low percentage per frame of intra-refresh macroblocks. In harsh channel conditions from the combined effect of slow and fast fading producing 'bursty' errors, all the proposed measures are necessary but then periodic intra-refresh can be avoided with its sudden increases in the data-rate if the proposed levels of intra-refresh macroblocks are applied.
为了避免时间误差传播的影响,在移动宽带无线接入中通常提供刷新内宏块。接下来的问题是:应该以何种形式进行刷新;刷新的百分比是多少。本文研究了一种鲁棒视频流方案下的内部刷新供应。该方案将数据分割视频压缩与自适应信道编码和冗余数据包相结合。详细分析得出的主要结论是:由于对数据包大小的影响,选择适当的量化参数很重要;由于循环内部宏块行更新的开销较高,因此最好选择每帧内刷新宏块的低百分比。在缓慢和快速衰落产生“突发”错误的综合影响的恶劣信道条件下,所有建议的措施都是必要的,但是如果应用建议的内部刷新宏块级别,则可以避免周期性的内部刷新,因为它会导致数据速率的突然增加。
{"title":"Impact of intra-refresh provision on a data-partitioned wireless broadband video streaming scheme","authors":"L. Al-Jobouri, M. Fleury, M. Ghanbari","doi":"10.1109/CEEC.2010.5606483","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606483","url":null,"abstract":"Intra-refresh macroblocks are normally provided in mobile broadband wireless access to avoid the effect of temporal error propagation. The questions then arise are: in what form should the refresh take place; and what percentage of refresh is necessary. This paper is a study of intra-refresh provision in the context of a robust video streaming scheme. The scheme combines data-partitioned video compression with adaptive channel coding and redundant packets. The main conclusions from a detailed analysis are that: because of the effect on packet size it is important to select a moderate quantization parameter; and because of the higher overhead from cyclic intra macroblock line update it is better to select a low percentage per frame of intra-refresh macroblocks. In harsh channel conditions from the combined effect of slow and fast fading producing 'bursty' errors, all the proposed measures are necessary but then periodic intra-refresh can be avoided with its sudden increases in the data-rate if the proposed levels of intra-refresh macroblocks are applied.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"91 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127426414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concurrent statechart slicing 并发状态图切片
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606493
Arthorn Luangsodsai, C. Fox
The paper describes a system for slicing concurrent statecharts. Slicing seeks to remove those parts of a statechart that are not relevant for a given criteria. The technique can be applied to support model-based analysis, testing, debugging and maintenance of embedded systems and reactive systems. An And-Or dependence graph is used to represent the control and data dependencies of statecharts. The slicing algorithm determines the slice by traversing the dependence graph from a point that is specified by the slicing criteria. We deal with concurrent statecharts by taking into account of interference dependencies including parallel control dependence, interference control dependence and interference data dependence.
本文描述了一个并行状态图切片系统。切片旨在删除状态图中与给定标准不相关的部分。该技术可用于支持嵌入式系统和响应式系统的基于模型的分析、测试、调试和维护。and - or依赖关系图用于表示状态图的控制和数据依赖关系。切片算法通过从切片标准指定的点遍历依赖图来确定切片。通过考虑并行控制依赖、干扰控制依赖和干扰数据依赖等干扰依赖关系来处理并发状态图。
{"title":"Concurrent statechart slicing","authors":"Arthorn Luangsodsai, C. Fox","doi":"10.1109/CEEC.2010.5606493","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606493","url":null,"abstract":"The paper describes a system for slicing concurrent statecharts. Slicing seeks to remove those parts of a statechart that are not relevant for a given criteria. The technique can be applied to support model-based analysis, testing, debugging and maintenance of embedded systems and reactive systems. An And-Or dependence graph is used to represent the control and data dependencies of statecharts. The slicing algorithm determines the slice by traversing the dependence graph from a point that is specified by the slicing criteria. We deal with concurrent statecharts by taking into account of interference dependencies including parallel control dependence, interference control dependence and interference data dependence.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A hybrid virtual bass system for optimized steady-state and transient performance 一种优化稳态和瞬态性能的混合虚拟低音系统
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606489
Adam J. Hill, M. Hawksford
Bandwidth extension of a constrained loudspeaker system is regularly achieved employing nonlinear bass synthesis. The method operates on the doctrine of the missing fundamental whereby humans infer the presence of a fundamental tone when presented with a signal consisting of higher harmonics of said tone. Nonlinear devices and phase vocoders are commonly used for signal generation; both exhibiting deficiencies. A system is proposed where the two approaches are used in tandem via a mixing algorithm to suppress these deficiencies. Mixing is performed by signal transient content analysis in the frequency domain using constant-Q transforms. The hybrid approach is rated subjectively against various nonlinear device and phase vocoder techniques using the MUSHRA test method.
