Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073404
K. Kumar, Nadir Mustafa, Jian-ping Li, R. Shaikh, Saeed Ahmed Khan, Asif Khan
The Wavelet Transform remained quite rapidly used technique today for analysing the signals. For image edge detection, wavelet transform provides facility to select the size of the image details that will be detected. Wavelets transform separates the lower frequencies and higher frequencies easily, which is prime important for edge detection. The wavelet scale sets the size of detected edges. For discrete wavelet transform, many signals are passed through wavelet filter for choice of the scale. For 2-D image, wavelet analysis is carried out in terms of horizontal and vertical function and edges are detected separately. In this paper the Daubachies wavelet transform has been used, where 2-D image is decomposed at three levels and at each level lower and higher frequencies have been separated. As Daubachies wavelet gives appropriate edge at three levels for black and white image along with some ghost edges. Some threshold has been used to cater these ghost edges. For edges detection in an image, a MATLAB code have been developed, which tests the two-dimensional scene. Two dimensional image objects have been investigated. The intention was to test 2D images by using wavelet transform of real objects.
{"title":"Image edge detection scheme using wavelet transform","authors":"K. Kumar, Nadir Mustafa, Jian-ping Li, R. Shaikh, Saeed Ahmed Khan, Asif Khan","doi":"10.1109/ICCWAMTIP.2014.7073404","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073404","url":null,"abstract":"The Wavelet Transform remained quite rapidly used technique today for analysing the signals. For image edge detection, wavelet transform provides facility to select the size of the image details that will be detected. Wavelets transform separates the lower frequencies and higher frequencies easily, which is prime important for edge detection. The wavelet scale sets the size of detected edges. For discrete wavelet transform, many signals are passed through wavelet filter for choice of the scale. For 2-D image, wavelet analysis is carried out in terms of horizontal and vertical function and edges are detected separately. In this paper the Daubachies wavelet transform has been used, where 2-D image is decomposed at three levels and at each level lower and higher frequencies have been separated. As Daubachies wavelet gives appropriate edge at three levels for black and white image along with some ghost edges. Some threshold has been used to cater these ghost edges. For edges detection in an image, a MATLAB code have been developed, which tests the two-dimensional scene. Two dimensional image objects have been investigated. The intention was to test 2D images by using wavelet transform of real objects.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073450
Hao Liu, Yuehao Yan, Junhai Wang
After studying the compressed sensing theory and its main reconstruction algorithm-Matching Pursuit (MP) algorithm, this paper proposes a new approach to improve the speed of MP algorithm, and it describes how to build a Beowulf parallel computing system with 8 PCs. Its parallel computations is implemented by Message-Passing-Interface(MPI), and a 100Mb/s high speed Ethernet network interconnects all PCs. Test is made using parallel computing program to measure the parallel efficiency of the system, results show that this approach can reduce the MP algorithm computing time-cost form 78 minutes with a PC to 11 minutes with 8 PCs.
{"title":"A fast algorithm of compressed sensing","authors":"Hao Liu, Yuehao Yan, Junhai Wang","doi":"10.1109/ICCWAMTIP.2014.7073450","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073450","url":null,"abstract":"After studying the compressed sensing theory and its main reconstruction algorithm-Matching Pursuit (MP) algorithm, this paper proposes a new approach to improve the speed of MP algorithm, and it describes how to build a Beowulf parallel computing system with 8 PCs. Its parallel computations is implemented by Message-Passing-Interface(MPI), and a 100Mb/s high speed Ethernet network interconnects all PCs. Test is made using parallel computing program to measure the parallel efficiency of the system, results show that this approach can reduce the MP algorithm computing time-cost form 78 minutes with a PC to 11 minutes with 8 PCs.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117193675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073388
X. Lu, Liangyan Cheng
A target tracking algorithm based on compressed sensing and sensing subtraction was proposed in this paper. We presented the concept of sensing subtraction, combined sensing subtraction and compressed sensing, sparsely sampled the distributed sensing information in Internet of Things (IoT), and reconstructed sensing subtraction matrix by compressed sensing theory, and then located and tracked moving target by sensing subtraction method. Simulation results show that the proposed algorithm recovers sensing data well, and the sparse sampling strategy reduces network communication traffic and improves the energy-efficiency of system.
