首页 > 最新文献

2006 8th International Conference Advanced Communication Technology最新文献

英文 中文
Verifying Software Streaming Systems 验证软件流系统
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205987
Ki-Hyuk Nam, Junkil Park, Jin-Young Choi, Jeong-Joon Lee, W. Choi
Software streaming is an emerging technology that enables SAV applications to be executed on-demand without download and installation, so that the applications are available virtually everywhere in the network. In developing software streaming systems, the engine and protocols must be carefully designed since the performance and reliability of the streamed software are directly affected by that of streaming engine and network status. In this paper, we present the application of formal verification in the design and implementation of the software streaming systems to take precautions against any potential defects. To achieve this goal, we use the model checker SPIN to model and verify the base architecture and protocol of the system. The effects of the use of formal verification is much more satisfactory than we expected
软件流是一种新兴技术,它使SAV应用程序无需下载和安装即可按需执行,因此应用程序几乎可以在网络中的任何地方使用。在开发软件流系统时,流引擎和流协议的设计是非常必要的,因为流引擎的性能和可靠性直接影响到流软件的性能和可靠性。在本文中,我们提出了形式化验证在软件流系统的设计和实现中的应用,以预防任何潜在的缺陷。为了实现这一目标,我们使用模型检查器SPIN对系统的基本体系结构和协议进行建模和验证。使用形式验证的效果比我们预期的要令人满意得多
{"title":"Verifying Software Streaming Systems","authors":"Ki-Hyuk Nam, Junkil Park, Jin-Young Choi, Jeong-Joon Lee, W. Choi","doi":"10.1109/ICACT.2006.205987","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205987","url":null,"abstract":"Software streaming is an emerging technology that enables SAV applications to be executed on-demand without download and installation, so that the applications are available virtually everywhere in the network. In developing software streaming systems, the engine and protocols must be carefully designed since the performance and reliability of the streamed software are directly affected by that of streaming engine and network status. In this paper, we present the application of formal verification in the design and implementation of the software streaming systems to take precautions against any potential defects. To achieve this goal, we use the model checker SPIN to model and verify the base architecture and protocol of the system. The effects of the use of formal verification is much more satisfactory than we expected","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fragment packet partial re-assembly method for intrusion detection 入侵检测的片段包部分重组方法
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205933
Bo-heung Chung, Jae-Deok Lim, Seungho Ryu, Young-ho Kim, Ki-young Kim
This paper proposes the fragment packet partial re-assembly method for intrusion detection. In the proposed method, intrusion detection is performed not with all the fragment packets but with partial fragment packets. If the fragment packet comes, the packet-matching-buffer containing the partial part of the previous fragment packet and this packet is merged into a packet-matching-buffer. After this work, pattern matching for this buffer is done. Finally, for the purpose of the next packet, the partial region of the current packet is stored into the packet-matching-buffer. With the help of these steps, there are two advantages. The one is that it doesn't need to re-assemble all fragment packets for intrusion detection. The other is that the size of buffer can be smaller than all fragment packet re-assembly and can be predictable as a constant size. The proposed method can be used efficiently to prevent malicious code of attackers for avoiding intrusion detection system
提出了一种用于入侵检测的碎片分组部分重组方法。该方法不是对所有的分片报文进行入侵检测,而是对部分分片报文进行入侵检测。如果收到分片报文,则包含前一个分片报文部分内容的packet-matching-buffer与该报文合并为一个packet-matching-buffer。完成这项工作后,将完成该缓冲区的模式匹配。最后,为了下一个数据包的目的,当前数据包的部分区域被存储到数据包匹配缓冲区中。在这些步骤的帮助下,有两个好处。一是它不需要重新组装所有的片段数据包进行入侵检测。另一种是缓冲区的大小可以小于所有分片包的重新组装,并且可以预测为一个常数大小。该方法可以有效地阻止攻击者的恶意代码,从而避免入侵检测系统
{"title":"Fragment packet partial re-assembly method for intrusion detection","authors":"Bo-heung Chung, Jae-Deok Lim, Seungho Ryu, Young-ho Kim, Ki-young Kim","doi":"10.1109/ICACT.2006.205933","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205933","url":null,"abstract":"This paper proposes the fragment packet partial re-assembly method for intrusion detection. In the proposed method, intrusion detection is performed not with all the fragment packets but with partial fragment packets. If the fragment packet comes, the packet-matching-buffer containing the partial part of the previous fragment packet and this packet is merged into a packet-matching-buffer. After this work, pattern matching for this buffer is