首页 > 最新文献

2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)最新文献

英文 中文
A reversible two-level image authentication scheme based on chaotic fragile watermark 一种基于混沌脆弱水印的可逆两级图像认证方案
D. Xiao, Jian Jin
For image authentication, the capability of accurately locating tampered pixel and ensuring security is desirable. In this paper, we propose a novel reversible two-level image authentication scheme based on chaotic fragile watermark. In the embedding process, at the pixel level, by utilizing the pixel correlation technology, the location watermark of each pixel is generated and embedded to the LSB of the pixel itself firstly. At the image block level, the image is then partitioned into blocks, and the relation watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block in a reversible way. The excursion block mapping sequence can be generated by sorting the keyed chaotic sequence. After all the relation watermarks are embedded, in each block embedded by relation watermark, the detection watermark is computed and embedded into the down-right subblock of the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks, then the embedded detection watermark of each block is extracted and the block itself is partially recovered for the first time. And the embedded relation watermark of each block is extracted and the block is fully recovered for the second time. Then we compute the new relation watermark and detection watermarks of each recovered block and perform comparison with the extracted ones. In the proposed scheme, the tampered watermark can pass the authentication because it does not reduce the value of image to some extent. But if the image content is tampered, the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. In the proposed image authentication scheme, the complicated nonlinear property of chaos is utilized to generate the pixel location watermark at the pixel level, construct the excursion block map, and create the relation watermark and detection watermark at the image block level. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.
对于图像认证,需要能够准确定位篡改像素并保证安全性。本文提出了一种新的基于混沌脆弱水印的可逆两级图像认证方案。在嵌入过程中,在像素级,利用像素相关技术,首先生成每个像素的位置水印,并将其嵌入到像素本身的LSB中。在图像块级,将图像分割成块,计算每个块的关系水印,并以可逆的方式嵌入到其相应偏移块的左上角子块中。通过对键控混沌序列进行排序,生成偏移块映射序列。在所有关系水印嵌入后,在每个被关系水印嵌入的块中计算检测水印,并以可逆的方式嵌入到块本身的向下子块中。在提取过程中,先将水印图像分割成若干块,然后提取每个块的嵌入检测水印,第一次对块本身进行部分恢复。提取每个块的嵌入关系水印,对块进行第二次完全恢复。然后计算每个恢复块的新的关系水印和检测水印,并与提取的水印进行比较。在该方案中,篡改后的水印不会在一定程度上降低图像的价值,因此可以通过认证。但是,如果图像内容被篡改,则通过将重新计算的位置水印与提取的位置水印进行比较,在像素级进一步将篡改者定位到特定像素。在该图像认证方案中,利用混沌的复杂非线性特性在像素级生成像素位置水印,构造偏移块映射,在图像块级生成关系水印和检测水印。理论分析和计算机仿真验证了所提图像认证方案的成功实现。
{"title":"A reversible two-level image authentication scheme based on chaotic fragile watermark","authors":"D. Xiao, Jian Jin","doi":"10.1109/CEWIT.2012.6606974","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606974","url":null,"abstract":"For image authentication, the capability of accurately locating tampered pixel and ensuring security is desirable. In this paper, we propose a novel reversible two-level image authentication scheme based on chaotic fragile watermark. In the embedding process, at the pixel level, by utilizing the pixel correlation technology, the location watermark of each pixel is generated and embedded to the LSB of the pixel itself firstly. At the image block level, the image is then partitioned into blocks, and the relation watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block in a reversible way. The excursion block mapping sequence can be generated by sorting the keyed chaotic sequence. After all the relation watermarks are embedded, in each block embedded by relation watermark, the detection watermark is computed and embedded into the down-right subblock of the block itself in a reversible way. In the extracting process, the watermarked image is partitioned into blocks, then the embedded detection watermark of each block is extracted and the block itself is partially recovered for the first time. And the embedded relation watermark of each block is extracted and the block is fully recovered for the second time. Then we compute the new relation watermark and detection watermarks of each recovered block and perform comparison with the extracted ones. In the proposed scheme, the tampered watermark can pass the authentication because it does not reduce the value of image to some extent. But if the image content is tampered, the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. In the proposed image authentication scheme, the complicated nonlinear property of chaos is utilized to generate the pixel location watermark at the pixel level, construct the excursion block map, and create the relation watermark and detection watermark at the image block level. Theoretical analysis and computer simulation have verified the successful achievement of the proposed image authentication scheme.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An effective device and data origin authentication scheme in home networks 一种在家庭网络中有效的设备和数据源认证方案