{"title":"Target tracking in internet of things based on sensing subtraction and compressed sensing","authors":"X. Lu, Liangyan Cheng","doi":"10.1109/ICCWAMTIP.2014.7073388","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073388","url":null,"abstract":"A target tracking algorithm based on compressed sensing and sensing subtraction was proposed in this paper. We presented the concept of sensing subtraction, combined sensing subtraction and compressed sensing, sparsely sampled the distributed sensing information in Internet of Things (IoT), and reconstructed sensing subtraction matrix by compressed sensing theory, and then located and tracked moving target by sensing subtraction method. Simulation results show that the proposed algorithm recovers sensing data well, and the sparse sampling strategy reduces network communication traffic and improves the energy-efficiency of system.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115485204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073430
Quan Wang, Ping Li, Rongbin Liu, Jian-Pin Li
In PCM/FM remote sensing receiving system, when the bit rate is above 1Mbps, the signal suffers frequency select fading, which causes the serious inter-symbol interference (ISI); power allowance can no longer guarantee the system quota. Besides signal reflection such as buildings, ground, mountains and atmospheric refraction eventually become the multipath interference signals. Thus an adaptive filter is needed for equalization before the sample-decision detector in the receiver [1]. The traditional method is based on training sequence channel equalization. However, considering to these two problems, two issues are discussed in this dissertation: blind equalization based on the adaptive filter theory; the realization of blind equalizer on FPGA.
{"title":"Implementation of CMA-base blind equalizer on FPGA","authors":"Quan Wang, Ping Li, Rongbin Liu, Jian-Pin Li","doi":"10.1109/ICCWAMTIP.2014.7073430","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073430","url":null,"abstract":"In PCM/FM remote sensing receiving system, when the bit rate is above 1Mbps, the signal suffers frequency select fading, which causes the serious inter-symbol interference (ISI); power allowance can no longer guarantee the system quota. Besides signal reflection such as buildings, ground, mountains and atmospheric refraction eventually become the multipath interference signals. Thus an adaptive filter is needed for equalization before the sample-decision detector in the receiver [1]. The traditional method is based on training sequence channel equalization. However, considering to these two problems, two issues are discussed in this dissertation: blind equalization based on the adaptive filter theory; the realization of blind equalizer on FPGA.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073448
Qing-xian Wang, Yan Ren, Neng-Qiang He, Meng Wan, Guo-Bo Lu
Collaborative filtering recommender systems are now popular both commercially and in the research community. However, they are vulnerable to manipulation by malicious users, where attackers inject into some fake user profiles in order to bias the recommendation results to their benefits. To solve the problem, a lots of methods have been proposed but mainly focus on identification the attacker at the individual level, i.e., to find the fake user one by one, while do not consider the similarity between attack users. In this paper, we present an algorithm to detect the attackers in group level. It works based on an effective algorithm for detecting individual malicious user and an effective clustering algorithm. More precisely, we cluster all users into group, and then find the group characters of attacked items, finally we find the attack user group. We test the algorithm on a benchmark dataset using four kinds of typical attack models, the results show that our solution is both efficient and effective, particularly in the popular attack model and the segment attack model, and the performance is significant in the segment attack model with large attack size.
{"title":"A group attack detecter for collaborative filtering recommendation","authors":"Qing-xian Wang, Yan Ren, Neng-Qiang He, Meng Wan, Guo-Bo Lu","doi":"10.1109/ICCWAMTIP.2014.7073448","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073448","url":null,"abstract":"Collaborative filtering recommender systems are now popular both commercially and in the research community. However, they are vulnerable to manipulation by malicious users, where attackers inject into some fake user profiles in order to bias the recommendation results to their benefits. To solve the problem, a lots of methods have been proposed but mainly focus on identification the attacker at the individual level, i.e., to find the fake user one by one, while do not consider the similarity between attack users. In this paper, we present an algorithm to detect the attackers in group level. It works based on an effective algorithm for detecting individual malicious user and an effective clustering algorithm. More precisely, we cluster all users into group, and then find the group characters of attacked items, finally we find the attack user group. We test the algorithm on a benchmark dataset using four kinds of typical attack models, the results show that our solution is both efficient and effective, particularly in the popular attack model and the segment attack model, and the performance is significant in the segment attack model with large attack size.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"11 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073369
Dongyu Li, Guang Chen, Yan Li, Weiran Xu
In recent years, the E-commercial plays an important role in people's daily life. When on the Internet, people often buy commodities from Taobao, Tmall and make comments on them, the comments of the goods may have closely connections with commercial value, which often reflect what's the consumers really care when they choose one piece of good among thousands of other similar ones. How to mining these aspects which the consumers really concern is a problem left unsolved. As a potential effective solution to construct structured information for people's preference, Information Extraction(IE) has attracted more and more scholar's attention. A meaningful research area is Opinion Target Extraction(OTE). This paper proposed a system using translation model as well as word representation method to obtain user's interests on dataset in Chinese. To release the word segmentation error, a finely generated system with new Chinese word detection module is proposed. The experiments on two corpus subjected on digital product verify the effective of our method.