done. Finally, for the purpose of the next packet, the partial region of the current packet is stored into the packet-matching-buffer. With the help of these steps, there are two advantages. The one is that it doesn't need to re-assemble all fragment packets for intrusion detection. The other is that the size of buffer can be smaller than all fragment packet re-assembly and can be predictable as a constant size. The proposed method can be used efficiently to prevent malicious code of attackers for avoiding intrusion detection system","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132606526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense against lap-top class attacker in wireless sensor network 无线传感器网络中笔记本级攻击防范
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205976
Md. Abdul Hamid, M. Mamun-Or-Rashid, C. Hong
We consider wireless sensor network (WSN) security and focus our attention to tolerate damage caused by an adversary who has compromised deployed sensor node to modify, block, or inject packets. We adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes. Adapting to WSN characteristics, we incorporate these secrets to establish new pairwise key for node to node authentication and design multi-path routing to multiple base stations to defend against HELLO flood attacks. We then analytically show that our defense mechanisms against HELLO flood attack can tolerate damage caused by an intruder
我们考虑无线传感器网络(WSN)的安全性,并将注意力集中在容忍攻击者对部署的传感器节点进行修改、阻止或注入数据包所造成的损害上。我们采用概率秘密共享协议,在两个传感器节点之间共享的秘密不会暴露给任何其他节点。针对无线传感器网络的特点,结合这些秘密建立新的节点对节点认证密钥,设计多路径路由到多个基站,抵御HELLO flood攻击。然后,我们分析表明,我们对HELLO洪水攻击的防御机制可以容忍入侵者造成的损害
{"title":"Defense against lap-top class attacker in wireless sensor network","authors":"Md. Abdul Hamid, M. Mamun-Or-Rashid, C. Hong","doi":"10.1109/ICACT.2006.205976","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205976","url":null,"abstract":"We consider wireless sensor network (WSN) security and focus our attention to tolerate damage caused by an adversary who has compromised deployed sensor node to modify, block, or inject packets. We adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes. Adapting to WSN characteristics, we incorporate these secrets to establish new pairwise key for node to node authentication and design multi-path routing to multiple base stations to defend against HELLO flood attacks. We then analytically show that our defense mechanisms against HELLO flood attack can tolerate damage caused by an intruder","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133347699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
A new efficient BS scheduler and scheduling algorithm in WiBro systems WiBro系统中一种新的高效BS调度算法及调度算法
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206261
Juhee Kim, Eunkyung Kim, K. Kim
In this paper, we propose an efficient structure of base station (BS) scheduler for the wireless broadband (WiBro) system. The BS scheduler consists of an uplink scheduling block, a downlink scheduling block and a channel quality information block. Both uplink and downlink scheduling blocks operate closely with a channel quality information block to schedule downlink packets and allocate uplink/downlink radio resources. Next, we propose a new efficient scheduling algorithm for WiBro systems. The proposed algorithm utilizes the user-based scheduling to relieve the MAP overhead problem and to modify the normal proportional fair (PF) scheduling algorithm to guarantee user-based quality of service (QoS). The simulation study shows that the proposed algorithm relieves the MAP overhead problem by allocating the minimum number of user bursts in a frame and supports better fairness performance, while supporting the system throughput performance similar to that of the normal PF scheduling algorithm
本文提出了一种适用于无线宽带(WiBro)系统的高效基站调度器结构。BS调度程序由上行调度块、下行调度块和信道质量信息块组成。上行链路和下行链路调度块都与信道质量信息块紧密合作,以调度下行链路数据包和分配上行/下行链路无线电资源。接下来,我们提出了一种新的高效的WiBro系统调度算法。该算法利用基于用户的调度来解决MAP开销问题,并对常规的比例公平调度算法进行改进,以保证基于用户的服务质量(QoS)。仿真研究表明,该算法通过在一帧内分配最小的用户突发数,缓解了MAP开销问题,并支持更好的公平性性能,同时支持与普通PF调度算法相似的系统吞吐量性能