Soobok Shin, Hongjin Yeh, Kangseok Kim
Home network provides residents with autonomous services for convenient and secure life through communication among networked home devices. Particularly, as services of home network are provided through communication among home devices without human intervention, device and data origin authentication among devices are important for secure home. Most home devices do not have restrictions such as power supply and networking because home devices are located in home. On the other hand, home devices have the restrictions of computing power and memory capacity. Therefore security in home network should be designed effectively considering those restrictions. In this paper we propose device authentication scheme for secure home network. The proposed scheme does not have high computation complexity due to applying low cost operations such as hash function and exclusive-OR. Also the proposed scheme proposes mutual authentication and data origin authentication and then we show that our scheme is secure through security analysis.
家庭网络通过联网家庭设备之间的通信,为居民提供便捷、安全的自主服务。特别是,由于家庭网络的服务是通过家庭设备之间的通信提供的,无需人为干预,设备之间的设备和数据源认证对于安全家庭至关重要。大多数家庭设备没有电源和网络等限制,因为家庭设备位于家中。另一方面,家用设备受到计算能力和存储容量的限制。因此,家庭网络的安全设计应考虑到这些限制。本文提出了一种安全家庭网络的设备认证方案。该方案采用了哈希函数和异或运算等低成本操作,计算复杂度不高。提出了相互认证和数据源认证方案,并通过安全性分析证明了方案的安全性。
{"title":"An effective device and data origin authentication scheme in home networks","authors":"Soobok Shin, Hongjin Yeh, Kangseok Kim","doi":"10.1109/CEWIT.2012.6606977","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606977","url":null,"abstract":"Home network provides residents with autonomous services for convenient and secure life through communication among networked home devices. Particularly, as services of home network are provided through communication among home devices without human intervention, device and data origin authentication among devices are important for secure home. Most home devices do not have restrictions such as power supply and networking because home devices are located in home. On the other hand, home devices have the restrictions of computing power and memory capacity. Therefore security in home network should be designed effectively considering those restrictions. In this paper we propose device authentication scheme for secure home network. The proposed scheme does not have high computation complexity due to applying low cost operations such as hash function and exclusive-OR. Also the proposed scheme proposes mutual authentication and data origin authentication and then we show that our scheme is secure through security analysis.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"70 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting personal information behaviors with lifelog data 用生活日志数据预测个人信息行为
Minkyung Kim, Dong-Wook Lee, Kangseok Kim, Jai-hoon Kim, W. Cho
The research for monitoring and recognizing personal behaviors from various digital sensors has recently been doing in a variety of fields. We address this for “lifelog” - all of the digital information about personal daily life. The research typically focuses on collecting personal lifelog, managing huge amount of lifelog data, and recognizing activities and behavior patterns from them. The methods of extracting key features and characterizing patterns would be crucial for finding meaningful information from huge and complex lifelog data. The research is a significant challenge because individual's lifelog data would be useful to provide personal life services such as healthcare. In this paper, we propose the process for predicting personal future behavior by tracing back to the past experiences. The behavior prediction process is composed of five stages. Firstly, physical activities through various sensors are collected and then, major physical activities are extracted through feature selection. Secondly, behavioral context information such as location, time and object is annotated to each activity for recognizing the behavior states more exactly. Then all sequences of physical activities with contextual information are divided into each daily set. Thirdly, behavior patterns from them are extracted by analyzing key features. After that, all daily sequences are transferred as the set of semantic activities for presenting major behavior states. Fourthly, from the set of semantic activities, based on the behavior probability to be used for the behavior prediction in next step, a sequence tree is generated. Finally, the highest predicted activities can be shown in a user interface from the query based on `Time' or `Event'. In a user interface, the functions for retrieving past and current behaviors and searching the predicted behaviors will be provided by choosing specific point in time or the specific event. Currently we are building a system for processing the proposed behavior prediction.