采用非线性低音合成技术实现了受限扬声器系统的带宽扩展。该方法的原理是基本音缺失,即当出现由该音调的高次谐波组成的信号时,人类会推断出该基本音的存在。非线性器件和相位声编码器常用于信号产生;两者都有缺陷。提出了一种系统,其中两种方法串联使用,通过混合算法来抑制这些缺陷。混合是通过使用常q变换在频域进行信号瞬态内容分析来实现的。使用MUSHRA测试方法对混合方法进行了各种非线性器件和相位声码器技术的主观评价。
{"title":"A hybrid virtual bass system for optimized steady-state and transient performance","authors":"Adam J. Hill, M. Hawksford","doi":"10.1109/CEEC.2010.5606489","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606489","url":null,"abstract":"Bandwidth extension of a constrained loudspeaker system is regularly achieved employing nonlinear bass synthesis. The method operates on the doctrine of the missing fundamental whereby humans infer the presence of a fundamental tone when presented with a signal consisting of higher harmonics of said tone. Nonlinear devices and phase vocoders are commonly used for signal generation; both exhibiting deficiencies. A system is proposed where the two approaches are used in tandem via a mixing algorithm to suppress these deficiencies. Mixing is performed by signal transient content analysis in the frequency domain using constant-Q transforms. The hybrid approach is rated subjectively against various nonlinear device and phase vocoder techniques using the MUSHRA test method.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Determination of the surface reflectance properties of timber using photometric stereo technique 用光度立体技术测定木材的表面反射率
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606492
Philips S. Ogun, M. Jackson, R. Parkin
In-process surface inspection during wood machining has attracted great interest in recent years due to the growing desire to minimise wastage and the increasing demand for higher quality wooden products. In order to take advantage of the developments in machine vision technologies for surface quality inspection, it is necessary to investigate the reflectance properties of wood so that standard machine-vision based assessment methods can be established. This paper describes a method for estimating the surface albedo of wood using photometric stereo technique. It is revealed that the albedo of timber is highly variable, which can be attributed to its hygroscopic and anisotropic material nature.
木材加工过程中的表面检测近年来引起了人们的极大兴趣,因为人们越来越希望尽量减少浪费,对高质量木制品的需求也越来越大。为了利用机器视觉技术在表面质量检测中的发展,有必要研究木材的反射特性,从而建立基于机器视觉的标准评估方法。本文介绍了一种利用光度立体技术估算木材表面反照率的方法。结果表明,木材的反照率变化很大,这与木材的吸湿性和各向异性有关。
{"title":"Determination of the surface reflectance properties of timber using photometric stereo technique","authors":"Philips S. Ogun, M. Jackson, R. Parkin","doi":"10.1109/CEEC.2010.5606492","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606492","url":null,"abstract":"In-process surface inspection during wood machining has attracted great interest in recent years due to the growing desire to minimise wastage and the increasing demand for higher quality wooden products. In order to take advantage of the developments in machine vision technologies for surface quality inspection, it is necessary to investigate the reflectance properties of wood so that standard machine-vision based assessment methods can be established. This paper describes a method for estimating the surface albedo of wood using photometric stereo technique. It is revealed that the albedo of timber is highly variable, which can be attributed to its hygroscopic and anisotropic material nature.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131117175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimised clustering method for reducing challenges of network forensics 优化聚类方法,减少网络取证的挑战
Pub Date : 2010-10-21 DOI: 10.1109/CEEC.2010.5606495
J. Nehinbe
Network forensics are challenging because of numerous quantities of low level alerts that are generated by network intrusion detectors generate to achieve high detection rates. However, clustering analyses are insufficient to establish overall patterns, sequential dependencies and precise classifications of attacks embedded in of low level alerts. This is because there are several ways to cluster a set of alerts especially if the alerts contain clustering criteria that have several values. Consequently, it is difficult to promptly select an appropriate clustering technique for investigating computer attacks and to concurrently handle the tradeoffs between interpretations and clustering of low level alerts effectively. Accordingly, alerts, attacks and corresponding countermeasures are frequently mismatched. Hence, several realistic attacks easily circumvent early detections. Therefore, in this paper, intrusive alerts were clustered and the quality of each cluster was evaluated. The results demonstrate how a measure of entropy can be used to establish suitable clustering technique for investigating computer attacks.
网络取证具有挑战性,因为网络入侵探测器为实现高检测率而生成大量低级警报。然而,聚类分析不足以建立嵌入在低级别警报中的攻击的总体模式、顺序依赖关系和精确分类。这是因为有几种方法可以对一组警报进行聚类,特别是当警报包含具有多个值的聚类标准时。因此,很难及时选择一种合适的聚类技术来调查计算机攻击,并同时有效地处理低级别警报的解释和聚类之间的权衡。因此,警报、攻击和相应的对策经常不匹配。因此,一些现实的攻击很容易绕过早期检测。因此,本文对入侵警报进行聚类,并对每个聚类的质量进行评价。结果表明,熵的度量可以用来建立合适的聚类技术来调查计算机攻击。
{"title":"Optimised clustering method for reducing challenges of network forensics","authors":"J. Nehinbe","doi":"10.1109/CEEC.2010.5606495","DOIUrl":"https://doi.org/10.1109/CEEC.2010.5606495","url":null,"abstract":"Network forensics are challenging because of numerous quantities of low level alerts that are generated by network intrusion detectors generate to achieve high detection rates. However, clustering analyses are insufficient to establish overall patterns, sequential dependencies and precise classifications of attacks embedded in of low level alerts. This is because there are several ways to cluster a set of alerts especially if the alerts contain clustering criteria that have several values. Consequently, it is difficult to promptly select an appropriate clustering technique for investigating computer attacks and to concurrently handle the tradeoffs between interpretations and clustering of low level alerts effectively. Accordingly, alerts, attacks and corresponding countermeasures are frequently mismatched. Hence, several realistic attacks easily circumvent early detections. Therefore, in this paper, intrusive alerts were clustered and the quality of each cluster was evaluated. The results demonstrate how a measure of entropy can be used to establish suitable clustering technique for investigating computer attacks.","PeriodicalId":175099,"journal":{"name":"2010 2nd Computer Science and Electronic Engineering Conference (CEEC)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133230200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 2nd Computer Science and Electronic Engineering Conference (CEEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1