{"title":"A new efficient BS scheduler and scheduling algorithm in WiBro systems","authors":"Juhee Kim, Eunkyung Kim, K. Kim","doi":"10.1109/ICACT.2006.206261","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206261","url":null,"abstract":"In this paper, we propose an efficient structure of base station (BS) scheduler for the wireless broadband (WiBro) system. The BS scheduler consists of an uplink scheduling block, a downlink scheduling block and a channel quality information block. Both uplink and downlink scheduling blocks operate closely with a channel quality information block to schedule downlink packets and allocate uplink/downlink radio resources. Next, we propose a new efficient scheduling algorithm for WiBro systems. The proposed algorithm utilizes the user-based scheduling to relieve the MAP overhead problem and to modify the normal proportional fair (PF) scheduling algorithm to guarantee user-based quality of service (QoS). The simulation study shows that the proposed algorithm relieves the MAP overhead problem by allocating the minimum number of user bursts in a frame and supports better fairness performance, while supporting the system throughput performance similar to that of the normal PF scheduling algorithm","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133439906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Web services hybrid dynamic composition models for ubiquitous computing networks 泛在计算网络的Web服务混合动态组合模型
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205968
D. Thakker, T. Osman, D. Al-Dabass
Web services are used in distributed computing technology including ubiquitous and pervasive computing and communication networks. Composition models of such Web services are an active research area. Classified as static, dynamic and semi-automatic composition models, these models address different application areas and requirements. . Thus far, the most successful practical approach to Web-services composition, largely endorsed by industry, borrows from business processes' workflow management. Unfortunately, standards subscribing to this approach fall under the static composition category, therefore the service selection and flow management are done a priori and manually. The second approach to Web-services composition aspires to achieve more dynamic composition by semantically describing the process model of Web service and thus making it comprehensible to reasoning engines and software agents. In this paper, we attempt to bridge the gap between the two approaches by introducing semantics to workflow-based composition. We aim to present a composition framework based on a hybrid solution that merges the benefit of practicality of use and adoption popularity of workflow-based composition, with the advantage of using semantic description to aid both service developers and composers in the composition process and facilitate the dynamic integration of Web services into it
Web服务用于分布式计算技术,包括泛在计算和普适计算以及通信网络。这类Web服务的组合模型是一个活跃的研究领域。这些模型分为静态、动态和半自动组合模型,针对不同的应用领域和需求。到目前为止,web服务组合最成功的实用方法(在很大程度上得到了业界的认可)借鉴了业务流程的工作流管理。不幸的是,订阅此方法的标准属于静态组合类别,因此服务选择和流管理是先验的和手动的。Web服务组合的第二种方法希望通过语义地描述Web服务的流程模型,从而使推理引擎和软件代理能够理解Web服务的流程模型,从而实现更动态的组合。在本文中,我们试图通过在基于工作流的组合中引入语义来弥合这两种方法之间的差距。我们的目标是提出一个基于混合解决方案的组合框架,它结合了使用的实用性和基于工作流的组合的流行性,以及使用语义描述在组合过程中帮助服务开发人员和组合者的优势,并促进了Web服务的动态集成
{"title":"Web services hybrid dynamic composition models for ubiquitous computing networks","authors":"D. Thakker, T. Osman, D. Al-Dabass","doi":"10.1109/ICACT.2006.205968","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205968","url":null,"abstract":"Web services are used in distributed computing technology including ubiquitous and pervasive computing and communication networks. Composition models of such Web services are an active research area. Classified as static, dynamic and semi-automatic composition models, these models address different application areas and requirements. . Thus far, the most successful practical approach to Web-services composition, largely endorsed by industry, borrows from business processes' workflow management. Unfortunately, standards subscribing to this approach fall under the static composition category, therefore the service selection and flow management are done a priori and manually. The second approach to Web-services composition aspires to achieve more dynamic composition by semantically describing the process model of Web service and thus making it comprehensible to reasoning engines and software agents. In this paper, we attempt to bridge the gap between the two approaches by introducing semantics to workflow-based composition. We aim to present a composition framework based on a hybrid solution that merges the benefit of practicality of use and adoption popularity of workflow-based composition, with the advantage of using semantic description to aid both service developers and composers in the composition process and facilitate the dynamic integration of Web services into it","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of the script-based service deployment solution 基于脚本的服务部署解决方案的设计和实现
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206437
Wonjae Lee, Y. Bak, Sangmin Woo, Changsoo Kim, Okgi Min, Hak-Young Kim