近年来,利用各种数字传感器对人体行为进行监测和识别的研究已在各个领域展开。我们称其为“生活日志”——所有关于个人日常生活的数字信息。该研究通常侧重于收集个人生活日志,管理大量的生活日志数据,并从中识别活动和行为模式。提取关键特征和描述模式的方法对于从庞大而复杂的生命日志数据中找到有意义的信息至关重要。这项研究是一个重大的挑战,因为个人的生活日志数据将有助于提供个人生活服务,如医疗保健。在本文中,我们提出了通过追溯过去的经验来预测个人未来行为的过程。行为预测过程由五个阶段组成。首先通过各种传感器采集身体活动,然后通过特征选择提取主要的身体活动。其次,将地点、时间、对象等行为上下文信息标注到每个活动中,以便更准确地识别行为状态;然后将所有具有上下文信息的体育活动序列划分为每个日常集。第三,通过对关键特征的分析,从中提取行为模式。之后,所有的日常序列作为语义活动的集合被传递,用来表示主要的行为状态。第四,从语义活动集合中,根据下一步行为预测使用的行为概率,生成序列树。最后,根据“时间”或“事件”的查询,可以在用户界面中显示预测最高的活动。在用户界面中,通过选择特定的时间点或特定的事件,提供对过去和当前行为的检索以及对预测行为的搜索功能。目前,我们正在构建一个系统来处理提出的行为预测。
{"title":"Predicting personal information behaviors with lifelog data","authors":"Minkyung Kim, Dong-Wook Lee, Kangseok Kim, Jai-hoon Kim, W. Cho","doi":"10.1109/CEWIT.2012.6606983","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606983","url":null,"abstract":"The research for monitoring and recognizing personal behaviors from various digital sensors has recently been doing in a variety of fields. We address this for “lifelog” - all of the digital information about personal daily life. The research typically focuses on collecting personal lifelog, managing huge amount of lifelog data, and recognizing activities and behavior patterns from them. The methods of extracting key features and characterizing patterns would be crucial for finding meaningful information from huge and complex lifelog data. The research is a significant challenge because individual's lifelog data would be useful to provide personal life services such as healthcare. In this paper, we propose the process for predicting personal future behavior by tracing back to the past experiences. The behavior prediction process is composed of five stages. Firstly, physical activities through various sensors are collected and then, major physical activities are extracted through feature selection. Secondly, behavioral context information such as location, time and object is annotated to each activity for recognizing the behavior states more exactly. Then all sequences of physical activities with contextual information are divided into each daily set. Thirdly, behavior patterns from them are extracted by analyzing key features. After that, all daily sequences are transferred as the set of semantic activities for presenting major behavior states. Fourthly, from the set of semantic activities, based on the behavior probability to be used for the behavior prediction in next step, a sequence tree is generated. Finally, the highest predicted activities can be shown in a user interface from the query based on `Time' or `Event'. In a user interface, the functions for retrieving past and current behaviors and searching the predicted behaviors will be provided by choosing specific point in time or the specific event. Currently we are building a system for processing the proposed behavior prediction.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Inexpensive radar-based surveillance: Experimental study 廉价雷达监视:实验研究
V. Skvortsov, Keun Mvoung Lee, S. Yang
We present a novel approach which is helpful in building an inexpensive security or surveillance system for various applications. The system consists of a radar network that creates a virtual fence or barrier that is invisible, and in case of intrusion it will give an alarm, determine the location of a target and provide the target's relative velocity information. Our approach is a combination of continuous sensor measurements by commercially available automotive radar, specific network layout and advanced post-processing techniques. We use open source software and hardware to reduce the total cost of the system. The proposed network topology including radar coverage area is novel and similar to a half-fishbone shape, however the main focus of this paper is on creating a prototype of the radar network node. To get a control over the resolution of range measurements, the analysis of several post-processing algorithms for target detection was carried out. Another feature of our approach is an implementation of perceptual (robust) hash algorithm for storage of current signal `image' in memory and comparison of the signal and `no-intrusion' signal. During the work, applied software tool was created. It significantly simplifies the data acquisition and analysis. Extensive experimental measurements confirm the validity of the approach, show the performance of the radar and reveal some directions for future improvements.