{"title":"Mining consumer's opinion target based on translation model and word representation","authors":"Dongyu Li, Guang Chen, Yan Li, Weiran Xu","doi":"10.1109/ICCWAMTIP.2014.7073369","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073369","url":null,"abstract":"In recent years, the E-commercial plays an important role in people's daily life. When on the Internet, people often buy commodities from Taobao, Tmall and make comments on them, the comments of the goods may have closely connections with commercial value, which often reflect what's the consumers really care when they choose one piece of good among thousands of other similar ones. How to mining these aspects which the consumers really concern is a problem left unsolved. As a potential effective solution to construct structured information for people's preference, Information Extraction(IE) has attracted more and more scholar's attention. A meaningful research area is Opinion Target Extraction(OTE). This paper proposed a system using translation model as well as word representation method to obtain user's interests on dataset in Chinese. To release the word segmentation error, a finely generated system with new Chinese word detection module is proposed. The experiments on two corpus subjected on digital product verify the effective of our method.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073453
D. Liu, L. Zhao
Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Docker is a new type of virtualization technology. In this paper, through an application instance, we will describe docker's applications and advantages in the cloud Computing.
{"title":"The research and implementation of cloud computing platform based on docker","authors":"D. Liu, L. Zhao","doi":"10.1109/ICCWAMTIP.2014.7073453","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073453","url":null,"abstract":"Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Docker is a new type of virtualization technology. In this paper, through an application instance, we will describe docker's applications and advantages in the cloud Computing.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073413
R. Shaikh, S. Deep, Jian-ping Li, K. Kumar, Asif Khan, I. Memon
Content Based Image Retrieval (CBIR) has been a challenging research area among researchers of both industries and academic institutions. Human can judge and respond by memory to obtain and locate the target image and relate it by specific object, but for computer vision it's a challenging issue to retrieve image from complex database that is difficult to balance with an efficient algorithm. Simultaneous situation and complex object has been always a big challenge to retrieve an object from image or query image from database. In this paper, we propose to combine Neural Network to sense a specific objective image that is content based and easily retrieving from complex database.
{"title":"Contemporary integration of content based image retrieval","authors":"R. Shaikh, S. Deep, Jian-ping Li, K. Kumar, Asif Khan, I. Memon","doi":"10.1109/ICCWAMTIP.2014.7073413","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073413","url":null,"abstract":"Content Based Image Retrieval (CBIR) has been a challenging research area among researchers of both industries and academic institutions. Human can judge and respond by memory to obtain and locate the target image and relate it by specific object, but for computer vision it's a challenging issue to retrieve image from complex database that is difficult to balance with an efficient algorithm. Simultaneous situation and complex object has been always a big challenge to retrieve an object from image or query image from database. In this paper, we propose to combine Neural Network to sense a specific objective image that is content based and easily retrieving from complex database.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073455
D. Liu, Dong Pan
In stream computing system, a very important part is the message transport subsystem. This article describes a lightweighted message transport system coded by nodejs. It could be used to build message flows in various ways flexible.
{"title":"Message transport system of distributed stream computing","authors":"D. Liu, Dong Pan","doi":"10.1109/ICCWAMTIP.2014.7073455","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073455","url":null,"abstract":"In stream computing system, a very important part is the message transport subsystem. This article describes a lightweighted message transport system coded by nodejs. It could be used to build message flows in various ways flexible.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073423
Fan Zhang, Fajie Wei, S. Tian
With the order production model prevalent in the enterprise, the delivery delays of supplier occur frequently. The delay risk of supplier in delivery will cause bad effect on enterprises to fulfill customers' orders. Based on the procurement data of the enterprise ERP system, this paper identifies delay risk factors of supplier in delivery and get the relationship between the delay risk factors and the delay degree with data mining method. The conclusions can help the enterprise select suppliers more reasonable and mitigate delay risk more effective.
{"title":"Analysis of delay risk factors for the delivery of suppliers based on association rules","authors":"Fan Zhang, Fajie Wei, S. Tian","doi":"10.1109/ICCWAMTIP.2014.7073423","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073423","url":null,"abstract":"With the order production model prevalent in the enterprise, the delivery delays of supplier occur frequently. The delay risk of supplier in delivery will cause bad effect on enterprises to fulfill customers' orders. Based on the procurement data of the enterprise ERP system, this paper identifies delay risk factors of supplier in delivery and get the relationship between the delay risk factors and the delay degree with data mining method. The conclusions can help the enterprise select suppliers more reasonable and mitigate delay risk more effective.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"209 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}