This paper provides a general overview of the script-based service deployment solution for Unix environments. Our solution requires password-less or pass-phrase-less SSH configuration for basic functionality. The service deployment solution overcomes limitations of Nixes, while maintaining simplicity and ease of use
本文提供了Unix环境下基于脚本的服务部署解决方案的总体概述。我们的解决方案需要无密码或无密码短语的SSH配置来实现基本功能。服务部署解决方案克服了nix的局限性,同时保持了简单性和易用性
{"title":"Design and implementation of the script-based service deployment solution","authors":"Wonjae Lee, Y. Bak, Sangmin Woo, Changsoo Kim, Okgi Min, Hak-Young Kim","doi":"10.1109/ICACT.2006.206437","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206437","url":null,"abstract":"This paper provides a general overview of the script-based service deployment solution for Unix environments. Our solution requires password-less or pass-phrase-less SSH configuration for basic functionality. The service deployment solution overcomes limitations of Nixes, while maintaining simplicity and ease of use","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart card initiative for South African e-governance - a study 南非电子政务智能卡计划——一项研究
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206443
P. Nkomo, A. Terzoli, Hippolyte Muyingi, G. S. V. R. K. Rao, Telkom
The paper presents the feasibility of setting up a smart card based platform using free and open source that is card terminal vendor independent. This is important in accelerating smart card usage since lack of vendor independence has been a barrier to smart card adoption. The thesis also proves the feasibility of integrating free and open source technologies in enhancing e-government in the South Africa context. This is important because adopting free and open source software allows African government the opportunity to roll out online government services at lesser costs and be in full control of localization and adaptation
本文提出了利用免费、开源、独立于卡终端厂商的方式建立一个基于智能卡的平台的可行性。这对于加速智能卡的使用非常重要,因为缺乏供应商独立性一直是智能卡采用的障碍。本文还以南非为背景,论证了自由与开源技术相结合的可行性。这一点很重要,因为采用免费和开源软件使非洲政府有机会以更低的成本推出在线政府服务,并完全控制本地化和调整
{"title":"Smart card initiative for South African e-governance - a study","authors":"P. Nkomo, A. Terzoli, Hippolyte Muyingi, G. S. V. R. K. Rao, Telkom","doi":"10.1109/ICACT.2006.206443","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206443","url":null,"abstract":"The paper presents the feasibility of setting up a smart card based platform using free and open source that is card terminal vendor independent. This is important in accelerating smart card usage since lack of vendor independence has been a barrier to smart card adoption. The thesis also proves the feasibility of integrating free and open source technologies in enhancing e-government in the South Africa context. This is important because adopting free and open source software allows African government the opportunity to roll out online government services at lesser costs and be in full control of localization and adaptation","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
General Expression for the Error Probability of Arbitrary Two-Dimensional Signaling with I/Q Amplitude and Phase Unbalances 具有I/Q幅值和相位不平衡的任意二维信号误差概率的一般表达式
Pub Date : 2006-05-08 DOI: 10.1093/ietcom/e89-b.12.3356
Jaeyoon Lee, D. Yoon, K. Hyun
The I/Q unbalance which is generated by a non-ideal component is an inevitable physical phenomenon and leads to performance degradation when we implement a practical two-dimensional (2-D) modulation system. This paper provides an exact and general expression involving the 2-D Gaussian Q-function for the SER/BER of arbitrary 2-D signaling with I/Q amplitude and phase unbalances over an additive white Gaussian noise (AWGN) channel by using the coordinate rotation and shifting technique. Through Monte Carlo simulations we verify our expression provided here for various 16-quadrature amplitude modulation (QAM) circular constellations
由非理想元件产生的I/Q不平衡是一种不可避免的物理现象,它会导致实际二维(2-D)调制系统的性能下降。本文利用坐标旋转和移位技术,给出了加性高斯白噪声(AWGN)信道上任意具有I/Q幅值和相位不平衡的二维信号的SER/BER的精确和一般的二维高斯Q函数表达式。通过蒙特卡罗模拟,我们验证了这里提供的表达式适用于各种16正交调幅(QAM)圆形星座
{"title":"General Expression for the Error Probability of Arbitrary Two-Dimensional Signaling with I/Q Amplitude and Phase Unbalances","authors":"Jaeyoon Lee, D. Yoon, K. Hyun","doi":"10.1093/ietcom/e89-b.12.3356","DOIUrl":"https://doi.org/10.1093/ietcom/e89-b.12.3356","url":null,"abstract":"The I/Q unbalance which is generated by a non-ideal component is an inevitable physical phenomenon and leads to performance degradation when we implement a practical two-dimensional (2-D) modulation system. This paper provides an exact and general expression involving the 2-D Gaussian Q-function for the SER/BER of arbitrary 2-D signaling with I/Q amplitude and phase unbalances over an additive white Gaussian noise (AWGN) channel by using the coordinate rotation and shifting technique. Through Monte Carlo simulations we verify our expression provided here for various 16-quadrature amplitude modulation (QAM) circular constellations","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Fast 2D both handstracking with articulate motion prediction 快速2D双手追踪与清晰的运动预测