我们提出了一种新的方法,有助于建立一个廉价的安全或监控系统的各种应用。该系统由一个雷达网络组成,该雷达网络可以创建一个无形的虚拟围栏或屏障,在入侵的情况下,它会发出警报,确定目标的位置,并提供目标的相对速度信息。我们的方法结合了商用汽车雷达的连续传感器测量,特定的网络布局和先进的后处理技术。我们使用开源软件和硬件来降低系统的总成本。提出的包括雷达覆盖区域的网络拓扑结构是新颖的,类似于半鱼骨形状,但本文的主要重点是创建雷达网络节点的原型。为了控制距离测量的分辨率,对几种目标检测的后处理算法进行了分析。我们方法的另一个特点是实现了感知(鲁棒)哈希算法,用于将当前信号“图像”存储在内存中,并将信号与“非入侵”信号进行比较。在工作过程中,创建了应用软件工具。它大大简化了数据采集和分析。大量的实验测量证实了该方法的有效性,展示了雷达的性能,并揭示了未来改进的一些方向。
{"title":"Inexpensive radar-based surveillance: Experimental study","authors":"V. Skvortsov, Keun Mvoung Lee, S. Yang","doi":"10.1109/CEWIT.2012.6606976","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606976","url":null,"abstract":"We present a novel approach which is helpful in building an inexpensive security or surveillance system for various applications. The system consists of a radar network that creates a virtual fence or barrier that is invisible, and in case of intrusion it will give an alarm, determine the location of a target and provide the target's relative velocity information. Our approach is a combination of continuous sensor measurements by commercially available automotive radar, specific network layout and advanced post-processing techniques. We use open source software and hardware to reduce the total cost of the system. The proposed network topology including radar coverage area is novel and similar to a half-fishbone shape, however the main focus of this paper is on creating a prototype of the radar network node. To get a control over the resolution of range measurements, the analysis of several post-processing algorithms for target detection was carried out. Another feature of our approach is an implementation of perceptual (robust) hash algorithm for storage of current signal `image' in memory and comparison of the signal and `no-intrusion' signal. During the work, applied software tool was created. It significantly simplifies the data acquisition and analysis. Extensive experimental measurements confirm the validity of the approach, show the performance of the radar and reveal some directions for future improvements.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A methodology for daylight optimisation of facades: An investigation of the opening design strategy with cellular automata for an office building 外墙采光优化方法:对办公楼开放设计策略的元胞自动机研究
Jieun Kim
Daylighting has an important role in sustainable architecture as it affects the energy consumption in a building. Especially for an office building, daylight helps not only to reduce the load on artificial lighting but also to promote work efficiency through promoting good human health, wellbeing and user comfort. The objective of this research is to invent an innovative façade design strategy that comes from the development of digital technology and dynamic daylight performance measuring methods. Thus, the various parameters are studied through the computational process of Cellular Automata (CA) to generate the several alternative opening patterns on the building facade. The each CA design values were tested under static and dynamic sky condition to analyze the quality and quantity of daylight and visual comfort throughout the whole year. The results were compared to find the optimum alternative designs in terms of the daylighting design criteria, which were researched from building code, standard and design guidelines for the office building. Finally, the research of an adaptive façade design strategy was concluded with the results from the above hybridization of generative and performative design methodology. This study discovers the architectural design approach from the CA and it will make not only progress in building façade aesthetics, but also human comfort with building sustainability.