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.205961
Hye-Jin Kim, Keun-Chang Kwak, Jaeyeon Lee
This paper proposes a novel real-time hand tracking algorithm in the presence of occlusion. For this purpose, we construct a limb model and maintain the model obtained from AR-KLT methods with respect to second-order auto-regression model and Kanade-Lucas-Tomasi(KLT) features, respectively. Furthermore, this method do not require to categorize types of superimposed hand motion based on directivity obtained by the slope's direction of KLT regression. Thus, we can develop a method of hand tracking for gesture and activity recognition techniques frequently used in conjunction with human-robot interaction (HRI) components. The experimental results show that the proposed method yields a good performance in the intelligent service robots, so called WEVER developed in ETRI
提出了一种遮挡下的手部实时跟踪算法。为此,我们构建了一个肢体模型,并分别针对二阶自回归模型和Kanade-Lucas-Tomasi(KLT)特征对AR-KLT方法得到的模型进行了维护。此外,该方法不需要根据KLT回归的斜率方向获得的指向性对叠加的手部运动类型进行分类。因此,我们可以开发一种手部跟踪方法,用于经常与人机交互(HRI)组件一起使用的手势和活动识别技术。实验结果表明,该方法在ETRI开发的智能服务机器人WEVER中具有良好的性能
{"title":"Fast 2D both handstracking with articulate motion prediction","authors":"Hye-Jin Kim, Keun-Chang Kwak, Jaeyeon Lee","doi":"10.1109/ICACT.2006.205961","DOIUrl":"https://doi.org/10.1109/ICACT.2006.205961","url":null,"abstract":"This paper proposes a novel real-time hand tracking algorithm in the presence of occlusion. For this purpose, we construct a limb model and maintain the model obtained from AR-KLT methods with respect to second-order auto-regression model and Kanade-Lucas-Tomasi(KLT) features, respectively. Furthermore, this method do not require to categorize types of superimposed hand motion based on directivity obtained by the slope's direction of KLT regression. Thus, we can develop a method of hand tracking for gesture and activity recognition techniques frequently used in conjunction with human-robot interaction (HRI) components. The experimental results show that the proposed method yields a good performance in the intelligent service robots, so called WEVER developed in ETRI","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Single measure similarity for spatial data management system 空间数据管理系统的单度量相似度
Pub Date : 2006-05-08 DOI: 10.1109/ICACT.2006.206071
Lau Bee Theng, Wang Yin Chai
Multimeasure structural similarity for object retrieval is an active research area in spatial databases management software. The similarity is particularly important for development of spatial database system like Geographic Information Systems (GIS) and navigation system. This paper presents research findings from the developed SMSS, single measure structural similarity model for spatial databases management systems. The model is proven to be more effective than existing multimeasure models in several areas that are reduced similarity measures, reduced object associations, and eliminated object approximation
面向对象的多度量结构相似度检索是空间数据库管理软件研究的热点。这种相似性对于地理信息系统(GIS)和导航系统等空间数据库系统的开发尤为重要。本文介绍了空间数据库管理系统单测度结构相似度模型(SMSS)的研究成果。该模型在减少相似性度量、减少目标关联和消除目标逼近等方面比现有的多度量模型更有效
{"title":"Single measure similarity for spatial data management system","authors":"Lau Bee Theng, Wang Yin Chai","doi":"10.1109/ICACT.2006.206071","DOIUrl":"https://doi.org/10.1109/ICACT.2006.206071","url":null,"abstract":"Multimeasure structural similarity for object retrieval is an active research area in spatial databases management software. The similarity is particularly important for development of spatial database system like Geographic Information Systems (GIS) and navigation system. This paper presents research findings from the developed SMSS, single measure structural similarity model for spatial databases management systems. The model is proven to be more effective than existing multimeasure models in several areas that are reduced similarity measures, reduced object associations, and eliminated object approximation","PeriodicalId":247315,"journal":{"name":"2006 8th International Conference Advanced Communication Technology","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114439360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 8th International Conference Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1