采光在可持续建筑中扮演着重要的角色,因为它影响着建筑的能源消耗。特别是对于办公大楼来说,日光不仅有助于减少人工照明的负荷,还有助于通过促进人体健康、福祉和用户舒适度来提高工作效率。本研究的目的是发明一种创新的立面设计策略,该策略来自数字技术和动态日光性能测量方法的发展。因此,通过元胞自动机(CA)的计算过程来研究各种参数,以生成建筑立面上的几种可选择的开放模式。每个CA设计值在静态和动态天空条件下进行测试,以分析全年的日光质量和数量以及视觉舒适度。根据建筑规范、标准和办公楼设计指南的采光设计标准,对结果进行了比较,以找到最佳的替代设计。最后,结合上述生成式和表演式设计方法的结果,对自适应设计策略进行了研究。本研究发现了来自CA的建筑设计方法,它不仅将在建筑立面美学方面取得进步,而且将在建筑可持续性方面提高人类的舒适度。
{"title":"A methodology for daylight optimisation of facades: An investigation of the opening design strategy with cellular automata for an office building","authors":"Jieun Kim","doi":"10.1109/CEWIT.2012.6606981","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606981","url":null,"abstract":"Daylighting has an important role in sustainable architecture as it affects the energy consumption in a building. Especially for an office building, daylight helps not only to reduce the load on artificial lighting but also to promote work efficiency through promoting good human health, wellbeing and user comfort. The objective of this research is to invent an innovative façade design strategy that comes from the development of digital technology and dynamic daylight performance measuring methods. Thus, the various parameters are studied through the computational process of Cellular Automata (CA) to generate the several alternative opening patterns on the building facade. The each CA design values were tested under static and dynamic sky condition to analyze the quality and quantity of daylight and visual comfort throughout the whole year. The results were compared to find the optimum alternative designs in terms of the daylighting design criteria, which were researched from building code, standard and design guidelines for the office building. Finally, the research of an adaptive façade design strategy was concluded with the results from the above hybridization of generative and performative design methodology. This study discovers the architectural design approach from the CA and it will make not only progress in building façade aesthetics, but also human comfort with building sustainability.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"89 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126111232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploration of heuristic rules for green home design decision support system 绿色家居设计决策支持系统的启发式规则探索
Hyungjung Kim, Dongjun Suh, Seongju Chang
Through a serious of energy simulation sessions, it is possible to compare energy performance pertaining to the different internal layouts applicable to typical apartment housing units to identify generalized rules for residential building design strategies and generating energy-saving alternatives. We explored the impact of different attributes of the internal walls such as length, material, geometry, and location on the heating load profiles by using multiple sensitivity analyses based on the Design Builder simulation tool. The results are summarized into a set of heuristic rules for evaluating apartment unit's internal layout design alternatives to maximize their energy performance.
通过一系列的能源模拟会议,可以比较适用于典型公寓住宅单元的不同内部布局的能源性能,以确定住宅建筑设计策略和产生节能替代方案的一般规则。通过基于Design Builder仿真工具的多重灵敏度分析,我们探索了不同内墙属性(如长度、材料、几何形状和位置)对热负荷分布的影响。结果总结为一组启发式规则,用于评估公寓单元的内部布局设计方案,以最大限度地提高其能源性能。
{"title":"Exploration of heuristic rules for green home design decision support system","authors":"Hyungjung Kim, Dongjun Suh, Seongju Chang","doi":"10.1109/CEWIT.2012.6606980","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606980","url":null,"abstract":"Through a serious of energy simulation sessions, it is possible to compare energy performance pertaining to the different internal layouts applicable to typical apartment housing units to identify generalized rules for residential building design strategies and generating energy-saving alternatives. We explored the impact of different attributes of the internal walls such as length, material, geometry, and location on the heating load profiles by using multiple sensitivity analyses based on the Design Builder simulation tool. The results are summarized into a set of heuristic rules for evaluating apartment unit's internal layout design alternatives to maximize their energy performance.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trajectory extraction for abnormal behavior detection in public area 基于轨迹提取的公共区域异常行为检测
Jae-Jung Lee, Gyujin Kim, Moonhyun Kim
Surveillance system to improve safety and security is a major demand for the management and control of public area. Crowd management and control system requires a situation recognition technique which can predict accidents and provide alarms to the monitoring personnel. In this paper, we propose an abnormal behavior detection technique by using trajectory extraction of moving objects in video. Abnormal behavior includes running persons. The proposed abnormal behavior detection system separates background and foreground using Gaussian mixture model. And then, foreground image is used to generate the trajectories of moving objects using a Kanade-Lucas-Tomasi algorithm of the optical flow method. In addition, noise removal step is added to improve the accuracy of the created trajectory. From the trajectory of moving objects information, such as length, pixel, coordinate and moving degree is extracted. As the result of the estimation of abnormal behavior, objects' behavior is configured and analyzed based on a priori specified scenarios, such as running persons. In the results, proposed system is able to detect the abnormal behavior in public area.
提高监控系统的安全性和安全性是公共区域管理和控制的主要需求。人群管理与控制系统需要一种能够预测事故并向监控人员提供报警的态势识别技术。本文提出了一种基于运动目标轨迹提取的视频异常行为检测技术。异常行为包括跑人。提出的异常行为检测系统采用高斯混合模型分离背景和前景。然后,使用光流法中的Kanade-Lucas-Tomasi算法,利用前景图像生成运动物体的运动轨迹。此外,还增加了去噪步骤,提高了生成轨迹的精度。从运动物体的轨迹中提取长度、像素、坐标和运动度等信息。通过对异常行为的估计,可以根据先验的特定场景(如跑步人员)对对象的行为进行配置和分析。实验结果表明,该系统能够对公共场所的异常行为进行检测。
{"title":"Trajectory extraction for abnormal behavior detection in public area","authors":"Jae-Jung Lee, Gyujin Kim, Moonhyun Kim","doi":"10.1109/CEWIT.2012.6606979","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606979","url":null,"abstract":"Surveillance system to improve safety and security is a major demand for the management and control of public area. Crowd management and control system requires a situation recognition technique which can predict accidents and provide alarms to the monitoring personnel. In this paper, we propose an abnormal behavior detection technique by using trajectory extraction of moving objects in video. Abnormal behavior includes running persons. The proposed abnormal behavior detection system separates background and foreground using Gaussian mixture model. And then, foreground image is used to generate the trajectories of moving objects using a Kanade-Lucas-Tomasi algorithm of the optical flow method. In addition, noise removal step is added to improve the accuracy of the created trajectory. From the trajectory of moving objects information, such as length, pixel, coordinate and moving degree is extracted. As the result of the estimation of abnormal behavior, objects' behavior is configured and analyzed based on a priori specified scenarios, such as running persons. In the results, proposed system is able to detect the abnormal behavior in public area.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127086951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An approach for QoE-based media sharing in DLNA home network DLNA家庭网络中基于qos的媒体共享方法
Xianshu Jin, P. Deshpande, Ilchul Yoon, S. Yang, Sunyoung Han
Over the last decades, various kinds of Internet enabled devices have been developed. DLNA (Digital Living Network Alliance) has provided standard guidelines to improve the interoperability of DLNA-capable devices and to enhance the usability of digital contents through DLNA Certified devices. However, for several reasons, the transmission for media sharing between DLNA devices is still not seamless and users still experience low quality services, even between DLNA certified devices. In this paper, we address this problem from the respective of QoE (Quality of Experience) and present a system designed to keep user's service quality with reduced network resource consumption in terms of network bandwidth usage. As the key component in the system we propose Media Server that keeps media files encoded different qualities and delivers media files to multiple DLNA client devices, considering available bandwidth in a network. At each device request, the server chooses the media file that is the most appropriate for the devices with respect to the network status at the time of the request. Media files are classified into 5 different levels where each level has different bit rate. Before transmission, Media Server checks for the network status and selects the best video level that can be delivered to the client device with the best quality. We present the usefulness of our approach with results obtained from experimental studies to deliver video services seamlessly to meet users' quality requirements. Our results show that the proposed approach can also make better utilization of the limited home-network resources.
在过去的几十年里,各种各样的互联网设备被开发出来。DLNA(数字生活网络联盟)提供了标准指南,以提高支持DLNA的设备的互操作性,并通过DLNA认证设备增强数字内容的可用性。然而,由于一些原因,DLNA设备之间的媒体共享传输仍然不是无缝的,用户仍然体验到低质量的服务,即使在DLNA认证的设备之间也是如此。在本文中,我们从QoE(体验质量)的角度来解决这个问题,并提出了一个系统,旨在保持用户的服务质量,同时减少网络资源的消耗,在网络带宽的使用方面。作为系统的关键组件,我们提出了Media Server,它将媒体文件编码成不同的质量,并在考虑网络可用带宽的情况下将媒体文件传送到多个DLNA客户端设备。对于每个设备请求,服务器根据请求时的网络状态选择最适合设备的媒体文件。媒体文件被分为5个不同的级别,每个级别都有不同的比特率。传输前,Media Server检查网络状态,选择传输到客户端设备的视频质量最好的视频级别。我们用实验研究的结果来展示我们的方法的实用性,以无缝地提供视频服务,以满足用户的质量要求。结果表明,该方法可以更好地利用有限的家庭网络资源。
{"title":"An approach for QoE-based media sharing in DLNA home network","authors":"Xianshu Jin, P. Deshpande, Ilchul Yoon, S. Yang, Sunyoung Han","doi":"10.1109/CEWIT.2012.6606982","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606982","url":null,"abstract":"Over the last decades, various kinds of Internet enabled devices have been developed. DLNA (Digital Living Network Alliance) has provided standard guidelines to improve the interoperability of DLNA-capable devices and to enhance the usability of digital contents through DLNA Certified devices. However, for several reasons, the transmission for media sharing between DLNA devices is still not seamless and users still experience low quality services, even between DLNA certified devices. In this paper, we address this problem from the respective of QoE (Quality of Experience) and present a system designed to keep user's service quality with reduced network resource consumption in terms of network bandwidth usage. As the key component in the system we propose Media Server that keeps media files encoded different qualities and delivers media files to multiple DLNA client devices, considering available bandwidth in a network. At each device request, the server chooses the media file that is the most appropriate for the devices with respect to the network status at the time of the request. Media files are classified into 5 different levels where each level has different bit rate. Before transmission, Media Server checks for the network status and selects the best video level that can be delivered to the client device with the best quality. We present the usefulness of our approach with results obtained from experimental studies to deliver video services seamlessly to meet users' quality requirements. Our results show that the proposed approach can also make better utilization of the limited home-network resources.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electrical sterilization of juice by discharged HV impulse waveform 用放电高压脉冲波形对果汁进行电杀菌
Hee-Kyu Lee
In the sterilization system by using HV impulse waveform apple juice was sterilized with HV discharged oscillatory decay waveform. The optimal condition of impulse waveform for electrical sterilization has presented the excellent condition at 40kV/cm, 4mH. The characteristic of this waveform shows oscillatory decay waveform with multiple pulses. And this impulse waveform was more effective to kill Saccharomyces cervisiae than exponential decay waveform. Saccharomyces cervisiae to become musty and sour for apple juice was used as the sample. Especially, Vitamin C content of electrical sterilized apple juice was close to that of fresh apple juice, but was much higher than that of heat treated apple juice. Heat treated apple juice lost 80% of flavor components, whereas electrical sterilized apple juice lost only 10%. This apple juice has good effect of electrical sterilization because of higher conductivity than water. Therefore this experiment can be treated sterilization without loss of vitamin C and original taste or perfume to apple juice. As a result, it is found that apple juice can be sterilized on 40kV/cm, 4mH by using our designed HV impulse sterilizer.
在高压脉冲灭菌系统中,采用高压放电振荡衰减波形对苹果汁进行灭菌。电杀菌脉冲波形的最佳条件为40kV/cm, 4mH。该波形的特征为多脉冲振荡衰减波形。与指数衰减波形相比,脉冲波形对酿酒酵母的杀灭效果更好。以苹果果汁发霉发酸的酿酒酵母为研究对象。其中,电杀菌苹果汁的维生素C含量与新鲜苹果汁接近,但远高于热处理苹果汁。经过热处理的苹果汁失去了80%的风味成分,而经过电消毒的苹果汁只失去了10%。该苹果汁电导率比水高,具有良好的电杀菌效果。因此,本实验可以在不损失苹果汁维生素C和原有风味的情况下进行灭菌处理。实验结果表明,设计的高压脉冲消毒器在40kV/cm, 4mH的电压下可以对苹果汁进行灭菌。
{"title":"Electrical sterilization of juice by discharged HV impulse waveform","authors":"Hee-Kyu Lee","doi":"10.3844/AJASSP.2006.2076.2078","DOIUrl":"https://doi.org/10.3844/AJASSP.2006.2076.2078","url":null,"abstract":"In the sterilization system by using HV impulse waveform apple juice was sterilized with HV discharged oscillatory decay waveform. The optimal condition of impulse waveform for electrical sterilization has presented the excellent condition at 40kV/cm, 4mH. The characteristic of this waveform shows oscillatory decay waveform with multiple pulses. And this impulse waveform was more effective to kill Saccharomyces cervisiae than exponential decay waveform. Saccharomyces cervisiae to become musty and sour for apple juice was used as the sample. Especially, Vitamin C content of electrical sterilized apple juice was close to that of fresh apple juice, but was much higher than that of heat treated apple juice. Heat treated apple juice lost 80% of flavor components, whereas electrical sterilized apple juice lost only 10%. This apple juice has good effect of electrical sterilization because of higher conductivity than water. Therefore this experiment can be treated sterilization without loss of vitamin C and original taste or perfume to apple juice. As a result, it is found that apple juice can be sterilized on 40kV/cm, 4mH by using our designed HV impulse sterilizer.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effective rate maximization in large MIMO multiuser system 大型MIMO多用户系统的效率最大化
Ilgyu Choi, Chungyong Lee
Large MIMO system can achieve high data rate with simple linear transceiver. However, for this advantage, long time is required to estimate channel state information (CSI) at base station (BS). When estimation time is not negligible in coherence time, there exists tradeoff between estimation and data transmission. With long estimation time, data rate increases, but data transmission time decreases. Otherwise, with short estimation time, data rate decreases, but data transmission time increases. Therefore, maximizing not data rate itself but effective rate is required in large MIMO system. We mathematize an effective rate problem in a reasonable large MIMO system, and prove its concavity and find the optimal tradeoff point.
大型MIMO系统可以用简单的线性收发器实现高数据速率。然而,为了实现这一优势,需要很长时间来估计基站(BS)的信道状态信息(CSI)。当估计时间在相干时间中不可忽略时,在估计和数据传输之间存在权衡。随着估计时间的延长,数据速率增加,但数据传输时间减少。否则,由于估计时间较短,数据速率降低,但数据传输时间增加。因此,在大型MIMO系统中,需要的不是最大化数据速率本身,而是最大化有效速率。对一个合理的大型MIMO系统的效率问题进行了数学化,证明了其凹凸性,并找到了最优平衡点。
{"title":"Effective rate maximization in large MIMO multiuser system","authors":"Ilgyu Choi, Chungyong Lee","doi":"10.1109/CEWIT.2012.6606978","DOIUrl":"https://doi.org/10.1109/CEWIT.2012.6606978","url":null,"abstract":"Large MIMO system can achieve high data rate with simple linear transceiver. However, for this advantage, long time is required to estimate channel state information (CSI) at base station (BS). When estimation time is not negligible in coherence time, there exists tradeoff between estimation and data transmission. With long estimation time, data rate increases, but data transmission time decreases. Otherwise, with short estimation time, data rate decreases, but data transmission time increases. Therefore, maximizing not data rate itself but effective rate is required in large MIMO system. We mathematize an effective rate problem in a reasonable large MIMO system, and prove its concavity and find the optimal tradeoff point.","PeriodicalId":221749,"journal":{"name":"2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1